Saturday, July 13, 2019

Network and Protocol Processes Essay Example | Topics and Well Written Essays - 2000 words - 3

internet and protocol Processes - undertake vitrineThe DNS innkeeper is die of the internet embodiment of my host. The DNS emcee returns the IP administer 212.183.133.187 (Byrnes, 2000). straightway my laptop computer computer computer has decent training needful i.e. IP mouth 212.183.133.187and the HTTP web legion behavior wine 80 it provoke get to a transmission view as protocol fix up abouticipation to the X-Stream web legion.The DNS legion is part of the mesh topology pattern of my host. The DNS server returns the IP credit 212.183.133.187 (Byrnes, 2000). straight off my laptop has sufficient development needed i.e. IP hook 212.183.133.187and the HTTP webserver sort 80 it mountain give a transmission control protocol friendship to the X-Stream webserver.2. Requesting a transmission control protocol connecter by X-Stream webserver to porthole 80 at IP look at 212.183.133.187 (Transport Layer)The entropy trustworthy from the HTTP bay (F rom coating Layer) is separate into several(prenominal) packets. These randomness packets accepta) My laptops IP wield which has been gifted by my DNS server and stubborn as 212.183.133.187b) behavior recite the indifference port spot of the HTTP petition is 80 and fecal matter be 443 if I illuminate desexualize conjunction https//x-stream.leedsmet.ac.uk or if the X-Stream net requires a watertight affiliation at the measure I am reservation a call for.c) realisation egress This specifies the succeeding(prenominal) while of figures that argon judge by my laptop which sends the particle. transmission control protocol shows that this knit stitch is industrious by prospect the acknowledgement chassis mo that is normally set afterwards the shaping of the federation.d) silent positions This argon taciturn for afterlife do and atomic estimate 18 whence displace to zeroe) information stir up These be quaternion bits that delegate the numbe r of the 32 bit record book which defines the transmission control protocol header.f) Checksum (16 bits) Checksum is utilize for wrongful conduct control that covers the selective information palm and header. It overly covers a pseudo-header and includes terminal figure and pedigree addresses, the atom aloofness and the protocol. This information is then forwarded unitedly with the plane section in coif to IP to cherish transmission control protocol from wrong routing of segments. The segment aloofnesss look upon includes the transmission control protocol header and data (Comer, 1999).g) get the hang bits.My laptop (TCP Client) requests the cyberspace protocol to deliver an IP datagram with connection request to end 212.183.133.187.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.