Describe what happens at every step of our network model, when a node on one network establishes a TCP connection with a node on another network. You can assume that the two networks are both connected to the same router.Your submission must include a detailed explanation of the following:

Physical layer

Data link layer

Network layer

Transport layer

MAC address

IP address

TCP port

Checksum check

Routing table

TTL

Answers

Answer 1
Answer: TCP (Transmission control protocol) makes sure  that  all data packets transferred by (IP)internet protocol  arrives safely.
This is what happens  when a node of one network establishes aTCP connection with a node on another network:
1.Physical layer.
It  is the lowest layer which defines how the cables,network cards,wireless transmitters and other hardware connect computers to the networks and the networks to the rest of  the internet.example of  physical layer is Ethernet,WIFI e.t.c.
It provides the means to transfer the actual bits from one computer to another.In an Ethernet network a computer is connected by plugging a network cable in its Ethernet  card and then plugging the other end of that cable into a router or switch.
It specifies how bits of data are sent over that cable.
2. Data link layer
The data link layer provides a network connection between hosts on a particular local network.
The internet protocol basically assumes all computers are part of one very large "web" of nodes that can all pass packets to other nodes.there is always route from one node to another,even if sometimes a very large number of intermediate nodes get involved. The data link layer makes this assumption true.
For example the client runs on a personal computer in someones home network which is set up using Ethernet protocol .The data link layer now is that Ethernet protocal. The IP packets that this computer transmits are added as payload to Ethernet packets that are transmitted over the local network to ADSL(Asymmetric digital subscriber line) modem that connects the local network to the provider.
3.Network layer
The network layer is responsible for transmitting and routing data packets over the network.The internet uses the internet protocal (IP) as its network layer.Each node on the network has an addres which is called the ip address of which data is sent as IP packets.
when the client sends its TCP connection request, the network layer puts the request in a number of packets and transmits each of them to the server.each packet can take different route and some packets may get lost along the way.If they all make it the transport layer at the server is able to reconstruct the request and it will prepare response confirming that the TCP connection has been set up.
This response is sent back again in a number of IP packets that will hopefully make it to the client.
4. Transport layer
This layer is realized by two protocals. The first is transmission control protocal(TCP) and the second one is the user datagram protocol(UDP) they both break up a message that an application wants to send into packets to the intended recipient.
At the recipients side,both take the payload from the recieved packets and pass those to the application layer.
Again taking an example of email, the email client and server communicate over a reliable TCP connection.The server listens on a certain port untill a connection request arrives from the client .The server acknowledges the request and aTCP connection is established.Using this connection the client and server can exchange data.
5.MAC address
MAC addres(media access control layer) This  layer is responsible for moving data packets to and from one network interface card (NIC) to another accross shared channel.
6. IP address
IP ( internet protocol) it is the the principal protocol in the internet protocol suite for relaying data-grams across network boundaries. its routing function enables inter-networking and essentially establishes the internet.
The  IP is responsible for the following:
i) IP addressing 
ii)host-to-host communications.
iii)fragmentation
7. TCP port
This is an endpoint to a logical connection and a the way a client program specifies a specific server program on a computer in a network.The port number identifies what type of port it is.
8.Checksum check
Checksum is a small sized datum derived from a digital data for the purpose of detecting errors which may have been introduced during its transmission or storage.
Checksum is a simple type of reduduncy check that is used to detect errors in data.
checksum is created by culculating the binary values in a packet or other block of data using some algorithm and storing the results with the data.
9.Routing table
Routing table is a data table stored in a router or a networked computer that lists the routes to particular network destinations and some cases metrics(distances) associated with those routes.
10. TTL
TTL Time-to-live is an internet protocal that tells a network router whether or not the packet has been in the network too long and should be discarded in IPV6.the TTL in each packet has been renamed (hop) limit.
Hop is one portion of the path between source and destination .Data pass through bridges,routers and gateways as they travel between source and destination.each time packets are passed to the  next network device,a hop occurs.





 





Answer 2
Answer:

Answer:

Your submission must include a detailed explanation of the following:

Physical layer

Physical layer refers, in computing, to the consideration of the hardware components involved in a given process. In terms of networks, the physical layer refers to the means of connection through which data will travel, such as serial interfaces, or coaxial cables.

Data link layer

The data link layer is the protocol layer in a program that handles the moving of data into and out of a physical link in a network. The data link layer is Layer 2 in the Open Systems Interconnection (OSI) architecture model for a set of telecommunication protocols. Data bits are encoded, decoded and organized in the data link layer, before they are transported as frames between two adjacent nodes on the same LAN or WAN. The data link layer also determines how devices recover from collisions that may occur when nodes attempt to send frames at the same time.

Network layer

The network layer of the OSI model is responsible for controlling overall network operation. Its main functions are the routing of packets between source and destination, even if they have to pass through several intermediate nodes along the route, congestion control and accounting for the number of packets or bytes used by the user for charging purposes.

