Name: Instructor: Course: Date: Network and Protocol Processes In accessing X-Stream’s website from the home computers, instructions must be given to the home computer on what to do; these instructions must be understandable to the sender to be able to send them…
Download file to see previous pages...
The devices are called end devices or more correctly hosts; which are either the destinations or sources of information transmitted via a network so accessing a network or site remotely involves three elements; a source or sender, a destination and a medium which is the channel through which the data is transmitted. The data transmitted can be in the form of text, graphics, voice or video which are converted into a language the computer understands called binary bits (data is transmitted as a zero or a one: 0I). The bits are then ‘programmed’ or coded into signals or data packets that can be transmitted through a medium over a network. Now sending data as one continuous stream will mean that no other data or devices can use the medium while the data is being transmitted just like a pipeline; if it is delivering gasoline, it cannot at the same time deliver liquid petroleum gas; so the data is broken into smaller packets; a process called segmentation which allows many different data to be transmitted concurrently, this is called multiplexing and segmenting data enhances network reliability so data is not lost easily whenever a break in communication occurs (“3rd Symposium on Networked Systems design and Implementation (NSDI’06), San Jose, California”). ...
The one used for internet communication is called TCP/IP stack which contains four layers; Application protocols layer that is defined to applications like WWW, or FTP (File Transfer Protocol), a transmission control protocol which is responsible for directing packets of data to specific computers by using a port number. It also has an internet protocol layer that directs data bits to destinations using the IP addresses of the computers and a hardware layer that converts data into data streams or signals such as the network cards or modems. An instruction flows from the sender (computer) from the application to the transfer control protocol then to the internet protocol and finally to the hardware protocol that converts the bits of information into signals transmitted through a medium through the internet. On reaching the destination computer, the signals are converted back to binary bits through the hardware layer then to the internet protocol layer then to transfer protocol layer and then to the application such as a web server software. The internet is made up of many big networks called Network Service providers (NSPs0 connected together in a peer standard. The NSPs exchange data packets with each other and must connect to three network access points (NAPs) and at metropolitan Area Exchanges (MAEs) both of which are called internet exchange points (IXs). Information is then sent around these networked computers to its destinations by routers which contain information tables and switch data packets to the right destination (Serpanos and Wolf 292-302) As soon as one types the web address to be accessed into a web browser (a web browser is a program that is used for internet applications and
...Download file to see next pagesRead More
Cite this document
(“Computer Communications & Networks Lab Report Example | Topics and Well Written Essays - 2000 words”, n.d.)
Retrieved from https://studentshare.org/education/1394647-computer-communications-networks
(Computer Communications & Networks Lab Report Example | Topics and Well Written Essays - 2000 Words)
“Computer Communications & Networks Lab Report Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/education/1394647-computer-communications-networks.
The author states that in the process of purchasing the laboratory is important to that you ask yourself some questions regarding the computer specification. First, you need to list down how the computer is going to be used. Secondly, the software that will be used can follow and here you determine whether any specialized functions are going to be used.
Page 10 Introduction Today, the Internet provides numerous opportunities for humans to communicate and exchange information. Apart from various advancements such as web2.0, the semantic web and virtual and augmented reality, fundamental concepts and protocols that are used to transfer and deliver a data packet is the same.
There are many networked devices, components, technologies, and methods involved to open a single web page from the Internet. All these devices talk with each other by different protocols. TCP/IP is one of the fundamental protocols that are mandatory for establishing connection on the Internet. The combination of these protocols serves to sustain an Internet connection and request the source to provide a new packet. The author will discuss in detail and try to cover different aspects of accessing the remote X stream server from home.
The paper discussed several routing protocols and their roles in ensuring robust connectivity from home to the x stream. Furthermore, DSL physical infrastructure is also discussed in detail in diagrams to get better insights and involvement of network devices in case of a DSL home connection.
Each layer will demonstrate the methods, processes and technologies that are associated with accessing the X stream server from a home computer. Moreover, in this scenario, we have assumed that the home computer is connected with an ADSL connection from an ISP with a Client premises equipment (CPE) named as ADSL router.
e of the most reliable technology through which information is relayed .Satellites dole out elementarily for map-reading, connections, backdrop scrutiny as well as climate forecasting. The launching of the Satellite Sputnik altered the course of the Russian history in 1957 when
The enhancements involve data encryption, transformation of analog to digital communications, networking, and measures to curb online security threats. In a business setup, the communication system is set up to meet the information needs of
ncertainties and concerns on designers and enterprises regarding the integration between mobile technologies and the existing IT environment including the infrastructure and applications. Preliminary investigations reveal that emerging technologies tend to exhibit unique