Question

In: Computer Science

One student has designed a new transport-layer protocol, NTLP, that is completely different from the TCP...

One student has designed a new transport-layer protocol, NTLP, that is completely different from the TCP or UDP. He then creates a packet that has a physical-layer header, a data-link-layer header, and an IP header. This packet contains the NTLP header and the application data payload. The packet is sent to the destination IP address as indicated in the IP header. Will this packet be delivered to the destination IP address indicated in the IP header? Please justify your answer.

Solutions

Expert Solution

Network layer is responsible for delivering packets from one network node to a node present on a different network, by making different routing decisions at various hops in between and choosing the optimal path. Logical addressing (IP address) is also also done by this layer.

Now, the question asks that physical layer header, data link layer header and network layer header has been added, then it will be delivered to destination IP address or not?? Of course, it will be delivered, because to deliver a packet to the destination IP address, all the headers are present in the packet required in this situation. To deliver a packet to the destination IP, we need headers upto layer 3 i.e. network layer only. Transport layer header is required to deliver the datagram to the application listening on a specific port, to which the datagram is destined. In this case, we will need the structure of NTLP header, which is not required for this questio. This question is about delivery of message to IP address only.

So the answer is yes.


Related Solutions

A common protocol stack used by many applications is to use TCP at the transport layer...
A common protocol stack used by many applications is to use TCP at the transport layer and IP at the network layer. The ICMP protocol is also used to report on problems encountered by IP. The IP protocol provides a service referred to as “best effort”. Describe the services of the IP protocol, and potentially ICMP protocol, with respect to flow control (ensuring the sender does not overwhelm the receiver). Describe the service TCP provides with respect to flow control...
A common protocol stack used by many applications is to use TCP at the transport layer...
A common protocol stack used by many applications is to use TCP at the transport layer and IP at the network layer. The ICMP protocol is also used to report on problems encountered by IP. The IP protocol provides a service referred to as “best effort”. Describe the services of the IP protocol, and potentially ICMP protocol, with respect to flow control (ensuring the sender does not overwhelm the receiver). Describe the service TCP provides with respect to flow control...
What are the potential dangers to merge network layer with transport layer of computer networking protocol...
What are the potential dangers to merge network layer with transport layer of computer networking protocol stack?
discuss the types of networks that would require TCP as a transport protocol because of its...
discuss the types of networks that would require TCP as a transport protocol because of its characteristics. Provide the application and or services, also include port numbers with description.
Describe the difference between IP and Network Access layer in TCP protocol and also explain the...
Describe the difference between IP and Network Access layer in TCP protocol and also explain the control information embedded in these two layers
1a) In your own words, what is the difference between Transport Control Protocol (TCP) and User...
1a) In your own words, what is the difference between Transport Control Protocol (TCP) and User Datagram Protocol (UDP)? Also give some examples of services that use TCP and UDP. b) PC1 is assigned the IP address 192.168.13.8 with a subnet mask of 255.255.255.224. PC1 sends a packet to PC2 which has an IP address of 192.168.13.65. Is PC1 (192.168.13.8) and PC2 (192.168.13.65) in the same subnet based on the subnet mask of PC1 (255.255.255.224)?
How is an application layer firewall different from a packet-filtering firewall? Why is an application layer...
How is an application layer firewall different from a packet-filtering firewall? Why is an application layer firewall sometimes called a proxy server? What is stateful inspection? What is a VPN? Why is it becoming more widely used? What is content filtering, and should it be leveraged on a corporate network? Backup your statement with 2 or 3 facts. Please pick two peer posts for your responses. Do you agree with their statements on content filtering or disagree and why? Are...
when you develop an application, you must choose one of the available transport layer protocols. how...
when you develop an application, you must choose one of the available transport layer protocols. how do you make the choice? And, if you have to provide secure transmission for this application data, how it can be achieved?
Intercultural Communication. A college professor has a new student from China in the class. The student...
Intercultural Communication. A college professor has a new student from China in the class. The student does not speak English fluently. Name and discuss three cultural factors that might influence classroom interaction
When you develop an application, you must choose one of the available transport-layer protocols. How do...
When you develop an application, you must choose one of the available transport-layer protocols. How do you make this choice? And, if you have to provide secure transmission for this application data, how it can be achieved?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT