15. In the seven-layer OSI model of computer networking, the network layer is layer 3. The network layer is responsible for packet forwarding including routing through intermediate routers. The network layer is the third level (Layer 3) of the Open Systems Interconnection Model (OSI Model) and the layer that provides data routing paths for network communication. ... Logical connection setup, data forwarding, routing and delivery error reporting are the network layer's primary responsibilities The role of the Network Layer is to enable any two open systems anywhere to exchange data with one another, irrespective of the types of network the two systems are attached to and of the means of interconnecting those two networks. Located at Layer 3 of the Open Systems Interconnection (OSI) communications model, the primary function of the network layer is to move data into and through other networks. The main functions of network layer is to provide end-to-end addressing, routing and to provide a connectionless datagram delivery of packets. 14. Private and Public IP Address A public IP address identifies you to the wider internet so that all the information you're searching for can find you. A private IP address is used within a private network to connect securely to other devices within that same network. Each device within the same network has a unique private IP address. Private (internal) addresses are not routed on the Internet and no traffic can be sent to them from the Internet, they only supposed to work within the local network. Private addresses include IP addresses from the following subnets: Range from 10.0. 0.0 to 10.255. A public IP address is an IP address that can be accessed directly over the internet and is assigned to your network router by your internet service provider (ISP). Your personal device also has a private IP that remains hidden when you connect to the internet through your router's public IP. for example, google.com 13. IP fragmentation is an Internet Protocol process that breaks packets into smaller pieces, so that the resulting pieces can pass through a link with a smaller maximum transmission unit than the original packet size. The fragments are reassembled by the receiving host. Fragmentation is necessary for data transmission, as every network has a unique limit for the size of datagrams that it can process. This limit is known as the maximum transmission unit (MTU). Fragmentation most generally means the process of fragmenting— breaking into pieces or being divided into parts. It can also refer to the state or result of being broken up or having been divided. Examples: Hydra, Spirogyra, etc. 12. What is meant by parity check? a method for detecting errors in data communications or within a computer system by counting the number of ones or zeros per byte or per word, including a special check bit (parity bit ), to see if the value is even or odd. What is the purpose of using parity check bit? A parity bit is a check bit, which is added to a block of data for error detection purposes. It is used to validate the integrity of the data. The value of the parity bit is assigned either 0 or 1 that makes the number of 1s in the message block either even or odd depending upon the type of parity. There are two kinds of parity bits: In even parity, the number of bits with a value of one are counted. ... In odd parity, if the number of bits with a value of one is an even number, the parity bit value is set to one to make the total number of ones in the set (including the parity bit) an odd number. 11. Framing is a point-to-point connection between two computers or devices consists of a wire in which data is transmitted as a stream of bits. ... Framing is a function of the data link layer. It provides a way for a sender to transmit a set of bits that are meaningful to the receiver. Frames can be of fixed or variable size. In fixed-size framing, there is no need for defining the boundaries of the frames; the size itself can be used as a delimiter. An example of this type of framing is the ATM wide-area network, which uses frames of fixed size called cells. In variable - length framing, the size of each frame to be transmitted may be different. So, a pattern of bits is used as a delimiter to mark the end of one frame and the beginning of the next frame Types of Framing Framing can be of two types, fixed sized framing and variable sized framing. Fixed-sized Framing Here the size of the frame is fixed and so the frame length acts as delimiter of the frame. Consequently, it does not require additional boundary bits to identify the start and end of the frame. Example − ATM cells. Variable – Sized Framing Here, the size of each frame to be transmitted may be different. So additional mechanisms are kept to mark the end of one frame and the beginning of the next frame. It is used in local area networks. 10. What do u mean by socket? Definition: A socket is one endpoint of a two-way communication link between two programs running on the network. A socket is bound to a port number so that the TCP layer can identify the application that data is destined to be sent to. An endpoint is a combination of an IP address and a port number. Example. An Internet Protocol (IP) addressable client and server, for example, might engage in an e-mail transfer using SMTP (Simple Mail Transfer Protocol), which is well-known port 25. Top 10 Types of Sockets Stream Sockets. These sockets are used on the delivery side of the network environment. ... Datagram Sockets. The implementation doesn't give any guaranteed delivery as they work connectionless. ... Raw Sockets. ... Packet Sequenced Sockets. ... Hex Sockets. ... Socket Bit. ... Impact Sockets. ... Spark Plug Sockets. There are four common socket sizes: 1/4 inch (0.6 centimeters), 3/8 inch (0.9 centimeters), 1/2 inch (1.3 centimeters) and 3/4 inch (1.9 centimeters). 9. The Address Resolution Protocol is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address. This mapping is a critical function in the Internet protocol suite. Address Resolution Protocol (ARP) is used to dynamically map layer-3 network addresses to data-link addresses. The address resolution protocol (arp) is therefore used to translate between the two types of address. There are four types of ARP. Proxy ARP. Reverse ARP (RARP) Gratuitous ARP. Inverse ARP. 8. The mechanism for exchange of information between different computer networks and network segments is called switching in Networking. Switching may be applied in various formats and can function in diverse ways within a greater network infrastructure. There are three types of message switching techniques used: 1. Circuit Switching In-Circuit Switching, a dedicated channel is established for a single connection where the sender and receiver can communicate during the communication session. 