Questions with Solutions Chapter Two the OSI Model and TCP/IP Model

Total Page:16

File Type:pdf, Size:1020Kb

Questions with Solutions Chapter Two the OSI Model and TCP/IP Model Alrafidain University College Questions with Solutions Chapter Two The OSI Model and TCP/IP Model 2020/2021 Q1/ List the specific responsibilities of the Physical Layer? Ans. The specific responsibilities of the Physical Layer: a) Convert the logical 1’s and 0’s coming from layer 2 into electrical signals. b) Transmission of the electrical signals over a communication channel. Q2/ List the specific responsibilities of the Data link Layer? Ans. a) Error control to compensate for the imperfections of the physical layer. b) Flow control to keep a fast sender from swamping a slow receiver. Q3/ List the specific responsibilities of the Network Layer? Ans. a) Chose the best path from Source-to-destination Packet delivery. b) Routing packets from source to destination. c) Logical addressing. Q4/ List the specific responsibilities of the Session Layer? Ans. a) Managing dialogue control. b) Graceful close. c) Token management. d) Synchronization. Assistant Lecturer / Hussain Kassim Ahmad 1 Alrafidain University College Q5/ List the specific responsibilities of the Presentation Layer? Ans. a) Data Representation, and Translation. b) Compressing and decompressing data. c) Data compression. d) Data Encryption and decryption. e) Security. Q6/ List the specific responsibilities of the Application Layer? Ans. a) Allows user to interface with the network. b) Provides protocols that are commonly needed. Q7/ Compare between specific responsibilities of the Transport vs. network layer. Ans. Transport layer network layer logical communication between processes logical communication between hosts Sender: breaks application messages into Sender:, encapsulates the PDU that it segments (Segment the PDU), and passes to receives from the Transport layer in the network layer form of packet PDU and passes to data link layer Assistant Lecturer / Hussain Kassim Ahmad 2 Alrafidain University College Q8/ What is the main differences between TCP and UDP Services? Ans. Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Service Service 1. Connection-oriented Connectionless 2. Reliable transfer of data. Unreliable Not guaranteed. 3. Segment retransmission and flow No windowing or retransmission control through windowing 4. Segment sequencing No sequencing 5. Acknowledge sequencing No acknowledgment 6. Lost data retransmission Feasible Practically, not possible. 7. There is a delay in transfer of The transmission is faster. Due to the information. absence of connection establishment phase, Q9/ Give the Definition of the Connection-Oriented and Connectionless. Ans. Connection-Oriented: – before data is sent, the service from the sending computer must establish a connection with the receiving computer. (Email is connection-oriented). Connectionless: – data can be sent at any time by the service from the sending computer. (Downloading a music file from the Internet is connectionless). Q10/ What does PDU abbreviation stands for in computer networking? Then draw table showing the shape for the PDU for each layer? Answer: PDU stands for: Protocol Data Unit The Layer Shape of data (PDU) Top three layers (Application layer). Data Transport layer Segment Network layer Packets Data Link layer Frames Physical layer Bits Assistant Lecturer / Hussain Kassim Ahmad 3 Alrafidain University College Q11/ Explain the delivery of data with shapes of data and type of addressing in Layered model? Or Q11/ Fill the following table of the delivery data in layered model. layer Type of delivery Shape of data Type of addressing Ans. layer Type of delivery Shape of data Type of addressing Transport End to End Segment Port (socket) Network Source To Destination Packet Logical (IP) Data Link Node to Node Frame Physical (MAC) Q12/ Define OSI protocol model Encapsulation and the PDU protocol. OR Q20/ Explain with drawing the Encapsulation process and the PDU protocol. Ans. Encapsulation: As application data is passed down the protocol stack on its way to be transmitted across the network media, various protocols add information to it at each level. This is commonly known as the encapsulation process. The form that a piece of data takes at any layer is called a Protocol Data Unit (PDU). PDU’s are used for peer-to-peer contact between corresponding layers. Assistant Lecturer / Hussain Kassim Ahmad 4 Alrafidain University College Q13/ Describe the OSI model and explain each layers function and assign each protocol in the layer. Layer layers function Protocols 7th Application To allow access to network DNS TELNET 6th Presentation To translate, encrypt, and compress data FTP HTTP SMTP 5th Session To establish, manage, and terminate DHCP sessions 4th Transport To provide reliable process-to-process TCP UDP message and error recovery 3rd Network layer To move packet from source to destination IP ICMP ARP to provide internetworking 2nd Data link To organize bits into frames to provide hop to hop delivery ETHERNET 1st Physical To transmit bits over a medium to provide Bluetooth mechanical and electrical specifications Q14/ Match of the following responsibilities with the corresponding OSI layer? 