StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Protocols - Case Study Example

Cite this document
Summary
However, protocol can get used in various perspectives, among them in the diplomatic field. Diplomats use the set protocols to be able to interrelate with diplomats from foreign countries. In the computer…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Network Protocols
Read Text Preview

Extract of sample "Network Protocols"

Network Protocols Rules and procedures used in communicating are referred to as protocols. However, protocol can get used invarious perspectives, among them in the diplomatic field. Diplomats use the set protocols to be able to interrelate with diplomats from foreign countries. In the computer environment, rules of protocol apply in the same manner. Following the networking of computers, the technical procedures and rules that regulate their communication are referred to as protocols (Dong 45).

There are various types of protocols; in the lowest stage protocols are used to define the type of the electrical signal gets to represent one and the signal that represents zero. At the highest stage protocols enable users to communicate by sending emails to other computer users. Protocol suits are also another issue that a user needs to understand. Various protocols are used together in sets that match. The most common protocol suites in networking are Ethernet and TCP/IP. UNIX networks are commonly users of TCP/I.

it is also commonly used in the local area networks as well as the internet (Dong 47). Users also need to understand Ethernet as it is a low-stage protocol. It is used to spell out the characteristics of electrical network hardware as it is used by many local area networks. The third important protocol that users need to understand is IPX/SPX; it is an alternative to the TCP/IP. It was developed for the NetWare networks. The preferred protocol is TCP/IP irrespective of the fact that IPX/SPX gets used widely in the local area networks (Dong 49).

Works CitedDong, Jielin. Network Protocols Handbook. Saratoga, CA: Javvin Technologies, 2007. Print.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Protocols Case Study Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1652778-network-protocols
(Network Protocols Case Study Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1652778-network-protocols.
“Network Protocols Case Study Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1652778-network-protocols.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Protocols

Network Management and Systems Administration SLP

Not such a good way to learn it is important to know about this, as without security on Network Protocols there is a good chance of hacking the system.... And to report back on three of the tutorials on the Application protocols web page.... And to report back on three of the tutorials on the Application protocols web page.... The secure networking protocols (Koren, 2011), which is very different in its presentation being a written article, it is informative but dull reading....
2 Pages (500 words) Research Paper

Information Security as Career Choice

My academic qualification has equipped me with expertise in network security, Network Protocols, Windows, Microsoft office and other such technical software packages that are used within the firm.... The job would broadly encompass development and maintenance of comprehensive database of network security with all the support systems like network equipment, hardware and software....
1 Pages (250 words) Essay

Networking Explained

Higher-level Network Protocols IP use Ethernet as a transmission medium.... The run length of personal Ethernet cables is limited to 100 meters; however, Ethernet networks can be extended easily using network bridge devices Token Ring describes a Local Area network (LAN) technology in which stations are organized in a ring topology.... he Fiber Distributed Data Interface (FDDI) refers to a 100 Mbps technology, which uses the LAN network and is usually linked through a fiber optic cable....
1 Pages (250 words) Essay

Network Protocol Issues

Network Protocols are the relevant rules, processes and data structures that clients in a network use to communicate with one another.... Network Protocols determine the format that determines an application for data transfer to ensure uniformity and conformity (Bush et al, 2012).... hellip; It is quite important to state that the routable protocols are those protocols that are designed to cross physical networks and enter other networks (Tanenbaum, 2003)....
1 Pages (250 words) Essay

Software for wireless devices

he five major software components necessary in mobile computing include 1) mobile operating system such as Microsoft, Symbian, Linux, and other specialized operating systems, 2) a mobile application user interface which is the application logic in mobile devices to operate the various interface devices such as a mini-joystick, touch screen, thumb wheel, and jog dial, 3) the microbrowsers which are actually similar to standard Internet browsers but specially adapted to deal with the limitations in the memory, bandwidth, and smaller display screens of mobile devices, 4) the wireless application protocol or WAP which is the suite of Network Protocols to enable different kinds of wireless devices to access WAP-readable files on an Internet-connected Web server, and 5) various mark-up languages which is also an area that lacks a single uniform standard; examples of competing standards are wireless markup language (WML), the compact hypertext markup language (cHTML), and extensible hypertext markup language (eHTML)....
1 Pages (250 words) Essay

Forty Years of Internet and Introduction to Digital Culture

Internet involves computer networking where a worldwide computer network involves Network Protocols to ensure exchange and transmission of data.... It enables people to be able to communicate, transfer payments and data, conduct research, and carry the daily office duties among other activities through a computer network system....
4 Pages (1000 words) Essay

Leach and Energy Usage in Wireless Networks

IntroductionLow energy adaptive clustering hierarchy (LEACH) is a communications protocol that has overcome some of the limitations of various routing protocols on wireless sensor networks.... Cluster routing protocols have also been improved to increase energy management in WSNs.... The paper "Leach and Energy Usage in Wireless Networks" estimates to the hierarchical and clustering mechanism in wireless sensor networks aids in the reduction of the overhead created and the consumption of energy when all the nodes within the network are sending information to a focal point....
6 Pages (1500 words) Literature review

The Features and Requirements of Network Security

This paper outlines features of network technology, cabling, network interfaces, Network Protocols, requirements for all these parts, data and security requirements, firewall and network performance.... This case study describes the features and requirements of network security.... hellip; As per the field of digital forensics, the network design client/server architecture will be adequate for meeting the requirements.... This will reduce the administrative work on the network for the network administrator....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us