StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Internetworking Data Communication between Various Systems - Coursework Example

Cite this document
Summary
"Internetworking Data Communication between Various Systems" paper describes the major purpose of Internetworking that is sharing data and resources. Three types of networking exist. They are Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN). …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Internetworking Data Communication between Various Systems
Read Text Preview

Extract of sample "Internetworking Data Communication between Various Systems"

Introduction: Internetworking means connecting more that one computer by using routing technology. In a network, routing technology used in all computers is same. Major purpose of Internetworking is sharing data and resources. Three types of networking exist. They are Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN). Internetworking is a collection of LAN, MAN and WAN. In internetworking data communication between various systems is done based on certain protocols. Transport Control Protocol/ Internet Protocol (TCP/IP): TCP/IP is a reference model for the computer networks. It is also a protocol suite which includes several protocols for the communication between computers. It was introduced in one of the oldest wide area network - ARPANET. It is a widely used architecture because most of the computers and networks are configured to follow this suite and it is open to all. The TCP/IP reference model is a 4 layered model. The layers from top to bottom are Application Layer, Transport Layer, Internet Layer and Host-to-Network Layer. A data in a computer is going to the network from the Application Layer to the Host-to-Network Layer through the intermediate layers. Data from the network is getting to an application in the reverse order. Application Layer consists of certain higher level protocols like TELNET (for remote login/ to get a virtual remote terminal), FTP (File Transfer Protocol), SMTP (Simple Main Transfer Protocol), HTTP (Hyper Text Transfer Protocol), DNS (Domain Name System) protocols etc. The protocols in this layer will produce messages smaller in size to become compatible with the Transport Layer for an outward data flow and join the data messages to the original data for the application in case of inward message. Transport Layer consist the protocols like TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). The reliability and the error checking of the data are managed here. This layer is responsible for the communication between two computers. Internet Layer is responsible for the data communication between two networks in an internetworking. The data from the Transport Layer is broken into smaller IP packets. The main protocol used in this layer is IP (Internet Protocol). The two versions of IP are IPv4 and IPv6.The lowest layer is the Host-to-Network Layer and this layer has the direct contact with the networking hardware. The data in this layer will be in the form of frames or byte series. Few protocols like PPP (Point to Point Protocol) are available in this layer. One of the most useful services of TCP/IP is the naming service it provides. Information sharing and exchange on an Internet work become easy and comfortable through this. The most widely used naming services are NIS (Network Information Service) and DNS (Domain Name System). NIS is used to provide information that has to be known throughout the network, to all machines on the network. There will be NIS server to keep all the information for the NIS. In case of a UNIX system, the configuration files handled by NIS are /etc/group, /etc/hosts, /etc/netmasks, /etc/passwd, /etc/protocols, /etc/rpc, and /etc/services. For setting up NIS, we have to set up both the NIS Server and NIS Clients. DNS is used for naming a host uniquely on a network, especially on the Internet. In this IP addresses of the computers or other interfaces are mapped to certain names with a typical naming strategy. Each group of similar computers is included in same domain and the domains are created in a hierarchical manner e.g. for the top level domains are .com, .net, .org etc. The details of the naming are stored in the DNS Server as resource records. There are two types of mapping files. The forward mapping file is used to convert names to its IP addresses and reverse mapping record is used to convert IP addresses to its symbolic names. Format of a resource record entry is as follows. Name (variable length) type(16bits) class(16bits) ttl(32bits) data For DNS configuration in a UNIX system, we have to configure the files resolv.conf, named.conf, forward mapping file and reverse mapping file. UNIX Networking: UNIX is one of the important operating system in which lot of development is done. Because there are different versions of UNIX, there are different ways of programs to use networks from UNIX. Some common UNIX networking are given here. The internet:-It means a worldwide network