Nobody downloaded yet

Network and Protocol Processes - Essay Example

Comments (0) Cite this document
The main focus of this paper is to analyze network and protocol processes that occur in the network when you access x-stream from a remote location. The interaction between my laptop and the server at X-Stream takes client-server architecture through TCP/IP protocols suite…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.9% of users find it useful
Network and Protocol Processes
Read TextPreview

Extract of sample "Network and Protocol Processes"

Download file to see previous pages The DNS server is part of the network configuration of my host. The DNS server returns the IP address (Byrnes, 2000). Now my laptop has enough information needed i.e. IP address the HTTP webserver port 80; it can establish a TCP connection to the X-Stream webserver.The DNS server is part of the network configuration of my host. The DNS server returns the IP address (Byrnes, 2000). Now my laptop has enough information needed i.e. IP address the HTTP webserver port 80; it can establish a TCP connection to the X-Stream webserver.2. Requesting a TCP connection by X-Stream webserver to port 80 at IP address (Transport Layer)The data received from the HTTP request (From Application Layer) is divided into several packets. These data packets include:a) My laptop’s IP address which has been delivered by my DNS server and determined as Port number: the default port number of the HTTP request is 80 and can be 443 if I make secure connection or if the X-Stream network requires a secure connection at the time I am making a request. c) Acknowledgement number: This specifies the next sequence of figures that are expected by my laptop which sends the segment. TCP shows that this field is active by setting the acknowledgement number bit that is usually set after the establishment of the connection.d) Reserved bits: This are reserved for future use and are therefore sent to zeroe) Data offset: These are four bits that specify the number of the 32 bit word which defines the TCP header.f) Checksum (16 bits): Checksum is used for error control that covers the data fields and header. It also covers a pseudo-header; and includes destination and source addresses, the segment length and the protocol. This information is then forwarded together with the segment in order to IP to protect TCP from faulty routing of segments. The segment length’s value includes the TCP header and data (Comer, 1999).g) Control bits. My laptop (TCP Client) requests the Internet protocol to deliver an IP datagram with connection request to destination ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Network and Protocol Processes Essay Example | Topics and Well Written Essays - 2000 words - 3”, n.d.)
Network and Protocol Processes Essay Example | Topics and Well Written Essays - 2000 words - 3. Retrieved from
(Network and Protocol Processes Essay Example | Topics and Well Written Essays - 2000 Words - 3)
Network and Protocol Processes Essay Example | Topics and Well Written Essays - 2000 Words - 3.
“Network and Protocol Processes Essay Example | Topics and Well Written Essays - 2000 Words - 3”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Network and Protocol Processes

Network Protocol

...?Network Protocol Analysis By Institute Table of Contents List of figures Figure 1components Of SOA Architecture, Image Source: (Rotem-Gal-Oz,2012) 6 Abstract In the past few years, the field of information technology has experienced an amazing pace of advancement. In fact, these developments and advancements of information technology have caused a considerable transformation in the understanding, thoughts and ways of thinking of the people. It is an admitted fact that computer technology has affected many parts of our life by playing a vital role. In addition, business organizations are adopting modern and innovative tools and technologies in order to survive in this ever-increasing competitive world. In...
17 Pages(4250 words)Essay

Network Processes

...and four layers of TCP/IP protocol stack. The OSI is a hypothetical model and provide the fundamental understanding of the communication infrastructure for modern networks. On the other hand TCP/IP is a suite of protocols which operates over this hypothetical model. In simplest words, protocol is a set of agreed upon communication rules that govern the communication between two or more machines. The OSI model and TCP/IP protocol suite work in close coordination at various layers to ensure a secure and efficient data communication. In majority of implementations, a sound understanding of the layers, protocols, processes...
6 Pages(1500 words)Essay

Link Layer Protocol Services to the Network Layer

...?Homework Assignment al Affiliation Link layer protocol services to the network layer In the OSI model (layered architecture) the protocol in one layer provides services to the protocol in the next layer while receiving services from the protocol in the lower layer of the architecture. The data link layer (layer 2) majorly deals with the transformation of the logical communication channel provided by the physical layer (layer 1) into a more reliable mode of communication by splitting the data into frames allowing error and flow control. (Keith 2008) The services offered by the link layer to the network layer are usually hidden from the...
3 Pages(750 words)Assignment

