Layering and tcp/ip protocols, Computer Networking

Assignment Help:

TCP/IP protocols are managed into five basic layers. Although some layers of the TCP/IP reference model related to layers of the ISO reference model, the ISO layers procedure does not have a layer that corresponds to TCP/IP Internet Layer.

TCP/IP reference model is given in the figure below.

256_Layering.png

LAYER 1:

Corresponds to physical network hardware layer in OSI.

LAYER 2:

Specifies how to manage data in frames.

LAYER 3:

Specifies the format of data packets transmit across an Internet and forwards data packets.

LAYER 4:

Specifies how to ensure reliable communication.

LAYER 5:

Like 6 and 7 in OSI architecture, it specifies how one application needs an Internet.

HOST COMPUTERS, ROUTERS AND PROTOCOL LAYERS:

TCP/IP describe the term host computer to refer to any computer machine that connects to an Internet and executes applications. A TCP/IP protocol makes it worth full for any pair of hosts to interact despite hardware differences.

Both routers and host require TCP/IP protocol software but routers do not require layer 5 protocols for applications, as they do not execute applications.


Related Discussions:- Layering and tcp/ip protocols

Error detection-redundancy, Q. Error Detection-Redundancy? In its p...

Q. Error Detection-Redundancy? In its place of repeating the entire data stream a shorter group of bits may be appended to the end of each unit. Called as -redundancy?

Hardware sharing - fundamentals of networks , Hardware Sharing  ne...

Hardware Sharing  network  facilitate the  sharing  devices. For  example  instead of giving  each of 10 employees in  department  of the internet  on modern society is har

Define IEEE 802.4-token bus, IEEE 802.4-Token bus Physical line or tree...

IEEE 802.4-Token bus Physical line or tree however logical ring. Stations know "left" as well as "right" stations. One token "passed" from station to station. Only station with

Dns cache poisoning, DNS cache poisoning The DNA cache poisoning gener...

DNS cache poisoning The DNA cache poisoning generally refers to the process of maintaining or developing the false information, in the cache of DNS server. This process refers

Wide area network, XYZ INC. is a large manufacturing firm that operates 5 f...

XYZ INC. is a large manufacturing firm that operates 5 factories in Dallas, 4 factories in Los Angeles, and 5 factories in Albany, New York. It operates a tightly connected order m

Assigment, what the domain name of 128.252.160.2000

what the domain name of 128.252.160.2000

Reference models - fundamentals of networks, Reference models Design...

Reference models Designing  implementing and  manufacturing  computer  networks  and related  devices  are very  complex  activities. Therefore in order  for this  technolog

What are the two broad classes of middleware, Two broad classes of middlewa...

Two broad classes of middleware are a) General middleware b) Service-specific middleware.

What is mesh topology, What is mesh topology Mesh topology is a setup w...

What is mesh topology Mesh topology is a setup wherein every device is linked directly to each other device on the network. Consequently, it needs that each device has at least

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd