Network protocols and communications

18 important questions on Network protocols and communications

There are many ideas about communication methods. Regardless of the method chosen, all communication methods have three elements in common. Name these three.

1. The message source or sender: Message sources are people, or electronic devices, that need to send a message to other individuals or devices.
2. The destination or receiver: The destination receives the message and interprets it.
3. a channel: consists of the media that provides the pathway over which the message travels from source to destination.

Name four requirements protocols must account for.

  • An identified sender and receiver
  • Common language and grammar
  • Speed and timing of delivery
  • Confirmation or acknowledgment requirements

What is encoding and decoding?

One of the first steps to sending a message is encoding. Encoding is the process of converting information into another acceptable form, for transmission. Decoding reverses this process in order to interpret the information.

Messages sent across the network are first converted into bits by the sending host. Each bit is encoded into a pattern of sounds, light waves, or electrical impulses depending on the network media over which the bits are transmitted. The destination host receives and decodes the signals in order to interpret the message.
  • Higher grades + faster learning
  • Never study anything twice
  • 100% sure, 100% understanding
Discover Study Smart

Explain the size restrictions of a frame.

The size restrictions of frames require the source host to break a long message into individual pieces that meet both the minimum and maximum size requirements. The long message will be sent in separate frames, with each frame containing a piece of the original message. Each frame will also have its own addressing information. At the receiving host, the individual pieces of the message are reconstructed into the original message

What does it mean if the delivery option is referred to as unacknowledged?

There are also times when the sender of a message needs to be sure that the message is delivered successfully to the destination. In these cases, it is necessary for the recipient to return an acknowledgment to the sender. If no acknowledgment is required, the delivery option is referred to as unacknowledged.

What do networking protocols define?

For devices to successfully communicate, a network protocol suite must describe precise requirements and interactions. Networking protocols define a common format and set of rules for exchanging messages between devices.

Name three cmmon networking protocols.

1. HTTP: Hypertext transfer protocol
2. TCP: tranmission control protocol
3. IP: internet protocol

What is ethernet (protocol)?

A network access protocol that describes two primary functions: communication over a data link and the physical transmission of data on the network media. Network access protocols are responsible for taking the packets from IP and formatting them to be transmitted over the media.

Layer Name:  Network Access

What is a legacy protocol suite?

Some protocols are proprietary which means one company or vendor controls the definition of the protocol and how it functions. Examples of proprietary protocols are AppleTalk and Novell Netware, which are legacy protocol suites. It is not uncommon for a vendor (or group of vendors) to develop a proprietary protocol to meet the needs of its customers and later assist in making that proprietary protocol an open standard.

What are the benefits of using a layered model to describe network protocols and operations?

  • Assisting in protocol design because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below.
  • Fostering competition because products from different vendors can work together.
  • Preventing technology or capability changes in one layer from affecting other layers above and below.
  • Providing a common language to describe networking functions and capabilities.

What does OSI Layer 3 do?

Layer 3: Network

OSI Layer 3, the network layer, maps directly to the TCP/IP Internet layer. This layer is used to describe protocols that address and route messages through an internetwork.

What does OSI Layer 4 do?

Layer 4: Transport

OSI Layer 4, the transport layer, maps directly to the TCP/IP Transport layer. This layer describes general services and functions that provide ordered and reliable delivery of data between source and destination hosts.

What do OSI model Layers 5, 6, and 7 do?

The TCP/IP application layer includes a number of protocols that provide specific functionality to a variety of end user applications. The OSI model Layers 5, 6, and 7 are used as references for application software developers and vendors to produce products that operate on networks.

What are the two primary benefits of segmenting messages?

  • By sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network, called multiplexing.
  • Segmentation can increase the efficiency of network communications. If part of the message fails to make it to the destination, due to failure in the network or network congestion, only the missing parts need to be retransmitted.

Protocols at the network and data link layers both contain a source and destination address, but their addresses have diffrent purposes. Name the two types of adresses and explain their purposes.

  • Network layer source and destination addresses - Responsible for delivering the IP packet from the original source to the final destination, either on the same network or to a remote network.
  • Data link layer source and destination addresses – Responsible for delivering the data link frame from one network interface card (NIC) to another NIC on the same network.

What is the purpose of the data link address?

The purpose of the data link address is to deliver the data link frame from one network interface to another network interface on the same network.

Before an IP packet can be sent over a wired or wireless network, it must be encapsulated in a data link frame so it can be transmitted over the physical medium.

The IP packet is encapsulated in a data link frame that contains data link information, including a: (2 anwers)

  • Source data link address - The physical address of the device’s NIC that is sending the data link frame.
  • Destination data link address - The physical address of the NIC that is receiving the data link frame. This address is either the next hop router or of the final destination device.



The data link frame also contains a trailer which will be discussed later

Explain the Role of the Network Layer Addresses on a remote network.

When the sender of the packet is on a different network from the receiver, the source and destination IP addresses will represent hosts on different networks. This will be indicated by the network portion of the IP address of the destination host.
  • Source IP address - The IP address of the sending device, the client computer PC1: 192.168.1.110.
  • Destination IP address - The IP address of the receiving device, the server, Web Server: 172.16.1.99.
Notice in the figure that the network portion of the source IP address and destination IP address are on different networks.

The question on the page originate from the summary of the following study material:

  • A unique study and practice tool
  • Never study anything twice again
  • Get the grades you hope for
  • 100% sure, 100% understanding
Remember faster, study better. Scientifically proven.
Trustpilot Logo