Internet has turned out to be a revolution and the greatest discovery for humans. Now every piece of information is on the Internet. Apart from communicating with each other, state of the art web based applications are now available on our home computer desktop and it will be discussed in this paper…
Download file to see previous pages...
In order to test connectivity of the Internet connection, ping command is executed from the command prompt of the operating system. The syntax will be ping (space) (destination address), moreover, in order to review hops and delays in accessing the X stream server, the ‘tracert’ command can be executed from the command prompt. The syntax for this command will be tracert (space) (destination address). The ping command utilized Internet Control Message Protocol (ICMP) to check the connectivity of the destination by sending ICMP echo request on periodic basis. Moreover, the ‘tracert’ command demonstrates all the hops and delays that are in the way of that particular destination. Likewise, it is not necessary that only routers are involved in the process of establishing and exchanging information from the required host. The Ethernet is the first device that initiates and constructs a request datagram from the home computer, as it is considered to be the most popular Local Area Network technology that is implemented globally (Ethernet. 2007). The connectivity of the Ethernet adapter is established by both wired and wireless networks. However, in terms of wired connectivity, twisted pairs of cable are connected in to the Ethernet RJ45 socket. The other end of the wire is terminated to the router, switch or hub. In this scenario, home user will use a DSL router that will connect the home computer with the Internet Service Provider (ISP). Likewise, the Ethernet construct the datagram consisting of six parameters i.e. destination address, source address, preamble, type, CRC and data. The preamble parameter is responsible for clock synchronization of the data packets from the source and destination. Likewise, the addresses...
This report approves that home Internet users do not have DNS configured. ISP is responsible to resolve the URL into IP addresses. In order to do so, the request from the home network will terminate on the ISP Network that will resolve the URL and sends the request to the relevant destination accordingly. After resolving the DNS for the URL, the router checks for the shortest and robust path for processing the quest with the help of routing protocol. Some popular routing protocols include Routing Information Protocol, Open Shortest Path First, Border Gateway Protocol. After identifying the most suitable path for the request, the connection to the X stream server will be established. Encapsulation of User datagram protocol, IP and Ethernet takes place before sending it to the router for resolving DNS query.
This essay makes a conclusion that the first section covered mandatory requirements as well issues that occur on physical layer connectivity. Likewise, we have discussed the Ethernet packet header along with its purpose in details. The next discussion was about CSMA/CD, as the request needs space to fulfill the execution. Next we have discussed the ARP command along with the discussion of a MAC address packet. Moreover, in the next section we have discussed the network layer connectivity and router functionality. We have also put some light on routing protocols and their functions. Furthermore, in the last section, DNS query construction is discusses along with socket connections by incorporating HTTP, TCP/IP, UDP and ARP for opening the X stream web page on the home user browser.
...Download file to see next pagesRead More
Cite this document
(“Computer Communications & Networks Lab Report Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from https://studentshare.org/e-commerce/1394467-computer-communications-networks
(Computer Communications & Networks Lab Report Example | Topics and Well Written Essays - 1500 Words)
“Computer Communications & Networks Lab Report Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/e-commerce/1394467-computer-communications-networks.
The author states that in the process of purchasing the laboratory is important to that you ask yourself some questions regarding the computer specification. First, you need to list down how the computer is going to be used. Secondly, the software that will be used can follow and here you determine whether any specialized functions are going to be used.
Page 10 Introduction Today, the Internet provides numerous opportunities for humans to communicate and exchange information. Apart from various advancements such as web2.0, the semantic web and virtual and augmented reality, fundamental concepts and protocols that are used to transfer and deliver a data packet is the same.
The paper discussed several routing protocols and their roles in ensuring robust connectivity from home to the x stream. Furthermore, DSL physical infrastructure is also discussed in detail in diagrams to get better insights and involvement of network devices in case of a DSL home connection.
The computer must convert these instructions that we will refer to as data into a language it understands. The machine language instructions are relayed via a medium from where the data is guided to access the X-Stream website. Various complex and simple processes take place during this data transmission and involves many devices (Shuler).
Each layer will demonstrate the methods, processes and technologies that are associated with accessing the X stream server from a home computer. Moreover, in this scenario, we have assumed that the home computer is connected with an ADSL connection from an ISP with a Client premises equipment (CPE) named as ADSL router.
e of the most reliable technology through which information is relayed .Satellites dole out elementarily for map-reading, connections, backdrop scrutiny as well as climate forecasting. The launching of the Satellite Sputnik altered the course of the Russian history in 1957 when
The enhancements involve data encryption, transformation of analog to digital communications, networking, and measures to curb online security threats. In a business setup, the communication system is set up to meet the information needs of
ncertainties and concerns on designers and enterprises regarding the integration between mobile technologies and the existing IT environment including the infrastructure and applications. Preliminary investigations reveal that emerging technologies tend to exhibit unique