answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RoseWind [281]
2 years ago
13

Describe what happens at every step of our network model, when a node on one network establishes a TCP connection with a node on

another network. You can assume that the two networks are both connected to the same router.
Your submission must include a detailed explanation of the following:

Physical layer

Data link layer

Network layer

Transport layer

MAC address

IP address

TCP port

Checksum check

Routing table

TTL
Computers and Technology
2 answers:
Minchanka [31]2 years ago
8 0
TCP (Transmission control protocol) makes sure  that  all data packets transferred by (IP)internet protocol  arrives safely.
This is what happens  when a node of one network establishes aTCP connection with a node on another network:
1.Physical layer.
It  is the lowest layer which defines how the cables,network cards,wireless transmitters and other hardware connect computers to the networks and the networks to the rest of  the internet.example of  physical layer is Ethernet,WIFI e.t.c.
It provides the means to transfer the actual bits from one computer to another.In an Ethernet network a computer is connected by plugging a network cable in its Ethernet  card and then plugging the other end of that cable into a router or switch.
It specifies how bits of data are sent over that cable.
2. Data link layer
The data link layer provides a network connection between hosts on a particular local network.
The internet protocol basically assumes all computers are part of one very large "web" of nodes that can all pass packets to other nodes.there is always route from one node to another,even if sometimes a very large number of intermediate nodes get involved. The data link layer makes this assumption true.
For example the client runs on a personal computer in someones home network which is set up using Ethernet protocol .The data link layer now is that Ethernet protocal. The IP packets that this computer transmits are added as payload to Ethernet packets that are transmitted over the local network to ADSL(Asymmetric digital subscriber line) modem that connects the local network to the provider.
3.Network layer
The network layer is responsible for transmitting and routing data packets over the network.The internet uses the internet protocal (IP) as its network layer.Each node on the network has an addres which is called the ip address of which data is sent as IP packets.
when the client sends its TCP connection request, the network layer puts the request in a number of packets and transmits each of them to the server.each packet can take different route and some packets may get lost along the way.If they all make it the transport layer at the server is able to reconstruct the request and it will prepare response confirming that the TCP connection has been set up.
This response is sent back again in a number of IP packets that will hopefully make it to the client.
4. Transport layer
This layer is realized by two protocals. The first is transmission control protocal(TCP) and the second one is the user datagram protocol(UDP) they both break up a message that an application wants to send into packets to the intended recipient.
At the recipients side,both take the payload from the recieved packets and pass those to the application layer.
Again taking an example of email, the email client and server communicate over a reliable TCP connection.The server listens on a certain port untill a connection request arrives from the client .The server acknowledges the request and aTCP connection is established.Using this connection the client and server can exchange data.
5.MAC address
MAC addres(media access control layer) This  layer is responsible for moving data packets to and from one network interface card (NIC) to another accross shared channel.
6. IP address
IP ( internet protocol) it is the the principal protocol in the internet protocol suite for relaying data-grams across network boundaries. its routing function enables inter-networking and essentially establishes the internet.
The  IP is responsible for the following:
i) IP addressing 
ii)host-to-host communications.
iii)fragmentation
7. TCP port
This is an endpoint to a logical connection and a the way a client program specifies a specific server program on a computer in a network.The port number identifies what type of port it is.
8.Checksum check
Checksum is a small sized datum derived from a digital data for the purpose of detecting errors which may have been introduced during its transmission or storage.
Checksum is a simple type of reduduncy check that is used to detect errors in data.
checksum is created by culculating the binary values in a packet or other block of data using some algorithm and storing the results with the data.
9.Routing table
Routing table is a data table stored in a router or a networked computer that lists the routes to particular network destinations and some cases metrics(distances) associated with those routes.
10. TTL
TTL Time-to-live is an internet protocal that tells a network router whether or not the packet has been in the network too long and should be discarded in IPV6.the TTL in each packet has been renamed (hop) limit.
Hop is one portion of the path between source and destination .Data pass through bridges,routers and gateways as they travel between source and destination.each time packets are passed to the  next network device,a hop occurs.





 





Gnom [1K]2 years ago
3 0

Answer:

Your submission must include a detailed explanation of the following:

Physical layer

Physical layer refers, in computing, to the consideration of the hardware components involved in a given process. In terms of networks, the physical layer refers to the means of connection through which data will travel, such as serial interfaces, or coaxial cables.

Data link layer

The data link layer is the protocol layer in a program that handles the moving of data into and out of a physical link in a network. The data link layer is Layer 2 in the Open Systems Interconnection (OSI) architecture model for a set of telecommunication protocols. Data bits are encoded, decoded and organized in the data link layer, before they are transported as frames between two adjacent nodes on the same LAN or WAN. The data link layer also determines how devices recover from collisions that may occur when nodes attempt to send frames at the same time.

Network layer

The network layer of the OSI model is responsible for controlling overall network operation. Its main functions are the routing of packets between source and destination, even if they have to pass through several intermediate nodes along the route, congestion control and accounting for the number of packets or bytes used by the user for charging purposes.

Transport layer

The transport layer is the layer in the open system interconnection (OSI) model responsible for end-to-end communication over a network. It provides logical communication between application processes running on different hosts within a layered architecture of protocols and other network components.   The transport layer is also responsible for the management of error correction, providing quality and reliability to the end user. This layer enables the host to send and receive error corrected data, packets or messages over a network and is the network component that allows multiplexing.