Transport layer

The transport layer is the layer in the open system interconnection (OSI) model responsible for end-to-end communication over a network. It provides logical communication between application processes running on different hosts within a layered architecture of protocols and other network components.   The transport layer is also responsible for the management of error correction, providing quality and reliability to the end user. This layer enables the host to send and receive error corrected data, packets or messages over a network and is the network component that allows multiplexing.

MAC address

When we talk about physical address we are referring to the MAC (Media Access Control) address which is 48 bits (12 hexadecimal characters).

IP address

An Internet Protocol Address (IP Address) is a numeric label assigned to each device (computer, printer, smartphone, etc.) connected to a computer network using the Internet Protocol. for communication.

TCP port

if you are using a File Transfer Protocol (FTP) program, the Internet connection is made through TCP port 21, which is a standard port for this protocol. If you are downloading files from BitTorrent, one of the ports ranging from 6881 to 6889 will be used for such activity.

Checksum check

This is done by calculating the checksum of the data before sending or storing it, and recalculating it upon receipt or retrieval from storage. If the value obtained is the same, the information has not changed and therefore is not corrupted.

More simplified forms of these sums are vulnerable because they do not detect some forms of failure. The simple sum of character values, for example, is vulnerable to their changing order by the commutativity of the sum. There are more elaborate ways of calculating these sums that solve these problems, such as the Cyclic Redundancy Check or CRC widely used for fault detection by dividing polynomials.

Routing table

In a computer network, a routing table, or routing information base, is a data table stored on a network router or host that lists the routes to specific network destinations and, in some cases, metrics associated with those routes.

TTL

Time to Live, which means the number of hops between machines that packets can take a computer network before being discarded (maximum of 255).

Any router is programmed to discount a unit of TTL to packets flowing through it. This is a way to avoid that packages remain on the net for infinite time, if the routing is not being done properly, as in the case of looping.

This value is also useful in screening circuits traversed by packets, as does the tracerouting tool.

Hope this helps :) -Mark Brainiest Please :)


Related Questions

What is the purpose of creating a PST file?Question 18 options:a)To document an antivirus pattern that continues to be sent to your mailboxb)To insert as a Signature for all outgoing emailsc) To save your emails so that you can restore your mailbox if necessaryd)To create a file that deleted emails will be sent to for deletion
When applying scenario logic to technology commercialization we should not consider if there is enough social, political, and market support for commercialization to take place Select one: True False
Which of the following are key corporate assets?A) intellectual property, core competencies, and financial and human assetsB) production technologies and business processes for sales, marketing, and financeC) knowledge and the firm's tangible assets, such as goods or servicesD) time and knowledge
What type of result does the MATCH function, when used on its own, return?
What is copyright and what are your thoughts on it?

. A file allocation table (FAT) is used to keep track of the portions assigned to a file. Select one: True False

Answers

Answer: True

Explanation: File allocation table(FAT) is the part of the file system that helps the hard drives .It is used for the management of the files and data which gets stored in the hard drive  by the operating system. It can also help in the extension or expansion of the hard drive storage.

It also keeps tracing the files and data accordingly. This table works for the  portable devices ,cameras etc. Thus, the statement given is true.

Consider the operation of a machine with the data path given below. Suppose that loading the ALU input registers takes 5 nsec, running the ALU takes 10 nsec, and storing the result back in the register scratchpad takes 5 nsec. What’s the maximum number of MIPS this machine is capable of with pipelining with the three execution stages?

Answers

Answer:

The load instructions in the ALU input registers take the 5 nsec, and tuns the ALU and this takes the 10 nsec and thus stores the result back into the scratchpad registers and this takes 5 nsec. The data path cycle in it is 20 nsec.

The total time is 20 nsec for one cycle.

To calcualte the MIPS, divide one second with 20 nsec.

Millions of instructions per second (MIPS) = (1*10^9 nsec)/20 nsec = 50,000,000 nsec

Therefore, the maximum number of MIPS this machine is capable of in the absence of pipelining is 50 MIPS.

Explanation:

Using your choice of pseudocode, C# or java, define a class for a Pig. A Pig object should have three attributes: a name, an age, and weight. Your class should have (i) a constructor that takes three arguments and copies them to the attributes; (ii) setters (mutators) and getter accessors) or properties (C#) for the attributes; (iii) a display method to display the Pig's attributes on screen; and (iv) a main() method that creates a Pig object, assigns values to its attributes, and displays them by calling the display method.

Answers

Answer:

Following are the code to this question:

public class Pig //Defining class Pig

{

private String name; //Defining string variable name

private int age; // Defining integer variable age

private double weight; // Defining double variable weight

Pig (String name, int age, double weight)  //Defining parameterized constructor  

{

super(); //using super key

this.name = name; //holding value in name variable

this.age = age;  // holding value in age variable

this.weight = weight; // holding value in weight variable

}

String getName() //Defining method getName

{

return name; //return name value

}

void setName(String name) // Defining method setName    

{

this.name = name; //hold name value

}

int getAge() // Defining method getAge

{

return age; //return value

}

void setAge(int age) // Defining method setAge  

{

this.age = age; // hold age value

}

double getWeight()  //Defining method getWeight

{

return weight; //return weight value

}

void setWeight(double weight) //Defining method setWeight  

{

this.weight = weight; //hold weight value

}

void display() //Defining method display

{

System.out.println("Name:" + name + " Age:" + age + " Weight:" + weight); //print value

}

public static void main(String[] ar) //Defining main method

{

Pig onc = new Pig("Jig",5,14.5); //creating class object and called parameterized constructor  

onc.display();//calling display method

}

}

Output:

please find the attachment.

