Nt1310 Unit 9 Assignment 1 Network Packet

Decent Essays
Alejandro Carriegos
9/1/2015
Network Layer The main purpose of the network layer packet is connecting with the destination; it must be familiar with the topology subnet and choose the appropriate paths through it. When the source and destination are on different networks, the network layer (IP), have to deal with these differences. The services provided by the network layer should be independent of the topology subnet. The transport layer must be protected in the number, type, and topology of this connection subnet addresses are available on the transport layer and should be of a single numbering plan (also LAN and WAN) for data transfer.
Four specific jobs performed by the Network layer:
1- Communication with the Transport layer
Transport layer ensures reliable arrival of messages and offers error mechanisms and data flow control activities. The transport layer provides services for sending "free space", "connection-oriented" and emissions. For connection, transmission, transfer or destination, it can send packets that have to be reconstituted at the other end the whole message.
…show more content…
The transport layer encapsulates the application data with data unit. The transport layer protocol creates a virtual flow of data sent and received between the sending applications, divided by the transport port number. The port number identifies a port, a place dedicated to the memory to receive or send data presentation. The services layer protocol transport reliable delivery of the order data. The final result depends on TCP, SCTP, vs UDP handles the

Related Documents

  • Great Essays

    Nt1310 Unit 7

    • 1416 Words
    • 6 Pages

    The three functions of the network software are: To make sure that the information is addressed properly. To organise information into packets (a series of messages that a file is broken down into) on the sending workstation and putting the packets back to make a file on the receiving workstation. To check that each packet reaches the designated workstation. 4. What are the…

    • 1416 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Ntc300 Unit 1

    • 1895 Words
    • 8 Pages

    Each interface must have a unique IP address that identifies that interface. In our earlier conversations we examined MAC addressing and how layer two capable devices we able to utilize the MAC address to route packets to the desired destination. MAC address switching used layer…

    • 1895 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    How DHCP works:- Dynamic IP address will be generated and assigned from pool of network. It assigns that IP address which are expired. This is done using DHCP server. The high level working of DHCP has mentioned below: a) The network which is connected to your machine, request for IP address to DHCP server. b) On request, DHCP server allocates an IP address to machine.…

    • 1622 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    TCP/IP And OSI Models

    • 957 Words
    • 4 Pages

    Can be written in DDN format c. Are listed in the data-link trailer d. Used by routers to make a forwarding decision 16. Which of the following statements is true comparing LANs and WANs? (Choose two answers.) a. LANs generally connect devices that are nearer to each other, compared to WANs. b. WANs are purchased, and LANs are leased.…

    • 957 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Basically it determines what data entities stores the needed information within the system. As well as the workflows and business rules that are needed to be completed to process request. Then finally the client request is send through the Data Access Service to make sure that this data is able to be accessed and provided to requestor. Once this is confirmed…

    • 1025 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Appendix B – BROS Information PURPOSE: The following provides information on the “BES Reliability Operating Services” (BROS) noted in this procedure and the CIP-002 standard. USAGE: BROS was introduced in the Guidance and Technical Basis section of the CIP-002 standard, and are based on the NERC Reliability Functional Model. The purpose of the BROS is to assist Responsible Entities (i.e. FPL) in the identification services essential to the reliable operation of the BES asset, and the Cyber Assets associated with those essential services. For CIP-002 the BROS have been identified as: BROS Name Brief Description Dynamic Response Includes those actions performed by BES Elements or subsystems which are automatically triggered to initiate a response to a BES condition.…

    • 1107 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    GUI shall be designed for the system to communicate with the users. The system depends on functioning database, operating systems, and hardware. The system depends on working LAN, WLAN, and/or TCP/IP connections. The success of the system is dependent on the users capability of operating the software. 4 Detailed Design 4.1 Screen Display Samples 4.2 Detailed Object…

    • 713 Words
    • 3 Pages
    Great Essays
  • Great Essays

    Client-server communicates at the virtual (logical) level by exchanging requests and responses. In order to achieve this virtual communication, physical messages are sent between these two processes. This implies that operating systems of computers and a communication system of a distributed computing system are actively involved in the service…

    • 1122 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    1. (5 points) Compare and contrast the three types of addresses used in a network. Application layer – A port is assigned to an application for direct routing of incoming and or outgoing data. Network layer – IP addresses are assigned to each individual computer. The IP addresses can change and are often assigned by the DHCP server.…

    • 766 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    If the same host is capable of IPv6, it can break through an IPv6 tunnel over this IPv4-protected communication channel. Since IPv4 VPN puts the remote host on a private network, the natural choice for the IPv6 tunnel is the ISATAP (Intra-Site Automatic Tunnel Addressing Protocol), which is suitable for communication within a location. However, in practice, we can use any type of IPv6 tunnel as long as it is supported by the host and while the gateway is set up within the private network for it. Configurations for IPv4 access to VPN and IPv6 tunnel are completely independent. From the host's perspective, the tunnel configuration depends on the operating system used.…

    • 274 Words
    • 2 Pages
    Improved Essays