StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Wireless Networks and Pervasive Computing SLP - Research Paper Example

Cite this document
Summary
Reporting on three tutorials in the TCP and UDP web pages. What is it a business can expect to be addressed by each of the protocols and do the tutorials work to train for that need.
1. Reliable Multicast…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Wireless Networks and Pervasive Computing SLP
Read Text Preview

Extract of sample "Wireless Networks and Pervasive Computing SLP"

Evaluation of RAD ials (First sur no qualifications like Dr. College Position in organisationPlace of authorRAD University Tutorials InvestigatedAbstractThe evaluation of some of the tutorials from RAD University (RAD 2011). Reporting on three tutorials in the TCP and UDP web pages. What is it a business can expect to be addressed by each of the protocols and do the tutorials work to train for that need.1. Reliable Multicast Transport (RMT). This is a transport protocol that is aimed at complete reliability but at the expense of delays whereas other protocols give better quality of service (QoS) at the cost of reliability.

Some applications are better at taking delays in transmission rather than data loss. RMTP gives loss-less deliveries of bulk data. A cheap way of connecting applications for messaging but not always reliable, a business could use it as long as the applications are not mission critical and time delays are acceptable. Stated by Meital, et al (2003).The authors have created an interesting web site on RMTP from its start to how it works. It’s interesting to be able to learn more on RMTP, this web site definitely helps understanding.2. Transmission Control Protocol (TCP).

The protocol is used on the transport layer of the OSI model. It is a reliable transport layer. Extract: When we say that TCP is "connection-oriented" we mean that there is a procedure that is followed for two communicating end points to exchange data. The TCP connection allows TCP to tailor each byte stream transfer, and maintain the state of that transfer, for each pair of communicating end points. Any given host might have many simultaneous TCP connections, each one having different characteristics, such as the segment size, the timeout (which will be explained), the window size (also to be explained), etc.

A specific TCP connection is defined by a socket pair, where a socket is the IP address and port number on one of the communicating points, and the port number identifies the application process on that end point. The port number serves as part of the interface between TCP and the application layer, by identifying which process within a particular host a segment is associated with. As stated by Koren (2011). TCP helps businesses with their network connections, as it is very reliable normally, although it cannot take delays as can RMTP, it is an industry standard used by many businesses in their networks, its problems are known.

A business should know a lot about its costs on staffing and equipment using this protocol.This tutorial is a great way to help in-depth understanding of TCP; it has many areas linked from the home page, including demos and animations.3. User Datagram Protocol (UDP) uses as the underlying system, IP. It’s used for application to application messaging without too many protocol mechanisms involved; it is unreliable, as it does not use acknowledgements in the same way as TCP does. It does not order the messages or provide data flow control.

UDP messages are lost or arrive out of order or very much else. Its use is in providing a lightweight protocol for delivery of messages for some applications that do use communications so multiplexing and de-multiplexing messages. Stated by Bejarano and Finkel (2004). A business could use this for speed it is faster than TCP but only as long as occasional system crashes are OK, one use is that of internet telephony. The tutorial web page is OK it covers the area of UDP, but there are no animations or modern demonstrations to aid learning, it could do with some modernizing.

CitationsRAD Data Communications, Ltd (2011), TCP and UDP tutorials. From: http://www.rad.com/12/RAD-University-Tutorials/5266/Taran, Meital. Raashi, Eran. Ackerman, Refael. Maller, David. (2003) RMTP.Course: Protocols and Computer Networks. Lecturer: Dr. Debby Koren. School of Computer Science, Faculty of Exact Sciences. Tel Aviv University. From: http://www2.rad.com/networks/2003/rmtp/index.htm.Koren, Debby. (2011) RAD University. TCP Portal, tutorial.From: http://www2.rad.com/networks/transport/tcp/main.

htmBejarano, Guy. Finkel, Eran (2004, spring) UDP. Course: Protocols and Computer Networks. Lecturer, Dr. Debby Koren. Tel Aviv University. From: http://www2.rad.com/networks/2004/udp/main.htm

