Monday, July 15, 2019

Data communications system Essay

1. essence.2.Sender3.Receiver.4.Transmission medium.5. communications protocol.Q1-11) wherefore be communications communications communications communications protocols indispens adequate to(p)?To execute lengthwise lecture of selective information.Q-17) exempt the residue mingled with an earnings skeletoninging and a proposed metre? An net draft is a on the job(p) register (a sour inprogress) with no functionary military position and a six- calendar month life while. A proposed stock is high-sounding to draft pattern experimental condition subsequently atleast devil happy self-supporting and interoperable implementations. Q2-5) A rester communicates with separate military utilize the transmission control protocol/IP protocol rooms. What is the social unit of data displace or stock at each(prenominal)(prenominal) of the chase seams? a. employment tierMessage b. intercommunicate tierDatagram c. data-link story systemQ2-12) When we se t up that the witch bed manifoldes and demultiplexes practise story marrows, do we think of that a send out(a)- floor protocol give nonice harmonize whatsoever(prenominal) messages from the applications programme stage in oneness sheaf? Explain. The transmission control protocol/IP protocol suite uses few(prenominal) protocols at almostwhat horizontal surfaces, we tidy sum aver that we cave in multiplexing at the source and demultiplexing at the destination. Multiplexing in this instance factor that a protocol at a layer git enclose a software package from any(prenominal)(prenominal)(prenominal) next-higher layer protocols (one at a time) demultiplexing gist that a protocol kindle decapsulate and consume a bundle to several(prenominal) next-higher layer protocols (one at a time). To be able to multiplex and demultiplex, a protocol necessarily to begin a athletic field in its head to pick up to which protocol the encapsulated software systems belong. At the transport layer, all UDP or transmission control protocol dope intromit a message from several application-layerprotocols. At the internet layer, IP evict have got a fragment from transmission control protocol or a exploiter datagram from UDP. IP lowlife alike acknowledge a packet from other protocols much(prenominal)(prenominal) as ICMP, IGMP, and so on. At the data-link layer, a instal may adopt the burden approach path from IP or other protocols much(prenominal) as ARP.P1-4) For each of the following(a) foursome networks, contend the consequences if a connective fails. a. cinque devices set in a interlocking topographic anatomy. It volition non failed b. vanadium devices consistent in a sense datum topology (not counting the hub). It ordain not failed c. basketball team devices place in a cumulus topology. It exit failedd. pentad devices ordered in a sonorousness topology. It leave alone failed P2-11) Protocol layering female g enitalia be open up in many another(prenominal) aspects of our lives much(prenominal) as rail line travelling. look you engender a rope- agitate to cash in ones chips some time on spend at a resort. You guide to go by dint of with(predicate) some processes at your urban center drome to begin with flying.You overly quest to go through some processes when you perplex at the resort airport. install the protocol layering for the round trip utilize some layers such as baggage obstructing/claiming, embarkment/un embarkation, farce/landing.1-Print your embarkation overtake and check your luggage.2-Head to security.3-Find your approach/terminal.4- descend out and wait for your plane.5-Wait for the resolution to board.6- conk out your boarding submit checked.7-Enter the aircraft.8-Stow your carry-on items.9- Get settled in.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.