Comprehensive Study: OSI Model, TCP/IP Protocol Suite, and Networking
VerifiedAdded on 2023/04/23
|5
|1050
|215
Homework Assignment
AI Summary
This assignment provides a detailed comparison of the OSI model and the TCP/IP protocol suite, outlining the layers of each model and their correlations. It identifies network support and user support layers within the TCP/IP suite, explaining data encapsulation and the responsibilities of the Data Link, Network, and Transport layers. The assignment differentiates between network and transport layer delivery, discusses error detection mechanisms, and clarifies the roles of logical, physical, and port addresses. It also lists services provided by the application layer and explains the advantages of combining layers in the TCP/IP model. Desklib offers this solution and many other solved assignments for students.

Running head: NETWORKING
Networking Technology
Name of Student-
Name of University-
Author’s Note-
Networking Technology
Name of Student-
Name of University-
Author’s Note-
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1NETWORKING
1. The layers of OSI model are: Physical Layer, data link layer, network layer, transport
layer, session layer, presentation layer and application layer.
The layers of TCP/IP model are: network access layer, internet layer, transport layer, and
application layer.
2. The data link layer and the physical layer of the OSI model represents network layer
TCP/IP model. The network layer represents the internet layer of the TCP/IP model. The
transport layer of both the models are same (Zseby et al., 2016). Three layers of OSI model that
is session layer, presentation layer, and the application correlates the application layer of the
TCP/IP model.
3. Physical layer, Data Link layer, and the Network layer of the TCP/IP protocol are the
network support layers of the model. The network layer is also known as the internet layer that
deals with many packets of data and connects all the networks independently for transporting
packets across the network boundaries (He et al., 2016). The Session layer, Presentation Layer,
and the Application layer are the user support layer of TCP/IP protocol.
4. Encapsulation in networking states as a process that takes data from a particular
protocol and then translates the data in to another protocol. This is done so that the data can be
moved from one network to another. Data encapsulation can also be defined as sending of data to
different layers of the network.
5. The responsibility of data link layer is to provide link control, media access control,
error detection, handling the physical layer, defining the physical layer, and addressing the
1. The layers of OSI model are: Physical Layer, data link layer, network layer, transport
layer, session layer, presentation layer and application layer.
The layers of TCP/IP model are: network access layer, internet layer, transport layer, and
application layer.
2. The data link layer and the physical layer of the OSI model represents network layer
TCP/IP model. The network layer represents the internet layer of the TCP/IP model. The
transport layer of both the models are same (Zseby et al., 2016). Three layers of OSI model that
is session layer, presentation layer, and the application correlates the application layer of the
TCP/IP model.
3. Physical layer, Data Link layer, and the Network layer of the TCP/IP protocol are the
network support layers of the model. The network layer is also known as the internet layer that
deals with many packets of data and connects all the networks independently for transporting
packets across the network boundaries (He et al., 2016). The Session layer, Presentation Layer,
and the Application layer are the user support layer of TCP/IP protocol.
4. Encapsulation in networking states as a process that takes data from a particular
protocol and then translates the data in to another protocol. This is done so that the data can be
moved from one network to another. Data encapsulation can also be defined as sending of data to
different layers of the network.
5. The responsibility of data link layer is to provide link control, media access control,
error detection, handling the physical layer, defining the physical layer, and addressing the

2NETWORKING
hardware. Data link layer provides transfer of data in a reliable manner by transferring the
packets as synchronized form, error control form and as flow control.
6. Network layer delivery includes delivering of packets from a source to destination
across different networks (Comer, 2018). The transport layer delivery has responsibility to
transfer the entire message from source to destination. Network layer delivery provides
connection service; on the other hand, transport layer provides connectionless service.
7. The errors between nodes are detected by data link layer, but error at the node that is
between the input port and the output port is not detected by the data link layer. For detecting
error at the node, transport layer is needed.
8. The responsibility of network layer is routing. Routing is actually moving the packets
that is moving the fundamental data unit of the data transport on the modern computer network
that is across the network using appropriate paths (Mejías et al., 2017). The network layer also
addresses messages and helps in translating the logical address.
9. Transport layer is mainly responsible for establishing a communication in a network.
It helps in providing logical communication between the application processes that runs on
various hosts in a layered architecture of the protocols and on different components (Shang,
Droms & Zhang, 2016). The end-to-end connection that is established by the transport layer is
established between hosts that uses TCP and the UDP protocol.
10. The IP address of a system is known as the logical address and is a combination of
NetID and the HostID.
hardware. Data link layer provides transfer of data in a reliable manner by transferring the
packets as synchronized form, error control form and as flow control.
6. Network layer delivery includes delivering of packets from a source to destination
across different networks (Comer, 2018). The transport layer delivery has responsibility to
transfer the entire message from source to destination. Network layer delivery provides
connection service; on the other hand, transport layer provides connectionless service.
