NT1210 Lab 3
What would happen if wireless devices were not governed by the Wi- Fi Alliance and each vendor had its own standards and protocols? What impact would this have on your personal life or business communications?
The costs of wireless devices could skyrocket if they were not governed by the Wi-Fi alliance. Each vendor would be able to set its own standards and charge its own fees if they were not restricted to certain regulations
Plus nothing would be compatible with each other you would happen to go in a CafÃ© to use their wireless WIFI if your laptop was not the same brand it would not work.
Reference models provide more than just a means of standardization. ...view middle of the document...
However if the data is too general then there may be crucial information missing.
Lab 3.1 Review
If the data is too detailed, it may overlap with other information. However if the data
sing1. Why would a three-layer model of communication that has the layers physical, network, and application be insufficient to adequately describe network communication?
Because there is no transport or application layer.
2. What is the history of the OSI reference model? How did it come about and why was it created? Use your textbook and Internet research to support your answer.
It was created to standardize the way networks communicate.
3. What is the history of the TCP/IP model? Why was it created? Use your textbook and Internet research to support your answer.
The model was to show the standard procedures and made it so people could understand how it worked.
Using Figure 3- 1, define each layer of the OSI model in your own words and state what each layer provides. Use your textbook or Internet research to support your answer.
1. PHYSICAL (Layer 1) â€“ this layer conveys the bit stream: electrical impulse, light or radio signal â€“ through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects.
2. DATA LINK (Layer2) â€“ divided into 2 sub layers: MAC, which controls how a computer on the network gains access to the data and permission to transmit it, and LLC which controls frame synchronization. At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization.
3. NETWORK (layer 3) â€“ Provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node.
4. TRANSPORT (layer 4) â€“ provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control.
5. SESSION (layer 5) â€“ this layer establishes, managers and terminates connections between applications
6. PRESENTATION (layer 6) â€“ this layer provides independence from differences in data representation. E.g. encryption
7. APPLICATION (layer 7) â€“ This layer supports application and end-user process.
Using Figure 3- 2 as a basis, complete the diagram to show the intermediate encapsulation provided by each layer. Use your textbook and Internet research to support your answer.
Transport â€“ Segments
Network â€“ Packets
Data link â€“ Frame
Briefly explain the deencapsulation steps in the communication from host B receiving a message from Host A destined for an active application.
A. Converts data to bits for transmission
B. Packages the data for end to end transport
C. Adds the data-link header and trailer
D. Adds the network IP address to the header...