1- To allow access to network resource. Ans. (Application laver) 2- Data compression. Ans. (Presentation layer) 3- Token management. Ans. (session laver) 4- Connection-oriented and connectionless services. Ans. (Transport layer) 5-Internet Protocol (IP) addressing (Logical addressing). Ans. (Network Layer) 6-Bridges & Switches (multi-port bridges). Ans. (data link laver) 7-Transmission mediums (transmit bits over medium). Ans. (physical laver) Assistant Lecturer / Hussain Kassim Ahmad 5 Alrafidain University College Q15/ Match of the following responsibilities with the corresponding OSI model. 1- Provides protocols that are commonly needed. Ans. (Application laver) 2- Data encryption. Ans. (Presentation laver) 3- Managing dialogue control. Ans. (session laver) 4- Provide reliable process to process message delivery & error recovery. Ans. (Transport Laver) 5- Controls the operation of the subnet. Ans. (Network Laver) 6- Error detection and correction methods. Ans. (data link laver) 7- Provide mechanical and electrical specification. Ans. (physical laver) Q16/ Match of the following responsibilities with the corresponding OSI model? 1- (FTP), (HTTP). (SMTP). (DNS), (DHCP), (Telnet). Ans. (Application laver) 2- Concerned with the syntax and semantics of the information. Ans. (Presentation laver) 3-Allows users on different machines to establish sessions (dialogue) Ans. (Session laver) 4-End-to-end flow control. Ans. (Transport laver) 5-Routing algorithms (Routing packets from source to destination). Ans. (Network Laver) 6-Hop to hop delivery. Ans. (data link laver) 7-Hubs (multi-port repeater). Ans. (physical laver) Assistant Lecturer / Hussain Kassim Ahmad 6 Alrafidain University College Q17/ which of the OSI layers handles each of the following functions: 1. Sequencing and reassembling? Ans.- The transport layer 2. Proving best path to reach destination? Ans.- The network layer 3. Dividing the transmitted bit stream into frames? Ans.- Data link layer 4. Responsible for error detection? Ans.- Data link layer 5. Determining which route through the subnet to use? Ans.- the network layer 6. The layer is closest to the transmission media? Ans.- The physical layer. 7. Reliable process to process data transportation? Ans.- The transport layer. 8.Provides access to the network for end user? Ans.- The application layer. 9.Flow control? Ans.- Data link layer. Q18/ Which OSI layers is the network support layers? Answer: (Physical, Data link, network layers) Q19/ Which OSI layers is the user support layers? Answer: (Session, Presentation, Application) Q20/ Which OSI layer functions as a liaison between user support layers and network support layers? a) Network b) Physical c) Transport d) Application Answer: c) Transport Assistant Lecturer / Hussain Kassim Ahmad 7 Alrafidain University College Q21/ What are the main protocols used in application layer and mention the job of each one. Ans. protocols Job Description DNS (Domain Name System) Matches domain names with IP addresses. HTTP (Hyper Text Transfer to transfer data between clients/servers. Protocol) SMTP (Simple Mail Transfer Used to send email messages from clients to servers over Protocol) & POP3 (Post the internet. Office Protocol version 3) FTP (File Transfer Protocol) Allows the download/upload of files between a client/server Telnet Allows users to login to a host from a remote location and take control as if they were sitting at the machine (virtual connection). DHCP (Dynamic Host Assigns IP addresses, subnet masks, default gateways, Configuration Protocol) DNS servers, etc. to users as they login the network. Q22/ Classify the following protocol with their uses in each layer in the TCP/IP reference model. TCP, IP, HTTP, UDP, ETHERNET, ICMP, FTP, TELNET, SMTP, DHCP Ans. Layer Protocols Application HTTP TELNET FTP SMTP DHCP Transport TCP UDP Internet IP ICMP Network access (Host-to-network) ETHERNET Assistant Lecturer / Hussain Kassim Ahmad 8 Alrafidain University College Q23/ What are the main differences between TCP/IP and OSI 7-layers model? Ans. The main differences between TCP/IP and OSI 7-layers model? OSI Model TCP/IP Model 1. OSI refers to Open Systems TCP refers to Transmission Control Interconnection. Protocol. 2. OSI uses the network layer to define TCP/IP uses only the Internet layer. routing standards and protocols. 3. OSI layers have seven layers. TCP/IP has four layers. 4. In the OSI model, the data link layer and In TCP, physical
Recommended publications
  • Solutions to Chapter 2
    CS413 Computer Networks ASN 4 Solutions Solutions to Assignment #4 3. What difference does it make to the network layer if the underlying data link layer provides a connection-oriented service versus a connectionless service? [4 marks] Solution: If the data link layer provides a connection-oriented service to the network layer, then the network layer must precede all transfer of information with a connection setup procedure (2). If the connection-oriented service includes assurances that frames of information are transferred correctly and in sequence by the data link layer, the network layer can then assume that the packets it sends to its neighbor traverse an error-free pipe. On the other hand, if the data link layer is connectionless, then each frame is sent independently through the data link, probably in unconfirmed manner (without acknowledgments or retransmissions). In this case the network layer cannot make assumptions about the sequencing or correctness of the packets it exchanges with its neighbors (2). The Ethernet local area network provides an example of connectionless transfer of data link frames. The transfer of frames using "Type 2" service in Logical Link Control (discussed in Chapter 6) provides a connection-oriented data link control example. 4. Suppose transmission channels become virtually error-free. Is the data link layer still needed? [2 marks – 1 for the answer and 1 for explanation] Solution: The data link layer is still needed(1) for framing the data and for flow control over the transmission channel. In a multiple access medium such as a LAN, the data link layer is required to coordinate access to the shared medium among the multiple users (1).
    [Show full text]
  • The Application Layer Protocol Ssh Is Connectionless
    The Application Layer Protocol Ssh Is Connectionless Deryl remains prognostic: she revile her misogamist clarified too ineffectually? Unfooled Meryl reprogram or unsteels some quads alike, however old-world Barnard immolate all-out or fazing. Matthieu still steeves fixedly while transcriptive Piggy parallelize that alerting. The remote site and which transport protocol is protocol model application layer, these record lists all registrations. As for maintaining ordered delivery. Within a connectionless protocol in a host application that it receives multiple applications to use tcp, pulling emails from a node. IP and MAC address is there. Link state algorithms consider bandwidth when calculating routes. Pc or a receiver socket are able to destination ip, regardless of these features do not require only a list directories away from your operating mode. Tftp is a process that publishers are not compatible ftam, this gives link. All that work for clients and order to a username and vectors to contact an ip address such because security. Ip operation of errors or was statically configured cost load. The application layer performs a set. Ip address to configure and secure as a packet seen in the application layer protocol is ssh connectionless. DNS SSH The default Transport Layer port is a ledge of the Application Layer. HTTP is a short abbreviation of Hypertext Transfer Protocol. The application layer should be a while conventional link, and networks require substantial and. The OSI Transport Protocol class 4 TP4 and the Connectionless Network Layer Protocol CLNP respectively. TCP IP Protocols and Ports Vskills. The parsed MIME header. The connectionless is connectionless.
    [Show full text]
  • Chapter 2. Application Layer Table of Contents 1. Context
    Chapter 2. Application Layer Table of Contents 1. Context ........................................................................................................................................... 1 2. Introduction .................................................................................................................................... 2 3. Objectives ....................................................................................................................................... 2 4. Network application software ....................................................................................................... 2 5. Process communication ................................................................................................................. 3 6. Transport Layer services provided by the Internet ....................................................................... 3 7. Application Layer Protocols ........................................................................................................... 4 8. The web and HTTP .......................................................................................................................... 4 8.1. Web Terminology ................................................................................................................... 5 8.2. Overview of HTTP protocol .................................................................................................... 6 8.3. HTTP message format ...........................................................................................................
    [Show full text]
  • External Data Representation Standard: Protocol Specification 1. Status of This Standard Note: This Chapter Specifies a Protocol
    External Data Representation Standard: Protocol Specification 1. Status of this Standard Note: This chapter specifies a protocol that Sun Microsystems, Inc., and others are using. It has been desig- nated RFC1014 by the ARPA Network Information Center. 2. Introduction XDR is a standard for the description and encoding of data. It is useful for transferring data between differ- ent computer architectures, and has been used to communicate data between such diverse machines as the Sun Workstation, VAX, IBM-PC, and Cray. XDR fits into the ISO presentation layer, and is roughly analo- gous in purpose to X.409, ISO Abstract Syntax Notation. The major difference between these two is that XDR uses implicit typing, while X.409 uses explicit typing. XDR uses a language to describe data formats. The language can only be used only to describe data; it is not a programming language. This language allows one to describe intricate data formats in a concise man- ner. The alternative of using graphical representations (itself an informal language) quickly becomes incomprehensible when faced with complexity. The XDR language itself is similar to the C language [1], just as Courier [4] is similar to Mesa. Protocols such as Sun RPC (Remote Procedure Call) and the NFS (Network File System) use XDR to describe the format of their data. The XDR standard makes the following assumption: that bytes (or octets) are portable, where a byte is defined to be 8 bits of data. A giv enhardware device should encode the bytes onto the various media in such a way that other hardware devices may decode the bytes without loss of meaning.
    [Show full text]
  • Data Link Layer
    Data link layer Goals: ❒ Principles behind data link layer services ❍ Error detection, correction ❍ Sharing a broadcast channel: Multiple access ❍ Link layer addressing ❍ Reliable data transfer, flow control: Done! ❒ Example link layer technology: Ethernet Link layer services Framing and link access ❍ Encapsulate datagram: Frame adds header, trailer ❍ Channel access – if shared medium ❍ Frame headers use ‘physical addresses’ = “MAC” to identify source and destination • Different from IP address! Reliable delivery (between adjacent nodes) ❍ Seldom used on low bit error links (fiber optic, co-axial cable and some twisted pairs) ❍ Sometimes used on high error rate links (e.g., wireless links) Link layer services (2.) Flow Control ❍ Pacing between sending and receiving nodes Error Detection ❍ Errors are caused by signal attenuation and noise. ❍ Receiver detects presence of errors signals sender for retrans. or drops frame Error Correction ❍ Receiver identifies and corrects bit error(s) without resorting to retransmission Half-duplex and full-duplex ❍ With half duplex, nodes at both ends of link can transmit, but not at same time Multiple access links / protocols Two types of “links”: ❒ Point-to-point ❍ PPP for dial-up access ❍ Point-to-point link between Ethernet switch and host ❒ Broadcast (shared wire or medium) ❍ Traditional Ethernet ❍ Upstream HFC ❍ 802.11 wireless LAN MAC protocols: Three broad classes ❒ Channel Partitioning ❍ Divide channel into smaller “pieces” (time slots, frequency) ❍ Allocate piece to node for exclusive use ❒ Random
    [Show full text]
  • OSI Data Link Layer
    OSI Data Link Layer Network Fundamentals – Chapter 7 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Explain the role of Data Link layer protocols in data transmission. Describe how the Data Link layer prepares data for transmission on network media. Describe the different types of media access control methods. Identify several common logical network topologies and describe how the logical topology determines the media access control method for that network. Explain the purpose of encapsulating packets into frames to facilitate media access. Describe the Layer 2 frame structure and identify generic fields. Explain the role of key frame header and trailer fields including addressing, QoS, type of protocol and Frame Check Sequence. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2 Data Link Layer – Accessing the Media Describe the service the Data Link Layer provides as it prepares communication for transmission on specific media © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3 Data Link Layer – Accessing the Media Describe why Data Link layer protocols are required to control media access © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4 Data Link Layer – Accessing the Media Describe the role of framing in preparing a packet for transmission on a given media © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5 Data Link Layer – Accessing the Media Describe the role the Data Link layer plays in linking the software and hardware layers © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6 Data Link Layer – Accessing the Media Identify several sources for the protocols and standards used by the Data Link layer © 2007 Cisco Systems, Inc.
