StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Wireless Networks and Pervasive Computing - Essay Example

Cite this document
Summary
In the paper “Wireless Networks and Pervasive Computing” the author analyzes internet protocols (Transmission Control Protocols) that have different uses. He has chosen these tutorials because they have a lot of information he would like to know…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful
Wireless Networks and Pervasive Computing
Read Text Preview

Extract of sample "Wireless Networks and Pervasive Computing"

Wireless Networks and Pervasive ComputingTransmission Control Protocol (TCP) and User Datagram Protocol (UDP) are internet protocols that have different uses. I have chosen these tutorials because they have a lot of information I would like to know. As defined by Kozierok (2005), TCP is an internet protocol that requires connection and is the most commonly used because it provides error correction. It can make a connection from client to server resulting to instant delivery. When using TCP, the computer sending data connects with the one receiving the data, and remains connected for some time until the data is sent correctly and safely, and then they disconnect.

This method has several advantages such as it is reliable, it is ordered, and it is heavy weight (Kozierok, 2005). It is reliable in that any message sent along it, arrives safely unless there is a problem with the connection. Also, when two messages are sent along a connection, the first message arrives first and ordered. However, if messages arrived in the wrong order, resend requests must be sent, which requires a lot of effort to put together.UDP is also a commonly used the message-based internet protocol that does not require any connection (Kozierok, 2005).

According to Kozierok (2005), UDP is not be used to send crucial data like database information and web-pages, but for streaming video and audio. It is faster than TCP; hence, it is used in streaming media like real player, and Media audio files. Its speed is higher than that of TCP because it does not require any error correction or flow control. However, it is quite unreliable because the data sent along it is likely to be affected by errors and collision. Also, it is not ordered because messages sent can arrive in any order.

Unlike the TCP, UDP is lightweight because it does not track its connections or order messages; hence, little effort is required to translate the data back from the packets (Reid and Lorenz, 2008).All computers, which are connected to the internet, must have an IP address. This is a unique number that is assigned to all computers as a means of recognizing a certain computer from others that are connected to the internet. When information is sent to a computer, it is accepted through the use of TCP/UDP ports.

In is highly essential in business in order to ensure the data sent reaches its destination safe and in proper order. What happens is, when a computer program sends or receives data via the internet, it sends this data to an IP address and a certain port on the remote computer, and then it receives the data on a random port own its own computer (Reid and Lorenz, 2008).If the program uses the TCP protocol to send and receive data, it connects and binds to a TCP port, but if it uses the UDP protocol, it will use the UDP port (FitzGerald and Dennis, 2008).

FTP server is a server that helps to transfer and receive files from remote computers, on the same web server (FitzGerald and Dennis, 2008). It uses TCP ports 20 and 21 to send and receive information so as to prevent conflicts with the web server running on TCP port 80. Hence, after binding to TCP port 20 and 21, FTP server usually waits for connections so as to send and receive data.Therefore, TCP and UDP are essential in business because they help to transfer and receive data through the internet, which makes business easy to manage.

Moreover, when exploring the tutorials, I learnt about the significance of technology and its application in business. I learnt how the TCP and UDP ports work with the IP addresses.ReferencesReid, A. and Lorenz, J. (2008). Working at a Small-to-Medium Business or ISP: Ccna Discovery Learning Guide. London: Cisco Press.FitzGerald, J. and Dennis, A. (2008). Business Data Communications and Networking. New York: John Wiley and Sons.Kozierok, C. M. (2005). The TCP/IP guide: a comprehensive, illustrated Internet protocols reference.

