...The following table compares the functions performed at each OSI model layer. Layer | Description and Keywords | Application (Layer 7) | The Application layer integrates network functionality into the host operating system, and enables network services. The Application layer does not include specific applications that provide services, but rather provides the capability for services to operate on the network.Most Application layer protocols operate at multiple layers down to the Session and even Transport layers. However, they are classified as Application layer protocols because they start at the Application layer (the Application layer is the highest layer where they operate). Services typically associated with the Application layer include: * HTTP * Telnet * FTP * TFTP * SNMP | Presentation (Layer 6) | The Presentation layer formats or "presents" data into a compatible form for receipt by the Application layer or the destination system. Specifically, the Presentation layer ensures: * Formatting and translation of data between systems. * Negotiation of data transfer syntax between systems, through converting character sets to the correct format. * Encapsulation of data into message envelopes by encryption and compression. * Restoration of data by decryption and decompression. | Session (Layer 5) | The Session layer's primary function is managing the sessions in which data is transferred. Functions at this layer include: * Management of multiple sessions...
Words: 836 - Pages: 4
...Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction Protocol (Protocols.com) * Security Layer Protocols * WTLS or Wireless Transport Layer Security...
Words: 278 - Pages: 2
...The network uses standards defined in TCP/IP RFCs, plus other standards. 2. C. Ethernet D. TCP/IP mapping 3. A. It exists as a written document. C. It has been passed through some form of review and approval or certification process. 4. A. De facto standard documents have been reviewed more thoroughly. C. De facto standards typically mean that the standards group has been authorized by many countries to create standards that apply to multiple countries. 5. B. The data link layer sits lower in the model than the transport layer. C. The physical layer sits just below the data link layer. 6. B. IEEE D. ANSI 7. D. To keep intellectual property rights to the technology inside the company 8. B. IP is a network layer protocol. 9. B. TCP/IP 10. B. The lower four layers of TCP/IP define the same kinds of functions as the matching layer numbers from OSI. 11. C. The PCs use two wires to create a circuit to send data from PC1 to PC2. 12. B. Ethernet defines MAC addresses, but when used in a TCP/IP network, it does not use the addresses, instead relying on IP addresses. 13. D. Datagram 14. B. Can be written in DDN format D. Used by routers to make a forwarding decision 15. A. 48 bits in length 16. A. LANs generally connect devices that are nearer to each other, compared to WANs. D. LANs are purchased, and WANs are leased. 17. B. Two TCP/IP data-link protocols are Ethernet and...
Words: 699 - Pages: 3
...1. nibble, byte, word, double word- define 2. how does the RAM know when its on and off, full and half 3. converting binary’s 4. how are the tracks and setctors separated on a hard drive 5. pg 12 adding binary 6. Read about file systems 7. Video compression and what is it for 8. 9. Internet core 10. How do you define a network (more than one computer) 11. Topologies (bus,ring,star,and mesh) 12. Networking standards 13. Defacto standards vs vendor standards vs vendor group standards 14. Tcp/ip 15. Open networking model and the osi model 16. Ip routing 17. Pg 136 authors note 18. Frame and packet 19. IP addressing 20. IP addressing 21. Physical layer, layer 1 of the OSI model 22. Lab 3.1.1 (wouldn’t be able to communicate) 23. Data link layer 24. LAN vs WAN 25. Different between ac and dc currents 26. Difference between the circitury and node 27. Full duplex vs half duplex 28. Sending data through electricity foucusing on sound waves 29. RJ 45 connectors 30. Fiber optics 31. The wireless standards 32. CSMA CSCA 33. When you have a fiber optic cable and two buildings, which would you use single mode or multi mode? Multi mode 34. Copper cable and standards. (EMI) 35. Two types of utp cable a and b, cross over and straight cable 36. Max distance for UTP cables (100M) 37. FORFIT! 38. What is trouble shooting bottom up and...
Words: 366 - Pages: 2
...Analysis of Wireless Protocols Analysis of Wireless Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction...
