Free

Network Protocol - Essay Example

Comments (0) Cite this document
Summary
The paper "Network Protocol" discusses that the data link layer of the OSI model has been assessed to the widely used in networks. The layer is reserved for routers for their highly specific communication. The hardware resources that are used in a network represent the physical layer…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.8% of users find it useful
Network Protocol
Read TextPreview

Extract of sample "Network Protocol"

Network protocols are the relevant rules, processes and data structures that clients in a network use to communicate with one another. The protocol acts like the languages that computers use in communication. Network protocols determine the format that determines an application for data transfer to ensure uniformity and conformity (Bush et al, 2012). The protocol helps define the transfer of information and therefore prevent the lack of a breach of treatment of information,
OSI model
In this model, the configuration used serves to describe the applications hasted on networks and the protocols. The model is split into seven parts. In the same token, the presentation layer deals with the production of services that rely on application program such as MSWindows.
According to the OSI model, the session layer has been set aside for the tabling of the running of services (Tanenbaum, 2003). This runs the process and leads to the scheduling of tasks that are to be run using the applications.
In the transport layer, responsibility vested is for the data being broken to packets for purpose of transfer between hosts on a regular basis to ensure the quality of service, on a network(Bush et al, 2012). Normally, network layers interpret the physical name of the computer from the logical network addresses.
Protocol orientation
Connection-oriented protocols are more reliable than the non-connection oriented ones. This is because they perform a check on their own structures. These protocols resend a message in case the receiver does not receive one (Forouzan, 2003). In this case, they tend to be more networks oriented. The non-connection oriented protocols are not session-based and can thus end at any time. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Network Protocol Essay Example | Topics and Well Written Essays - 250 words, n.d.)
Network Protocol Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1602004-network-infrastructure-basics
(Network Protocol Essay Example | Topics and Well Written Essays - 250 Words)
Network Protocol Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1602004-network-infrastructure-basics.
“Network Protocol Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1602004-network-infrastructure-basics.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Network Protocol

Network Protocol

...?Network Protocol Analysis By Institute Table of Contents List of figures Figure 1components Of SOA Architecture, Image Source: (Rotem-Gal-Oz,2012) 6 Abstract In the past few years, the field of information technology has experienced an amazing pace of advancement. In fact, these developments and advancements of information technology have caused a considerable transformation in the understanding, thoughts and ways of thinking of the people. It is an admitted fact that computer technology has affected many parts of our life by playing a vital role. In addition, business organizations are adopting modern and innovative tools and technologies in order to survive in this ever-increasing competitive world. In...
17 Pages(4250 words)Essay

Link Layer Protocol Services to the Network Layer

...?Homework Assignment al Affiliation Link layer protocol services to the network layer In the OSI model (layered architecture) the protocol in one layer provides services to the protocol in the next layer while receiving services from the protocol in the lower layer of the architecture. The data link layer (layer 2) majorly deals with the transformation of the logical communication channel provided by the physical layer (layer 1) into a more reliable mode of communication by splitting the data into frames allowing error and flow control. (Keith 2008) The services offered by the link layer to the network layer are usually hidden from the...
3 Pages(750 words)Assignment

Triage protocol

...? Describe the change you hope to implement The triage protocol is the change that needs to be implemented in the hospitals, so that the effectiveness of their operations can be facilitated (Crinson, 1999). The triage protocol will be responsible for the identification of specific or a range of treatments and any related conditions required for the effective functioning of the protocol and shortening the waiting time in A&E departments (Cutts, 1999). It is worth mentioning that the new protocol is developed with such sophistication that is demanding for fresher courses of the nurses and emergency officers who will be responsible for using it. The competency of the responsible officers will be validated through both the assessment... and the...
4 Pages(1000 words)Dissertation

QoS and network monitoring on Linksys consumer devices (Wireless Protocol 802.11e)

