Free

Computer Networks - Essay Example

Comments (0) Cite this document
Summary
This essay "Computer Networks" concerns the computer applications that require connection-oriented service and include the remote login, file transfer and video on demand. It is stated that some of the examples of where the connectionless service is best to include the electronic transfer of money…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
Computer Networks
Read TextPreview

Extract of sample "Computer Networks"

Computer networks
Q1. Some of the computer applications that require connection oriented service include the remote login, file transfer and video on demand (Tanenbaum, Andrew, 13). Some of the examples of where the connectionless service is best include the electronic transfer of money, the verification of credit cards and most of remote database access.
Q2. The main reason for inventing the new abstract ID is because the process IDs is usually OS specific. This would make the protocols to become independent. The second reason for using the new abstract IDs is that one channel is capable of establishing multiple channels of communication. It is impossible to distinguish these channels when using the single process IDs (Tanenbaum, Andrew, 33)
.
Q3.

Q4. This size of network design is because the network is suitable for medium organization. This make the size economical as a single router is capable of supporting several hosts (Tanenbaum, Andrew, 93). Communication in this size of a network is faster as the failure of one device does not affect the system. The system also makes it possible to use other connected devices such as printers.
Q5. The TPC is the personification of a transmission channel that is very reliable. It is used in end to end transmission purpose in the general internet architect. All the functionality of a network are required to take a simple of IP datagram release and major upon this control mode which helps in implementing flow control, reliability , sequencing , reliability and the manner in which data streaming is rooted with TCP(Tanenbaum, Andrew,103).
The TCP provides a channel of communication between different processes on every host system. The channel is usually very reliable and streaming. In order to achieve this functionality, the drivers in the TPC breaks up the running session DataStream into small segments and then attach them to the TCP header (Tanenbaum, Andrew, 112).
Work cited
Tanenbaum, Andrew S. Computer Networks. Boston: Pearson Education, 2011. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Networks Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Computer Networks Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1665889-computer-networks
(Computer Networks Essay Example | Topics and Well Written Essays - 250 Words)
Computer Networks Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1665889-computer-networks.
“Computer Networks Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1665889-computer-networks.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Computer Networks

Computer networks

...?Local Area Network Information and communication technology ICT has facilitated us with endless communication interfaces and opportunities. Likewise, a skeleton for transfer and exchanging blood within different parts of the body is considered veins. Similarly, for exchanging and communicating data within different computers and applications, computer network is an essential component. There are various types of computer networks such as Local Area Network, Wide Area Network and Metropolitan Area Network. These networks operates on different topologies, however, star...
14 Pages(3500 words)Essay

Computer networks

...Interconnection (OSI) model. Likewise, network layer incorporates addressing information and control information that enables data packets to be routed within the computer network ("Internet Protocol Version 6." 255-255). Moreover, IP version 6 is also considered or called as the next generation IP, as specified by the IEFT: RFC 2460 ("Internet Protocol Version 6." 255-255). However, the primary reason for upgrading the IP version 4 to IP version 6 is address space limitations. Moreover, other issues such as performance, security and auto configuration are considered secondary (Loshin 305). Likewise, address space limitations are linked with the IP address space crisis that is debatable...
14 Pages(3500 words)Essay

Computers and Computer Networks

..., proving specific names to the folders may help things to become easier. For creating a nested folder in ‘My Documents’, Charlie will navigate via these folders: Double click My Computer ? Double click C: ?Double Click ‘Document and Settings’ ?Double Click ? ‘Charlie’? Double Click ‘My Documents’ Sharing Files Securely Charlie needs to configure the same workgroup name for both the workstations. The difference between the computer names will not affect the sharing procedure. Two services are mandatory to transfer files i.e. ‘File and Print Sharing for Microsoft Networks’ and ‘Client for Microsoft networks’. Both the users must log in, for creating a sharing session....
8 Pages(2000 words)Essay

Computer Networks

...Computer Networks Introduction In order to have a network of computers working and serving the required purpose of data storage and retrieval, several computers need to be connected to each other in a specific format so as to have a network of computer. Specifically designed norms have be laid down in the form of layered architecture with the description of the devices used for connectivity at each and every layer in order for the system to work efficiently and without any difficulty. 1. CASE STUDY Local area networks are very essential to let the work going for any kind of organization, then may it be a...
9 Pages(2250 words)Essay

Security in Computer Networks

...Security in Computer Networks Millions of computer users across the globe today are exposed to the Internet that has raised safety concerns with respect to personal data and information. The use of computers for online banking and monetary transactions as well as communicating with friends and associates online has left the users vulnerable to hackers and spywares. Apart from the Internet that is the largest public data network there are private networks such as Wide Area Networks (WANs) of companies connecting their offices located remotely as well as billions of Local Area Networks (LANs) within the...
6 Pages(1500 words)Research Paper

Introduction to Computer Networks TCPIP

...technology. Although the protocol was defined before the commercial usage of LAN technologies, the original design has continued to work well through several generations of hardware technologies. IP is now used over networks that operate several orders of magnitude faster than the networks that were in use when IP was designed. The Motivation for Change In TCP/IP If IP works so well, why a need is felt to change The primary motivation for change arises from the limited address space. When IP was defined, only a few compute networks existed. The designers decided to use 32 bits for an IP address because doing so allowed the Internet to include over a million...
6 Pages(1500 words)Essay

Computer Networks and Operating systems

...RFC 2030 Network Time Protocol (NTP Network Time Protocol is used to synchronize computer clocks in World Wide Web scenario. It has been describedby Network Working Group in their Request for Comments: 1305 specifications. NTP standardize the process of time synchronization between national time and frequency dissemination services helps in time synchronization of subnet of a network. It helps in adjusting the local clock in each participating subnet peer in a local network. It promises the accuracies of 1-50 ms, depending on the characteristics of the synchronization source and network paths. RFC-1305 specifies the NTP...
10 Pages(2500 words)Essay

Three Main Approaches to improve TCP/IP in Wireless Networks, Computer Networks

...) of the United States Department of Defense (DOD) was first intended to study and demonstrate computer resource sharing (Stallings 281). By 1975, it was no longer an experimental network and has been transformed to Defense Data Network, which met the DOD’s need demand for “secure command and control communications network and for ordinary unclassified communications” (Stallings 281). The outgrowth of ARPANET is what we know to be TCP/IP today. It is the communications protocol that unlike the Open Systems Interconnection (OSI) reference model recognizes the need for hierarchy. Its launch was a success because it delivered basic services that everyone needs like file...
18 Pages(4500 words)Research Paper

Computer networks

...that was received. This is the same situation that happens in a basic acknowledgement. In this mode, the acknowledgement specifies the SACK blocks and they are then conveyed through starting and ending sequence numbers. Question 2 In trying to locate a certain server on the internet, a computer communicates to a series of DNS servers around the internet. The process involves the domain resolver determining the most appropriate domain name through queries that start with the top level label of the domain. The process entails some steps as follows; - On sending the message after the composition, the email client connects to the domains SMTP server The senders email communicates SMTP with email address of the...
4 Pages(1000 words)Essay

Hardening Computer Networks

...HARDENING COMPUTER NETWORKS Hardening Computer Networks Affiliation Introduction At the present, the majority of organizations carry out their business activities using computers and when the number of computers increases they need to form a computer network. A computer network allows a number of employees to access and process data simultaneously. In view of the fact that a computer network is an essential part of almost every organization that processes data on a regular basis hence it becomes essential for them to secure their...
5 Pages(1250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Computer Networks for FREE!

Contact Us