StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Basic Network Technology, Structure, and Protocols - Essay Example

Cite this document
Summary
The RAD University tutorials available from the RAD University tutorials page is tutorials for Data Communications, telecommunications and computer networking. The tutorials available on the site page also include projects done by students and some by the dean.
The tutorials…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
Basic Network Technology, Structure, and Protocols
Read Text Preview

Extract of sample "Basic Network Technology, Structure, and Protocols"

BASIC NETWORK TECHNOLOGY, STRUCTURE, AND PROTOCOLS Basic Network Technology, Structure, and Protocols Introductory and General ials RAD University TutorialsThe RAD University tutorials available from the RAD University tutorials page is tutorials for Data Communications, telecommunications and computer networking. The tutorials available on the site page also include projects done by students and some by the dean.Anyone can submit a tutorial on any topic to be added to the online directory of tutorials provided by RAD University.

The tutorials are meant for computer scientists and engineers of the future. The introductory and general tutorials are categorized into: client-server interactive animation, internet protocol model, internet communications flash animation, internet resiliency interactive demo, OSI reference model, and regional internet registries.These tutorials are meant to shed light on the networking topics covered by students in college. They can also be used for references purposes by engineers and computer scientists.

The projects done by students are meant for visual demonstrations on what the tutorials cover. For instance, the client-server flash interactive animation covers protocols and computer networks in general. It is a project done in 2005 by Roman Margolis and Slav Podolsky. Animations are usually developed to show, visually, what might not be clear when just put into words alone. The 2005 animation project shows how communication happens over the internet. This normally happens via the client server architecture; as the tutorial explains.

A client communicates with a server and the server responds with the information requested for by the client and sends that information. Servers are numerous and are situated at various locations around the globe. Servers can be within the same room as a client computer while others can be remote. The protocols described in the tutorial are: IP between client-server, address resolution DNS and ICMP.INSTRUCTIONS are given on how to use the animation and how to see its contents.The internet communications flash animation is very interactive.

This is very useful as it provides detailed information and explanations as well as graphical representations of the topic it describes. This tutorial is not only useful to computer science students but also lovers of technology and the curious computer user who may want to know how some things work on the internet. It explains how to go about surfing the internet for certain information. The computer is personified for humor purposes and it definitely does not fall short in that regard.The interactivity that the two above tutorials provide is the sole reason I choose to go through them and learn a thing or two.

They are easy to understand – I believe anybody can understand them. As for the business purposes that the tutorials can be used for, animated tutorials can be used for online courses. They can be a substitute to an instructor even in actual classrooms. They are detailed and contain the demonstrations hence, combine the functions of a classroom instructor as well as a lab technician. The internet communication tutorials can also provide insight to those who spend on internet data bundles to let them know how much data they use and how they can minimize data bundle consumption while on the internet and the security measure they can put in place, while on the internet.

It also can let to find reason to spend on anti-virus programs to protect their computers to prevent data theft on the internet.ReferencesRAD University, (2012) Tutorials for Data Communications, Telecommunications, and Computer Networking. Retrieved from http://www.rad.com/12/5266/The Internet Protocol Model, (2012) The OSI Model - A Surviving Remnant of the OSI Protocol Stack. Retrieved from http://www2.rad.com/networks/introductory/layers/main.htm

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Basic Network Technology, Structure, and Protocols Essay - 2”, n.d.)
Basic Network Technology, Structure, and Protocols Essay - 2. Retrieved from https://studentshare.org/information-technology/1587582-basic-network-technology-structure-and-protocols
(Basic Network Technology, Structure, and Protocols Essay - 2)
Basic Network Technology, Structure, and Protocols Essay - 2. https://studentshare.org/information-technology/1587582-basic-network-technology-structure-and-protocols.
“Basic Network Technology, Structure, and Protocols Essay - 2”, n.d. https://studentshare.org/information-technology/1587582-basic-network-technology-structure-and-protocols.
  • Cited: 0 times

CHECK THESE SAMPLES OF Basic Network Technology, Structure, and Protocols

Complete Computer Network Infrastructure for a Real or Ficticious Business

For the WAN architecture, we will discuss the technologies, protocols and services that will be used for connecting these sites together.... The topology will define the structure of the entire network along with preferred cable to be used.... The topology will define the structure of the entire network along with preferred cable to be used.... This paper ''Complete Computer network Infrastructure for a Real or Ficticious Business'' assumes a proposed network of a hospital that will remotely connect to maternity homes....
20 Pages (5000 words) Research Paper

Cryptographic Overhead of IPsec Protocol Suit

So to solve this issue researchers are trying to increase the network security at each layer by designing a range of security protocols.... The designed protocols include PGP, S/MIME, and SET which are specifically designed to ensure the security of the application layer.... IPSec IPSec is a complete suite of protocols, which carry out specific tasks.... In this race, IPSec is one of the most important security protocol, which is designed for dealing with the network layer security, ensuring the availability of security services like that data source authentication, access control, data confidentiality and integrity and processing data packages on the IP packet layer (Zheng & Zhang, 2009; Meng, et al....
5 Pages (1250 words) Research Paper

Quality of Service in WiMAX Based Broadband Wireless Networks

Existing protocols and solutionsIEEE's 802 LAN/MAN Standards Committee is almost anonymous with a wireless standards body.... hellip; WiMAX Forum a leading industry consortium and IEEE working groups are working in collaboration of research community to overcome current infrastructure, QoS and implementation issues that are restriction the adoption of WiMAX technology.... WiMAX technology promises a better, more robust and cost effective alternative to existing wireless networking technologies and traditional wire-based broadband Internet connections. IEEE 802....
9 Pages (2250 words) Essay

The Role of Network Topologies in Designing a Network

hellip; Communication protocols characterize rules and ways for exchanging information and data in a computer network.... One of the widely used protocols is the Ethernet, Today, computer networks have become an important aspect of present-day communication.... he network infrastructures like hubs and switches as well as network protocols that are means of accessing remote hosts for exchange of information poses a great risk on the network.... Further, adoption of peer-to-peer technology to reduce the expense of coaxial cables in Ethernet LAN, at the same gives unsecured networking because it bases its operation on the sharing of information....
8 Pages (2000 words) Essay

Computer Technology and the Networked Organization

This essay articulates on network setup and design of a medium-sized food store, the structure of securing, socio-technical linkages and maintaining the network.... Network structure design is compulsory for any computer network, whether it is small business or home network.... The network structure is designed earlier prior linking and installing the software and hardware components.... nbsp;… According to the paper the perfect network for medium-sized food store therefore must be candid and effortlessly controlled....
4 Pages (1000 words) Assignment

Common Use IP Networks: Should They Be Implemented in a Mall

In this report, I have also presented a brief but comprehensive overview of the IP based network implementation support, technology, overview, and data types at the network.... "Common Use IP Networks: Should They Be Implemented in a Mall" paper is about the detailed analysis of the IP network implementation at Mall.... This report provides a comprehensive overview of the main implementation overview of the IP network at Mall....
9 Pages (2250 words) Coursework

IP Phone Technology Issues

hellip; Digital IP based telephone systems use control protocols like the Session Initiation Protocol and different other proprietary protocols in its functioning.... Initially, the providers of Voice over IP service provided business models as well as technological solutions that were similar to the structure of the conventional telephone network.... The paper "IP Phone technology Issues" summarizes the features of IP phones that are almost the same as those of Skype and Google Voice, which boast of richer feature sets, but since they depend on the IP support of mainstream operating systems, there are audio problems associated with latency....
6 Pages (1500 words) Essay

Wireless Networks: Technology and Applications

… The paper "Wireless Networks: technology and Applications" is an outstanding example of an essay on information technology.... The paper "Wireless Networks: technology and Applications" is an outstanding example of an essay on information technology.... The original intention of this technology was so that it would be possible to connect mobile phones to headsets.... When compared to WiFi, it comes out as a more user-friendly technology....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us