StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Concept of Networking - Essay Example

Cite this document
Summary
The paper "The Concept of Networking " highlights that in general, the DNS concept is a technique through which the DNS address provided to the main server of an organization can be translated into an IP address for easy recognition over the World Wide Web…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
The Concept of Networking
Read Text Preview

Extract of sample "The Concept of Networking"

Networking Table of Contents Introduction 3 Discussion 3 In computer networking, there are two important protocols that include Internet Protocol (IP) and Transmission Control Protocol (TCP). Contextually, computer networking is also recognized as TCP/IP. The layered communication protocols of networking are discussed hereunder. 3 Protocol Stack 3 Layers and Related Concepts 4 Application layer 5 Presentation Layer 6 Session Layer 6 Transport Layer 8 Network Layer 8 Data Link Layer 9 Physical Layer 10 Ethernet Concept 10 Domain Naming System (DNS) 11 Address Resolution Protocol (ARP) and Media Access Control (MAC) 12 Conclusion 12 Introduction The concept of networking is a significant achievement in the field of information and communication technology. Networking in simple words can be explained as the process of establishing communication between two or more computer nodes within a same facility, locality or within nations. Moreover, the concept of networking might appear simple if seen from a diagrammatic perspective but from the technical perspective, it might rather appear as highly complex. From a generalised point of view, it can be understood that the networking process is the development of a connection between the nodes within the network that might be involved in the data sharing process. The concept explains all the aspects that all together form the communication process (Microsoft, 2014). The essay describes the concepts and the aspects related to networking. The discussion emphasizes the principles and the operations of the layered communication protocols. It also briefs about protocol stack, its working and packet headers Discussion In computer networking, there are two important protocols that include Internet Protocol (IP) and Transmission Control Protocol (TCP). Contextually, computer networking is also recognized as TCP/IP. The layered communication protocols of networking are discussed hereunder. Protocol Stack The concept of protocol stack can be explained with reference to the Ethernet technology and data transmission techniques. Data transmission in an online fashion generally takes place in the form of packets. Therefore, in a general sense, it can be understood that the packets that are needed to be transmitted must have a sending as well as a receiving address. In this context, the concept of protocol slack plays an important role in the data transmission process (The Linux Information Project, 2005). The diagrammatic representation provided below will help in understanding the concept of protocol slack. Protocol Slack From the above diagram, it can be clearly understood that each packet transmitted must have a sender and a receiver address, so that the data reach the desired address appropriately (The Linux Information Project, 2005). The technique is known as wrapping up of the data packets. The transmission process has been explained through the elaboration of the seven layers of the OSI model. Layers and Related Concepts Layers have always been the prime aspects in context to effectively understand and manage the networking process. In total, there are seven types of layers forming the communication signal through which the data and information from one node are transmitted to the other nodes (Microsoft, 2014). The specific details regarding the layers can be found mentioned within the OSI layer as provided hereunder. The Seven Layers of OSI In the OSI model, the data transmission process between two nodes is segregated into the 7 specific layers. The seven specific layers of the OSI model are described hereunder. Application layer The application layer is the first layer of the OSI model and it generally refers to the ‘Graphical User Interface (GUI)’ through which the human users provide their message in terms of high level language (Microsoft, 2014). The functions within this specific layer have been provided below. Sharing of resources and device redirection Remote access to files Remote access to printing devices Inter communication between processes Network management Directory services Electronic messaging services Virtual network terminal With the help of the above-mentioned functions within the application layer, the users can easily input human understandable form of data through the input device, which subsequently is translated to low level machine language (Microsoft, 2014). Presentation Layer Presentation layer is the second layer of the communication process, which is related to the translation of high level language form of data and information into machine understandable form. The opposite process is repeated in case of the receiving the data (Microsoft, 2014). The functions within the presentation layer are provided below Carrying out the character code translation process such as from ASCII to EBCDIC Bit wide conversion of data such as from Integer to Float or to Boolean Bringing about regulation within the size of the data bits, which might be necessary for transmitting them through the network Carrying bout of the data encryption process For instance, attachment of password and encryption tags to the confidential data Source (Microsoft, 2014) Session Layer Session layer is the third layer of the OSI model and is mainly used for identifying packets belonging from a similar data form that has been broken down to conveniently transmit it through the network bandwidth. The functional explanation of this layer has been provided as under in a diagrammatic representation. Note (Diagram developed for explaining the layer) The above diagram provides a brief understanding regarding the functioning of both the session as well as the presentation layer. The session layer is just like a timer that continues or terminates the data transmission cycle between two nodes based on the set time. It can be observed from the diagram that the large chunk of data is segregated into small data packets of specific size (D1, D2, D3, D4, and D5). The segregation is carried out by the presentation layer on the basis of a time session attached to each of the segregated data packets (T1, T2, T3, T4 and T5). The session layer regulates the time session management. The time-activated data are then transmitted through the network and chances occur that the transmission sequence of these segregated data packets might be disarranged in the midway. On reaching the destination, the misarranged data packets are further arranged by the collaborative support of the session and the presentation layer, which is then provided as output to the user (Global Knowledge Training LLC., 2006). Transport Layer The transport layer is the fourth layer of the OSI model and carries out the same function of both the session layer and the presentation layer but in a highly précised manner. The layer ensures that the transmitted data packets follow a specific pattern. It also ensures that transmitted data is not lost during transmission along with occurrence of data redundancy cases. The functions of the layer are provided hereunder. Receiving of message from the session layer and segmenting it into small data packets as well as passing it on the next layer Delivering of acknowledgement code regarding transmitted and received data packets. Controlling traffic during message transmission Keeping track of data packets belonging from the same session Source (Global Knowledge Training LLC., 2006) Network Layer The network layer is one of the most important layers of the OSI model, which is involved in selection of the appropriate physical path through which the data packets will be transferred. The functions of the network layer are mention below The first function of the network layer is to control the subnet traffic through generation of dynamic Routing Information Protocols (RIP). The RIP signals help in determining the appropriate physical route between the connected routers within the network based on which the packet transmission is initiated The second function of network layer is related to the concept of ‘Maximum Transmission Unit (MTU)’. The MTU is described as the maximum transmission capacity of a down-streamed router. As a result, the every router fragments the transmission bits into fragments within the maximum size of the frame that can be transmitted. However, on the receiver side it reassembles all the fragmented frames The third function of the network layer is mapping out the relationship between the logical and the physical address through translation The network layer also keeps a track of the total number of subnet frames that are transmitted between the sender terminal and the receiver terminal. The tracking records are helpful during faulty transmission and network malfunction detection Source (Global Knowledge Training LLC., 2006) Data Link Layer The data link layer is the sixth layer of the OSI model and is responsible for the establishment of reliable link between the communication gateways at the sender end and the receiver end. The functions of the layer are discussed below. Establishment of session based link between the sender end and the receiver end Framing of effective traffic control mechanism Sequencing of transmitted and received data frame Delivery of acknowledgement report in context of transmitted and received data frame Structuring the minimum and the maximum limit of data frame size Identification and correction of data frame related errors Management of media access Source (Beal, 2014) Physical Layer This is the final layer of the OSI model and the related functions of the layer have been provided as follows: Transmission of raw bits data over the physical medium between the sender and the receiver port Execution of the data encoding process i.e. conversion of the machine language data (0 and 1) into electronic signals that will be transmitted accordingly Attachment of the physical address to the bits that will be transmitted (MAC address of the receiving end) Determination of the transmission band i.e. baseband or broadband Source (Beal, 2014) Ethernet Concept From the effective elaboration of all the seven layers, it can be comprehended that the stack protocol breaks down large chunks of data into small data packets followed by conversion into subsequent frames and prepares them to get transmitted by the ‘Ethernet hardware (Network Interface Card)’. In the final stage of the transmission process, the address header and footer play an important role for systematic transmission of data over the network. For instance, every data packet after entering the Ethernet hardware are attached with the wrapper head containing the destination address of the final host or the intermediate routers (SYS TEC Electronics, 2010). In the case of small distance transmission, the Ethernet hardware at the sender end directly attaches the address wrapper of the receiver hardware as packet header and transmits it. However, in case of long distance communication, the data packet along with the sender and the destination address wrapper is required to pass through multiple routers. Thus, at each transitional hop, the router will shed off both the existing sender and the destination address wrapper from the data packet and attach a new address of the next furthest hop to which the data packet will have to be transmitted (Wildpackets, Inc., 2014). Once the data packet reaches the destination hardware, the Ethernet hardware at the receiver side will pass on the packet to