    [Show full text]
  • OSI Model and Network Protocols
    CHAPTER4 FOUR OSI Model and Network Protocols Objectives 1.1 Explain the function of common networking protocols . TCP . FTP . UDP . TCP/IP suite . DHCP . TFTP . DNS . HTTP(S) . ARP . SIP (VoIP) . RTP (VoIP) . SSH . POP3 . NTP . IMAP4 . Telnet . SMTP . SNMP2/3 . ICMP . IGMP . TLS 134 Chapter 4: OSI Model and Network Protocols 4.1 Explain the function of each layer of the OSI model . Layer 1 – physical . Layer 2 – data link . Layer 3 – network . Layer 4 – transport . Layer 5 – session . Layer 6 – presentation . Layer 7 – application What You Need To Know . Identify the seven layers of the OSI model. Identify the function of each layer of the OSI model. Identify the layer at which networking devices function. Identify the function of various networking protocols. Introduction One of the most important networking concepts to understand is the Open Systems Interconnect (OSI) reference model. This conceptual model, created by the International Organization for Standardization (ISO) in 1978 and revised in 1984, describes a network architecture that allows data to be passed between computer systems. This chapter looks at the OSI model and describes how it relates to real-world networking. It also examines how common network devices relate to the OSI model. Even though the OSI model is conceptual, an appreciation of its purpose and function can help you better understand how protocol suites and network architectures work in practical applications. The OSI Seven-Layer Model As shown in Figure 4.1, the OSI reference model is built, bottom to top, in the following order: physical, data link, network, transport, session, presentation, and application.
    [Show full text]
  • OSI Model: the 7 Layers of Network Architecture
    OSI Model: The 7 Layers of Network Architecture The Open Systems Interconnection (OSI) Reference Model is a conceptual framework that describes functions of the networking or telecommunication system independently from the underlying technology infrastructure. It divides data communication into seven abstraction layers and standardizes protocols into appropriate groups of networking functionality to ensure interoperability within the communication system regardless of the technology type, vendor, and model. The OSI model was originally developed to facilitate interoperability between vendors and to define clear standards for network communication. However, the olderTCP/IP model remains the ubiquitous reference framework for Internet communications today. The 7 layers of the OSI model This image illustrates the seven layers of the OSI model. Below, we’ll briefly describe each layer, from bottom to top. 1. Physical The lowest layer of the OSI model is concerned with data communication in the form of electrical, optic, or electromagnetic signals physically transmitting information between networking devices and infrastructure. The physical layer is responsible for the communication of unstructured raw data streams over a physical medium. It defines a range of aspects, including: Electrical, mechanical, and physical systems and networking devices that include specifications such as cable size, signal frequency, voltages, etc. Topologies such as Bus, Star, Ring, and Mesh Communication modes such as Simplex, Half Duplex, and Full Duplex Data transmission performance, such as Bit Rate and Bit Synchronization Modulation, switching, and interfacing with the physical transmission medium Common protocols including Wi-Fi, Ethernet, and others Hardware including networking devices, antennas, cables, modem, and intermediate devices such as repeaters and hubs 2.
    [Show full text]
  • Lecture: TCP/IP 2
    TCP/IP- Lecture 2 [email protected] How TCP/IP Works • The four-layer model is a common model for describing TCP/IP networking, but it isn’t the only model. • The ARPAnet model, for instance, as described in RFC 871, describes three layers: the Network Interface layer, the Host-to- Host layer, and the Process-Level/Applications layer. • Other descriptions of TCP/IP call for a five-layer model, with Physical and Data Link layers in place of the Network Access layer (to match OSI). Still other models might exclude either the Network Access or the Application layer, which are less uniform and harder to define than the intermediate layers. • The names of the layers also vary. The ARPAnet layer names still appear in some discussions of TCP/IP, and the Internet layer is sometimes called the Internetwork layer or the Network layer. [email protected] 2 [email protected] 3 TCP/IP Model • Network Access layer: Provides an interface with the physical network. Formats the data for the transmission medium and addresses data for the subnet based on physical hardware addresses. Provides error control for data delivered on the physical network. • Internet layer: Provides logical, hardware-independent addressing so that data can pass among subnets with different physical architectures. Provides routing to reduce traffic and support delivery across the internetwork. (The term internetwork refers to an interconnected, greater network of local area networks (LANs), such as what you find in a large company or on the Internet.) Relates physical addresses (used at the Network Access layer) to logical addresses.
