Describe the network interface layer in the tcp-ip model

Assignment Help Computer Networking
Reference no: EM131888186

Assignment

Directions:

Formulate complete responses to the following fourteen questions. You may craft your response after each question and let the document grow as you respond. The questions have been highlighted to help delineate the questions from the responses. The questions cover topics that are discussed in Weeks 1 through 3.

1. What are the three characteristics of sine waves that can be manipulated to represent data?

The three sine waves characteristics that can be manipulated are;

• Amplitude-which is the measure of the wave power or height and is basically the maximum distance from a wave peak to its zero value. It occurs to remain the same if it is measured from the zero value to the positive peak or from the zero value to the negative peak.

• Phase-it refers to a certain time point within a wave's cycle. It is usually measured in degrees, whereby 00 represents the start of the cycle, whereas 3600 represents the end. The positive point peak is represented by 900 and the zero point within the positive and negative peak is considered to be 1800 and the negative peak point is 2700.

• Frequency-it is the term used in reference to the number of cycles that can be observed within one second and its unit of measure is hertz (HZ).

2. Why are waves important in communication?

Waves are of great essence in communication in that:

• Waves do propagate or in other words travel not only through space but also wires, as well as, fibers.
• Most importantly, patterns can possibly be encoded within waves.

3. Describe some options regarding light transmission in communication technology.

Wireless transmission through the use of light frequencies can take place within infrared, visible, or even ultraviolet light spectra. Theoretically, the raw transmission rates can happen to be relatively higher as compared to RF transmission as a result of the higher transmission frequency, as well as, available bandwidth. However, practically, atmospheric interference tends to create big barriers by rapidly attenuating light signals. Infrared transmissions turn out to be limited to just a few dozen meters, whereas laser transmissions within the visible spectrum happen to be restricted to several hundred meters. Another barrier to massive use is the need of a line of sight that is not obstructed.

4. What are the two main synchronization problems that can occur during message transmission?

The two major synchronization problems that can potentially emerge during message transmission include:

• Keeping the sender together with the receiver clocks synchronized in the course of transmission.
• Synchronization of the start of every message.

5. List two characteristics in which error detection and correction methods vary.

• Size, as well as, content of redundant transmission.
• The likelihood that the error free message will possible be detected as an error.

6. List and describe four physical topologies.

• Bus- the nodes are networked within a linear sequence that is terminated at both ends.

• Mesh-it connects each node to all other nodes and it is practically applicable for the considerably small networks only.

• Ring-The network takes the form of a ring, whereby tokens or packets move to the succeeding node within the ring. Just a single node has the packet at every given moment.

• Star-Refers to the network whereby all nodes are linked to a central point. It is disadvantageous in that all nodes get the same signal, increasing the chances of collisions together with security concerns.

7. What was ARPANET?

ARPANET refers to the network which turned out to be the foundation for the Internet. It was based on an idea initially published within 1967 and was developed under the U.S ARPA (Advanced Research Projects Agency). ARPANET capitalized on the concept of sending information within small bits termed as packets, which could be directed to diverse paths and redesigned at their destination. Further development of ARPANET led to the invention of the present-day Internet.

8. Describe the application layer of the TCP/IP model.

9. Describe the network interface layer in the TCP/IP model.

10. What are the call management functions that VoIP must perform?

11. Why were fourth-generation languages developed?

12. What does a programming language define?

13. List two capabilities of a symbolic debugger.

14. What are factors have caused Java's popularity to far exceed most initial expectations?

15. List three components that an integrated development environment generally includes.

16. Why has changed as a result of hardware cost declining over time as a proportion of total system costs?

Reference no: EM131888186

Questions Cloud

Create a forecast model : When one of multiple independent variables (X) does not meet the requirements for statistical significance (confidence) between X and Y.
Write a dna sequence that will encode for five amino acids : Write a DNA sequence that will encode for at least five amino acids. Change three different bases separately and write the corresponding amino acid sequences.
What are some of the key components in the overall ecology : What are some of the key components in the overall ecology of global health? Are these different from the ecological context for domestic health?
Compare qualitative and quantitative research methods : Your task is to prepare a chart in which you will compare and contrast qualitative and quantitative research methods.
Describe the network interface layer in the tcp-ip model : Describe the network interface layer in the TCP/IP model. What are the call management functions that VoIP must perform?
What is the best location if the production volume equal : Using the break-even point in the quantities, what is the location? What is the best location if the production volume equal 4000 unit?
Difference between natural and acquired immunity : Cardiovascular and Lymphatic-Immune Systems Worksheet - What is the difference between natural and acquired immunity
What would be most effective and cost-effective way to plan : What would be the most effective, efficient, timely, and cost-effective way to plan for and manage a global pandemic? Why?
Write a summary of blooms taxonomy : For this discussion question, research Bloom's Taxonomy and write a summary of Bloom's Taxonomy.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd