Free Essay

Network Protocols

In: Computers and Technology

Submitted By brydog81
Words 365
Pages 2
Bryan Henderson, Jr
IT204-1503B-03
Unit 5 Individual Project
Prof. Carol Tilden
9/21/2015

Networking Protocols and Facts
What is meant by protocol? A protocol is a special set of rules that governs the communications between computers on a network. They specify the interactions between the communicating entities like one computer to another. There is a protocol for every part that connects a network known as TCP/IP which means Transmission Control Protocol and Internet Protocol. They TCP and IP are two different protocols that preform different tasks in the networking world they are built into all major operating systems.
TCP allows and enables two computers or hosts to connect and exchange data streams from one to the other guaranteeing that the delivery of data and packets being delivered come in the same order they were sent out. Utilizing the Idea of TCP being like your Mail courier dropping off your mail because he has the link and means to communicate or find your destination.

Internet Protocols use a packets instead of streams, also known as datagrams, and addressing scheme. Picture the IP protocol as a post office you drop off a packet of information, without being combined with TCP it cannot be delivered. The TCP part of the protocol it the mail truck or the courier like I stated in the last paragraph. The reasons why IP cannot be a standalone software is because it deals in packets which is small bits of information with now true way of keeping it order, from going missing, and even duplicating itself.
A fact of the TCP/IP protocol was that it was developed both at the same time in 1974 by Computer Scientists Vinton Cerf and Robert Kahn.

References:
Yurcik, William J.. "TCP/IP." Computer Sciences. 2002. Retrieved September 21, 2015 from Encyclopedia.com: http://www.encyclopedia.com/doc/1G2-3401200604.html
Christensson, P. (2006). TCP/IP Definition. Retrieved 2015, Sep 21, from http://techterms.com

IT Business Edge (2015). TCP Description. Retrieved 2015, Sep 21, from http://www.webopedia.com/TERM/T/TCP.html
IT Business Edge (2015). IP Description. Retrieved 2015, Sep 21, from http://www.webopedia.com/TERM/I/IP.html

Similar Documents

Free Essay

Network Protocols

...The importance of communication protocols: Unless Patton Fuller Community Hospital has an agreement between the two communicating parties information may get lost or un-communicated. This agreement is called the protocol. Communications protocols usually have a number of parts, Handshake, encoding method, compressions methods, packet / frame structure, and addressing.. This is why protocols are often defined by standards bodies, but some protocols SSL can be used widely even though they are not specifically from a standards body. A protocol must be implemented to enable effective, efficient communication by using a set of rules. Protocols are also described as hardware or software components that carry out the OSI model guidelines for transferring information on a network In short - if we don't have a protocol we won't be able to communicate between different devices. Identify the protocols in your design and provide rationale for your decision Define the overall network architecture. The design of a communications system, which includes the backbones, routers, switches, wireless access points, access methods and protocols used May refer only to the access method in a LAN, such as Ethernet or Token Ring Network architecture is the design of a communications network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as data formats used in its...

Words: 1950 - Pages: 8

Free Essay

Network and Protocols

...the three areas defined for the IEEE 802.11 standard?      1. Physical Layer (PHY)           The method of transmitting the data, which may be either RF or infrared (although infrared is rarely used.)     2. Medium Access Control (MAC)           I. The reliability of the data service.           II. Access control to the shared wireless medium.           III. Protecting the privacy of the transmitted data.     3. MAC management protocols and services           I. Authentication, association, data delivery, and privacy. 3. What is an ad hoc network?      1. In this network, the wireless clients (stations) communicate directly with each other. This means the clients have recognized the other stations in the WLAN and have established a wireless data link.      2. The fundamental topology of the WLAN is the Basic Service Set (BSS). This is also called the independent Basic Service Set, or ad hoc network. 4. What is the purpose of an Extended Service Set?      1. By adding multiple access points to the network, the range of mobility of a wireless client in the LAN is extended.      2. Definition - The use of multiple access points to extend user mobility Hand-off. 5. What are the four physical layer technologies being used in 802.11 wireless networking?      1. Direct Sequence Spread Spectrum (DSSS)      2. Frequency Hopping Spread Spectrum (FHSS)      3. Infrared      4. Orthogonal Frequency Division Multiplexing (OFDM) 6. Describe...

