Explain what a protocol stack is. Define and describe the OSI stack and what each layer is in charge of.
Please find my answer.
A protocol stack refers to a group of protocols that are runnning concurrently that are employed for the implementation of network protocol suite. The protocols in a stack determine the interconnectivity rules for a layered network model such as in the OSI or TCP/IP models.
What OSI do– It defines the communication process using 7 layers
from one endpoint to another endpoint devices. Each layer performs
own functionality and forwards to the next layer. The Same process
happens at another endpoint.
Advantage of OSI- It divide a big communication process into smaller components.
OSI is the combination of 7 layers, each layer has own functions on data.
OSI Layers-
Layer 7- Application Layer
This layer responsible to provide interface for the users to interface with networking services. Identify the service using Port Number.
Example- Web Browser, Outlook etc.
Layer 6- Presentation Layer
It responsible that how data would be represented. For example, Encoding-decoding, Encryption-decryption, compression-decompression etc.
Example- JPEG, ASCII, WAV, AVI
Layer 5- Session Layer
This layer is responsible for establishing, maintain or terminate the session. Session layer creates a Session between sender and receiver, once the data got transferred it terminate the session. Session ID used to identify the session. From client to server, a data communication process organized by 3 modes: Simplex, Half-Duplex, and Full-Duplex.
Layer 4- Transport Layer
Transport Layer- This layer is responsible for end to end the transportation of data between the application. This layer is Reliable, means It responsible for 3 things: Sequencing, Error Free, and Flow control. Sequencing- data should go in the same sequence and data would be error free and should go with the same flow.
Functions of Transport Layer-
Create a session using 3-way handshaking between sender and
receiver before sending the data.
Multiplexing and De-multiplexing
Segmentation
Error Correction
Sequencing
Flow Control
Acknowledge
Layer 3- Network Layer
This layer is responsible to provide a path to data and responsible
for logical addressing. This layer used to Route the packet among
the network. In this layer, data converts into a packet.
Network layer has two responsibility, Logical Addressing and Path selection (Routing).
Layer 2- Data Link Layer
This layer is responsible data transport between LAN. Data link
layer is responsible for error free data transmission, error
detection and flow control over the physical layer. In this layer
data packed into frames and this process called data framing.
This layer has 2 sub-layer:
LLC: Logical Link Control, provide flow control, error control data transmission (Check Error)
MAC: Media Access Control, provide physical addressing as well as logical topology.
Layer 1- Physical Layer
Physical layer is responsible for a physical medium for data transmission and transfers the data in Bit format ( 0 and 1 Binary) and This layer sends bits and receives bits.
Functions-
Data Rate
Synchronization
Signals
Devices- Network Interface Card (NIC), Hubs etc.
Explain what a protocol stack is. Define and describe the OSI stack and what each layer...
Explain how the Physical Layer of the OSI model works. Identify which layer of the OSI model the IP Protocol and HTTP operates. Identify the layer of the OSI model a router operates. Explain the difference between IPCONFIG vs. IPCONFIG /ALL. Explain the purpose of an IPv4 loopback address and how it works. What TCP/IP utility would you use to find another computer’s IP address? Explain the difference between a static route and a default route. Explain the difference between...
those are the options for each
D Question 8 Match the Internet Protocol Stack layer with its respective encapsulation header/trailer. Application Layer I Choose Transport Layer Datagram Message Choose Choose] Link Layer . Previous
. Name the layer of the Web/Internet Protocol Stack with which each of these functions is associated. a. Encrypt a message. b. Prevent buffer overruns. c. Choose the best route for a data packet. d. Compose an email message.
Consider removing the Session and Presentation layers from the 7-layer OSI model resulting in the 5-layer Internet model discussed in class. What is the impact os us as the application developers? In other words, how does this change impact us? Consider changing the algorithms but maintaining the same functionality in the Session and Presentation layers from the 7-layer OSI discussed in class. What is the impact os us as the application developers? In other words, how does this change impact...
Describe a hypothetical situation where you can apply the OSI reference model in conjunction with protocol analysis to solve a problem or think through a solution involving an information system or network. Discuss the advantages, disadvantages, an Describe a real-world problem where you can apply the OSI reference model to solve a problem or to think through a solution involving an information system or network. Discuss the advantages, disadvantages, and limits of using the model in that situation. An example...
Subject: Network Security 2. Secure Socket Layer protocol (SSL): (a) Compare the Secure Socket Layer protocol (SSL) to IPsec. Show where would you place both in the Internet protocol stack. Which one is better suited for credit card transactions? [10 marks] (b) Is a man-in-the-middle attack possible on the Secure Socket Layer protocol (SSL)? [10 marks] (c) What is the difference between session and connection and why do we need both? [5 marks]
At what layer of the OSI model do proxy servers update? A. Layer 3 B. Layer 2 C. Layer 7 D. Layer 4
Networks work because of protocol standards. The transport layer has three prominent protocols, namely TCP and UDP, both of which can be in use at the same time by different application laver protocols. Explain why we might allow several protocols to be active in one layer at the same time rather than mandate a single best-practice standard to each layer of the network stack.
- If you were to design a new application layer protocol to stream videos over the Internet, what transport layer protocol would you use, and why? What are the features of that protocol that make it suitable for your purpose? - From application layer to physical layer and back again, explain the process that a single packet message goes through to get encapsulated? What information is added at each layer. Clarify your assumptions. Is this an IPv4 or v6 network,...
Using OSI model, find the different attack on each layer. Give a brief description about them.