TCP/IP Protocol: Data Encapsulation, Network Addressing, and Broadcast Communication

Verified

Added on  2024/07/22

|12
|2894
|149
AI Summary
This document explores the intricacies of the TCP/IP protocol, focusing on data encapsulation, network addressing, and broadcast communication. It delves into the layered structure of TCP, illustrating how data units are processed and transmitted through different layers. The document also examines the challenges of network loops and the role of Spanning Tree Protocols in mitigating them. Additionally, it discusses the importance of the Point-to-Point Protocol (PPP) in wide area networks (WANs) and its sub-protocols for data exchange. Finally, the document explores the significance of modulation in digital cellular telephony and the concept of digital transmission on a bandpass channel. Through detailed diagrams and explanations, this document provides a comprehensive understanding of key concepts in network communication.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Question 1
There are two different ways that are used in communication in the TCP/IP protocol. It used

most widely form of local area network technology i.e. with the help of TCP protocols. TCP

protocol uses multiple layers to record the payload and establish the units of data. It shows

that data arrives from one of the senders and obtain with the use of protocols. It is to be

mentioned that each data unit passes through the layers which are maintained in the TCP/IP

model. A diagram which contains the various units of data i.e. it’s data layers, maintain

communication with a peer to peer architecture and obtain the name of PDU and its

components used in the PDU structure. It is required to describe the encapsulation steps of

certain layers.

The amount of data is sent by the physical layer of the network. The data is formed again by

the receiver using the digital amount of data. Using the protocol at the application layer, the

processing of data is obtained by protocol stack and the whole process of achieving this is

called decapsulation. It is required to form the steps at the receiver side and determine the

format by using the combination of encapsulation and decapsulation of the diagrams.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
The above diagram is used to show the multiple layers of the OSI and TCP/IP model, their
protocols and the way of communication with its explanation.

If there is a failure found in the network and the use of that network is currently available
so that multiple devices are connected with their links. If one node in the network is not

working than other nodes are ready to detect the path to provide communication. This

methodology is mostly used in the iteration systems if these types of systems are not in

use then it will result in flood and an endless loop in the system is working and it makes

results for spiking or a network fails in the system. The host used in the diagram provides

Host A receives LAN1 from Host B of LAN2 and maintain communication in the

network. It is to be illustrated that the network addressing table of MAC in which

switches suffer from the thrashing and want an explanation for dispatching of frames

infinitely.

It is possible to use the following diagrams and again draw the new structures to show
and explain the broadcast on the network. It makes updates in the addressing of MAC

tables for various switches like swith1, switch2 and also used for positions of the frame in

local area network.
(Kai, Yu & Chen, 2007)
Document Page
Question 2
If there multiple paths in the system between two endpoints in the Layer2 architecture then

loops are created in the system. The broadcasting of the data is set up in the loop and provide

multicasting in the circuit where each switch is work as a broadcasting transmission at each

node and broadcasting of messages is achieved that results in network overflow. If IP

addressing frames are sent to the loop ends, so it can maintain the iterative nature as the

header of layer2 doesn’t contain Transistor-Transistor logic. Spanning Tree Protocols are

used for the continuous problem of iteration in the network.

The weight is written on the edges of the network that represents the path of the frame or

amount of load in the network used for communication in the complete network.

Host B transmits the frame having no Transistor-Transistor Logic value. So when the data is

received by the Hub2 so that first and second switch will be represented by its weight as 1

and 2 as mentioned in the diagram. Now it is possible for both the switches 1 and 2 to

evaluate the MAC address of host B on the node and make all the active nodes overflow.

After evaluating the learning of B, both the switches will send it to Hub1 and this makes

broadcasting to the switches and also to the active ports. Now both the switches will help to

complete the MAC of host B on both the ports. The hubs and switches are used to go through

the same steps and initiate the looping of F2 and it will result not to stable in the switches.

(Zhang & Feng, 2012)
Document Page
Question 3
As the diagram specifies the time slots to send data to the Bob, it will help in designing of the

frame but it doesn’t have the MAC address of the Bob.

S-MAC: L6, D-MAC: FFFF: FFFF: FFFF, Transmitter IP: N6, Objective IP: N2,

Transmitter MAC: L6, Objective MAC: 0000:0000:0000

If the sub-protocols of internet layer i.e. Address Resolution Protocol is obtained by the R1,

the address of L2 header used to maintain the objective address and opened it. It has

maintained its own addressing and make a response for MAC address. When response it gets

at its location, the overall process of the frames is finished
S-MAC: L6, D-MAC: L2, S-IP:
N6, D-IP: N5 will be sent to R1. As the R1 acknowledge the frame, D-MAC makes a check

on the data and open it then again recheck the Internet protocols and make accessibility in the

routing table or not. If the accessibility is confirmed then it will be acknowledged to the R2

and if not then it will be released. Now, R2 will perform the AND operation and solve the

address resolution protocols. The new data packet is created as:

S-MAC: L3, D-MAC: L4, S-IP: N6, D-IP: N5.

The segment should check the routing table and able to send the packets to R2 and this helps

to open the second header L2 and it should try the diagnose the third header L3 and then

evaluate the destination point of the internet protocol which is linked with R2. If it maintains

the connection initially that defines Address resolution protocol is fixed for MAC addresses.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
S-MAC: L3, D-MAC: L5, S-IP: N1, D-IP: N5
The frame is now collected at the bob address and it allows controlling the destination of

MAC address by its own or not. If the address is maintained for its own then the header

second L2 and it must identify the destination of IP addresses. It should help in transmitting

the data by encapsulating it make responses for it.

S-MAC: L6, D-MAC: S-IP: N6, D-IP: N5

When the data is transmitted between Bob and Alice, then he will maintain the AND

processes with the relation between subnet and D-IP and examine the location to which data

is moved in the same network or not. It helps in resolving with using multiple gateways.

("Network Protocols", n.d.)
Document Page
Document Page
Question 4
1.
Explain the importance of PPP with respect to wide area networks (WANs)?
The Point to Point protocol comes under the family of networking protocols that are used to

provide a standardized form to communicate using multiple protocols by point to point links.

The point to point protocol has three main points that provide a way to encapsulate multiple

datagrams, creates a link control protocol, test the data link connection and a bond of network

control protocols that are used for multiple layer protocols. It uses many real-time protocols

of network layer like Internet Protocol Control, AppleTalk Control Protocol, Novell IPX

control and many others. It also provides many ways in which Point to Point protocol has

many keys of benefits. A huge amount of information is circulated in a minimum amount of

time and maintains fast speed to establish a secure connection. The information which is

communicated in a wide area network is providing a secure access to users in a limited.

2.
Explain how PPP enables users to exchange data in WAN by using sub-protocols such as
LCP, PAP, CHAP, NCP, IPCP.

With the help of multiple protocols information is exchanged in a wide area network using a

network. It provides transport services using Integrated Service Digital Network, ATM and

frame delays. It provides four components to be connected with the system and they are

integrated service digital network,
V.24, EIA/TIA-232-C, V.35. The method which is used by
Data encapsulation provides datagrams for multiple protocols. Some protocols which are

encapsulated with the help of the same link and transported alternatively using diverse

protocols of internet layer. Here are some protocols which are used in the Point to Point

protocol for exchanging the information in WAN networks are:

LCP protocol:
By using networking fundamentals, Link control protocol helps to make a
part of the point to point protocol in all combinations. In both the sending and receiving

devices using PPP protocol packets of Link, control helps in evaluating the transmission of

the communication. The LCP protocol has

It helps to detect the identity of the connected devices and check the rejection and chose
to accept or reject the device.

Evaluate the exact packet size for transmission that is accepted for communication.
It is used to search for the errors in the system configuration.
It must work for the parameters that are fit in the requirements.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NCP protocol: It is used to provide the middle layers in the protocol and it is early
implemented using ARPANET. It is defined as the first operational packet switching

network. It helps users to access computers and many devices at certain locations, provide

transmission in files between systems. It enables many application services like email and

other file transfers.

PAP Protocol:
This protocol is based on the Password Authentication Protocol which is used
validate users by Point to Point protocol. All networks in the system support Point to Point

protocol. PAP is a very simple user authenticated protocol that is not able to encrypt the data

and send other details to the valid server. The amount of data is exchanged between the

server and the users.

CHAP Protocol:
It is known as Challenge Handshake Authenticate Protocol. It gives a more
secure form of procedure to connect with the system than Password Authenticate Protocol.

When the connection is established in the network then the server gives a message to the

acceptor and responds with a value that has multiple functions. It
examines the acceptance by
comparing its own measures of the values in hash.

