StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Networks and How They Work - Essay Example

Cite this document
Summary
"Networks and How They Work" paper presents an overview of TCP/IP network structure and its working. This paper discusses some of the important aspects of the TCP/IP framework and how this arrangement has enabled the expansion of the Internet into a worldwide network…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.3% of users find it useful
Networks and How They Work
Read Text Preview

Extract of sample "Networks and How They Work"

NETWORKS AND HOW THEY WORK? Networks And How They Work? Affiliation NETWORKS AND HOW THEY WORK Networks And How They Work Author 1 Author Affiliation 1 Date 1 Introduction 3 Structure of TCP/IP Framework 4 Issues with TCP/IP 5 Built for the Wide Area Network 5 Multiple Layers 6 Complicated Memory Management 6 Conclusion 7 References 8 9 Introduction A network is a combination of a variety of components such as software, computers and hardware where are all these components are linked with each other to help their users work jointly. In addition, a network connects computers through specialized software, cabling systems and devices that handle data traffic. In this scenario, a network facilitates users to share resources and files like that printers, and send messages electronically (or email) to each other. Basically, computer networks are divided into 2 major categories: peer-to-peer networks and client/server networks. A client/server network makes use of one or more dedicated machine (that is known as a server) to share the printers, files, and applications. On the other hand, a peer-to-peer network allows its users to share files using any other user and does not necessitate a central, dedicated server (TechsChange, 2010; Nash, 2000; Turban, Leidner, McLean, & Wetherbe, 2005). In the same way, the Internet is a huge network of networks. It connects all the networks so that they could receive and send data and information. For this purpose, the Internet uses a communication protocol that is known as TCP/IP (Transfer Control Protocol/Internet Protocol) (TechsChange, 2010; Nash, 2000; Turban, Leidner, McLean, & Wetherbe, 2005). This paper presents an overview of TCP/IP network structure and its working. This paper will discuss some of the important aspects of the TCP/IP framework and how this arrangement has enabled the expansion of the Internet into a worldwide network. This paper also outlines some issues regarding these networks. Structure of TCP/IP Framework TCP/IP based network management operations are normally associated with a protocol accountable for applying those processes. This protocol is known as the SNMP (Simple Network Management Protocol). In fact, the majority of IT people are aware of SNMP as it is common for SNMP to determine “the” method that network management is carried out in TCP/IP. Basically, the SNMP protocol is an element of a higher-level network management policy known as the Internet Standard Management Framework. Thus, in order to actually identify how SNMP works, we fulfill some conditions of the method that this network is controlled all together (Kozierok, 2005). In addition, open protocol standards are freely accessible and developed autonomously from some particular computer hardware or operating system platform. In view of the fact that the TCP/IP is extensively supported, thus it is perfect for connecting different hardware and software, even someone is not communicating over the Internet. As compared to any other physical network hardware, it can be executed over a Token Ring, an Ethernet, an X.25 net, a dial-up line and virtually any other type of physical transmission media. Additionally, it also supports routing and internetworking, standardized high-level communication protocols for reliable and extensively accessible user services (Peeters, 2012; Kozierok, 2005). Moreover, TCP/IP tries to produce a mixed network with open protocols that is independent of an operating system and architectural difference. In addition, TCP/IP communication protocols are available for all, are built and changed by means of consensus, not by the fiat of one producer. Thus, everybody is free to build products as far as they convene these open protocol requirements. Moreover, a lot of information regarding TCP/IP is available as Request for Comments (RFC), as it holds the most recent versions of all the standard TCP/IP protocols (Peeters, 2012; Kozierok, 2005). Issues with TCP/IP Though, the round-trip performance latency of TCP/IP is typically poor however it can attain high-quality throughput on presently deployed networks. In addition, the round-trip latencies on subsequent generation network technologies for example Myrinet as well as ATM have not gained the potential of these networks. Given below are some of the possible issues with TCP/IP based network communication and working: (USENIX, 1997; Kirch & Dawson, 2000) Built for the Wide Area Network TCP/IP was initially designed and implemented for WANs (wide-area networks). Though, TCP/IP works fine with a LAN (local-area network), however it is not customized or optimized for these networks. In addition, the TCP/IP model believes to be communicated between self-governing machines that collaborate simply minimally. In this scenario, machines on a LAN normally share a frequent administrative service, a common file system, and an ordinary user base. Hence, it should be probable to extend this cohesion and collaboration into the network communication application (USENIX, 1997; Kirch & Dawson, 2000). Multiple Layers Standard application of the socket interfaces and the TCP/IP protocol set different protocol and interface stack into various layers. In addition, this multi-layer group facilitates protocol stacks to be constructed using a wide variety of programming interfaces, protocols and network devices; however this flexibility is achieved at the price of performance. In fact, layer transitions can be expensive in time and programming attempts (USENIX, 1997; Kirch & Dawson, 2000). Complicated Memory Management Present TCP/IP applications make use of a complicated memory administration means. In addition, this protocol can be used in many ways. Initially, a multi-layered protocol stack outlines packet headers are incorporated (or removed) as the packet goes downward (or upward) using a stack. On the other hand, various issues regarding complicated memory management make it hard to program this protocol for a network. Thus, IT team needs to take care for a number of areas and aspects in order to deal with this issue (i.e. complex memory management) (USENIX, 1997; Kirch & Dawson, 2000). An overview of IPv6 IPv6 refers to the Internet Protocol version 6. As its name indicates it is the next edition of the Internet Protocol version 4 that is presently used all through the virtual world. Additionally, the IPv6 is as well recognized as IPng that stands for IP-Next-Generation. In this scenario, one of the major improvements in IPv6 is in the form of increased number of virtual addresses accessible for networked systems. For instance, every mobile phone or additional kinds of electronic device can have its own IPv6-network-address. In addition, IPv6 offers 3.4x10^38 addresses. This is mostly because of amount of bits in every protocol. In fact, the addresses in IPv6 have 128 reserved bits. Moreover, IPv6 presents a higher level of built-in safety, and it has been specially designed by keeping mobile devices in mind. Furthermore, the safety appears in the form of IPsec that allows verification, compression and encryption (White, 2012; IPv6, 2012). Conclusion A network is a combination of a variety of components such as software, computers and hardware where are all these components are linked with each other to help their users work jointly. Basically, computer networks are divided into 2 major categories: peer-to-peer networks and client/server networks. A client/server network makes use of one or more dedicated machine (that is known as a server) to share the printers, files, and applications. On the other hand, a peer-to-peer network allows its users to share files using any other user and does not necessitate a central, dedicated server. The Internet is a huge network of networks. It connects all the networks so that they could receive and send data and information. For this purpose, the Internet uses a communication protocol that is known is TCP/IP (Transfer Control Protocol/Internet Protocol). TCP/IP based network management operations are normally associated with a protocol accountable for applying those processes, known as the SNMP (Simple Network Management Protocol). TCP/IP tries to produce a mixed network with open protocols that is independent of an operating system and architectural difference. IPv6 refers to the Internet Protocol version 6. As its name indicates it is the next edition of the Internet Protocol version 4 that is presently used all through the virtual world. IPv6 offers a lot of advantages over IPv4. References IPv6. (2012). WORLD IPv6 LAUNCH DAY. Retrieved April 21, 2012, from http://ipv6.net/ Kirch, O., & Dawson, T. (2000, June). Linux Network Administrators Guide, 2nd Edition. Retrieved April 21, 2012, from http://oreilly.com/openbook/linag2/book/ch02.html Kozierok, C. M. (2005). TCP/IP Internet Standard Management Framework Architecture and Protocol Components. Retrieved April 19, 2012, from http://www.tcpipguide.com/free/t_TCPIPInternetStandardManagementFrameworkArchitectu.htm Nash, J. (2000). Networking Essentials, MCSE Study Guide. California: IDG Books Worldwide, Inc. Peeters, A. (2012). The Internet Model. Retrieved April 20, 2012, from http://www.citap.com/documents/tcp-ip/tcpip012.htm TechsChange. (2010). Computer Networks. Retrieved April 12, 2012, from http://tecschange.org/classic/networks/network-syllabus.html Turban, E., Leidner, D., McLean, E., & Wetherbe, J. (2005). Information Technology for Management: Transforming Organizations in the Digital Economy . New York: Wiley. USENIX. (1997). 2 Problems with TCP/IP. Retrieved April 20, 2012, from http://static.usenix.org/publications/library/proceedings/ana97/full_papers/rodrigues/rodrigues_html/node2.html White, D. (2012, February 13). What is IPv6? Retrieved April 20, 2012, from http://www.wisegeek.com/what-is-ipv6.htm Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Networks and how they work ----- See below Essay”, n.d.)
Retrieved from https://studentshare.org/information-technology/1594537-networks-and-how-they-work-see-below
(Networks and How They Work ----- See below Essay)
https://studentshare.org/information-technology/1594537-networks-and-how-they-work-see-below.
“Networks and How They Work ----- See below Essay”, n.d. https://studentshare.org/information-technology/1594537-networks-and-how-they-work-see-below.
  • Cited: 0 times

