Comparing the Effectiveness of Networking Protocols for Different Applications
How does one get two computers to interact with each other? By using a network. A network allows two or more computers to exchange data over a medium. Rules are needed so that the computers know how to communicate. These rules for the language computers use to transmit information are called protocols. As with the many different languages people around the world use to communicate, there are many different protocols. Some of these protocols include IPX, SPX, NetBEUI, TCP, and IP. Without protocols, communication between computers on a network would not be possible. Each protocol has it’s own set of responsibilities and characteristics. Some protocols are faster, and others are more reliable.
Compatibility
Protocol compatibility is an important issue. Since a protocol is like a language for computers on a network, it is important that the devices on a network speak the same language, or use the same protocol, so that data can be successfully delivered. For example, if a computer on a network needs to print a document, it is necessary for the computer and the network printer to have the same protocol. Once a standard is established, all the devices on a network will be able to work together in a network environment. If two devices on a network are not using the same protocol, the two devices will be unable to communicate (Whitehead 125).
Protocol Stacks
Some protocols are used in conjunction with each other to exchange data between computers. These protocols are called protocol stacks, or a protocol suite. The two most common examples of protocol stacks are TCP/IP and IPX/SPX. In the example of TCP/IP, the TCP prot...
... middle of paper ...
... moves messages from one e-mail server to another over TCP/IP based networks. SNMP is a protocol that manages hardware devices on a TCP/IP network (Microsoft).
In conclusion, protocols are a necessity in computer networks. Without protocols, networks would not exist, the Internet would not be a reality, and playing multiplayer games would be simply way too crowded on a single keyboard.
Bibliography:
Dean, Tamara. Network+ Guide to Networks. Cambridge, MA: Course Technology,
2000.
“Dux Computer Digest of Computer Networking, Hardware, and Software”
(12 March 2001).
“Microsoft TechNet” (21 February
2001).
Ogletree, Terry William. Upgrading and Repairing Networks, Second Edition.
Indianapolis: Que Corporation, 1999.
Whitehead, Paul. Teach Yourself Visually, Networking, 2nd Edition. New York: IDG
Books Worldwide Inc., 2000.
The Netsilik and the Chipewyan were both tribes that lived in really tough area with extreme low temperature and a lot of ice that doesn’t allow any kind of farming. These tribes rely on deer hunting a lot and the process of using the meat is handled by women. Any kind of sewing, cooking or preparation of the meat to be used is done by women, but even though women have a big role in the post hunting life in both of these communities, they have quite different roles. First, they approach kinship in two different ways. The Netsilik have a bilateral descent system, which is similar to what we have in the United States today, but not completely. Netsilik have personal kindreds which are blood relatives of a person on his or her generational level which we don’t have. The Chipewyan system is
Lastly, they have to develop the protocols to be used.... ... middle of paper ... ... n.d. - n.d. - n.d.
There are two versions of internet protocols, Internet Protocol Version 4 and Internet Protocol Version 6. I will quickly brief you on differences in security, mobility, addressing space, speed, ease of administration. And why IPv6 is the successor of IPv4.
Define Protocol: A Protocol is a set of rules or procedures for transmitting data between electronic devices, such as computers. In order for ocmputers toe xchange information, there must be a preexiting agreement as to how the information will be structered and how each side will send and recieve it.
Perhaps the most redundant, fault-tolerant of all network topologies is the mesh LAN. Each node is connected to every other node for a true point-to-point connection between every device on the network.
An example of a highly important protocol which will be utilized at application level, is HTTP or hypertext transfer protocol. HTTP is the protocol used within web browsers and the entire internet to send and receive specific web page data. HTTP is a controlling protocol, as it determines how documents should be sent, and what the browser should do in response to commands. When accessing a web page, a HTTP command is sent to the pages web server, so that the server may send that specific page’s data to the user. PCO’s Learning Centre will be using the hypertext transfer protocol on a regular basis. In order for students to access web pages, the HTTP must exist to ensure speedy and accurate navigation, especially in a learning
Recently C++ has made its way into the Internet community. For over ten years, business’ have used C++ for their Internet needs, for example, sending and receiving important data pertaining to their business across the Internet and allowing it to quickly and safely reach the other end of communication and all in one piece. With the high demands of today’s Internet users, whether it be an online shopper or one that desires to seek information on a certain topic, it is essential that the information can be sent from the user, to the server, and then back again as swiftly as possible and with utmost dependability… all, of course, without the loss of security.