...?QoS Voice over Internet Protocol (VoIP) has become a realistic substitute for public switched telephone network telephony services. To enhance mobile communication over a network, there has been development of infrastructure to include Video and Voice packet transfer over a wireless network. VoIP protocol, just like other data transmission protocol, is characterized by extreme bandwidth and delay sensitivity. This has been strengthened by the introduction of IEEE 802.11e quality of service enabled infrastructure on wireless LAN. Quality of service implementation is one among the mechanism of ensuring high quality voice and video...
6 Pages(1500 words)Research Paper

Network Security through the protocol

...Network Security Report Introduction: All the data which are sent in the network are transferred in the form of packets. For example, when you send a mail across the internet the mail transfers in the form of packets. These packets are transferred through the protocol. Internet uses the Transmission control protocol (TCP). All the packets can be referred with different types of names as frames, block, cell, and fragment. These names depend on what type of network. Most network packets are splitted into three parts, they are the header, payload and trailer. These parts carry different fields. Generally these packets can be easily sniffed...
6 Pages(1500 words)Essay

Simple Network Management Protocol

...Simple Network Management Protocol SNMP monitors and manage activities of network devices or components on the network. Activities include alert generation and node management associated with routers, bridges, repeaters, switches, hubs and workstations. However, SNMP can be configured effectively only on an IP based network. Likewise, primary task of a typical network team is to ensure reliable network services, network expansion considerations and addressing network issues. SNMP reporting and alert generation features may benefit network engineers and...
2 Pages(500 words)Essay

Network and protocol processes that occur in the network when you access X-Stream

...Computer Communication & Networks January 16 Network and Protocol Process that occur in the network when you access the X stream server. X-Stream Server Table OF Contents Introduction ………………………………………... Page 2-3 X-Stream Server ………………………………………… Page 3-8 Conclusion …………………………………………… Page 8 References ……………………………………………. Page 9 Introduction Internet has revolutionized the way we communicate, learn, collaborate and share. In order to enable technological advancements, including semantic web, web 2.0 and social networking, online learning, interactive and collaborative educational forums, websites, online shopping, a technological layer serves as a...
8 Pages(2000 words)Essay

Network and Protocol Processes

... Network and Protocol Processes that occur in the Network When you Access X-Stream from a Remote Location The interaction between my laptop and the server at X-Stream takes client server architecture through TCP/IP protocols suite. The diagram below illustrates the interaction which is intensively explained thereafter. 1. Making an HTTP Request to the webserver at X-Stream (The Application Layer) To make an HTTP request to X-Stream, I open the browser in my laptop which is connected to the internet through wireless network from an internet service provider. This is done by typing the address: http://x-stream.leedsmet.ac.uk....
5 Pages(1250 words)Essay

In networking protocol,open shortest path first(OSPF)protocol is better than routing information protocol(RIP)because,it converges the network faults,uses the shortest path first(SPF) algorithm and error detection

...Open Shortest Path First (OSPF) compared to Routing Internet Protocol (RIP) due: Open Shortest Path First (OSPF) and Routing Information Protocol (RIP) In computer networking, there are various techniques used. This includes but not limited to, open shortest path first (OSPF) as well as routing internet protocol (RIP). The protocols makeup an all rounded, complete, wireless network. The two protocols form the main algorithms for routing. Each of the protocols has its own benefits and drawbacks. Routing is the process of selecting a path through which to send data in network traffic. Routing can be applied in various ways such as internet protocols, for sending packet data or even in telephones. The OSPF and the RIP are some... of the...
5 Pages(1250 words)Research Paper

Fundamentals of Simple Network Management Protocol

...1 Since the birth of the Internet, Ethernet and the Internet protocol has been replacing older technology with the new one. Since the childhood of computer networking, network designers envisage a world where every living and non living thing is interconnect to the same network. A protocol capable of managing any network device is developed in 1988 named as Simple Network Management Protocol (SNMP). SNMP embraces three dissimilar versions SNMPv1, SNMPv2, and SNMPv3. Due to the dispersion of the usage of SNMP globally, many device vendors provide support for this protocol, and many SNMP management solutions are available off-the-shelf for commonly used operating systems and programming language. Simple Network Management Protocol... is the...
9 Pages(2250 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Network Protocol for FREE!

Contact Us