of computers. By using it user can transfer files and login to the computers. Mail:-A UNIX program that has been around for years. So it is the same thing which is used in other operating system. File Transfer Protocol (FTP):-The FTP program is one way to transfer files between your computer and another computer with TCP/IP. UUCP:-UNIX-to-UNIX Copy is a family of programs for transferring files and email between computers. It is usually used with modems over telephone lines. Usenet:-Usenet is not exactly a network. It is a collection of thousands of computers worldwide that exchange files. Telnet:-This utility logs you into a remote computer over a network using TCP/IP. The telnet program is available on many operating systems; telnet can log you into other operating systems from your UNIX host and vice versa. (Unix Networking and Communications). Ethernet: Ethernet is a communication protocol in internetworking. It is used for the Local Area Networking. Ethernet cable is used for connecting different computers in the network to the central switch. This central switch is known as hub. Hub is used for the transmission of data packets between the computers in the LAN. Ethernet helps the sharing of various resources like printer and data in the network. Ethernet network may either be wired or wireless. In wireless Ethernet radio waves are used for communication. (What is Ethernet). Local Area Network (LAN) is used for connecting computers in a small geographical area. Examples are school, hospital, college, etc. Through LAN connection one can share resources like printer, plotter etc. It is very fast compared to MAN and WAN. In LAN all "Ethernet extenders can use fiber-optic or copper twisted-pair cables to transparently send packets at full-line rate to a peered LAN up to five miles away." (Have Questions: Why Use the Ethernet Extenders). Ethernet card is a network adapter. It operates in network with different speed. Ethernet card is used for setting high speed in the Ethernet. There are three types of Ethernet technologies. 1) Traditional Ethernet: - Its standard speed is 10Mbps (Mega bytes per second).Traditional Ethernet uses three type standards for connectivity.10Base-5, 10Base-2 and 10Base-T. 10Base-T is the commonly used Ethernet. In 10Base-T UTP (Unshielded Twisted Pair) cable is used for connecting the computers in the LAN. It is very cost effective cabling technique compared to the other two methods. It needs less segment length compared to others. So it is very popular in today's world. In traditional Ethernet segment length is very low. Through this Ethernet transmission is broken due to noise or degradation. Major disadvantage of traditional Internet is low performance and re-cabling. 2) Fast Ethernet: - Fast Ethernet overcomes the disadvantages of traditional Ethernet. Its standard speed is 100Mbps. It is in two types, 10Base-T and 10Base-FX. 10Base-T uses Unshielded Twisted Pair (UTP) cable for making connection.10Base-FX uses fiber optic cable for connection. 3) Gigabit Ethernet: - Its standard speed is 1000Mbps (1Gbps).1000Base-T standard support Gigabit Ethernet. (Mitchell). IEEE 802.3 is Ethernet protocol. According to IEEE 802.3 half duplex and full duplex are the two modes of operations done in Ethernet. In half duplex CSMA/CD (Carrier - Sense Multiple Access / Collision Detection) protocol is used for the data transmission. Major drawback of half duplex is less efficiency and limited coverage area. To overcome this limitation Gigabit Ethernet uses carrier extension technique. According to 802.3 operation speed on different Ethernet technologies are, in Traditional Ethernet it is 10 Mbps, in Fast Ethernet 100Mbps, and in Gigabit Ethernet 1Gbps. 7 1 6 6 2 46-1500bytes 4 Pre SFD DA SA Length Type Data unit + pad FCS (Ethernet: IEEE 802.3 Local Area Network (LAN) Protocols). This diagram illustrates the protocol structure of IEEE802.3 in Local Area Network. Here MAC (Media Access Control) data frame is used. MAC is developed based on CSMA/CD. MOD-TAP is an adapter. It is used to connect analogue telephone / modems to UTP networks. It helps to see to working phone system through the Ethernet cabling. Major features of Ethernet are:- a) Commonly it can send data 10 to 100 Mbps. b) It is a broadcast bus. Broadcasting means sending data from the source to all computers in the network. c) Best-effort delivery d) Distributed access control Interest Groups, Periodicals, and Conferences: Here it describes about electronic mail interest groups, networking periodicals, networking conferences, and other miscellaneous items in network. Electronic Mail is an important communication media in Internetworking where lot of people are communicating very efficiently. In the Email Interest groups we are mainly using mailing list. A list of people who subscribe to a periodic mailing distribution on a particular topic is called mailing list. It has become popular for internet users to keep up the topics they are interested. Mailing list means a collection of