Question

What happens when the packets sent from a computer (at the application layer) reach various network...

What happens when the packets sent from a computer (at the application layer) reach various network nodes – local computers, remote computers, local attached routers/switches, remote routers/switches, hubs, etc.?

Please discuss what network nodes of different types know about the application file being transmitted (based on what information is provided in the header at the OSI layer at which that node operates) at each level of reassembly (i.e., viewing the frame packet only, reassembling frame packets to recreate the IP packet, reassembling the IP packets to recreate the TCP or UDP packets, and reassembly of the TCP/UDP packets to regenerate the full transmitted file) and how that information (provided by the data in the header) might be used by the node to provide network services.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

step1:

Packet is the box hat contains data which can be communicated between source and destination over a network.

Basically every packet contains 3 sections which are

1.Header

2.Payload

3.Trailer

Header: contains some instruction which can include:

1.Destination Address (where does it go)

2.Source Address (from where it is coming)

3.Protocol : for ex:e-mail or streaming video

Payload: It is actual data that resides in packet

Trailer: contains some of bits which will inform about the device to which the packet was reached.

packet can reach to router or hub or switch.

step 2:

A router is a networking device that sends data packets to other networks, instead of just the local computers.

First of all router observes the destination address which is present in packet header and compare it with routing table to determine the packet's direction.

If the router has no explicit route to the destination, it sends the packet to the closest match it can find, which is often its own Internet gateway.

Routing table which may contain:

1.The IP address of the packet's final destination

2.Next hop: The IP address to which the packet is forwarded

eventually this router sends the packet to another router and so on until packet reaches its final destination.

ce does.

Network Hub:

A network hub is designed to connect computers.

When a hub receives a packet of data from a connected device, it sends that data packet to all other connected devices rather than to which device it should the send.

Network bandwidth is split between all of the connected computers.

So, the more computer that are connected, the less bandwidth that is available for each computer, which means slower connection speeds.

Switch:

A network switch also connects computers to each other, like a hub except the handling of packet data.

after receiving data packet, switch finds out what computer or device the packet is intended for and sends it to that computer only.

unlike hub, switch sends the packet to particular device rather than sending it to tha all devices connected to that network.

Bandwidths are not shared hence switch is faster than hub.

Network nodes of different types in ONS (Open Systems Interconnection) model:

it consists of 7 layers:

1.Physical layer:

The lowest layer of the OSI reference model is the physical layer.

It is responsible for the actual physical connection between the devices to enable the successful transmission of data.

Responsibilities of Physical layer:

1.It translates the data from one form to another so that it can be physically transmitted over a communication channel.

2.Bit synchronization for synchronous serial communications.

3. Physical layer specifies the way in which the different, devices/nodes are arranged in a network i.e. bus, star or mesh.

Ethernet works on this layer.

finally it sends data to the Data Link layer, which will put the frame back together.

2.Data Link Layer:

The data link layer gets the data from physical layer,sends the data from node to node..

Responsibilities of Data link layer:

1.it ensures data is free of error from physical layer

2.It converts the data into frames and adds physical addresses of sender and receiver in the header of each frame.

Data Link Layer is divided into two sub layers :

1.Logical Link Control: It controls how a computer on the network gets the access to data and transmit it.

2.Media Access Control: it controls the floe control and error checking.

Switch works in this layer.

3. Network Layer:

Network layer works for the transmission of data from one host to the other located in different networks.

Segment in Network layer is referred as Packet.

Responsibilities of Network layer:

1.it also finds the shortest route to transmit the packet from all available routes.

2.it routes the data from one network to another network.

3.error handling and packet sequencing(breaking the large packet into small packets) will be done here.

Router and different network protocols like TCP/IP works at this layer.

4.Transport Layer :

Transport layer provides services to application layer and takes services from network layer.

Transport layer receives the formatted data from the previous layers and performs Segmentation.

Data in the transport layer is referred to as Segments.

Responsibilities of Transport layer:

1.It responsible for transfer of complete message.

2.If any error is occurs, it provides acknowledgment regarding error.

3.If the message is transmitted successfully, it provides acknowledgment regarding successful transfer of data.

Transport Layer is called as Heart of OSI model.

5.Session Layer:

This layer is responsible for establishment of connection, maintenance of sessions, authentication and also ensures security.

Responsibilities of session layer:

1.The layer allows the two processes to establish, use and terminate a connection.

2. The session layer allows two systems to start communication with each other in half-duplex or full-duplex.

6.Presentation Layer:

Presentation layer is also called the Translation layer.