CA: No Starch Press.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Wireless Networks and Pervasive Computing Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Wireless Networks and Pervasive Computing Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1591280-wireless-networks-and-pervasive-computing
(Wireless Networks and Pervasive Computing Essay Example | Topics and Well Written Essays - 500 Words)
Wireless Networks and Pervasive Computing Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1591280-wireless-networks-and-pervasive-computing.
“Wireless Networks and Pervasive Computing Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1591280-wireless-networks-and-pervasive-computing.
  • Cited: 0 times

CHECK THESE SAMPLES OF Wireless Networks and Pervasive Computing

Information Technology Annotated Bibliography

Star rating:  4 Stars:  Paper provides a key method/approach for my research Key words: Channel coding; Error correction; Multimedia streaming; Packet scheduling; Rate-distortion optimization; video coding; wireless networks.... “Video-Aware Opportunistic Network Coding over wireless networks,” in IEEE JSAC, Special Issue on Network Coding for Wireless Communication Networks, vol.... Star rating:  2 Stars:  Paper describes some important terms and fundamental concepts Key words: Network coding, video streaming, prioritizedtransmission, wireless networks, and cross-layer optimization....
3 Pages (750 words) Essay

Pervasive Computing: The Future of Technology

The paper “pervasive computing: The Future of Technology” seeks to evaluate the ultimate goal of all technology, which is to pervade the environment completely and get integrated into the everyday life in a ubiquitous manner.... Without this, the aim of pervasive computing cannot be realized.... This barrier must be crossed with pervasive computing.... The second aspect of pervasive technology in the future will be the convergence of sensing, monitoring, networking, and computing technologies....
6 Pages (1500 words) Assignment

Wireless Networks and Pervasive Computing SLP

TCP helps businesses with their network connections, as it is very reliable normally, although it cannot take delays as can RMTP, it is an industry standard used by many businesses in their networks, its problems are known.... ourse: Protocols and Computer networks.... om/networks/2003/rmtp/index.... om/networks/transport/tcp/main.... Course: Protocols and Computer networks.... om/networks/2004/udp/main....
2 Pages (500 words) Research Paper

Network Infrastructure Basics in the LAB

Networking Infrastructure for pervasive computing: Enabling Technologies & System.... The requirements in this LAB were that the author had to install a wireless network card in the PC in which a built-in Ethernet Card was already present.... wireless networking employing the 802.... wireless Card should have the following properties in it.... (wireless Standard Facts) 802.... 1a wireless network adaptor amongst the given has all the required functionalities in it that include frequency of 5....
2 Pages (500 words) Assignment

Fundamental Properties of Pervasive Systems

om, that states, “pervasive computing is the trend towards increasingly ubiquitous, connected computing devices in the environment”.... As per Wikipedia, it is defined as ”In graphical computing, a desktop environment (DE) commonly refers to a style of the graphical user interface (GUI) that is based on the desktop metaphor which can be seen on most modern personal computers today ”The core concept of pervasive computing is, it is a set of small intelligent devices integrated with each other providing fast and robust network connectivity, data transfer and network processing devices that are distributed regardless the distance and disbursed geographically and facilitate everyday life....
15 Pages (3750 words) Assignment

Pervasive Computing for Assisting Individuals With Autism

This assignment "pervasive computing for Assisting Individuals With Autism" investigates a pervasive computing technology that focuses on providing nonverbal autistic children with a voice.... Some of the pervasive computing technologies are designed to assist in collecting records, analyzing records, making decisions, and communicating (Kientz et al, 2008).... The spotlight of this assignment is to investigate a pervasive computing technology that focuses on providing nonverbal autistic children with a voice....
7 Pages (1750 words) Assignment

Privacy in Mobile Social Networks

The growth of applications which brings together online social networks and mobile computing applications has enabled the occurrence of applications which are unique in their requirements and also which are hard to understand because they are hard to understand (Eagle, & Pentland, 2005).... This development has made the computing power to the hands of users and also allowed them to access online information on the Internet.... IntroductionInformation from the social networks has found its use in many ways which was not expected in the beginning....
7 Pages (1750 words) Essay

Context-Aware Sensor Networks for Smart Environments

Examples include the pervasive computing paradigm, many wireless and wired protocols, and fixed sensor technologies.... Context-aware senor networks fall in the category of wireless sensor networks and are therefore part of it (Korpipaa, Koskinen, Peltola, Makela, & Seppanen, 2003).... Smart environments have many benefits to society but they also pose very many new challenges about the design of wireless networks.... Context-aware computing in such a case explains the situation of a mobile or wearable computer and its awareness about the state and surroundings of the user and changing its behavior in consideration of this information....
22 Pages (5500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us