Secondly, the seven layers proposed by OSI are completely out of touch with reality. The defacto networking standard is TCP/IP. TCP/IP is the grandaddy of XNS, IPX/SPX, Banyan, AppleTalk, and a host of other protocols and pre-dates that seven layer thing because it was funded by the largest organization in the world devoted to maintaining Eurocentric socioeconomic domination; the US Military. And for some reason, that makes it better. Yeah.
A network can be based on either a peer-to-peer level or server-based, also referred to as domain-based. To distinguish the difference, a peer-to-peer network, also known as a workgroup, is a network in which a group of computers are connected together to share resources, such as files, applications, or peripherals. The computers in a peer-to-peer network are peers to one another, meaning no single computer has control over one another. There is also no central location for users to access resources, which means that each individual computer must share their files in order for other computers to have access (Muller, 2003, p.411). “In a peer-to-peer environment, access rights are governed by setting sharing permissions on individual machines.” (Cope, 2002) On the other hand, in a domain-based network, the computers connected together are either servers or clients. All of the other computers connected to the network are called client computers. The server is a dedicated machine that acts as a central location for users to share and access resources. The server controls the level of authority each user has to the shared resources. When logging on to the network, users on client machines are authenticated by the server, based on a user name and password (Lowe, 2004, p.13).
4. To communicate with other computers, either one at a time (Instant message) or many at once (chat rooms or discussion groups).
TCP/IP is a network model which enables the communication across the Internet. The most fundamental protocol on which the Internet is built. This is made up of the 2 common networking protocols, TCP, for Transmission Control Protocol, and IP, for Internet Protocol. TCP maintains and handles packet flow linking the systems and IP protocol has the ability to handle the routing of packets. However The TCP/IP stack consists of 5 layers first being application layer, the transport layer, then the network layer, the link layer and finally the physical layer. The assignment focuses on the three middle layers and is divided into five parts. Firstly explaining how the TCP and UDP the most vital protocols needed to deliver and communicate.
... middle of paper ... ... TCP/IP operates at levels 3 and 4 of the OSI model.
LANs systems can be defined and connected in many different ways. This is the reason for the standardization for every one can have a common ground to start from. “The LANs described Herein are distinguished from other types of data networks in that they are optimized for a moderate size geographic area such as a single office building, warehouse, or a campus. The IEEE 802 LAN is a shared medium peer-to-peer communications network that broadcasts information for all stations to receive. As a consequence, it does not inherently provide privacy. The LAN enables stations to communicate directly using a common physical medium on a point-to-point basis without any intermediate switching node being required. There is always need for an access sublayer in order to arbitrate to access to the shared medium. The network is generally owned, used, and operated by a single organization. This is in contrast to Wide Area Networks (WANs) that interconnect communication facilities in different parts of a country or are used as a public utility. These LANs are also different from networks, such as backplane buses, that are optimized for the interconnection of devices on a desk top or components within a single piece of equipment.”(IEEE 802 Standard 1990) That is the standard definition for LANs by Institute of Electrical and Electronics Engineer committee 802. They are the committee used to set the standard in workmanship and operations for technicians that set-up and perform maintenance on LANs systems. And through all the technical words what they are trying to say is a LAN is a small area network that distributes information among computer in a small work environment unlike WANs that distribute information across global areas.
As the use of computers is on the rise, the understanding of networks and how they interact with computers becomes a necessity for its end users. One of the pieces that allow the interaction of computers and networks is the protocol. According to Merriam-Webster dictionary, a protocol is essentially a set of rules that define how computers communicate with other computers over a network (Merriam-Webster). There are many protocols that presently exist (e.g. HyperText Transfer Protocol, Internet Protocol), but one of the most useful protocols to users who have the desire of sharing files with one another may just be the File Transfer Protocol, or FTP. This paper is designed to explain the history behind the FTP, its purpose, how it is used, and why it is useful to this group of users.
Communication is the process of transmitting, receiving, and processing information. Communication is most important in