Free

Network Protocols - Case Study Example

Comments (0) Cite this document
Summary
However, protocol can get used in various perspectives, among them in the diplomatic field. Diplomats use the set protocols to be able to interrelate with diplomats from foreign countries. In the computer…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful
Network Protocols
Read TextPreview

Extract of sample "Network Protocols"

Network Protocols Rules and procedures used in communicating are referred to as protocols. However, protocol can get used invarious perspectives, among them in the diplomatic field. Diplomats use the set protocols to be able to interrelate with diplomats from foreign countries. In the computer environment, rules of protocol apply in the same manner. Following the networking of computers, the technical procedures and rules that regulate their communication are referred to as protocols (Dong 45).
There are various types of protocols; in the lowest stage protocols are used to define the type of the electrical signal gets to represent one and the signal that represents zero. At the highest stage protocols enable users to communicate by sending emails to other computer users. Protocol suits are also another issue that a user needs to understand. Various protocols are used together in sets that match. The most common protocol suites in networking are Ethernet and TCP/IP. UNIX networks are commonly users of TCP/I. it is also commonly used in the local area networks as well as the internet (Dong 47).
Users also need to understand Ethernet as it is a low-stage protocol. It is used to spell out the characteristics of electrical network hardware as it is used by many local area networks. The third important protocol that users need to understand is IPX/SPX; it is an alternative to the TCP/IP. It was developed for the NetWare networks. The preferred protocol is TCP/IP irrespective of the fact that IPX/SPX gets used widely in the local area networks (Dong 49).
Works Cited
Dong, Jielin. Network Protocols Handbook. Saratoga, CA: Javvin Technologies, 2007. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Protocols Case Study Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1652778-network-protocols
(Network Protocols Case Study Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1652778-network-protocols.
“Network Protocols Case Study Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1652778-network-protocols.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Network Protocols

Routing Protocols for Ad-hoc Wireless Network

...?IEEE 802.11b standard is operational on a 2.4 GHz unlicensed frequency spectrum that offers a maximum data rate of 11 Mbps. Likewise, this standard divides the band further to 11 separate channels, as 11 channels are available in north America and 13 channels are in Europe. IEEE 802.11g standard is also operational on a 2.4 GHz unlicensed frequency spectrum that offers a maximum Mbps rate of data by using Orthogonal Division Multiplexing in the frequency band. Chapter 3: Routing Protocols for Ad-hoc Wireless Network 3.1. Routing Protocols As stated previously in this paper, an ad-hoc mobile network refers to a number of wireless mobile hosts linked together to form a...
20 Pages(5000 words)Dissertation

Security protocols

...work. Moreover, computers with different subnet are supported and thousands of computers can be connected on the domain based environment. For instance, if a computer stops responding, employees or users can log on from some other computer and no work is halted. Therefore, Domain based network environments are more effective and are compatible to the current network scenario. Moreover, if security auditing features are enabled, user activity and system logs are saved and monitored. Likewise, the lightweight directory access protocol ensures encryption all the way from the domain controller to the workstations via Kerberos. However, network or system security specialist...
12 Pages(3000 words)Case Study

Basic Network Technology, Structure, and Protocols

...globally. A dot-company could save a lot of investment e.g. building charges, travelling costs, communication and availability issues, etc. Having a high level technical knowledge of how information travels within a client server arrangement of a network, knowing the protocols and various network jargons e.g. topology, routers, switches, etc., a better understanding of the solution designs presented by developers can be achieved. Understanding the basic working of Internet would inspire possibilities of networking existing businesses locally or remotely, increasing the business productivity and support. Understanding about the flow of traffics, optimization strategies...
2 Pages(500 words)Research Paper

Basic Network Technology, Structure, and Protocols

...?BASIC NETWORK TECHNOLOGY, STRUCTURE, AND PROTOCOLS Basic Network Technology, Structure, and Protocols Affiliation Networking is the way of linking two or more computer systems, devices or even networks jointly with the intention of distributing and sharing useful information and data. Additionally, networks are created using a combination of computer software and hardware. In addition, there are diverse kinds of computer networks. One technique is to define the kind of network according to the massive area it covers. For instance, LANs (Local area networks) normally...
3 Pages(750 words)Research Paper

Basic Network Technology, Structure, and Protocols

...? Basic Network Technology, Structure, and Protocols Introduction The importance of computer technology in this age cannot be gainsaid. In essence, computers have been incorporated in almost every part of the society in such a way that living without them seems to be a mirage. However, while computers have been used for almost two decades, it is appalling that very few people have a complete knowledge as to the operation of computer networks. Many are times when people will make pretty dumb statements not because they would like to do that but rather because, they do not know much about computer networks. This is not excusable in the 21st century hence looking at the...
3 Pages(750 words)Essay

Network Organization, Addressing, and Routing Protocols

... of the of the 10 February Network Organization, Addressing, and Routing Protocols The best routing protocol for this scenario is Open shortest Path First OSPF routing protocol. This protocol defines a methodology for transporting information. Likewise, the interior gateway protocol that is utilized between routers represents a part of a single (AS) Autonomous System. OSPF also has a functionality of link state technology that exchange router information associated with routing information. Moreover, a database demonstrating the Autonomous system’s topology is maintained in each OSPF router ("Open Shortest Path First." 353-353). The database maintaining a routing table develops a shortest path tree. The routes are than calculated... with...
3 Pages(750 words)Research Paper

Study of protocols in a VoIP network

...A Report on Voice over Internet Protocol (VoIP) Introduction Voice over Internet Protocol (VoIP) refers to the transmission technology used in delivering voice communications over IP networks such as the Internet or other IP-based networks. Using IP for voice conversations is just one of the communication modes that migrated from their traditional forms to the Internet. The trend started in the early 1990s with the e-mail that has now displaced the regular mail or snail mail for written communications. Then came instant text messaging applications like Microsoft Messenger, Yahoo Messenger, ICQ, and AOL Instant Messenger. These applications later came out with voice...
16 Pages(4000 words)Essay

Network Management and Protocols

...Network Management and Protocols We also involve our users as much as we can. If the users can be somewhat independent in their own network management functions, the whole system is more effective. If the user can determine whether the LAN segment, the entire network, or the ISP is down, then the number of calls to the technicians can be decreased. The users are also very good at keeping track of consistent problems. They can help determine patterns that result in low response times or complete outages. The fundamental service for network management is SNMP, which stands for "simple network management protocol." It is a component of TCP/IP, which is itself the foundation of the Internet. SNMP is used to provide information about... the...
2 Pages(500 words)Essay

Basic Network Technology, Structure, and Protocols

...BASIC NETWORK TECHNOLOGY, STRUCTURE, AND PROTOCOLS Basic Network Technology, Structure, and Protocols Introductory and General ials RAD University Tutorials The RAD University tutorials available from the RAD University tutorials page is tutorials for Data Communications, telecommunications and computer networking. The tutorials available on the site page also include projects done by students and some by the dean. Anyone can submit a tutorial on any topic to be added to the online directory of tutorials provided by RAD University. The tutorials are meant for computer scientists and engineers of the future. The introductory and general tutorials are...
2 Pages(500 words)Essay

EDirectory Protocols

...Edirectory protocols By Edirectory has traditionally utilized service location protocol (SLP) and service advertising protocol (SAP) to advertise and search for network services. Such protocols are known as service discovery protocol and are a class of network applications that permit distributed components to use and find needed services available in the network. Domain name system (DNS) was added in the edirectory 8.7.1 as a discovery protocol. The domain name system is a type of edirectory discovery protocol that enables the user to locate and translate internet domain...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Network Protocols for FREE!

Contact Us