StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Fundamental Concepts of Advanced Networking - Case Study Example

Cite this document
Summary
The author of this particular paper "Fundamental Concepts of Advanced Networking" is focused to answer the major concepts of networks and related issues. Basic knowledge of protocols, models, and devices is necessary for handling the issues in a network…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.9% of users find it useful
Fundamental Concepts of Advanced Networking
Read Text Preview

Extract of sample "Fundamental Concepts of Advanced Networking"

Application Layer:  This layer defines how users access the network by using various applications like FTP, WWW, and SMTP.

Transport Layer: The transport layer lies upon the network layer and handles the information of data transmission. Logical communication is also possible at this layer between processes of the different hosts.

Network Layer:  This layer is responsible for packet delivery from source to destination.

Data Link Layer:  This layer is responsible for reliable synchronization and information transferring across the physical layer.

Physical Layer:  Physical layer defines network hardware like routers and switches.


Briefly describe each of the following TCP/ IP application layer protocols: SMTP, FTP, HTTP.

Simple Mail Transfer Protocol (SMTP):  This protocol is used for electronic mails and messaging over the TCP/IP.

File Transfer Protocol (FTP): Set of rules used for governing how files transfer occurs is defined in the FTP.  This protocol allows multiple connections for remote file systems simultaneously.

Hypertext Transfer Protocol (HTTP): Protocol is responsible for governing how files like sound, video, text, and graphics are exchanged over the World Wide Web. (Anfinson  and Quamme, 290)


Describe the differences among the following subnetwork components: hosts, end systems, intermediate systems.

Host: A host is a computer connected to the network and offers services, information, and applications to users.

End Systems: The end system is the network host or a workstation, which has limited routing capability. End nodes in a node are also known as end systems.

Intermediate Systems:  Network devices like routers, which have intensive capabilities of packet forwarding, are known as intermediate systems (Martey, 47).


Briefly describe the differences among the following types of intermediate systems: layer 2 switches, routers, gateways.

Switching occurs at layer 2 while routing at layer 3 network layers. Based upon the MAC addresses, switches forward the frames while routers forward the packets of logical addresses. A gateway is a program or a device that allows the networks to communicate with each other. It is also referred to as a marketing term and considered in a broader context. Gateways mostly operate at the transport layer and also at the application layer. But routers never operate at level 7 (Sosinsky, 231).


What is a VPN?

A Virtual Private Network is a private data network that connects with security and tunneling protocols over public networks.


What is IPsec?

A set of protocols that is responsible for securing the packet processing at the network layer in network communication is known as an Internet security protocol. IPsec is integrated into IPv6 as well as in IPv4 older version.

Identify several applications and advantages of IPsec.

Some key benefits of IPsec are as follows:

  • IPsec ensures secure data transfer between two sites at the endpoints.
  • IPsec is deployed transparent of servers and clients and workstations do not need to be configured for working with IPsec.
  • IPsec deployment is simplified by offloading the routers.
  • Applications of IPsec at key points of networks maintain consistent security and policies in the organizations.
  • IPsec is flexible and specific or selective protection can be enabled.


Briefly describe the differences between TCP and UDP.

  • TCP is a connection-oriented service and the destination confirms that data has been received. If a few packets are lost then destination requests for retransmission of lost data.
  • UDP is a connectionless-oriented service and does not guarantee the secure delivery of data. Source sends data to destination without worrying about whether it is received or not.


Briefly explain the differences between IPv4 and IPv6.

  • IPV4 address uses 32 bits while IPv6 address uses 128 bits
  • There are a lot of usable addresses in IPv6 as compared to IPv4.
  • Addresses in IPv6 are represented in hexadecimal and dot-decimal notation in IPv4.


Identify and briefly describe the major functions performed by routers.

Routers carry out two major functions as follows

  • Selection of path between the networks
  • Transmission of information packets across the selected paths and secure delivery at destination

Routers can be either software or hardware-based and differ from layer 3 switches. Routers support a number of protocols (Aber).

