Get premium membership and access questions with answers, video lessons as well as revision papers.
1. Network Access Layer –
This layer corresponds to the combination of Data Link Layer and Physical Layer of the OSI model. It looks out for hardware addressing and the protocols present in this layer allows for the physical transmission of data.
We just talked about ARP being a protocol of Internet layer, but there is a conflict about declaring it as a protocol of Internet Layer or Network access layer. It is described as residing in layer 3, being encapsulated by layer 2 protocols.
2. Internet Layer –
This layer parallels the functions of OSI’s Network layer. It defines the protocols which are responsible for logical transmission of data over the entire network. The main protocols residing at this layer are :
1. IP – stands for Internet Protocol and it is responsible for delivering packets from the source host to the destination host by looking at the IP addresses in the packet headers. IP has 2 versions:
IPv4 and IPv6. IPv4 is the one that most of the websites are using currently. But IPv6 is growing as the number of IPv4 addresses are limited in number when compared to the number of users.
2. ICMP – stands for Internet Control Message Protocol. It is encapsulated within IP datagrams and is responsible for providing hosts with information about network problems.
3. ARP – stands for Address Resolution Protocol. Its job is to find the hardware address of a host from a known IP address. ARP has several types: Reverse ARP, Proxy ARP, Gratuitous ARP and Inverse ARP.
3. Host-to-Host Layer –
This layer is analogous to the transport layer of the OSI model. It is responsible for end-to-end communication and error-free delivery of data. It shields the upper-layer applications from the complexities of data. The two main protocols present in this layer are :
1. Transmission Control Protocol (TCP) – It is known to provide reliable and error-free communication between end systems. It performs sequencing and segmentation of data. It also has acknowledgment feature and controls the flow of the data through flow control mechanism. It is a very effective protocol but has a lot of overhead due to such features. Increased overhead leads to increased cost.
2. User Datagram Protocol (UDP) – On the other hand does not provide any such features. It is the go-to protocol if your application does not require reliable transport as it is very cost-effective. Unlike TCP, which is connection-oriented protocol, UDP is connectionless.
4. Application Layer –
This layer performs the functions of top three layers of the OSI model: Application, Presentation and Session Layer. It is responsible for node-to-node communication and controls user-interface specifications. Some of the protocols present in this layer are: HTTP, HTTPS, FTP, TFTP, Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS, X Window, LPD. Have a look at Protocols in Application Layer for some information about these protocols. Protocols other than those present in the linked article are :
1. HTTP and HTTPS – HTTP stands for Hypertext transfer protocol. It is used by the World Wide Web to manage communications between web browsers and servers. HTTPS stands for HTTP-Secure. It is a combination of HTTP with SSL(Secure Socket Layer). It is efficient in cases where the browser need to fill out forms, sign in, authenticate and carry out bank transactions.
2. SSH – SSH stands for Secure Shell. It is a terminal emulations software similar to Telnet. The reason SSH is more preferred is because of its ability to maintain the encrypted connection. It sets up a secure session over a TCP/IP connection.
3. NTP – NTP stands for Network Time Protocol. It is used to synchronize the clocks on our computer to one standard time source. It is very useful in situations like bank transactions. Assume the following situation without the presence of NTP. Suppose you carry out a transaction, where your computer reads the time at 2:30 PM while the server records it at 2:28 PM. The server can crash very badly if it’s out of sync.
Titany answered the question on November 30, 2021 at 12:44
- Basic Network Troubleshooting Steps(Solved)
Basic Network Troubleshooting Steps
Date posted: November 30, 2021. Answers (1)
- Describe two types of user interfaces in network operating systems(Solved)
Describe two types of user interfaces in network operating systems
Date posted: November 30, 2021. Answers (1)
- Wireless networks are commonly used in business firms. Outline four benefits of the network (Solved)
Wireless networks are commonly used in business firms. Outline four benefits of the network
Date posted: November 30, 2021. Answers (1)
- Use of passwords expiration feature in data communication systems is unpopular. Explain two limitations of this feature (Solved)
Use of passwords expiration feature in data communication systems is unpopular. Explain two limitations of this feature
Date posted: November 30, 2021. Answers (1)
- Joan was requested to patch communication software in her company’s computers. Explain two reasons that could have influenced the request (Solved)
Joan was requested to patch communication software in her company’s computers. Explain two reasons that could have influenced the request
Date posted: November 30, 2021. Answers (1)
- Explain two types of cookies as used in the Internet(Solved)
Explain two types of cookies as used in the Internet
Date posted: November 30, 2021. Answers (1)
- With aid of a diagram, describe TCP handshake(Solved)
With aid of a diagram, describe TCP handshake
Date posted: November 30, 2021. Answers (1)
- Copper cables offer different throughputs in data communication. Outline four factors that influence the cables(Solved)
Copper cables offer different throughputs in data communication. Outline four factors that influence the cables
Date posted: November 30, 2021. Answers (1)
- With the aid of a diagram, describe a time-division multiplexing (TDM)(Solved)
With the aid of a diagram, describe a time-division multiplexing (TDM)
Date posted: November 30, 2021. Answers (1)
- Routing protocols use routing tables to establish the source and destination of data packets in transit. Explain three routing path determination methods used by these...(Solved)
Routing protocols use routing tables to establish the source and destination of data packets in transit. Explain three routing path determination methods used by these protocols
Date posted: November 30, 2021. Answers (1)
- Differentiate between information security and network infrastructure security(Solved)
Differentiate between information security and network infrastructure security
Date posted: November 30, 2021. Answers (1)
- A network design should meet several user needs. Outline four examples of such needs(Solved)
A network design should meet several user needs. Outline four examples of such needs
Date posted: November 30, 2021. Answers (1)
- Explain three advantages of extranet networks in organizations(Solved)
Explain three advantages of extranet networks in organizations
Date posted: November 30, 2021. Answers (1)
- Explain two circumstances under which unshielded fibre optic cables are used to build a LAN(Solved)
Explain two circumstances under which unshielded fibre optic cables are used to build a LAN
Date posted: November 30, 2021. Answers (1)
- Outline two roles of a browser(Solved)
Outline two roles of a browser
Date posted: November 30, 2021. Answers (1)
- Explain two types of UTP cables used during network installation(Solved)
Explain two types of UTP cables used during network installation
Date posted: November 30, 2021. Answers (1)
- Define the term throughput as used in data transmission(Solved)
Define the term throughput as used in data transmission
Date posted: November 30, 2021. Answers (1)
- Describe the email protocols(Solved)
Describe the email protocols
Date posted: November 30, 2021. Answers (1)
- Outline four requirements for internet installation in organizations(Solved)
Outline four requirements for internet installation in organizations
Date posted: November 30, 2021. Answers (1)
- Jonah intends to troubleshoot a network for his company. Explain three troubleshooting methods that he should apply(Solved)
Jonah intends to troubleshoot a network for his company. Explain three troubleshooting methods that he should apply
Date posted: November 30, 2021. Answers (1)