7. The errors between nodes are detected by data link layer, but error at the node that is
between the input port and the output port is not detected by the data link layer. For detecting
error at the node, transport layer is needed.
8. The responsibility of network layer is routing. Routing is actually moving the packets
that is moving the fundamental data unit of the data transport on the modern computer network
that is across the network using appropriate paths (Mejías et al., 2017). The network layer also
addresses messages and helps in translating the logical address.
9. Transport layer is mainly responsible for establishing a communication in a network.
It helps in providing logical communication between the application processes that runs on
various hosts in a layered architecture of the protocols and on different components (Shang,
Droms & Zhang, 2016). The end-to-end connection that is established by the transport layer is
established between hosts that uses TCP and the UDP protocol.
10. The IP address of a system is known as the logical address and is a combination of
NetID and the HostID.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3NETWORKING
Each of the system has a NIC network (Netwrk Interface Card) by which two systems is
connected physically with one another through cables. This address is known as physical address
or MAC address.
Each of the application that runs on a computer system has a port number and that is
called the port address of that application.
11. The services that are provided by the application layer are standard service of TCP/IP
that includes ftp, tftp, and telnet commands (Alan & Kaur, 2016). Simple Network Management
Protocols and the RDISC (Router Discovery Server Protocol).
12. Combining three layers means lessening the cost of the using the protocol. It
simplifies conceptual problem that have problem of dealing with the things that are in the
network stack.
Each of the system has a NIC network (Netwrk Interface Card) by which two systems is
connected physically with one another through cables. This address is known as physical address
or MAC address.
Each of the application that runs on a computer system has a port number and that is
called the port address of that application.
11. The services that are provided by the application layer are standard service of TCP/IP
that includes ftp, tftp, and telnet commands (Alan & Kaur, 2016). Simple Network Management
Protocols and the RDISC (Router Discovery Server Protocol).
12. Combining three layers means lessening the cost of the using the protocol. It
simplifies conceptual problem that have problem of dealing with the things that are in the
network stack.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4NETWORKING
References
Alan, H. F., & Kaur, J. (2016, July). Can Android applications be identified using only TCP/IP
headers of their launch time traffic?. In Proceedings of the 9th ACM Conference on
Security & Privacy in Wireless and Mobile Networks (pp. 61-66). ACM.
Comer, D. E. (2018). The Internet book: everything you need to know about computer
networking and how the Internet works. Chapman and Hall/CRC.
He, K., Rozner, E., Agarwal, K., Gu, Y. J., Felter, W., Carter, J., & Akella, A. (2016, August).
AC/DC TCP: Virtual congestion control enforcement for datacenter networks.
In Proceedings of the 2016 ACM SIGCOMM Conference (pp. 244-257). ACM.
Mejías, A., Herrera, R. S., Márquez, M. A., Calderón, A. J., González, I., & Andújar, J. M.
(2017). Easy handling of sensors and actuators over TCP/IP networks by open source
hardware/software. Sensors, 17(1), 94.
Shang, W., Yu, Y., Droms, R., & Zhang, L. (2016). Challenges in IoT networking via TCP/IP
architecture. Technical Report NDN-0038. NDN Project.
Zseby, T., Vázquez, F. I., Bernhardt, V., Frkat, D., & Annessi, R. (2016). A network
steganography lab on detecting TCP/IP covert channels. IEEE Transactions on
Education, 59(3), 224-232.
References
Alan, H. F., & Kaur, J. (2016, July). Can Android applications be identified using only TCP/IP
headers of their launch time traffic?. In Proceedings of the 9th ACM Conference on
Security & Privacy in Wireless and Mobile Networks (pp. 61-66). ACM.
Comer, D. E. (2018). The Internet book: everything you need to know about computer
networking and how the Internet works. Chapman and Hall/CRC.
He, K., Rozner, E., Agarwal, K., Gu, Y. J., Felter, W., Carter, J., & Akella, A. (2016, August).
AC/DC TCP: Virtual congestion control enforcement for datacenter networks.
In Proceedings of the 2016 ACM SIGCOMM Conference (pp. 244-257). ACM.
Mejías, A., Herrera, R. S., Márquez, M. A., Calderón, A. J., González, I., & Andújar, J. M.
(2017). Easy handling of sensors and actuators over TCP/IP networks by open source
hardware/software. Sensors, 17(1), 94.
Shang, W., Yu, Y., Droms, R., & Zhang, L. (2016). Challenges in IoT networking via TCP/IP
architecture. Technical Report NDN-0038. NDN Project.
Zseby, T., Vázquez, F. I., Bernhardt, V., Frkat, D., & Annessi, R. (2016). A network
steganography lab on detecting TCP/IP covert channels. IEEE Transactions on
Education, 59(3), 224-232.
1 out of 5
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.