 

Conclusion:

In this paper, fundamental concepts of advanced networking have been described. The difference between UDP and TCP has been explained. Application layer protocols FTP, HTTP, and SMTP are discussed with the related features. Differences between IPv4 and IPv6 also showed the advantages of the new IPv6 over the older version of IPv4. Major functions of the router as path selection and data forwarding are also identified.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Memo Case Study Example | Topics and Well Written Essays - 500 words - 3”, n.d.)
Memo Case Study Example | Topics and Well Written Essays - 500 words - 3. Retrieved from https://studentshare.org/information-technology/1640405-memo
(Memo Case Study Example | Topics and Well Written Essays - 500 Words - 3)
Memo Case Study Example | Topics and Well Written Essays - 500 Words - 3. https://studentshare.org/information-technology/1640405-memo.
“Memo Case Study Example | Topics and Well Written Essays - 500 Words - 3”, n.d. https://studentshare.org/information-technology/1640405-memo.
  • Cited: 0 times

CHECK THESE SAMPLES OF Fundamental Concepts of Advanced Networking

Patient Advocacy Concept

PATIENT ADVOCACY CONCEPT Name University Instructor Course Date Patient advocacy concept Introduction The term advocacy appears more often in nursing, but its primary meaning is unclear to many people.... Advocacy emanates from the legal word advocate, which denotes an individual who helps, defends, take legal action and pleads for another person (Schramm, 2000)....
11 Pages (2750 words) Research Paper

Discourse Analysis of the Usage of Public Relations in Social Media: A Case of Proctor and Gamble

Background – Key concepts and theories 8 ... Justification Various studies in the field as well as publications by journalists have emphasized the fundamental role that social media has played in the field of public relations (Hunt, 2010).... Table of Contents ...
23 Pages (5750 words) Research Paper

Journal 1 Information Structures

More Than Social networking.... om/blogs/bfc/more-than-social-networking.... • Main Argument Government agencies can tap social networking tools to deliver social services to more people compared to traditional methods.... The government can harness social networking as a powerful tool in a variety of ways such as improving service delivery, data gathering, determining public opinion, and engaging citizens to participate in meaningful discussions and share best practices....
2 Pages (500 words) Essay

Is Social Networking a Problem Rather Than a Unique Benefit Offered to Online Users

The researcher will present his view on the social networking situation in the world.... The idea of this research emerged from the author's interest and fascination in whether social networking a problem rather than a unique benefit offered to online users.... On the other hand, millions of people suffer the damages caused by weak privacy protection in social networking.... To a large extent, social networking is more a benefit rather than a problem....
3 Pages (750 words) Essay

Telecommunications and Networking

The paper examines the concepts of telecommunication and networking and cloud computing.... Other features include advanced algorithms, service-oriented architecture availability, massive broadband availability.... The paper also aims to describe the challenges faced by present-day cloud computing concepts and services....
9 Pages (2250 words) Assignment

Secure Wireless Networking

The paper "Secure Wireless networking" names standard 802.... The Client/Server networking technology extends the existing wired LAN to the wireless devices by connecting them with the access point.... In this process, the access point of the network plays an essential role in building a connection between wired and WLAN and controls the overall functions of the networking system.... 1Although the process of WLAN includes numbers of fundamental principles like the conventional LAN (Local Area Network) interconnectivity, WLAN has further witnessed to involve more attention in order to make a successful deployment....
7 Pages (1750 words) Term Paper

How ICT Technology Supports Individuals, Business and Legal Data

Thirdly, through the citation of the concepts of Cloud Computing and Big Data, the identification of the nature of business systems and legal data which are supported by computers, and the development of networking and communication.... he document also makes the fundamental point that ICT is so much more than computers, the internet, and telephony....
6 Pages (1500 words) Case Study

Analysis of Social Media

Twitter and Facebook, for example, are among the most popular social networking sites with more than three billion users.... The other famous social networking site in China and the East, which also have more than a billion users, is Alibaba.... The New Horizons Agency should, therefore, embrace the use of social media in marketing since the networking sites have effective infrastructures for marketing enhanced with yet practical tools that permit the application of the practice-evidence-translation-application-validation thus enabling the marketers to monitor the activities on their sites as the discussion below portrays....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us