the protocol stack, which in turn will rip of the header and footer addresses attached to the packet. It will then make header and footer addresses to pass through the OSI layers at the destination machine in reverse order to decode the message and project it to the user through the application layer that controls all the output devices. The stacking protocol is identified to work on the basis of the aforementioned procedures. Thus from the overall understanding, it can be stated that the concept of protocol stack is all about a defined set of guidelines or principles based on which the data transmission is carried out (Wildpackets, Inc., 2014). Domain Naming System (DNS) The DNS concept is a technique through which the DNS address provided to the main server of an organization can be translated into IP address for easy recognition over the World Wide Web. The concept also finds significance in the areas of data transmission and networking (Discovery Communications, LLC., 2011). The DNS service has established servers where both the DNS and the IP address assigned to a particular node remains stored. The Ethernet hardware at the sender side also attaches the DNS and the corresponding IP address of the receiver in the address wrapper of each data packet before they are transmitted through the network. The process ensures that the transmitted data packet definitely reach the destination address without getting distracted from the path (Bytemark Hosting, 2014). Address Resolution Protocol (ARP) and Media Access Control (MAC) The concept of the ‘Address Resolution Protocol’ (ARP) and the ‘Media Access Control’ (MAC) can be described in a correlated manner. The main purpose of the ARP protocol is to map the 32-bit long IP address with the machine address (MAC) (Hewlett Packard Development Company, L.P., 2014). However, correlating the Mac address with that of the IP address might be complex work due to the fact that IP 4 address is currently in use, which is 32-bit size and the corresponding MAC address is of 48-bit size. Thus, the possibility of size issue might arise in this context. In this respect, as a solution, the concept of ARP cache is adopted. The cache is a buffer that maintains the size correlation between the IP address and the MAC address. Thus, these two concepts of ARP and MAC finds high significance in the areas of network data transmission due to the fact that without bringing about correlation within the IP address and the MAC address of the sender and the receiver machines, the data packet cannot be transmitted from one node to another (University of Aberdeen, 2005). Conclusion It can be comprehended from the foregoing discussion that protocol slack plays an important role in the sphere of networking. In this respect, an understanding can be drawn regarding the importance of protocol stack and other concepts such as Ethernet, in the areas of network data transmission. The concepts describe the stages through which the data transmission process is carried out. In networking, the concepts of TCP/IP play an effective role in ensuring that data is transmitted in an appropriate and systematic manner. Additionally, the different layers of the protocol also assist in preventing the occurrences of data loss and address mismatch. Thus, it can be comprehended from the above descriptions that in an internet protocol, the principles and the operations of the layered communication protocol should be followed for effective networking. References A Project of the Team C Annihilation, 2012. An OSI Model for Trolling. AssHats.net – Facebook Trolls Exposed. [Online] Available at: http://asshats.net/an-osi-model-for-trolling/ [Accessed July 3, 2014]. Bytemark Hosting, 2014. How the Domain Name System (DNS) Works. Support Technical Documents. [Online] Available at: http://www.bytemark.co.uk/support/technical_documents/dnsworks [Accessed July 3, 2014]. Beal, V., 2014. The 7 Layers of the OSI Model. QuinStreet Inc. [Online] Available at: http://www.webopedia.com/quick_ref/index.asp [Accessed July 3, 2014]. Discovery Communications, LLC., 2011. How Does A DNS Server Work? Internet Communication. [Online] Available at: http://curiosity.discovery.com/question/how-does-dns-server-work [Accessed July 3, 2014]. Hewlett Packard Development Company, L.P., 2014. The MAC Level (Link Layer). Main Channel Access Mechanisms. [Online] Available at: http://www.hpl.hp.com/personal/Jean_Tourrilhes/Linux/Linux.Wireless.mac.html [Accessed July 3, 2014]. Global Knowledge Training LLC., 2006. The OSI Model: Understanding the Seven Layers of Computer Networks. An Overview of the OSI Model, pp. 1-11. The Linux Information Project, 2005. Protocol Stack Definition. LINFO. [Online] Available at: http://www.linfo.org/protocol_stack.html [Accessed July 3, 2014]. SYS TEC Electronics, 2010. Open POWERLINK: Ethernet POWERLINK Protocol Stack. Software Manual, pp. 1-100. University of Aberdeen, 2005. Address Resolution Protocol (ARP). Example of Use of the Address Resolution Protocol (ARP). [Online] Available at: http://www.erg.abdn.ac.uk/~gorry/course/inet-pages/arp.html [Accessed July 3, 2014]. Wildpackets, Inc., 2014. Ethernet Packets and Protocols. About Ethernet. [Online] Available at: http://www.wildpackets.com/resources/compendium/ethernet/ethernet_packets [Accessed July 3, 2014]. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Networking Essay Example | Topics and Well Written Essays - 2250 words”, n.d.)
Networking Essay Example | Topics and Well Written Essays - 2250 words. Retrieved from https://studentshare.org/information-technology/1651645-networking
(Networking Essay Example | Topics and Well Written Essays - 2250 Words)
Networking Essay Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/information-technology/1651645-networking.
“Networking Essay Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/information-technology/1651645-networking.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Concept of Networking