Words: 285 - Pages: 2
...Building TCP/IP Networks This chapter will allow you to explore the common models of networking from the physical media connection to the application that displays the information, including how these layers interact and how they map to real networking devices. The labs in this chapter are designed to reinforce concepts from Chapter 3 of your Introduction to Networking textbook and allow you to explore some of the more important ideas with greater depth. You will explore the different types of network reference models available and analyze how each one applies to real network technology. You will also use packet capturing to look at real network traffic and explore the data link layer of networking. At the end of this chapter, you should be able to ■ Explain the purpose of network reference models ■ Describe the layers of the OSI reference model and explain what each layer provides ■ Describe the layers of the TCP/IP model and relate it to the OSI model and real networking equipment ■ Capture live packet information on a network and explain the data link layer portion of the packets captured ■ Enable network resources such as shared printers and file sharing on your own PC Lab 3.1: Network Reference Models approximate Lab Time: 10–15 min. Materials Needed: paper/pencil, Textbook, and Internet research This lab reviews the importance of modeling communication on a network. This will include a review of the state of networking before standardized reference models existed...
Words: 270 - Pages: 2
...This Cisco IOS command would display the current status of EIGRP? Show IP eigrp neighbors Two metrics used by default in EIGRP metric calculation? Bandwidth and Delay Dynamic routing protocols is considered an exterior gateway protocol only? BGP Is an encapsulation protocol that can be used on cisco routers when configuring subinterfaces? 802.1Q Is the binary equivalent to the dotted decimal netmask- 255.255.192.0? 1111.1111.11100.0000 This routing protocol is considered to use distance vector logic? Rip Has the lowest Cisco IOS administrative distance? Static route Describe the point-to-point WAN connection protocol provided by Telco? Leased Lines This cisco IOS command copies the current running configuration to a tftp server? Copy running-config tftp The concept of EIGRP Feasible distance is the computed metric of a SUCCESSOR route Is the dotted decimal equivalent to slash notation /25 255.255.255.128 The routing protocol that doesn’t support support VLSM? RIP v1 Is the broadcast address for the ip subnet 8.5.8.232 mask 255.255.0.0 8.5.255.255 Is the slash notation dotted decimal mask of 255.255.255.252 /30 The following mask could create an IP subnet from a class B that contains 500 hosts? 255.255.255.0 Port of STMP? 25 Protocol responsible for resolving mac addresses from IP addresses? ARP Two protocols commonly used in WANS at layer 2 of the OSI model? HDLC and PPP 192.168.254.0 is private up networks, classified by? RFC1918 Bits comprise the network...
Words: 2228 - Pages: 9
...Figure 1 is the soil layer. Ground water table is at 5m depth. The thickness of each layer is determined by Case 1 uses H1 = 4m, H2 = 5m, H3 = 7m, and H4 = 2m. Case 2 uses H1 = 2m, H2 = 7m, H3 = 5m, and H4 = 4m. Soil below Layer 4 is considered as a rigid stratum which can control failure mechanism. Case 1 Layer 1: c’ = 3kPa, φ’ = 38°, and γ = 19kN/m3 (γsat = 20.3kN/m3) Layer 2 : cu = 25kPa, c’ = 8kPa, φ’ = 25°, OCR = 2, Cc = 0.8, Cs = 0.16, e = 1.1 and γ = 15kN/m3 (γsat = 16kN/m3) Layer 3: c’ = 0kPa, φ’ = 38°, and γ = 18kN/m3 (γsat = 19.1kN/m3) Layer 4 : cu = 40kPa, φ’ = 28°, OCR = 1, Cc = 0.5, e = 0.9 and γ = 16kN/m3 (γsat = 17kN/m3) Case 2 Layer 1 : cu = 30kPa, c’ = 15kPa, φ’ = 23°, OCR = 3.0, Cc = 0.8, Cs = 0.16, e = 1.1 and γ = 15kN/m3 (γsat = 16.5kN/m3) Layer 2: c’ = 1kPa, φ’ = 35°, and γ = 19kN/m3 (γsat = 20.8kN/m3) Layer 3 : cu = 35kPa, c’ = 5kPa, φ’ = 28°, OCR = 1.5, Cc = 0.5, e = 0.9 and γ = 16kN/m3 (γsat = 17.3kN/m3) Layer 4: c’ = 0kPa, φ’ = 35°, and γ = 18kN/m3 (γsat = 19.1kN/m3) Design the cut slopes for 12m height (Case 1) and for 7m height (Case 2), based on F = 1.3 (short-term), F = 1.5 (long-term) and F = 1.15 (seismic). There are only three options that can be used to increase F for the slope. They are, 1) reduce the slope angle; 2) reduce the slope height; and 3) dewater. The optimum design is the slope cut as less as possible. The water table change will induce the consolidation. The maximum vertical displacement due to dewatering on the slope crest must be...
Words: 449 - Pages: 2
...networks together. Network models include many of protocols, such as HTTP, DHCP, IPv4, UDP and ARP, which include the rules and regulations to manage the communication between the network devices, also the limits of communication with each other (Kozierok, 2001-2005). The most commonly used are: 1. Transmission Control Protocol/Internet Protocol (TCP/IP), which established by the Defense Advanced Research Projects Agency (DARPA), and managed by the Internet Engineering Task Force (IETF), to connect the various Defense Department with each other, and uses the TCP/IP protocol to connect all governmental, educational and business institutions in the world. 2....
Words: 769 - Pages: 4
...INTRO TO NETWORKING UNIT3 LAB3.3 The TCP/IP Model Mr. Randy Vogl Gus Perez 19593003 The TCP/IP network model Exercise 3.3.1 What are the distinct differences between OSI and TCP/IP models? TCP refers to Transmission Control Protocol. OSI refers to Open Systems Interconnection. Model TCP/IP is developed on points toward a model the internet. TCP/IP has 4 layers. OSI has 7 layers. TCP/IP more reliable than OSI OSI has strict boundaries; TCP/IP does not have very strict boundaries. TCP/IP follow a horizontal approach. OSI follows a vertical approach. In the application layer, TCP/IP uses both session and presentation layer. OSI uses different session and presentation layers. TCP/IP developed protocols then model. OSI developed model then protocol. TCP/IP offers support for connectionless communication within the network layer. In the network layer, OSI supports both connectionless and connection-oriented communication. TCP/IP is protocol dependent. OSI is protocol independent. http://www.differencebetween.net/technology/internet/difference-between-osi-and-tcp-ip-model/ Read more: Difference between OSI and TCP IP Model | Difference Between | Difference between OSI vs TCP IP Model http://www.differencebetween.net/technology/internet/difference-between-osi-and-tcp-ip-model/#ixzz3f4nyPzTU TCP/IP model protocols and functions. Exercise 3.3.2 Identify the layer in which each protocol resides according to the TCP/IP model. Using figure 3.4 from the Lab manual...
Words: 1306 - Pages: 6
...Protocols and standards TCP/IP TCP/IP is a suite of communication protocols which are used to interconnect device on the networks to the internet. This can also be made into a private connection as an intranet. This protocol specifies how data is exchanged using the internet which provides end to end connections. This will then determine how the exchange items should be broken into packets, transmitted, received, routed and addressed to a destination. TCP/IP doesn’t need much central management with the ability to recover if any device on the network were to fail and is also designed in order to make a network much more reliable. There are two parts to this protocol, TCP and IP. The TCP shows how application are able to make different channels of communication in a...
Words: 1544 - Pages: 7
...Fundamentals of Networking IT205-1304B-01 Phase 2 Discussion Board December 1, 2013 In this discussion board, I am going to define and describe the OSI and the TCP/IP models including a discussion on where and how they overlap. I will discuss why I think the TCP/IP model is use and the OSI model is not, and finally what my definition of the steps of OSI and TCP/IP are and their implementation. I am going to start with the OSI model. The OSI model is made up of 7 different layer, each with their own functions. Each of the layers are defined as: 1. Physical Layer: The physical layer is responsible of delivering row bit stream over the physical cable. Its functions are physical medium transmission, transmission technique and data encoding. (Khani, 2012) 2. Data Link Layer: The data link layer is responsible for controlling the error between adjacent nodes and transfer the frames to the other computer via the physical Layer. Its functions are Link establishment and termination, frame traffic control and frame acknowledgement. (Khani, 2012) 3. Network Layer: The network layer is responsible for the translating of the logical network address and names into their physical address. Its functions are subnet traffic control, logical and physical address mapping and frame fragmentation. (Khani, 2012) 4. Transport Layer: The transport layer is responsible for the end-to-end deliveries of messages between the networked hosts. Its functions are message segmentation...
Words: 730 - Pages: 3
...INTERNET PROTOCOLS & APPLICATIONS * TCP/IP: The TCP/IP suite of protocols has become the dominant standard for internetworking. TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks. * IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol suite originally employed by Novell Corporation’s network operating system, NetWare. It delivers functions similar to those included in TCP/IP. Novell in its current releases supports the TCP/IP suite. A large installed base of NetWare networks continue to use IPX/SPX. * NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on small Windows NT networks. NetBEUI cannot be routed or used by routers to talk to each other on a large network. NetBEUI is suitable for small peer-to-peer networks, involving a few computers directly connected to each other. It can be used in conjunction with another routable protocol such as TCP/IP. This gives the network administrator the advantages of the high performance of NetBEUI within the local network and the ability to communicate beyond the LAN over TCP/IP. * AppleTalk: AppleTalk is a protocol suite to network Macintosh computers. It is composed of a comprehensive set of protocols that span the seven layers of the Open Systems Interconnection (OSI) reference model. The AppleTalk protocol was designed to run over LocalTalk, which is the Apple LAN physical topology...
Words: 1711 - Pages: 7
...The OSI and TCP/IP The OSI model is an important part of providing network services over the Internet. This paper describes the seven different levels of the OSI model and the TCP/IP stack. Also, this paper will compare and contrast the main protocols being TCP and IP and the functions of each protocol. Also, this paper will discuss as to why the OSI model is important and why we still need the OSI model in today’s technological age of information exchange. Application Layer The Application Layer is number seven of the OSI model, which provides user interfaces that end-users are able to understand and interact through services, such as E-mail, FTP, Telnet, instant messaging software, IRC and DNS applications (Petri, 2009). Presentation Layer The Presentation Layer is number six of the OSI model, and it responds to the service requests of the application layer and sends requests to the session layer. Specific functions of the presentation layer are as follows: • Translates data from applications into local machine formats the computer can understand and vice-versa for the end-user. • Communicates with the applications layer. • Communicates with the session layer (Petri, 2009). Session Layer The Session Layer is number five of the OSI model, and it keeps track of connections. The session layer keeps track of multiple file downloads requested by a particular FTP application, or Telnet connections, or web page retrievals from a particular server (Petri...
Words: 993 - Pages: 4
...Brittany Martin IT245-1303A-03 Introduction to Network Management Phase 3 DB 8-1-2013 This week in phase 3 we are on the subject of how OSI (Open Systems Interconnection) model and TCP/IP (Transmission Control Protocol/Internet Protocol) are similar and how they are different. There are 7 layers in the OSI model and there are only 4 layers in TCP/IP. The 7 layers in OSI are application, presentation, session, transport, network, data link, and physical with application being the highest and physical being the lowest of the model (Harney, n.d.). The 4 layers of TCP/IP are application, transport, internet, and subnet (Harney, n.d.). In the OSI model the application layer simply handles a lot of software protocols such as DNS, and HTTP. The presentation layer transfers data from one end to the other. The session layer handles connection between two devices. The transport layer makes sure information is formatted in the proper way. The network layer sends information over to the proper web address. The data link layer makes sure data is small enough to be sent across the network to arrive in the correct place. The physical layer deals with all hardware including NIC’s, hubs, and Ethernet cabling. The TCP/IP only has 4 layers because one or more layers of the OSI models is composed in the TCP/IP model (OSI Model vs. TCP/IP Model, n.d.). In the application layer it deals with the user and how data is handled with that user. The transport layer deals with communication...
Words: 400 - Pages: 2