CHECK THESE SAMPLES OF Networks and How They Work

Network Security

There are to kinds of networks: synchronous network and data networks.... Organizations are forced to share networks with distrustful organizations and individuals.... The Telnet Protocol developed in the 1970s and this led to data networks being accessed by the public....
7 Pages (1750 words) Term Paper

How Do Designers in Their Work Benefit or Suffer from the Network Society

The paper "How Do Designers in Their work Benefit or Suffer from the Network Society" states that technology has to a great extent transformed people's lives in different social settings.... The essay below focuses on how designers in their work benefit or suffer from the network society.... A network society is a society whose social structure is composed of networks that are empowered by communication strategies and micro-electronic-based information....
6 Pages (1500 words) Essay

How Has the Network Society Changed How We Work and Interact

How has the network society changed the ways in which we work and interact?... Gradually, people began to view themselves as a ‘global village' national and geographic boundaries began to disappear, and work began to have no distinction of time, space or organizational hierarchy in the information society (Malamud 1997).... In fact, many businesses have increasingly adopted a virtual approach to work space.... Through network society, Information, Communication Technology (ICTS) have come up with numerous social, political and economic phenomena, a term that emerged from various theorists to explain a society that is connected by mass and telecommunication networks....
12 Pages (3000 words) Essay

How P2P Network Works

This paper ''how P2P Network Works'' discusses that P2P is keeping its identity as the platform for providing extraordinary services that helps to facilitate free speech and free transfer of information.... Here the fundamental architectural options such as degree of centralization and the structure of networks are discussed.... decentralization of p2p networks There is no devoted nodes are present that are critical for the operating systems in the decentralized P2P system....
5 Pages (1250 words) Literature review

The Network Society - How Has It Changed in Humans' Work And Interaction

This paper analyses what is a network society and how it has been transferred from the industrial age to the digital age.... It also helps to identify what affects the network society and how the present day network society has shaped the social structure of the world.... For this to work for the administration and public, all departments and sections of the society need to work in cooperation.... Communication networks are inseparable from network society (Yang & Bergrud, 2008)....
11 Pages (2750 words) Essay

Understanding of how networks work

The router How Networks work al Affiliation How Networks work Summary of What the Video Covers The video en d Warriors of The.... The visual illustration provided an effective manner to apprise viewers of how the networks work in the simplest; yet effective manner.... et, a film produced by Tomas Stephanson, presented a simplified visual framework of how the network works (jmatic, 2006).... et, a film produced by Tomas Stephanson, presented a simplified visual framework of how the network works (jmatic, 2006)....
1 Pages (250 words) Assignment

Impacts of the Non-State Actors and Transnational Organizational Crimes on the US National Security

Major criminal and terrorist attacks have taken place in the country leaving many questions on the national security.... The 9/11 terrorist.... ... ... tack remains to be the worst ever criminal event that faced the United States and indicated there could be weaknesses within the national security of the country....
7 Pages (1750 words) Assignment

How Do Designers in Their Work Benefit or Suffer from the Network Society

The paper "How Do Designers in Their work Benefit or Suffer from the Network Society" highlights that technology has to a great extent transformed people's lives in different social settings.... The essay below focuses on how designers in their work benefit or suffer from the network society.... network society is a society whose social structure is composed of networks that are empowered by communication strategies and micro-electronic-based information....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us