CourseLover

(12)

$10/per page/Negotiable

About CourseLover

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Algebra,Applied Sciences See all
Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Engineering,Health & Medical,HR Management,Law,Marketing,Math,Physics,Psychology,Programming,Science Hide all
Teaching Since: May 2017
Last Sign in: 292 Weeks Ago, 6 Days Ago
Questions Answered: 27237
Tutorials Posted: 27372

Education

  • MCS,MBA(IT), Pursuing PHD
    Devry University
    Sep-2004 - Aug-2010

Experience

  • Assistant Financial Analyst
    NatSteel Holdings Pte Ltd
    Aug-2007 - Jul-2017

Category > Computer Science Posted 24 Dec 2017 My Price 10.00

network architecture and protocols

Can you answer following questions please. Related to networking


1-3) Discuss the relationship between network architecture and protocols (Refer to Page 5 section 1-3-2) Data communications protocols are sets of rules governing the orderly exchange of data within the network or a portion of the network, whereas network architecture is a set of layers and protocols that govern the operation of the network. 1-5) Define the following terms: Protocol, connection-oriented protocol, connectionless protocol, and protocol stack. (Refer to P.6 section 1-3-2-1) Protocols are sets of rules governing the orderly exchange of data within the network or a portion of the network. With a connection-oriented protocol, a logical connection is established between the endpoints (e.g., a virtual circuit) prior to the transmission of data. Connectionless protocols are protocols where data are exchanged in an unplanned fashion without prior coordination between endpoints (e.g., a datagram). Connectionless protocols do not provide the same high degree of reliability as connection-oriented protocols; however, connectionless protocols offer a significant advantage in transmission speed. The list of protocols used by a system is called a protocol stack, which generally includes only one protocol per layer. 1-11) Briefly describe the seven layer of the OSI layer protocol hierarchy (P 13 -18 of section 1-6) (7) Application – Provides user applications services and interfaces (6) Presentation – Handles syntax, encryption/decryption, compression/decompression (5) Session – Handle software to software connection. Deal with session establishment, data flow, and session termination. (4) Transport – Handle end to end connection. Reliability includes segmentation, sequencing, flow control, and error control – TCP/UDP (3) Network – determine the best path using logical addressing – IP address (2) Datalink – upper sublayer is LLC and lower sublayer is MAC. Use physical address to identify host
Background image of page 1
(1) Physical – deal with media electrical, mechanical, procedural, and functional characteristics 1-21) List and briefly describe the five basic data communication network topologies (P.28 to 30 section 1-10-3) A star topology is a multipoint data communications network where remote stations are connected by cable segments directly to a centrally located computer called a hub, which acts like a multipoint connector. A bus topology is a multipoint data communications circuit that makes it relatively simple to control data flow between and among the computers because this configuration allows all stations to receive every transmission over the network. A ring topology is a multipoint data communications network where all stations are interconnected in tandem (series) to form a closed loop or circle. In a mesh topology, every station has a direct two-point communications link to every other station on the circuit. A hybrid topology is simply combining two or more of the traditional topologies to form a larger, more complex topology. 1-23) Briefly describe TCP/IP model (P.37 section 1-11-1) Network access layer. Provides a means of physically delivering data packets using frames or cells Internet layer. Contains information that pertains to how data can be routed through the network Host-to-host layer. Services the process and Internet layers to handle the reliability and session aspects of data transmission Process layer. Provides applications support.
Background image of page 2

Answers

(12)
Status NEW Posted 24 Dec 2017 12:12 PM My Price 10.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------usi-----------ng -----------our----------- we-----------bsi-----------te -----------and----------- ac-----------qui-----------sit-----------ion----------- of----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------ns.----------- Pl-----------eas-----------e p-----------ing----------- me----------- on----------- ch-----------at -----------I a-----------m o-----------nli-----------ne -----------or -----------inb-----------ox -----------me -----------a m-----------ess-----------age-----------

Not Rated(0)