names and addresses used by an individual or an organization to send material to multiple recipients. The mail is sent to all the members who are included in the list. The moderator has full authority to filter the incoming mail and mail sent to the members. Usenet is another method which we are using. The Usenet System is a method of distributing electronic mail organized as a set of articles as a newsgroup. There are large number of Usenet groups related to TCP/IP, UNIX Usenet groups, Ethernet questions and information. Periodicals: We are using various Periodicals related to networking. It involves different Periodicals related to network which are published weekly, quarterly, monthly and yearly. Nowadays we are issuing electronic journal, which is easy to communicate and can be bought through credit card or through internet banking. Conference: Conference involves group of people who are interconnected through networks and they transmit the information at the same time. For conference we make use of PC networks and Mainframe networks. PC-Network is a network of computers which are connected together. There are different reasons for connecting together, such as sharing mails in different computers, sharing resources like printer to different computers and for administrative purpose like which resource is attached to which computer. Here we are using different network such as LAN, WAN and Internet. LAN means Local Area Network in which systems are connected through cables. It is mainly used in home, office, school, airport etc. WAN means Wide Area Network, which connects different cities. The connection is done by using special high speed lines leased from the phone company or through ordinary phone line using a device called modem. Another way to connect is through internet in which individual computers are connected through internet service provider (ISP). The original PC-Network hardware was available in two varieties, baseband and broadband. The baseband version connected computers using twisted-pair cables and it is less expensive. The broadband version is more expensive and less widely used. It has very good capacity to store data and handles wide range of frequencies. Mainframe technology involves large servers for handling high volume of transactions and input/output operations in parallel. In the case of Mainframe Technology, when the organization becomes larger, there may be the chances of higher cost due to failure. So, a fully functional backup site is made in this technology. So, mainly in conference, the different agencies are conducting the conference by TCP/IP experts and giving technical sessions relating to TCP/IP, UNIX networking and Ethernet issues. So, if any person wants to attend conference he can register in the community like INTEROP or USENIX and he can attend the conference. Access to the Internet: Nowadays accessing the internet is necessary to acquire knowledge. Organizations like schools, colleges and companies are connected to the internet for acquiring their required information. For getting internet connection one must meet the internet service provider. They will get service provider information through Internet user's guide and catalog. Conclusion: Internetworking is a very vast area. It is a technique used to connect the client to the server. Some key points related to this area are TCP/IP, Ethernet etc. Transport Control Protocol (TCP) is a protocol which confirms that the routing of the data from sender to receiver is done correctly and no damage happens to the messages. Data sent from one computer to another is in the form of packets. The process of transferring the data in the form of packets is called packet switching. Routing is the movement of packets from the source to the destination. Here data is sent in the form of datagram. Datagram is a packet sent through the network. For protecting the Internet work from frauds firewall is used. Works Cited Ethernet: IEEE 802.3 Local Area Network (LAN) Protocols. Javvin: Network Management and Security. 11 Mar. 2009. . Have Questions: Why Use the Ethernet Extenders. Patton Electronics. 2006. 11 Mar. 2009. . Kayne, R. What is Ethernet. Wise Geek. 2009. 11 Mar. 2009. . Mitchell, Bradley. Ethernet Tutorial. About.com: Wireless networking. 2009. 11 Mar. 2009. . Unix Networking and Communications. Unix Power Tools. 11 Mar. 2009. . Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Internetworking Data Communication between Various Systems Coursework, n.d.)
Internetworking Data Communication between Various Systems Coursework. https://studentshare.org/information-technology/1500536-internetworking
(Internetworking Data Communication Between Various Systems Coursework)
Internetworking Data Communication Between Various Systems Coursework. https://studentshare.org/information-technology/1500536-internetworking.
“Internetworking Data Communication Between Various Systems Coursework”. https://studentshare.org/information-technology/1500536-internetworking.
  • Cited: 0 times