1.data is that got from above layer is extracted and converted(ASCII to EBCDIC,JPEG) into specific format in order to transmit.

2.It compresses data.

3. it will translate the data like (encrypt and decrypt).

7.Application Layer: It is top layer of the ONS model.

It supports application and apps and end user processes.

These applications produce the data, which has to be transferred over the network

it is responsible for file transfer like email.

ex:Application – Browsers, Skype Messenger etc.

HTTP works at this layer.

Add a comment
Know the answer?
Add Answer to:
What happens when the packets sent from a computer (at the application layer) reach various network...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and...

    Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Internet b. Application c. Transport d. Link 1.25 points Question 27 In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Network b. Data Link c. Application d. Physical 1.25 points Question 28 In the United States, who is able to activate the Emergency Alert System at the national level? a....

  • 10. In a network an IP address and prefix is given as 192.168.130.34/17. What is the...

    10. In a network an IP address and prefix is given as 192.168.130.34/17. What is the subnet mask? (A) 0.0.127.255 (B) 255.255.0.0 (C) 255.255.128.0 (D) 0.0.2.34 11. In a network an IP address and prefix are given as 192.168.130.34/17. How many host addresses are there? (A) 34 (B) 32766 (C) 131072 (D) 2 12. One result of subnetting is that the size of the routing table in the routers is reduced (A) True (8) False 13. The port number is...

  • seven-layer model? (Select twa.) A. Cables B. Hub C. Network protocol D. Session software the data...

    seven-layer model? (Select twa.) A. Cables B. Hub C. Network protocol D. Session software the data 13. Which components work at Layer I of the os La a. Which layer of the 0Sl model makes sure ls in a readable format for the Application layer A. Application layer B. Presentation layer Ex do C. Session layer D. Transport layer 9. At which layer of the TCP/1P model are UDP 14. Andalyn says complete 48-bit MAC ed to NIC manufacturers from...

  • Question 1 The size of the datagram is determined by the application that sends the data....

    Question 1 The size of the datagram is determined by the application that sends the data. Allowing the size of datagrams to vary makes IP adaptable to a variety of applications. True False Question 2 What is the conceptual network boundary, and where is it located within the protocol stack? Is the transition area between digital and analog signals and can be found between layer 2 and layer 3 of the protocol stack. Identifies application direct messaging and is formed...

  • 2) IP and MAC addressing. True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer to the following network consisting of three 10Mbps Ether...

    2) IP and MAC addressing. True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer to the following network consisting of three 10Mbps Ethernet segments, one switch, and one router. Assume all ARP tables are up-to-date unless otherwise stated. a) Consider a network consisting of Ethernets, hubs, switches, and routers. Suppose one of the hubs is replaced with a switch. Then the network administrator must redefine some IP addresses. True...

  • 1. Let’s consider the network shown in Figure 1 where Snort is deployed. 1.1: In Figure...

    1. Let’s consider the network shown in Figure 1 where Snort is deployed. 1.1: In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? (9 points) 1.2: In Figure 1, say True or False to the following statement: “Snort can see both incoming packets from the left firewall and outgoing packets from the right firewall”. (5 points) 1.3: In Figure 1, assume a packet P matches the following Snort rule when the packet is analyzed...

  • Question 34 A TCP socket contain …………………… that uniquely identifies it on a network TCP ID...

    Question 34 A TCP socket contain …………………… that uniquely identifies it on a network TCP ID Port number UDP HTTP ( ) a ( ) b ( ) c ( ) d 2 points Question 35 Mail server port number is usually 8080 80 2525 25 ( ) a ( ) b ( ) c ( ) d 2 points Question 36 TCP Head length indicates ( ) The size of the segment ( ) The capacity of data that...

  • 1.In the TCP/IP protocol suite, the ______ layer is responsible for moving frames from one hop...

    1.In the TCP/IP protocol suite, the ______ layer is responsible for moving frames from one hop (node) to the next.Immersive Reader (10 Points) network data link transport physical 2.As frequency increases, the period ________.Immersive Reader (10 Points) increases none of the choices are correct decreases remains the same 3.Data can flow only in both direction all of the times in a _________ mode.Immersive Reader (10 Points) none of the choices are correct half-duplex simplex full-duplex 4.For a ______ channel, the...

  • Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic...

    Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...

  • 166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls...

    166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls and Os) goes in and out of a machine physically is through the NIC (network interface card). The way network communication goes in and out of a machine logically though, is through a program or service. A service is a program that runs in the background, independent of a logon, that provides functionalities to a system. Windows client machines, for instance, have a Workstation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
Active Questions
ADVERTISEMENT