Examination of the Tipping Point

the concept of the tipping point is one which begins with identifying and understanding how something moves from a basic and idea or innovation into a trend that is within society.... the concept of innovation is then independent on building a strategy that creates a tipping point and which allows a specific response from those that are in society and which are looking for specific concepts.... the concept of drastic and dramatic changes is usually a component to modern thinking, both in the ideology of society and biology....
10 Pages (2500 words) Essay

Networking in Business Organizations

hellip; It defines three different types of networking structures which are personal networks, operational networks, and strategic networks.... The article emphasizes upon the important of networking activity for organizational leaders and explains that only functional knowledge or knowledge of the business environment and other things is not sufficient (Ibarra & Hunter, 2007).... The article's main purpose is to educate leaders and future managers about the benefits of networking and how to become accustomed with the process....
4 Pages (1000 words) Essay

Computer-Mediated Communication

Though SNSs imply The Concept of Networking hugely yet researchers suggest that this alone could not be considered as a solo feature which helps differentiating SNSs from other mediums of CMC like blogs and social support sites.... Computer-mediated communication: Internet-based social networking forms a very good example of computer-mediated communication (CMC) which refers to all types of communication made possible between people from different parts of the world via computers....
4 Pages (1000 words) Essay

Future of Comuper Networking

Despite of all the versatility the networking possesses today, it is unskeptical to think about the limitations of networking in the future.... The current central theme of notion is upon the elaboration of client server communications in which the role of Information Technology writ to a great extent creating the need for the advancement of networking technologies for a better tomorrow. … Today's most important and considerable issue regarding communicational approach refers to the need of protocol enhancement from IP to Ipv6....
3 Pages (750 words) Essay

History of Internet and Music in UK

Internet evolution in the UK started from the year 1973 when the first connections of ARPANET were given to the University College of London (England) and Royal Radar Establishment (Norway).... With the advent of ARPANET in the UK, Ethernet was outlined with the widespread of connecting local networks....
4 Pages (1000 words) Essay

Positioning Concepts In Social Networking

Social networking these days has become extremely common.... The paper "Positioning Concepts In Social networking" provides insight into how social networking sites are able to earn money.... Positioning Concepts In Social networking Social networking these days has become extremely common.... Thus, it becomes important for these social networking sites to earn money in order to keep on providing services to the people....
2 Pages (500 words) Essay

The Digital Presence of Technology and the Advanced Usage of the Internet

characterized by the presence and introduction of number of… This includes the social media and social networking website sources.... Apart from the modern day social networking sources, internet in general was attributed to a means of tracking out anyone who gets online through it.... The modern tracking systems and various other associated sources and concepts have embedded the human's limit of privacy, more so after the introduction of social networking websites that connect the people digitally in an intertwined manner where staying off the radar becomes nearly impossible....
8 Pages (2000 words) Essay

Evaluation and Solutions for E-Commerce & Social Networking

This paper "Evaluation and Solutions for E-Commerce & Social networking" discusses the risks and hazards of information being misused over the internet.... All kinds of people use the internet ranging from little children to busy businessmen for different purposes like business transactions, social networking, and research.... An analysis of the reasons for internet crime along with its consequence leads to a technological challenge -- whether the harmful consequences outweigh the benefits of the internet and what should be done to reduce crime involving unethical practices of hacking, identity theft, crime in e-commerce and social networking....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us