Words: 1687 - Pages: 7

Premium Essay

Network Standards and Protocols Pg 99

...Network Standards and Protocols June 29, 2013 Homework: Respond to multiple choice questions 1. A 2. B 3. D 4. C 5. C 6. D 7. B 8. C 9. D 10. D 11. C 12. D 13. B 14. C 15. A 16. D 17. D 18. D 19. A 20. B Define Key table 1.Computer Network is any combinations of many components that work together so that many different devices can communicate. 2. Computer Networking is the gerund form of the term computer network. 3. Application is a function of any kind of computer or electronic device. 4. Email is electronic mail in which user can type text or attach files. 5. Voice call is a modern term for telephone call. 6. Video frame is a grid of pixel location a chosen width by height that contains the lights/ color to be shown in a video. 7. Web server is software that stores web pages and web objects, listens for request for those pages and send the content of the pages/objects to clients. 8. web browser is software controlled directly by a user that request web pages from a web server and after receiving a page display the web in a window. 9. web address is the text that indentifies details about one object in a network so that a client can request that object from a server. 10. Protocol is a set of rules that different devices or software must follow so that the network works correctly. 11. HTTP is the protocol by web browsers and web servers to define the format of URLs and the messages...

Words: 390 - Pages: 2

Free Essay

Implementation and Evaluation of Wireless Mesh Networks on Manet Routing Protocols

...Implementation and Evaluation of Wireless Mesh Networks on MANET Routing Protocols Shashi Bhushan1,Anil Saroliya2 ,Vijander Singh3 Research Scholar, Computer Science, Amity University, Jaipur, India 1 Assistant Professor, Computer Science, Amity University, Jaipur, India 2 Senior Lecturer, Computer Science, Amity University, Jaipur, India 3 Abstract—Wireless Mesh Network (WMN) is a kind of network which is made up of Mesh router and Mesh clients where Mesh router having lesser mobility and form the heart of WMNs. In this paper, Wireless Mesh Network over MANET implemented using routing protocols such as AODV, DSR. In this work NS-2.34 simulator is used for simulations. Various measurements and calculations were figure out in this work like throughput, Average end-end delay, PDR, NRL and Routing packets in Random way point mobility model. WMN have features such as self configuration, self healing and low cost of equipment. This work specifically aims to study the performance of routing protocols in a wireless mesh network, where static mesh routers and mobile clients participate together to implement networks functionality such as routing and packet forwarding in different mobility scenarios Keywords- Ad hoc Network, Routing Protocols, Wireless Mesh Network, Performance, Throughput, PDR, NRL and Routing packets in Random way point mobility model, Simulation on Network simulator NS-2, AODV,DSR , Routing Overhead. I. INTRODUCTION A Mobile Ad-hoc network (MANET) is an autonomous system of...

Words: 4335 - Pages: 18

Free Essay

Impact of Mac Layer on the Performance of Odmrp, Fisheye, Aodv and Dsr, Routing Protocols in Mobile Ad Hoc Networks

