StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Links on the Internet - Essay Example

Cite this document
Summary
This paper 'The Links on the Internet' tells us that the first point to be noted is a link, as the link itself does not have a service provider. Likewise, TCP operates over an IP address to ensure reliable delivery of data i.e., it does not possess the overall responsibility of transmitting data to the source or destination…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.7% of users find it useful
The Links on the Internet
Read Text Preview

Extract of sample "The Links on the Internet"

    For instance, if workstation 1 is downloading a file from Workstation 2, after receiving a data packet, computer 2 sends an acknowledgment for receiving a packet to workstation 1. However, if workstation 1 does not receive an acknowledgment from workstation 2, TCP regenerates the packet again and serenest to Workstation 2. In this way, the transmission is reliable, and data is transmitted inefficiently. In a real-world scenario, an executable file that is downloaded from the Internet must be complete in size to be operational and TCP is up for this task. Whereas, if any chunk of the executable file fails to download, it will not work and become corrupted. Whereas User Datagram Protocol (UDP) is a connection-less protocol that is operational on layer 4 of the OSI model. Likewise, UDP is not a reliable protocol for data transmission that supports transaction-oriented services (User Datagram Protocol. 2007). However, UDP can be advantageous for applications such as live video streaming, VoIP services, etc. likewise, if any frame is missed from a video, the video will still carry on resulting in high availability. Moreover, the response of UDP is faster, as no acknowledgment is made for every packet.

Many of the functions of an adapter can be performed in software that runs on the node’s CPU. What are the advantages and disadvantages of moving this functionality from the adapter to the node?

As shown in fig 1the .1, the data link layout to the sender is responsible for hardware encapsulation. However, the source end is responsible for hardware valuation. Similarly, the network layer about the sender is responsible for performing network address translation (NAT). NAT is a method of mapping IP addresses from one group of users to another, at the same time ensuring transparency. Likewise, NAT is also used for privacy issues i.e., it cannot be used from the outbound network for security purposes (Network Address Translation. 2007). Moreover, the receiver’s end on the network layer ensures network valuation, as shown in Fig 1.1. Moreover, the transport layer of both the sender and receiver’s end conducts port encapsulation and port valuation. Furthermore, the session layer is responsible for establishing and terminating data sessions, followed by the presentation layer that ensures data compression and sequencing for both the sender’s and receiver’s end. However, there is a visible communication between the smallest program generating sequence and the amount of compression achieved (Sayood 2005) lastly, the presentation layer network interaction.
     A primary disadvantage comprises computing a datagram from the application layer that relies on resources about central processing unit and memory integrated into dedicated hardware i.e., Ethernet Adapter. However, an advantage would be to get more control of an application interacting with users that will work with dedicated hardware resulting in a complex task. Moreover, the software approach is more efficient for upgrading technology, as hardware upgrades only require a hardware replacement. Likewise, new hardware upgrades provide an adequate abstraction for ensuring user protection. As illustrated in Fig 1. software-based deployments require a large number of metadata to analyze the requirements. As network access layer enforces overheads for headers and data of Ethernet and Token Ring, header and data of Internet Layer comprising of IP address, Transport layer header, and data associated with TCP and UDP. Lastly, Metadata in the form of header and data of application layer about FTP, SMTP, etc. 

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“If all the links in the Internet were to provide reliable delivry Essay”, n.d.)
If all the links in the Internet were to provide reliable delivry Essay. Retrieved from https://studentshare.org/information-technology/1446499-week
(If All the Links in the Internet Were to Provide Reliable Delivry Essay)
If All the Links in the Internet Were to Provide Reliable Delivry Essay. https://studentshare.org/information-technology/1446499-week.
“If All the Links in the Internet Were to Provide Reliable Delivry Essay”, n.d. https://studentshare.org/information-technology/1446499-week.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Links on the Internet

Internet social networking's effects on teenager's social lives

Causes and effects of internet social networking on the lives of teenagers: Introduction: With the evolution of technology, and particularly the internet, the process of spread of information has become enormously quick.... According to a recent research generated by the Pew Internet Project, as many as 93 per cent of the teenagers in America between the age of 12 years and 17 years are regular users of the internet, and 55 per cent of such teenagers spends most of the time using social networking websites (Hall)....
4 Pages (1000 words) Essay

Telecommunication systems

These are the input and output devices that are used to transmit and receive data, in this case we require the firm to have modems printers, work stations routers in the voice over internet If telephone lines are used then serial access program are used to enable the communication of the computer with telephone line.... In a telecommunication network the message passes through links and nodes as it is transmitted from one part of the network to another.... They enable in conversion of data from analogue to digital and vice versa, modems, microwave links, wireless link, repeaters hubs are all used in computer networking to enable data transfer....
4 Pages (1000 words) Essay

Effects of Internet Social Networking on the Lives of Teenagers

According to the paper, as many as 93 per cent of the teenagers in America between the age of 12 years and 17 years are regular users of the internet, and 55 per cent of such teenagers spends most of the time using social networking websites (Hall).... According to a recent research generated by the Pew Internet Project, as many as 93 per cent of the teenagers in America between the age of 12 years and 17 years are regular users of the internet, and 55 per cent of such teenagers spends most of the time using social networking websites (Hall)....
4 Pages (1000 words) Essay

Internet Seen Through the Perspectives of Different Cultures or Religions

So it can be concluded that the internet started off with a simple idea and along with the help of advancements in technology, this idea was realized.... Today the internet has become a force never before seen in the history of mankind.... What shape it might take in the future is uncertain but we can say one thing for sure is that the internet will play a great role.... The essay "internet Seen Through the Perspectives of Different Cultures or Religions" presents the theory of packet switching formed the basis of internet connections as we know today....
5 Pages (1250 words) Essay

Interest Rate Disparity between RBA and Major Australian Banks

The paper "Interest Rate Disparity between RBA and Major Australian Banks" is a perfect example of a finance and accounting case study.... RBA is responsible for executing a monetary policy that is geared towards promoting economic growth, reducing the inflation rate, lowering the unemployment rate, and reducing inflation rates....
10 Pages (2500 words) Case Study

Inherent Risks - One Tel Company

The paper "Inherent Risks - One Tel Company" is a great example of a finance and accounting assignment.... Inherent risk is the tendency of declaring right a misstatement at the financial reporting level or account balance level as a result of fraud or error before considering controls that could be material individually or in mishmash with other misstatements....
8 Pages (2000 words) Assignment

Suncorp - Inherent Audit Risks

The paper 'Suncorp - Inherent Audit Risks' is an impressive example of a finance & accounting case study.... Suncorp is a third leading Australian general insurance, finance, and banking corporation based in Brisbane, Queensland Australia.... The general insurance company is a unique well-diversified financial services group operating in Australia and New Zealand....
11 Pages (2750 words) Case Study

One Tel Company Inherent Risks

The paper "One Tel Company Inherent Risks" is a perfect example of a finance and accounting case study.... The inherent risk is one of the elements in the audit risk model.... The other elements are control and detection risk.... The overall audit risk entails the product of all various risks encountered during the audit engagement....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us