2. Message Switching There is no dedicated path established between the sender and receiver in message switching, as in circuit switching. 3. Packet Switching In packet switching, when we send a message, then the whole message is divided into smaller pieces called packets. These pieces or packets travel across the network and take the shortest path as possible. 7. The two are essentially the same, in that both of them refer to the same “hypertext transfer protocol” that enables requested web data to be presented on your screen. But, HTTPS is still slightly different, more advanced, and much more secure. Simply put, HTTPS protocol is an extension of HTTP. HTTPS is HTTP with encryption. The only difference between the two protocols is that HTTPS uses TLS (SSL) to encrypt normal HTTP requests and responses. As a result, HTTPS is far more secure than HTTP. A website that uses HTTP has http:// in its URL, while a website that uses HTTPS has https://. HTTP is unsecured while HTTPS is secured. HTTP sends data over port 80 while HTTPS uses port 443. HTTP operates at application layer, while HTTPS operates at transport layer. ... No encryption in HTTP, with HTTPS the data is encrypted before sending. 6. Network address translation is a method of mapping an IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device. A. Network Address Translation (NAT) is designed for IP address conservation For example a computer on an internal address of 192.168. 1.10 wanted to communicate with a web server somewhere on the internet, NAT would translate the address 192.168. 1.10 to the company's public address, lets call this 1.1. Where is NAT used? The main use of NAT is to limit the number of public IP addresses an organization or company must use, for both economy and security purposes. The most popular type of NAT configuration, Overloading is a form of dynamic NAT that maps multiple unregistered IP addresses to a single registered IP address (many-to-one) by using different ports. It's also known as Port Address Translation (PAT). 5. Internet Control Message Protocol The Internet Control Message Protocol (ICMP) is a protocol that devices within a network use to communicate problems with data transmission. A good example is the “ping” utility which uses an ICMP request and ICMP reply message. When a certain host of port is unreachable, ICMP might send an error message to the source. The Internet Control Message Protocol (ICMP) is a network layer protocol used by network devices to diagnose network communication issues. ICMP is mainly used to determine whether or not data is reaching its intended destination in a timely manner. Commonly, the ICMP protocol is used on network devices, such as routers. ICMP is crucial for error reporting and testing, but it can also be used in distributed denial-of-service (DDoS) attacks. 4. A port is a virtual point where network connections start and end. Ports are software-based and managed by a computer's operating system. Each port is associated with a specific process or service. A Computer Port is an interface or a point of connection between the computer and its peripheral devices. Ports are standardized across all network-connected devices, with each port assigned a number. Most ports are reserved for certain protocols — for example, all Hypertext Transfer Protocol (HTTP) messages go to port 80 PS/2 Serial Port o DB-25 o DE-9 or RS-232 or COM Port Parallel Port or Centronics 36 Pin Port Audio Ports o Surround Sound Connectors or 3.5 mm TRS Connector. 3. A virtual circuit (VC) is a means of transporting data over a packetswitched network in such a way that it appears as though there is a dedicated physical link between the source and destination end systems of this data. The term virtual circuit is synonymous with virtual connection. Virtual circuit switching is a packet switching methodology whereby a path is established between the source and the final destination through which all the packets will be routed during a call. This path is called a virtual circuit because to the user, the connection appears to be a dedicated physical circuit. Public networks offer two types of virtual circuit--permanent and switched. An example of a circuit-switched network is an analog telephone network. 2. A datagram is a basic transfer unit associated with a packetswitched network. Datagrams are typically structured in header and payload sections. Datagrams provide a connectionless communication service across a packet-switched network. Datagram: This term is basically synonymous with “packet” and is also used to refer to network layer technologies. It is also often used to refer to a message that is sent at a higher level of the OSI Reference Model (more often than “packet” is). A datagram is primarily used for wireless communication and is selfcontained with source and destination addresses written in the header. It is similar to a packet, which is a small piece of data transmitted through a connectionless protocol. Datagram packet-switching is a packet switching technology by which each packet, now called a datagram, is treated as a separate entity. Structure Each datagram has two components, a header and a data payload. The header contains all the information sufficient for routing from the originating equipment to the destination without relying on prior exchanges between the equipment and the network. Headers may include source and destination addresses as well as a type field. The payload is the data to be transported. This process of nesting data payloads in a tagged header is called encapsulation. 1. Packet forwarding is the basic method for sharing information across systems on a network. Packets are transferred between a source interface and a destination interface, usually on two different systems. When you issue a command or send a message to a nonlocal interface, your system forwards those packets onto the local network. The interface with the destination IP address that is specified in the packet headers then retrieves the packets from the local network. If the destination address is not on the local network, the packets are then forwarded to the next adjacent network, or hop. By default, packet forwarding is automatically configured when you install Oracle Solaris. Routing is the process by which systems decide where to send a packet. Routing protocols on a system “discover” the other systems on the local network. When the source system and the destination system are on the same local network, the path that packets travel between them is called a direct route. If a packet must travel at least one hop beyond its source system, the path between the source system and destination system is called an indirect route. The routing protocols learn the path to a destination interface and retain data about known routes in the system's routing table. End