...DSR, Routing Protocols in Mobile Ad hoc Networks A. Sravani, G. Srinu, and A.Venkataramana Abstract— Mobile Ad hoc Network is an emerging area. Its standards are defined by IETF. MANET is a self generated, self organized and self handled network consisting of collection of independent nodes. MANETs Presents several desirable properties like dynamic topology, Easy of deployment and robustness, which are qualify them as an attractive topic for the research community. Providing QoS routing is a major issue in MANETs. Media Access Control layer plays crucial role in Ad hoc networks. Several routing protocols have already been proposed for MANETs. This paper describes the impact of MAC layer protocols like 802.11 and CSMA on the various routing protocols like AODV, DSR, ODMRP and Fisheye. Numbers of simulation scenarios were carried out by using Glomosim-2.03. The QoS parameters used are Throughput, Delay and PDR. Simulation results found that AODV performs better in 802.11 and CSMA, DSR and ODMRP performs better in only under 802.11. Keywords— MANET, AODV, DSR, FSR, GloMoSim, ODMRP I. INTRODUCTION Wireless communication networks are basically two types as shown in Fig.1. One is infrastructure based and other one is infrastructure less. Infrastructure based is cellular communications whereas infrastructure less is ad hoc networks. Fig.1 Classification of wireless communication networks A. Cellular Networks A Cellular Network is a wireless network distributed...

Words: 2917 - Pages: 12

Free Essay

Frame-Relay

...limiting factors are discussed as well as committed information rates, burst rates, an error handling. Some of the positive aspects of frame-relay are identified along with some options for the future of WAN technologies. Frame-Relay Operating at the physical and datalink layers of the OSI model, frame relay is a high-performing WAN protocol. It was originally designed for use with ISDN integrated services digital network interfacing. It has evolved into being used on multiple types of network interfaces. In 1984 the initial proposal for frame-relay standardization was presented to the CCITT Consultative Committee on international telephone and telegraph. Because interoperability standards were lacking, frame-relay did not fully take off until the 1990s. In 1990 StrataCom, Northern Telecom, Digital Equipment Corporation (DEC), and Cisco created a consortium that focused on the technical development of frame-relay technology. While the CCITT was already discussing frame-relay, the consortium established specifications that while still conforming to the frame-relay protocol, enhanced the protocol with additional features to accommodate more complex internetworking environments. These enhancements are known as the local management interface LMI. On the international front, the international telecommunication Union – telecommunication standards section standardized frame-relay. Frame-relay is an American National Standards Institute ANSI standard. Cisco...

Words: 2574 - Pages: 11

Free Essay

You Decide Week 3

...YOU DECIDE LLOYD BARTSHE NETW 208 Scenario Summary Over the past several weeks, you have carefully considered the devices and media that will be used to communicate between the Pittsburgh and Cleveland offices. You must now move your attention to moving data between the two networks. Kim has recently bought a networking book and began reading up on Frame Relay, but was confused by all of the new terminology. Perhaps with your networking knowledge, you can help Kim in this area. First I think Kim has some serious control issues that at some point should be addressed. The writers of this scenario mustn’t realize that at the understanding that a non-tech person is beginning to read a tech book to help make important tech decisions is equal to an NFL team whose looking for a new coach and gets a resume from someone whose accomplishments only include how many Madden championships he’s won. While on the surface it looks similar, but in reality it’s just scary. I would first explain to Kim that Frame Relay is a WAN implementation methodology which uses virtual circuits to insure an end to end data transmission rate at a guaranteed level of service with additional bandwidth made available if it is not being utilized, but that is not guaranteed. So when considering price, you should only consider the guaranteed rate as opposed to the theoretical additional bandwidth as it is not guaranteed and in a major metropolitan area you might not ever see this extra bandwidth. As it...

Words: 774 - Pages: 4

Free Essay

Cmit350

...CMIT 350 WAN and SOHO Skills Implementation Prepared for: University of Maryland University College CMIT 250 Prepared by: Devin Manning I. Site “Los Angeles” Challenge and Implementation The site administrator has requested that the site establishes remote IOS storage, remote management of switches, ACL list implementation, and a network time protocol for devices as described in the site specific portion of the scenario. II. Site Solutions and Technologies * The recommended course of action for the request of a remote IOS storage capability at the site would be to establish a remote access server using a HTTP/ HTTPS protocol as opposed to the SSH option mainly because of the security and control over things such as the internet connection to the routers from not only the user database, but the source addresses as well in regards to their perspectives. This particular protocol also requires the timing information to be in setup and in place which would complement the network time protocol solution that has been requested by the site. For this request, I would use the SonicWall software in order to setup up this capability along with the SonicWall UTM appliance that is provided by the company. * In order to address the remote management of the switches request, it would require a console cable and a server that has an available console port such as the Cisco Nexus 2228TP GE Fabric Extender expansion module which is one of the easier servers to use that...

