0% found this document useful (0 votes)
7 views

CN Solved Assignment

Sybcs computer network assignment
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
7 views

CN Solved Assignment

Sybcs computer network assignment
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 5
Differences between OSI Model and TCP/IP Model Parameters Full Form Layers Usage ‘Approach Detivery Replacement Reliability OS! Model OSI stands for Open Systems Interconnection, Ithas 7 layers, It is Low in usage. itis vertically approached, Delivery of the package is guaranteed in OSI Mode. Replacement of tools and changes can ‘easily be done in this model. It is tess reliable than TCP/IP Model. TCP/IP Model TCPIIP stands for Transmission Contrat Protocol/Internet Protocol. Ithas 4 layers It is mostly used It is horizontally approached. Delivery of the package is not guaranteed in TCP/IP Model. Replacing the tools is not easy as it isin OSI Model. It is more reliable than OS! Model ‘Geeusrortoeks. ee GeekstorGeekas promecy pORCY Functions of the Data-link Layer ra Tamactsenee “Thore are various benefits of data Unk layer s et’ lock intoit ewer Layer pose ata tnk Layer [aeiiaieiilinae = Physica tayer Framing “The packet received rom the Nanwatklavar is known 35a fame inthe Data ink ayer. At the cender's side, DLL receives packets fom the Netwark layer and evides them nta small frames then, sends each frame bit-by-bit the physical ava. algo staches some spec bts (or erorcontrl and addressing) tthe header and end ofthe frame, At the receives end, DLL takes bits fom the Physical Laver organizes ‘them into te fame, and sends them tothe Network Laer. Addressing “The data ink ayer encapsulates the source and dectination’s MAC aditeza/ physical address in the header of each frame to ensure red: to:node delivery MAC sess is the unique hardware adress that in assigned tothe device while manectuing Error Controt Data can get corrupted du to various reazons like nose attenuation ete. So, tis the responsibilty ofthe ‘data tink Layer, to detec the errr the tranemnitted data and corec it using sor detection and catuactan techniques respectively DLL adds error detection bits ints the frame's header, so that reciver ‘con check received data is correct or aot kad reliably to phyiscal layer by adding mechansims to detect and vevancinit damaged or ast frames Flow Control Woe receivers receiving peed i lower than the sender's sending speed, then this can ead Wo an ‘vertiow inthe recive’ burr and some frames may gt Lost. Sit’ the responsibility of DLLto smchronize the sanders and resive's ceds and establish low contol betwecn them Access Control When multe devices share the same communication channel there a high rababity of collision, so isthe responsibilty of DLL to check which device has contol over the channel and CSMAJCO ond (CSMA/CA canbe use ta avoid cllsions and loss of ames inthe channel Services Offered by Network Layer Receiver ‘Teafie Source with shaper 2-Rowting 3. Forwarding Forwarding is simply defined as the action applied by each router when a packet arrives at one of its interfaces. When a router receives a packet from one of its attached networks, it needs to forward the packet to another attached network (unicast routing) or to some attached networks (in the case of multicast routing). Routers are used on the network for forwarding a packet from the local network to the remote network. So, the process of routing involves packet forwarding from an entry interface out to an exit interface. What is UDP (User Datagram Protocol)? User Datagram Protocol (UDP) |s a communications protocol for time-sensitive applications like gaming, playing videos, or Domain Name System (ONS) lookups. UDP results in speedier communication because it does not sprend time forming a firm connection with the destination betore transferring the data, Because establishing the connection takes time, eliminating this step results in faster data transfer speeds. However, UDP can also cause data packets to get lost as they go from the source to the destination. It can also make it relatively easy for a hacker to execute a distributed denial-of-service (DDos) attack, In many cases, particularly with Transmission Control Protocol (TOP), when data is transferred across the internet, it not only has to be sent from the destination but also the receiving end has to signal that itis ready for the data to arrive, Once both of these aspects of the communication are fulfilled, the transmission can begin. However, with UDP, the data is sent before a connection has been firmly established, This can result in problems with the data transfer, and it also presents an opportunity for hackers who seek to ‘execute DDOS attacks.

You might also like