Triage protocol

.... Request of X-rays by triage nurses through the protocol reduces the waiting time by about 18 minutes, which leads to satisfaction of both the patients and the hospital staff (Crinson, 1999). This process entails the involvement of triage nurses, who must possess the ability to make quick decisions. In addition, triage nurses must have a high level of listening and communication skills and extensive knowledge of warning signs and symptoms. It is important to note that these field nurses must have vast experience in emergency medicine to be able to become triage nurses (Ward, 1999). According to the Department of Health (1997), triage is critically important since it is the foremost assessment in patient...
4 Pages(1000 words)Dissertation

Network Security through the protocol

...Network Security Report Introduction: All the data which are sent in the network are transferred in the form of packets. For example, when you send a mail across the internet the mail transfers in the form of packets. These packets are transferred through the protocol. Internet uses the Transmission control protocol (TCP). All the packets can be referred with different types of names as frames, block, cell, and fragment. These names depend on what type of network. Most network packets are splitted into three parts, they are the header, payload and trailer. These parts carry different fields. Generally these packets can be easily sniffed...
6 Pages(1500 words)Essay

Simple Network Management Protocol

For instance, network operating on SNMP will be associated with three components i.e. managed devices, agents and network management system (NMS). A managed device can be any node configured with SNMP within the network. The primary task of these managed devices is to perform information management in order to publish the information on the NMS (Protocols guide: TCP/IP protocols: Application layer protocols: SNMP: Simple network management protocol. 2007). Example of managed devices includes routers, hubs, switches etc. Moreover, an agent is considered as an application that is installed in a managed device. In addition, an agent also translates information that will be compatible with SNMP. Furthermore, NMS publish information re...
2 Pages(500 words)Essay

Protocol RCT

...Topic: Protocal RCT. The introduction of the topic is clearly done and the purpose of the study is also well articulated. The objective of the study was to evaluate the efficacy and effectiveness of a second generation computerized visual speed of processing interventions using three modes of delivery (on site without booster training, onsite with booster training and at house use) versus an attention control ( onsite computerized cross word puzzles without booster training) in improving cognitive processing speed and health outcomes).The methods for the study are also well explained and this protocol meets the standards of a good RCT. For instance methods for recruitment such as...
1 Pages(250 words)Article

Network and protocol processes that occur in the network when you access X-Stream

...Computer Communication & Networks January 16 Network and Protocol Process that occur in the network when you access the X stream server. X-Stream Server Table OF Contents Introduction ………………………………………... Page 2-3 X-Stream Server ………………………………………… Page 3-8 Conclusion …………………………………………… Page 8 References ……………………………………………. Page 9 Introduction Internet has revolutionized the way we communicate, learn, collaborate and share. In order to enable technological advancements, including semantic web, web 2.0 and social networking, online learning, interactive and collaborative educational forums, websites, online shopping, a technological...
8 Pages(2000 words)Essay

Routing Protocol

...Due: Routing Protocol Introduction Routing protocol particularize how data packets between computers is forwarded through circulating information between different nodes on a telecommunications network. In the telecommunications network, different routers operate through recalling the earlier networks specified onto it. After recalling the previous network, the routing protocol then shares the information among the routers on the same path then to the routers across the entire network (Jaffar, 2007) Most of the widely used routing protocol includes the Enhanced interior Gateway...
2 Pages(500 words)Essay

Protocol Critique

...Protocol critique April 26, Protocol critique Response to research methodology by Tammi Edwards Even though the methodology section identifies some of the necessary contents through developed headings of subsections, contents of the methodology section identify many weaknesses. Definition of the research participants is comprehensive and can allow for independent identification of the research participants for implementing the study. The number of research participants and gender identity of the participants are particularly used to describe the research participants. A large portion of the section was however used for describing the proposed research design and this has two implications. Describing...
2 Pages(500 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Network and Protocol Processes for FREE!

Contact Us