MAC address

When we talk about physical address we are referring to the MAC (Media Access Control) address which is 48 bits (12 hexadecimal characters).

IP address

An Internet Protocol Address (IP Address) is a numeric label assigned to each device (computer, printer, smartphone, etc.) connected to a computer network using the Internet Protocol. for communication.

TCP port

if you are using a File Transfer Protocol (FTP) program, the Internet connection is made through TCP port 21, which is a standard port for this protocol. If you are downloading files from BitTorrent, one of the ports ranging from 6881 to 6889 will be used for such activity.

Checksum check

This is done by calculating the checksum of the data before sending or storing it, and recalculating it upon receipt or retrieval from storage. If the value obtained is the same, the information has not changed and therefore is not corrupted.

More simplified forms of these sums are vulnerable because they do not detect some forms of failure. The simple sum of character values, for example, is vulnerable to their changing order by the commutativity of the sum. There are more elaborate ways of calculating these sums that solve these problems, such as the Cyclic Redundancy Check or CRC widely used for fault detection by dividing polynomials.

Routing table

In a computer network, a routing table, or routing information base, is a data table stored on a network router or host that lists the routes to specific network destinations and, in some cases, metrics associated with those routes.

TTL

Time to Live, which means the number of hops between machines that packets can take a computer network before being discarded (maximum of 255).

Any router is programmed to discount a unit of TTL to packets flowing through it. This is a way to avoid that packages remain on the net for infinite time, if the routing is not being done properly, as in the case of looping.

This value is also useful in screening circuits traversed by packets, as does the tracerouting tool.

Hope this helps :) -Mark Brainiest Please :)

You might be interested in
What is one effective way for employees to keep their skillsets current?
lys-0071 [83]
They are probably looking for B.  subscribing to journals is a good way of keeping up with what's happening in any field.

Of course, a very carefully curated professional network online is great for this too (but they said "personal" so that's not the answer)

Employers generally prefer that employees WORK as often as possible, so even though JUDICIOUS use of social media is a great way to keep current, D isn't the answer either.

Blogging about personal experiences is not necessarily going to teach you anything about work, though blogging professionally can be useful in gathering response from your readership
4 0
2 years ago
Read 2 more answers
In a single file, you wrote a bike class and used this line of code in the program.
Elza [17]

Answer:

Explanation:

Based on the available options the one that would be correct would be that the code to define your class (beginning with "class bike") must come before the line "bikeA = bike('Acme' 111)." This is because the line of code declaring the object and initializing it needs to be able to grab the information of the class that it is creating an object of. To do this, the class would need to have already been compiled by the program. It is good practice to have each class definitions as its own separate files but this is not a necessity.

5 0
2 years ago
Find and record a set of instructions containing a repetition clause (e.g., instructions on a shampoo bottle, a recipe, etc.). H
Leto [7]

This question belongs to scratch programming. This programming language has various instructions to carry out various tasks. There are different types of repeat statement available. This statement or instruction allows the user / programmer to repeat certain line of statements to a number of times. Here, according to the question, we need to use “Repeat after me”

If you take a music note, the tempo, timing and pitch needs to be mentioned clearly and “:” represents that a particular note to be repeated only once.

3 0
2 years ago
An admission charge for The Little Rep Theater varies according to the age of the person. Develop a solution to print the ticket
Lina20 [59]

Answer:

age = int(input("Enter your age: "))

charge = 0

if age > 55:

   charge = 10

if 21 <= age <= 54:

   charge = 15

if 13 <= age <= 20:

   charge = 10

if 3 <= age <= 12:

   charge = 5

if 0 <= age < 3:

   charge = 0

   

print(charge)

Explanation:

*It is in Python.

Ask the user for the age

Check the each given range and set the charge accordingly using if statements

Print the charge

6 0
2 years ago
Question 19 :Rachel, a database administrator, has created a database for her website. It contains pictures of vacations that pe
gavmur [86]

Answer:

The correct answer will be "Semi-structured data".

Explanation:

  • Semi-structured data comprise evidence that just isn't data collected in some kind of a traditional database management system, but then neither is content typed.
  • It's indeed descriptive information or structured data, but that's not organized into a theoretical design, like a chart or perhaps a graph centered through an entity.

So that the given scenario is the example of semi-structured data.

6 0
2 years ago
Other questions:
  • Foods that are high in _________ have the least impact on slowing the body's absorption rate of alcohol.
    5·1 answer
  • Suppose you define a java class as follows: public class test { } in order to compile this program, the source code should be st
    14·1 answer
  • Haley is helping to choose members for a customer satisfaction team. Which of the following employees demonstrate skill in focus
    13·1 answer
  • Compare the encryption algorithms found in s-tools: idea, mdc, des, and 3des.
    5·1 answer
  • Print "userNum1 is negative." if userNum1 is less than O. End with newline Convert userNum2 to 0 if userNum2 is greater than 8.
    10·1 answer
  • Consider the following two code segments, which are both intended to determine the longest of the three strings "pea", "pear", a
    7·1 answer
  • Omar wants to add transitions to his presentation, so he clicks the Transitions tab. Which tasks can he now complete? Check all
    10·1 answer
  • Write a split check function that returns the amount that each diner must pay to cover the cost of the meal The function has 4 p
    14·1 answer
  • A colleague sent you an awesome article about using proper ergonomics while sitting at the computer. You don't have time to read
    11·1 answer
  • Given positive integer n, write a for loop that outputs the even numbers from n down to 0. If n is odd, start with the next lowe
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!