Words: 1625 - Pages: 7

Free Essay

Time and Clocks

...Making time, holding time with or without a GPS. The most ubiquitous way to get accurate time and phase, every time, everywhere is to use a GPS disciplined oscillator (GPSDO). Over the last few years, some concerns have arisen due to the potential impact on critical infrastructure of malevolent attacks such as jamming or due to natural causes such as solar flares. The GPS system has been designed to distribute time around the world. It gets time from a reference called a time scale. They are several time scales in the world. In the US, NIST and USNO are used for the UTC time scale and are referred to as UTC (NIST) and UTC (USNO). USNO also produces the GPS time scale. The time scales around the world are coordinated through an international agency called BIPM. USNO, NIST are all coordinated to BIPM through a mechanism called two-way time transfer. BIPM defines International Atomic Time (TAI) from ensembling atomic clocks that are disseminated around the globe - the duration of the TAI second is kept as close as possible to the SI second. Coordinated Universal Time (UTC) is an atomic time scale derived from TAI to provide a reference scale in step with the irregular rotation of the earth. As a result of this process, the mean solar day, which is nominally 86400 seconds long, is actually getting longer when measured in SI seconds with stable atomic clocks. It is the role of IERS (International Earth Rotation Service) to observe the self-rotation of the earth and to make sure that...

Words: 2079 - Pages: 9

Free Essay

Thoughts About the Ez80 and Its Applications

...The application of eZ80 is a great advancement when it comes to technology, speed and efficiency. The eZ80 Web server CPU is intelligently created equipment that has a controlled network in another piece of equipments. In my view, this technology is indeed a breakthrough that allows the expansion of use of the controllers and networking. The availability of a software model is also a very important as it provides information that regards the software registers, flags, addressing and memory modes and instruction set. I think that this kind if development is vital in the general use of the eZ80 as it comes along with an instruction set as well. The presence of an addressing mode is important as it help sin the location of data needed for an instruction, this data might be stored in a register or memory location. Thus there is the role that shows the simplification of data and hence making it easy to access data in any angle. Arithmetic, logical and bit manipulation instructions are also important features that are used in providing the eZ80 CPU with its number-crunching ability for arithmetic instructions. Logical instructions are also used as they provide the user with the Boolean operations that are necessary in decision making as well as manipulating bits in registers or memory. Bit manipulation instructions are used in the testing; clearing or setting a bit in a register or memory location, thus there is assurance that a bit is registered as soon as it is entered. In my opinion...

Words: 562 - Pages: 3

Free Essay

Idnp Week 2

...IDNP:Part 2 NTC/362 06/29/2015 Importance of Communication Protocols Communications protocols are a very important communication capability. Communications protocols allow two systems or more to communicate effectively and to pass data over a network and between different communication devices. Communication protocols allows for the process of breaking data down into tiny packets that are the encrypted and signed by the sending device. Each of these packets are sent individually to cut down on errors. If any errors occur, instead of resending the whole line of data it is only necessary to send that specific packet to complete the transfer. Communications protocols also allow you to have secure and private communications when transferring data. Each packet we previously discussed has a header imbedded in its data that signifies where it is going. It will then only open on the device it has been addressed to. Also if someone were to intercept one of your packages it is still not the whole transfer since all the data is sent separately in smaller packages and they wouldn’t receive the full data transfer. There are many different kinds of protocols that govern how computers interact with each other through the internet and govern how they communicate most effectively. Common communication protocols include everything from how the data is secure to how the packets are structured and sent. Identifying Protocols/Network Architecture The links of communication and how they will...

Words: 932 - Pages: 4

Premium Essay

Nt1310 Unit 3 Assignment

...Communication Protocols Communication is defined as the exchanging of information or news. Protocol, for all intents and purposes, means an official way or agreed upon procedure or standards to accomplish a task. In this case, it would be rules to help transmit data. In networking, there are various protocols needed to make transmission of data easier. In today’s fast paced environment, the standards of information sharing are increasing exponentially. Adhering to the standards are also becoming more important than before. Design Kudler Fine Foods is dedicated to ensuring that the customer information in their possession remains secure from unapproved access. Securing their network is one of the highest priorities for Kudler. Since the new enterprise network will be integrating a wide area network to connect all the sites, which will have their own individual wireless local networks. Choosing the correct communication protocol stack is vital to the security and availability of both the WAN and WLAN network. In...

Words: 1036 - Pages: 5

Free Essay

Data

...C H A P T E R 5 AppleTalk Data Stream Protocol (ADSP) 5 This chapter describes the AppleTalk Data Stream Protocol (ADSP) that you use to establish a session to exchange data between two network processes or applications in which both parties have equal control over the communication. You should read this chapter if you want to write an application that supports the exchange of more than a small amount of data between two parties who each can both send and receive streams of data. This chapter also describes the AppleTalk Secure Data Stream Protocol (ASDSP), a secure version of ADSP, that allows users of your application to communicate over an ADSP session after the users’ identities have been authenticated. Users can then exchange encrypted data over the session. For your application to use ASDSP, the system on which it runs must have the AppleTalk Open Collaboration Environment (AOCE) software installed and must have access to an AOCE server. To use ASDSP, you must also use the Authentication Manager, which is a component of the AOCE software. For information on the Authentication Manager, refer to Inside Macintosh: AOCE Application Programming Interfaces. ASDSP enhances ADSP with authentication and encryption features. When this chapter discusses components of ADSP, such as connection ends and connection listeners, you can assume that the information also applies to ASDSP. The sections in this chapter that discuss ASDSP describe any specific differences between it...

Words: 29341 - Pages: 118

Premium Essay

Nt1310 Unit 3 Assignment 1

...is send by two working stations at a time there occurs collision and it stops transmitting and sends again when it founds the line is idle but it’s not defined till which period or duration it has to wait is called non deterministic protocol. It can be also defined as the system that has the possibility of multiple output for each input so that the output cannot be predict. Example: CSMA/CD Q2 Answer A timer is set, before the timer runs out, a clear to send (CTS) will be received from the access point. Q3 Answer No, for the 5 Ghz protocol have a small transmission distance approximately 30 meters and this frequency has trouble to transmit over floors and walls. If we needed to utilize the IEEE 802.11a we need multiple contact...

Words: 1657 - Pages: 7

Free Essay

Kulder

...format of the data being used. Communications protocols must adhere to the following; the rate of transmission either in baud or bps. The transmission is to be synchronous or asynchronous. Also, the data is to be transmitted in half-duplex or full-duplex mode. Baud transmission is the number of signaling elements that occur each second. At slower speeds, only 1 bit of information is encoded in each electrical change. When saying 1500 baud, it means that 1500 bits are transmitted each second, this is also shown as 1500bps. Communication protocols can also describe the syntax, semantics, and synchronization of analog and digital communications. Communications protocols are implemented in hardware and software. There are thousands of communications protocols that are used everywhere in analog and digital communications. Computer networks cannot exist without them. With KFF, being that the Home Office or Headquarters is located in La Jolla, there is a T3 dedicated line that connects HQ with Del Mar and Encinitas locations. These lines are usually rented at a monthly or yearly rate to connect geographically separate offices for private voice and or data networking. It is also very costly averaging over $3000 USD per month, so most don’t lease these lines. They are also reserved circuits that operate over either copper or fiber optics cables. One of the protocols that should be implemented is the Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP is the set of rules for...

Words: 838 - Pages: 4