Explanation:

In the given java program, a class "Pig" is declared, in which three name, age, and weight is defined which differs in datatypes, in the next step, parameterized constructor, get and set method, and display method declared, which can be described as follows:

  • In the parameterized constructor, uses super and this keyword to call and holds parameter value.  
  • In the get method three methods "getName, getAge, and getWeight" are defined, that return method values, and the set method "setName, setAge, and setWeight" uses this keyword to hold value in its variables.
  • The display method is used to print all method store values by its variables name.
  • Inside the main method, class object "onc" is created, which stores the value in it and calls the display method that print value with a message.

This problem will be discussed in Lab6. In Lab6, the TAs will also discuss about the solution of Function Problem 1 that required you to write several functions. Additionally, the last week's lab problems on loop will be discussed too, if you need more help on them. See the deadline. You should try your best to complete it within the lab time. First n prime numbers: Write a program that takes a positive integer n as input and prints all the prime numbers from 1 to n.

Answers

Answer:

C++.

Explanation:

#include <iostream>

using namespace std;

////////////////////////////////////////////////////////////////

void printPrime(int n) {

   if (n > 0) {

       cout<<2<<endl;

       

       for (int i=3; i<=n; i++) {

          bool isPrime = true;

           

           for (int j=2; j<i; j++) {

               if (i % j == 0) {

                   isPrime = false;

                   break;

               }

           }

           

           if (isPrime == true)

               cout<<i<<endl;

       }

   }

   else {

       cout<<"Invalid input";

   }

}

int main() {

   int n;

   cout<<"Enter positive integer: ";

   cin>>n;

   printPrime(n);

   return 0;

}

What suggestions do you have for preventing scope creep in projects?

Answers

Answer:

Scope creep is defined as the uncontrolled changes occur in the projects scope is known as scope creep. It basically occur when the project scope are not properly define and controlled.

Suggestions for preventing scope creep in projects are as follow:

  •   By using the online projects software and the software management help in prevent the scope creep in the projects.
  •   We should always focus on the projects requirements and must understand the main vision of the clients.
  •   There is no requirement of overdoing in projects rather keeping it simple and accurate according to the main requirements. otherwise, it may lead to scope creep.

Complete function PrintPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 2, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bagOunces followed by " seconds". End with a newline.

Answers

Answer:

The program to this question as follows:

Program:

#include <iostream> //defining header file

using namespace std;

void PrintPopcornTime(int bagOunces) //defining method PrintPopcornTime that accepts bagOunces

{

//defining conditional statement

if (bagOunces < 3) //if block checks bagOunces less then 3  

{

cout << "Too small"<<endl;

}

else if (bagOunces > 10)

{

cout << "Too large"<<endl; //else if value greater than 10

}

else //else block

{

cout << (bagOunces*6) <<" seconds"<<endl; //calculate seconds

}

}

int main()  

{

int bagOunces; //defining integer variable bagOunces

cout<<"Enter number: "; //message

cin>>bagOunces; //input value by user

PrintPopcornTime(bagOunces); //calling the method

return 0;

}

Output:

Enter number: 3

18 seconds

Explanation:

In the above C++ language code, the first header file is defined, then the method "PrintPopcornTime" is defined, in this method, an integer variable "bagOunces" is passed as a parameter, inside the method a conditional statement is used that can be described as follows:

  • In the if block, it will check that the "bagOunces" variable value is less than 3, if it is true, it will print "Too small". otherwise, it will go else if block.
  • In else if the "bagOunces" variable value is greater then 10, if it is true, it will print "Too large", otherwise it will go else block.
  • In the else block it will calculate the total second and prints its value in new line.

In the next step, the main method is defined, inside this method, an integer variable "bagOunces" is defined, which is used for user input and inside this method, the PrintPopcornTime is called.

The completed function "PrintPopcornTime()" can be referred to as given below.

We have,

The completed function "PrintPopcornTime()" as requested:

void PrintPopcornTime(int bagOunces) {

   if (bagOunces < 2) {

       System.out.println("Too small");

   } else if (bagOunces > 10) {

       System.out.println("Too large");

   } else {

       int time = 6 * bagOunces;

       System.out.println(time + " seconds");

   }

   System.out.println();

}

In this function, we check the value of "bagOunces" using conditionalstatements.

If it's less than 2, we print "Too small".

If it's greater than 10, we print "Too large".

Otherwise, we calculate the time by multiplying 6 with "bagOunces" and print it followed by " seconds".

Finally, we print a new line to end the output.

Thus,

The completed function "PrintPopcornTime()" can be referred to as given above.

Learn more about programming of functions here:

brainly.com/question/14684896

#SPJ6