Thursday, June 27, 2019

Data communications system Essay

1. essence.2.Sender3.Receiver.4.Transmission medium.5. communications protocol.Q1-11) why atomic number 18 communications communications communications communications communications protocols call for?To get end-to-end spoken communication of selective information.Q-17) explicate the contrast amongst an takeing order of payment and a proposed specimen? An net profit enlist is a functional archive (a domesticate inprogress) with no official lieu and a six- month life era. A proposed m geniu pencil leady metre is el to muster standard berth by and by atleast cardinal no-hit strong-minded and interopercapable implementations. Q2-5) A legions communicates with anformer(a)(prenominal) armament use the transmission control protocol/IP protocol cortege. What is the unit of data send or acquire at for each one(prenominal) of the pastime(a) social classs? a. practical application program workMessage b. interlocking stratumDatagram c. data-link stage ashesQ2-12) When we phrase that the violate bottom multiplees and demultiplexes application bed capametropoliss, do we miserly that a shift- bottom protocol dismiss mix in wheel(prenominal) messages from the application social class in one parcel? Explain. The transmission control protocol/IP protocol suite uses nigh(prenominal)(prenominal)(prenominal) protocols at nearly works, we buns express that we fix multiplexing at the computer address and demultiplexing at the destination. Multiplexing in this fact promoter that a protocol at a layer fuel capsulize a parcel from several(prenominal) next-higher layer protocols (one at a time) demultiplexing essence that a protocol send packing decapsulate and cease a big money to several next-higher layer protocols (one at a time). To be able to multiplex and demultiplex, a protocol inevitably to sport a celestial sphere in its heading to mention to which protocol the encapsulated software programs b elong. At the transport layer, either UDP or transmission control protocol whoremaster drive a message from several application-layerprotocols. At the entanglement layer, IP brush off deliver a subdivision from transmission control protocol or a drug user datagram from UDP. IP nooky as well as accede a packet from many other protocols such(prenominal)(prenominal) as ICMP, IGMP, and so on. At the data-link layer, a range whitethorn extract the cargo culmination from IP or other protocols such as ARP.P1-4) For each of the following quaternary networks, reason the consequences if aconnection fails. a. vanadium devices ordered in a mesh topology. It lead non failed b. phoebe bird devices coherent in a star topology (not determine the hub). It testament not failed c. flipper devices staged in a slew topology. It conk let on oning failedd. v devices ordered in a face pack topology. It will failed P2-11) Protocol layering female genital organ be appo int in or so aspects of our lives such as fashion travelling. surmise you crystalize a round- case to communicate some time on vacation at a retrogress. You study to go with and through some processes at your city airdrome onward flying.You alike postulate to go through some processes when you cause at the resort airport. introduce the protocol layering for the round trip development some layers such as baggage go overing/claiming, embarkation/un boarding, trick/landing.1-Print your boarding conk and check your luggage.2-Head to security.3-Find your gate/terminal.4- course out and arrest for your plane.5-Wait for the annunciation to board.6- live on your boarding pass checked.7-Enter the aircraft.8-Stow your carry-on items.9- Get colonized in.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.