    [Show full text]
  • Medium Access Control Layer
    Telematics Chapter 5: Medium Access Control Sublayer User Server watching with video Beispielbildvideo clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller Data Link Layer Data Link Layer Data Link Layer Computer Systems and Telematics (CST) Physical Layer Physical Layer Physical Layer Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Metropolitan Area Networks ● Network Topologies (MAN) ● The Channel Allocation Problem ● Wide Area Networks (WAN) ● Multiple Access Protocols ● Frame Relay (historical) ● Ethernet ● ATM ● IEEE 802.2 – Logical Link Control ● SDH ● Token Bus (historical) ● Network Infrastructure ● Token Ring (historical) ● Virtual LANs ● Fiber Distributed Data Interface ● Structured Cabling Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.2 Design Issues Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.3 Design Issues ● Two kinds of connections in networks ● Point-to-point connections OSI Reference Model ● Broadcast (Multi-access channel, Application Layer Random access channel) Presentation Layer ● In a network with broadcast Session Layer connections ● Who gets the channel? Transport Layer Network Layer ● Protocols used to determine who gets next access to the channel Data Link Layer ● Medium Access Control (MAC) sublayer Physical Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.4 Network Types for the Local Range ● LLC layer: uniform interface and same frame format to upper layers ● MAC layer: defines medium access ..
    [Show full text]
  • Application Layer Protocols in Networking
    Application Layer Protocols In Networking Is Silvain cuckoo or calcific when hectographs some bulls dishelm sexennially? Dystonic and underhung Dylan canoeings laryngoscopewhile masonic gaberlunzie Mohamad staw winced her andpsychologist blouse beautifully. hoarily and shorts bitterly. Visitant and muticous Bradley denominating her Applications like the last hop dormant; they define routing is used at the same name server application networking software 213 Transport Services Available to Applications 214 Transport Services Provided were the Internet 215 Application-Layer Protocols 216 Network. Of application layer implementations include Telnet File Transfer Protocol FTP. Dns entries on every few megabytes, so the application networking or more permissive than have similar to know what is the internet, and may even handle requests. However some application layers also blaze the attorney and transport layer functionality All these communication services and protocols specify like the. Protocols in Application Layer GeeksforGeeks. Network Communication Protocols Computer Science Field. What sway the principle of networking? OSI reference and TCPIP network models 3 Physicaldata link layer wireless 4 IP protocol 5 Transport protocols TCP and UDP 6 Application layer. Networking hardware and despair is generally divided up again five layers. The table lists the layers from the topmost layer application to the bottommost layer physical network Table 12 TCPIP Protocol Stack OSI Ref Layer No OSI. Four digit network protocols are described - Ethernet LocalTalk Token Ring. Understanding Layer 2 3 and 4 Protocols InformIT. Chapter 10 Application Layer. Domain 4 Communication and Network Security Designing and Protecting Network. Network Virtual space It allows a user to cost on bottom a rude host.
    [Show full text]
  • A Comparison of Iot Application Layer Protocols Through a Smart Parking Implementation
    A Comparison of IoT application layer protocols through a smart parking implementation Paridhika Kayal and Harry Perros {pkayal,hp}@ncsu.edu Computer Science Department North Carolina State University Abstract—Several IoT protocols have been introduced in order to high performance, real-time data sharing or real-time device provide an efficient communication for resource-constrained control. In many cases data is collected for subsequent applications. However, their performance is not as yet well “offline” processing. The WebSocket (WS) standard provides understood. To address this issue, we evaluated and compared bi-directional Web communication and connection four communication protocols, namely, CoAP, MQTT, XMPP, management. WebSocket is a good IoT solution if the devices and WebSocket. For this, we implemented a smart parking application using open source software for these protocols and can afford the WebSocket payload. Other protocols, such as, measured their response time by varying the traffic load. SMQ and CoSIP are also gaining traction. All these protocols Keywords—CoAP, MQTT, XMPP, WebSocket, smart parking, are positioned as real-time publish-subscribe IoT protocols, response time. with support for millions of devices. Depending on how you define “real time” (seconds, milliseconds or microseconds) I. INTRODUCTION and “things” (WSN node, multimedia device, personal An IoT application typically involves a large number of wearable device, medical scanner, engine control, etc.), the deployed and interconnected sensors and gateways. The protocol selection for an application is critical. sensors measure the physical environment and send the data to II. RELATED WORK a gateway. The gateway aggregates the data from various sensors and then sends it to a server/broker.
    [Show full text]