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Wireless Networks and Pervasive Computing SLP Research Paper”, n.d.)
Wireless Networks and Pervasive Computing SLP Research Paper. Retrieved from https://studentshare.org/miscellaneous/1578537-wireless-networks-and-pervasive-computing-slp
(Wireless Networks and Pervasive Computing SLP Research Paper)
Wireless Networks and Pervasive Computing SLP Research Paper. https://studentshare.org/miscellaneous/1578537-wireless-networks-and-pervasive-computing-slp.
“Wireless Networks and Pervasive Computing SLP Research Paper”, n.d. https://studentshare.org/miscellaneous/1578537-wireless-networks-and-pervasive-computing-slp.
  • Cited: 0 times

CHECK THESE SAMPLES OF Wireless Networks and Pervasive Computing SLP

Energy Efficient Middleware for Networking Protocols

He has extensive research work in Electrical and Computer Science that has gave him interest in wireless network, optical wavelength division multiplexed networks and performance evaluation.... A Survey of Energy Efficient Network Protocols for wireless networks.... wireless networks, Vol.... His extensive work has been recognised by getting patents in wireless networks- 3 patents and several papers including 18 journal publications....
4 Pages (1000 words) Essay

Home automation lightning systems for a handicapped house

Literature review Home automation lighting systems for a handicapped house The implementation of home automation becoming very common in many homes, especially for the handicapped and the elderly with the aim of maintaining their safety and independence.... The homes fitted with smart facilities allows the handicapped to comfortably stay in their homes rather than to expensive health care facilities....
6 Pages (1500 words) Essay

Mobile Computing and Wireless Communication

Recent advances in mobile computing [1] and wireless communication are the focus of study for this paper.... Such trends lead us to believe that mobile communication is bound to play an increasingly important role in everyday life through a variety of new applications often referred to as "ubiquitous or pervasive" computing.... The emergence of powerful portable computing devices, along with the advances in wireless communication technologies, has made mobile computing a reality....
9 Pages (2250 words) Essay

Pervasive Computing: The Future of Technology

The paper “pervasive computing: The Future of Technology” seeks to evaluate the ultimate goal of all technology, which is to pervade the environment completely and get integrated into the everyday life in a ubiquitous manner.... Without this, the aim of pervasive computing cannot be realized.... This barrier must be crossed with pervasive computing.... The second aspect of pervasive technology in the future will be the convergence of sensing, monitoring, networking, and computing technologies....
6 Pages (1500 words) Assignment

Wireless Networks and Pervasive Computing

In the paper “wireless networks and pervasive computing” the author analyzes internet protocols (Transmission Control Protocols) that have different uses.... wireless networks and pervasive ComputingTransmission Control Protocol (TCP) and User Datagram Protocol (UDP) are internet protocols that have different uses....
2 Pages (500 words) Essay

SWOT Analysis of the Apps Market

These applications are designed for various types of technologies like the Android Mobile, iPod/iPhone, Microsoft Mobile, Apple, Nokia, Motorola, Samsung, LG, Sony-Ericsson Verizon wireless and Symbian.... The paper "SWOT Analysis of the Apps Market" highlights that generally speaking, with increased rates of uptake and usability of smartphones and reduced prices for applications, the apps market is bound to expand even more this year and in the coming years....
8 Pages (2000 words) Case Study

Network Simulation for Small Businesses

For small businesses, a network that pervasively connects and allows mobility wherever the employees are in this case wireless LANs is designed for the purpose of enabling employees connected, access receive/reply to Emails, and access workspace, while away from workstations.... … The paper “Network Simulation for Small Businesses” is an affecting variant of a literature review on information technology....
21 Pages (5250 words) Literature review

Multicast Proxy for Dynamic Multimedia Delivery

Wu, Zhu, and Shu (2005) posit that multicast removes the networks' ''hot spots'' when the majority of users are accessing similar multimedia content, particularly when streaming live content.... The paper "Multicast Proxy for Dynamic Multimedia Delivery" explores the multicast proxy for dynamic multimedia delivery and multimedia transport through the network....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us