Professional Documents
Culture Documents
Jimma University: Jimma Institute of Technology
Jimma University: Jimma Institute of Technology
GROUP MEMBERS
NAME ID NUMBER
1. HAWI HAILU RU0988/09
ASSIGNMENT I
1. What is the difference between a host and an end system? List several different types of end
systems.
Answer:
Host is a computer connected via Internet whereas End system is those type of computers
connected computer network. The types of end systems are:-
PCs PDAs
Workstations TVs
Web servers Cell Phones and
email servers Tablets
2. Why are standards important for protocols?
Answer:
The standard protocol is important because it used
3. List six access technologies. Classify each one as home access, enterprise access, or wide-area
wireless access.
Answer:
The six access technologies are:-
2
Table 1. The classification of the six-access technology.
4. Describe the most popular wireless Internet access technologies today. Compare and contrast
them.
Answer:
The two most popular wireless internet access technologies are:
a. Wireless LAN (Local Area Network)
b. Wide-area wireless access network
Table 2. The comparison between LAN and WAN wireless access network.
3
5. List five tasks that a layer can perform. Is it possible that one (or more) of these tasks could be
performed by two (or more) layers?
Answer:
The following is the list of five tasks that a layer can perform:
Flow control
Error control
Segmentation and reassembly
Multiplexing
Connection setup
Yes, more than one task is performed by two or more layers. For example the flow control and
error control tasks are performed by more than two layers.
Flow control task:- The network layer and the transport layer perform the flow control
task.
Error control task:- The error control task is performed by session and transport layers to
detect the error.
6. What are the five layers in the Internet protocol stack? What are the principal responsibilities
of each of these layers?
Answer:
The TCP/IP model is based on a five-layer model for networking. From bottom (the link) to top
(the user application), the five layers in the internet protocol stack are:-
a. Application
b. Transport
c. Network
d. Data link
e. Physical
4
Used to exchange the packets of information with the application present in the system at the
other end. Some of the protocols that are present in this layer are HTTP, SMTP, and FTP. The
protocols of this layer are distributed over multiple end systems.
b. Transport Layer
To transport the messages of application-layer between two endpoints. The main protocols used
to transport the messages are TCP (Transmission Control Protocol) is a connection-oriented
service provider, guarantees the delivery of messages which provides flow control and UDP
(User Datagram Protocol) is connection less service provider which doesn’t provide flow control
or congestion control.
c. Network Layer
Used to move the packets of data (known as datagrams) between any two hosts in the network.
The service provided by this layer is similar to the postal service. It moves the datagrams and
delivers them based on the destination address and the protocol in this layer is IP (Internet
Protocol) protocol which defines the fields of the datagram.
d. Datalink Layer
Used to move the packets from one node (here node may be a router, a host or any other network
device) to the next node through an optimal route.
e. Physical Layer
Used to move the individual bits within the frame from one node (here node may be a router, a
host or any other network device) to the next node through physical transmission media.
Different physical media require different protocols. The protocol to transfer the bits using
twisted-pair is different from the protocol used in coaxial cable. The bit is moved in different
ways across the links based on the media used.