StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Three Main Approaches to improve TCP/IP in Wireless Networks, Computer Networks - Research Paper Example

Cite this document
Summary
Complex networks, random traffic volume, transmission problems, congestion – these are some of the usual problems we encounter day to day. These problems are actually inherent in the TCP/IP network in that its design…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Three Main Approaches to improve TCP/IP in Wireless Networks, Computer Networks
Read Text Preview

Extract of sample "Three Main Approaches to improve TCP/IP in Wireless Networks, Computer Networks"

Download file to see previous pages

These problems however can be inconvenient and costly in the long run and thus it is imperative that the performance of TCP/IP networks be improved. Added to the problems already encountered by traditional TCP/IP networks is the exponential growing of the participation of wireless networks. This paper presents three of the approaches that have been designed to improve TCP/IP in today’s networks. Also included are comparisons with other techniques to see how one technique fares with others. In view of this, probable power problems in the future could be accounted for and we could possibly enjoy the perfect TCP/IP network.

Its predecessor ARPANET’s development in the 1970’s by the Advanced Research Projects Agency (ARPA) of the United States Department of Defense (DOD) was first intended to study and demonstrate computer resource sharing (Stallings 281). By 1975, it was no longer an experimental network and has been transformed to Defense Data Network, which met the DOD’s need demand for “secure command and control communications network and for ordinary unclassified communications” (Stallings 281). The outgrowth of ARPANET is what we know to be TCP/IP today.

It is the communications protocol that unlike the Open Systems Interconnection (OSI) reference model recognizes the need for hierarchy. Its launch was a success because it delivered basic services that everyone needs like file transfer, electronic mail, and remote logon across a large number of client and server systems. TCP/IP networks however were designed to be dynamic. Errors are considered to be normal occurrences and are sorted out later. The first and foremost priority is for the network to continue working.

This design provides problems of its own. Aside from design problems, TCP/IP has been plagued by the inevitable growth of wireless networks’ participation. Wireless networks, as compared to traditional wired networks, have higher bit-error rates,

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Three Main Approaches to improve TCP/IP in Wireless Networks, Computer Research Paper”, n.d.)
Three Main Approaches to improve TCP/IP in Wireless Networks, Computer Research Paper. Retrieved from https://studentshare.org/miscellaneous/1552729-three-main-approaches-to-improve-tcpip-in-wireless-networks-computer-networks
(Three Main Approaches to Improve TCP/IP in Wireless Networks, Computer Research Paper)
Three Main Approaches to Improve TCP/IP in Wireless Networks, Computer Research Paper. https://studentshare.org/miscellaneous/1552729-three-main-approaches-to-improve-tcpip-in-wireless-networks-computer-networks.
“Three Main Approaches to Improve TCP/IP in Wireless Networks, Computer Research Paper”, n.d. https://studentshare.org/miscellaneous/1552729-three-main-approaches-to-improve-tcpip-in-wireless-networks-computer-networks.
  • Cited: 0 times

CHECK THESE SAMPLES OF Three Main Approaches to improve TCP/IP in Wireless Networks, Computer Networks

Wireless Networks-WLAN's

In the current section, the concept of wireless networking and the various trends associated with it shall be discussed in close detail.... … As the name suggests, wireless networking is different from wired networking wherein the use of wires for the purpose of communication is totally eliminated.... Under this approach, the various computers and other devices communicate with one another by using radio and microwaves The concept of wireless networking is a relatively new domain and has not been utilized to the fullest even today....
23 Pages (5750 words) Essay

Techniques That Use Bandwidth Aggregation to Increase Bandwidth

The main focus of the literature review refers to exploration of Bandwidth aggregation techniques, methods and ways.... he main focus of the literature review refers to exploration of Bandwidth aggregation techniques, methods and ways.... The techniques explanation is also a part of literature review....
15 Pages (3750 words) Literature review

Computer Networking and Management

This essay analyzes that the network manager can get information about any frailer to occur on the network by network management tools.... The network consists of a large number of interconnected nodes.... Network administrator able to find out the dead node.... hellip; This essay discusses that the function of SMI in network management is to identify pieces of information in an SNMP....
21 Pages (5250 words) Essay

Understanding Networking

here are two more types of networks: CANs (Campus Area Network) and TANs (Tiny Area Network).... These are considered as LANs with a minor difference that they are used for an extremely small networks which involves two to three computers only (A.... This report "Understanding Networking" discusses computer networking that plays a major role in building up a structure for communication and data transfer.... In this fast era, where millions of works are getting done on computers, computer networking is a source to make it more reliable....
6 Pages (1500 words) Report

Mr. Smiths Law Firm System Analysis and Security

The paper "Mr.... Smith's Law Firm System Analysis and Security" discusses the best test program for video conferencing among remote office locations, the naming structure for Mr.... Smith's network, and network security in each of the departments, the functions of different devices in the network....
10 Pages (2500 words) Assignment

WAN Technologies Currently Used within the UK and European Markets

The fifth topic is about the tools that are used in computer networks and lastly, is the security of the network both the physical security of the network components and the security of the data that is sent via the network.... Asynchronous data transfer is network technology designed for both local area networks and wide area networks....
8 Pages (2000 words) Report

Technological Advancement in Wireless Communications, Electronics, and Sensor Networking

… The paper “Technological Advancement in wireless Communications, Electronics, and Sensor Networking” is an inspiring example of an essay on information technology.... The current growth in wireless communication networks and electronics has lead to an advancement of cheaper sensor networks.... The paper “Technological Advancement in wireless Communications, Electronics, and Sensor Networking” is an inspiring example of an essay on information technology....
7 Pages (1750 words) Essay

CERT Australia Network Threat Risk Assessment

Since its inception in 2010, CERT Australia has been sharing information and collating responses related to cybersecurity to improve information security in Australian society.... nbsp;… CERT Australia collaborates with computer Emergency Response Teams across the world to exchange information on emergent cyber threats.... These working arrangements enable CERT Australia to determine the appropriate computer security advice and policies to develop for the public....
14 Pages (3500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us