Name: Instructor: Course: Date: Network and Protocol Processes In accessing X-Stream’s website from the home computers, instructions must be given to the home computer on what to do; these instructions must be understandable to the sender to be able to send them…
The devices are called end devices or more correctly hosts; which are either the destinations or sources of information transmitted via a network so accessing a network or site remotely involves three elements; a source or sender, a destination and a medium which is the channel through which the data is transmitted. The data transmitted can be in the form of text, graphics, voice or video which are converted into a language the computer understands called binary bits (data is transmitted as a zero or a one: 0I). The bits are then ‘programmed’ or coded into signals or data packets that can be transmitted through a medium over a network. Now sending data as one continuous stream will mean that no other data or devices can use the medium while the data is being transmitted just like a pipeline; if it is delivering gasoline, it cannot at the same time deliver liquid petroleum gas; so the data is broken into smaller packets; a process called segmentation which allows many different data to be transmitted concurrently, this is called multiplexing and segmenting data enhances network reliability so data is not lost easily whenever a break in communication occurs (“3rd Symposium on Networked Systems design and Implementation (NSDI’06), San Jose, California”). ...
The one used for internet communication is called TCP/IP stack which contains four layers; Application protocols layer that is defined to applications like WWW, or FTP (File Transfer Protocol), a transmission control protocol which is responsible for directing packets of data to specific computers by using a port number. It also has an internet protocol layer that directs data bits to destinations using the IP addresses of the computers and a hardware layer that converts data into data streams or signals such as the network cards or modems. An instruction flows from the sender (computer) from the application to the transfer control protocol then to the internet protocol and finally to the hardware protocol that converts the bits of information into signals transmitted through a medium through the internet. On reaching the destination computer, the signals are converted back to binary bits through the hardware layer then to the internet protocol layer then to transfer protocol layer and then to the application such as a web server software. The internet is made up of many big networks called Network Service providers (NSPs0 connected together in a peer standard. The NSPs exchange data packets with each other and must connect to three network access points (NAPs) and at metropolitan Area Exchanges (MAEs) both of which are called internet exchange points (IXs). Information is then sent around these networked computers to its destinations by routers which contain information tables and switch data packets to the right destination (Serpanos and Wolf 292-302) As soon as one types the web address to be accessed into a web browser (a web browser is a program that is used for internet applications and ...
Cite this document
(“Computer Communications & Networks Lab Report Example | Topics and Well Written Essays - 2000 words”, n.d.)
Retrieved from https://studentshare.net/education/5144-computer-communications-networks
(Computer Communications & Networks Lab Report Example | Topics and Well Written Essays - 2000 Words)
“Computer Communications & Networks Lab Report Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.net/education/5144-computer-communications-networks.
Most tools can offer in the very least some useful real-time feedback if not operate as autonomous units. Computers have the role of data processing to give some output or solution. In this ubiquitous aspect of computer technology, they have different uses and the use criteria varies with the individual situation.
There are many networked devices, components, technologies, and methods involved to open a single web page from the Internet. All these devices talk with each other by different protocols. TCP/IP is one of the fundamental protocols that are mandatory for establishing connection on the Internet. The combination of these protocols serves to sustain an Internet connection and request the source to provide a new packet. The author will discuss in detail and try to cover different aspects of accessing the remote X stream server from home.
The paper discussed several routing protocols and their roles in ensuring robust connectivity from home to the x stream. Furthermore, DSL physical infrastructure is also discussed in detail in diagrams to get better insights and involvement of network devices in case of a DSL home connection.
Each layer will demonstrate the methods, processes and technologies that are associated with accessing the X stream server from a home computer. Moreover, in this scenario, we have assumed that the home computer is connected with an ADSL connection from an ISP with a Client premises equipment (CPE) named as ADSL router.
e of the most reliable technology through which information is relayed .Satellites dole out elementarily for map-reading, connections, backdrop scrutiny as well as climate forecasting. The launching of the Satellite Sputnik altered the course of the Russian history in 1957 when
The picture archiving and communication system according to Samei (2004) is a comprehensive computer system which is responsible for the electronic distribution and storage of medical images in the field of medical enterprise. This system is extremely integrated with digital
Moreover, in this scenario, we have assumed that the home computer is connected with an ADSL connection from an ISP with a Client premises equipment (CPE) named as ADSL router.
Before discussing the communication in networks
ncertainties and concerns on designers and enterprises regarding the integration between mobile technologies and the existing IT environment including the infrastructure and applications. Preliminary investigations reveal that emerging technologies tend to exhibit unique