IPCP Protocol:
Internet Protocol Control Protocol is a type of Network Control Protocol that
helps in establishing and configures the IP addresses used in connecting or disconnecting

with the IP protocol modules on both the ends. This protocol helps in using the data filled in

the codes exchange mechanism as Link Control Protocol. IPCP is not accepted by PPP

protocols because it don’t reach to its networks.
("The Point-to-Point Protocol (PPP)", n.d.)
Document Page
Question 5
1.
Explain why modulation of a digital signal is required for transmission in digital
cellular telephony?

For improving the communication quality between two endpoints the technique of Digital

Modulation is used. The signal consists of 0’s and 1’s. It provides more capability to the

information systems, data security and provides availability to the systems with high

communication. It provides high frequency on the analog signals and us modulation of the bit

stream of digital mode. The digital signals are sent in the digital circuit around the digital

medium. The specifications of the channel are maintained to communicate with the signal

that has not definite bandwidth that actually not found. The transmissions of digital signals

don’t solve the rectangular bandwidth type. So if signals are transmitted then it is required to

modulate the signal in digital form to correct its bit rate. The alterations in the type and voice

with the modulation of excellent voice. It uses some benefits for modulating the digital signal

for the data transmission in the digital signals. These are:

It should decrease the height of the antenna.
It should increase the range of communication.
The system has a mixed form of signals.
It should maintain the possibility of multiplexing.
2.
Briefly explain the digital transmission on a bandpass channel?
The meaning of Broadband transmission of the signal specifies that it can send digital

signals on the channel and change digital signals to analog signals i.e. it can require

modulation. The transmission of broadband signal uses bandpass channel. In the network,

a bandpass channel is defined as it is a type of channel which doesn’t start from zero. The

actual point of bandpass transmission is to send digital signals on the channel without

converting the digital signal to analog signals. It has a requirement to use a bandpass

channel. A channel which is more available than the lowpass channel. If the channel is

used in bandpass then digital signals don’t send directly it must be converted to an analog

signal before transmission. In the process of transmission in Baseband pulse, a group of

data is symbolized in the form of digital pulse modulation signal which is transmitted on

low pass channels.
(Guimarães, 2009)
Document Page
Question 6
The amount of data that is used for a total of nine collisions that are detected in the form of a

circle with the marking digits on it.

Switches: It is identified as a computer device which works on the network that is used to

attach the devices together with the help of data packets switched to send and receive the

data. It has network components that connect more than two devices together. It is called a

network bridge with multiple ports helps to process and connect packets at the data link layer.

Hub: It is called as a single point of devices in the network. It can connect various points to

the Local Area Network. It should maintain many ports when single data packets are come at

one node and keep a copy the packets to other nodes. It is a central node through which all

the other nodes can communicate with each other.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Bridges: It is defined as a network of the computer that maintains inter-related connections
with the network and uses some type of protocol. It works at the OSI model in the data link

layer and provides communication between two separate forms of network. It can filter the

data and generate a frame for MAC address networks.

Router: It is developed to build network connection to send data packets in the computer

systems. It helps to maintain control over the traffic that points to the network. It doesn’t

maintain the collisions in the router and helps to build one broadcast network.
(Topor et al.,
2009)

References:
Document Page
Kai, C., Yu, N., & Chen, Y. (2007). An enhancement scheme of TCP protocol in mobile
Ad hoc networks: MME-TCP.
Journal Of Electronics (China), 24(1), 1-9. doi:
10.1007/s11767-005-0105-y

Zhang, Y., & Feng, X. (2012). Ad Hoc LAN Protocol-Based Defense Wormhole Attack
Method.
Recent Advances In Computer Science And Information Engineering, 195-201.
doi: 10.1007/978-3-642-25766-7_25

Network Protocols. Communications And Networking, 79-104. doi: 10.1007/978-1-
84628-645-2_6

The Point-to-Point Protocol (PPP). Ipv6 In Practice, 199-207. doi: 10.1007/978-3-540-
48001-3_15

Guimarães, D. (2009). Passband Digital Transmission. Digital Transmission, 411-583.
doi: 10.1007/978-3-642-01359-1_6

De Silva, A. P., Gunaratne, H. N., Gunnlaugsson, T., Huxley, A. J., McCoy, C. P.,
Rademacher, J. T., & Rice, T. E. (1997). Signaling recognition events with fluorescent

sensors and switches.
Chemical reviews, 97(5), 1515-1566.
Topor, R., Salem, K., Gupta, A., Goda, K., Gehrke, J., & Palmer, N. et al. (2009).
Switch.
Encyclopedia Of Database Systems, 2896-2896. doi: 10.1007/978-0-387-39940-
9_3728
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]