CHECK THESE SAMPLES OF Internetworking Data Communication between Various Systems

Business Proposal for the Requirements of the TEEVO Corporation

The paper "Business Proposal for the Requirements of the TEEVO Corporation" suggests a network set up to be created that would orchestrate the various departments and structures in the corporate settings.... The various departments it has are the departments of Management, Accounting, HR, Development and Executive Management.... Of course, there are various ways to determine that how the company can perform better and how the internetworking should be implemented....
12 Pages (3000 words) Case Study

Implementing Wi-Fi Technology in an Industrial Environment

The state-of-the-art communication network where voice, data and video can be shared among various functionaries of the organization, either they are working in an office or while they are on the move can provide a significant competitive advantage to the organization.... The paper "Implementing Wi-Fi Technology in an Industrial Environment" describes that the proposed solution for the provision of WiFi connection services will enhance corporate productivity and will ensure its rapid growth through better communication and improved operations management....
7 Pages (1750 words) Essay

Transmission Control Protocol and Internet Protocol

New standards were needed in order to ensure that an open systems environment would succeed.... A Transfer Control Protocol/Internet Protocol (TCP/IP) provided a universal set of instructions that allowed various computer systems to connect.... In this scenario, some of the well-known applications and services that were supported by these protocols included remote login, file transfer, and electronic mail (email) to a large number of users as well as server systems....
4 Pages (1000 words) Essay

The Price of Products and the Volume of Commodities

The firms ensure close coordination between the senior management and the technology group.... The paper describes organizations in different quadrants.... They have a different emphasis on the use of IT.... Strategic firms find it important to use information technology in executing current strategies....
23 Pages (5750 words) Essay

The Need for Wireless Standards and Protocols

American National Standards Organization is based in the USA and is involved in creation of various standards for products, services, processes, systems and personnel in the United States.... The need for wireless standards and protocols is to allow different computers and devices from various vendors and with different operating characteristics to be able to effectively communicate.... Institute of Electrical and Electronics Engineers IEEE is an international standardization organization that is involved with development of protocols and standards in various fields of electrical, electronics, communications, and computer engineering and computer science....
4 Pages (1000 words) Assignment

Internet Protocol Internetworking - Reasons for Using VLAN in XUM

It was in comparison to creating physical relationships of various VLANs among the switches.... To allow for communication of personal computers on similar VLANs but separated by a switch or a number of switches, a trunk link now exists between the switches.... In this case, between one switch and another, there would have been six links, which would have wasted twelve ports.... Further, it provides vital security to departmental data or privacy so that users in one VLAN cannot see what the others on the others are doing....
6 Pages (1500 words) Case Study

Installing and Administering IPSec

This paper "Installing and Administering IPSec" presents an introduction of a security standard, called, IPSec and its capabilities in ensuring secure communication in the network.... hellip; Each protocol plays its part in improving the security, integrity, and confidentiality of communication by using different algorithms for encryption and authentication.... 4th section highlights some best practices that have been observed as accelerating network communication and providing better security against attacks....
9 Pages (2250 words) Term Paper

New Technology Solution at Cisco

hellip; Management information systems have become an important part of almost every business or organization.... At the present, the implementation of information systems can be seen in almost all the departments of a business or an organization.... This report requires a discussion about the use of information systems with respect to a specific organization.... Enterprise resource planning (ERP) is one of the major types of business information systems....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us