Subnet layer of the tcp-ip model, Computer Networking

Assignment Help:

Q. Subnet layer of the TCP-IP model?

These two layers of the OSI correspond straight to the subnet layer of the TCP/IP model. Majority of the time the lower layers under the Interface or Network layer of the TCP/IP model are seldom or rarely discussed. The TCP/IP model does nothing however to highlight the fact the host has to connect to the network using some protocol so it can send IP packets over it. For the reason that the protocol used isn't defined it will vary from host to host and network to network

  • Subsequent to much deliberation by organizations it was decided that the Network Interface Layer in the TCP/IP model corresponds to a combination of the OSI Data Link Layer and network specific functions of the OSI network layer (example IEEE 203.3).
  • Since these two layers deal with functions that are therefore inherently specific to each individual networking technology the layering principle of grouping them together related functions is largely irrelevant.

 


Related Discussions:- Subnet layer of the tcp-ip model

Which applications of computer network will be categorized, Q. What are the...

Q. What are the main categories based on which applications of computer network will be categorized? Ans: The main areas under which the applications for computer network will

What is data traffic, Q. What is Data traffic? Data traffic ...

Q. What is Data traffic? Data traffic Peak data rate : max data rate of the traffic Average data rate = (amount of data)/time Maximum Burst size: max. l

What are the security models by giving striking analogies, Security models ...

Security models by giving striking analogies to the real world A classical case study: (With due acknowledgements to the security exponent who proposed this theory.) He has c

Switching creates variable latency through the switch, DEFINITION: Latency ...

DEFINITION: Latency = Delay. Because a store and forward switch reads the entire frame before forwarding, a larger frame takes longer than a shorter frame.

Explain the types of security threats, Q. Explain the types of Security Thr...

Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut

Mention different categories of computer networks, Mention different catego...

Mention different categories of computer networks (on the basis of scale) and distinguish one from the other. Local Area Network (LAN): Metropolitan Area Network (MAN): W

Routing and routed protocols, What is difference among routing and routed p...

What is difference among routing and routed protocols? Ans) i) Routing use for top path selection ii) Routed protocol carries on source and destination information.

What is the virtual path, Along any transmission path from a given source t...

Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is known as path.

Recognize the command that shows the sap table, show ipx servers is the co...

show ipx servers is the command that shows the SAP table

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd