StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Protocol Issues - Essay Example

Cite this document
Summary
The essay "Network Protocol Issues" focuses on the critical analysis of the major issues in the network protocol. Network protocols are the relevant rules, processes and data structures that clients in a network use to communicate with one another…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Network Protocol Issues
Read Text Preview

Extract of sample "Network Protocol Issues"

Network protocols are the relevant rules, processes and data structures that clients in a network use to communicate with one another. The protocol acts like the languages that the computers use in communication. Network protocols determine the format that determines the application for data transfer to ensure uniformity and conformity (Bush et al, 2012). The protocol helps define the transfer of information and therefore prevents the lack of a breach of treatment of information.

In this model, the configuration used serves to describe the applications hosted on networks and the protocols. The model is split into seven parts. In the same token, the presentation layer deals with the production of services that rely on application programs such as MSWindows.

According to the OSI model, the session layer has been set aside for the tabling of the running of services (Tanenbaum, 2003). This runs the process and leads to the scheduling of tasks that are to be run using the applications.

In the transport layer, the responsibility vested is for the data being broken into packets for transfer between hosts regularly to ensure the quality of service, on a network (Bush et al, 2012). Normally, network layers interpret the physical name of the computer from the logical network addresses.

The data link layer of the OSI model has been assessed to the widely used in networks. The layer is reserved for routers for their highly specific communication. The hardware resources that are used in a network represent the physical layer (Forouzan, 2003).

Routable protocols are those protocols that are designed to cross physical networks and enter other networks (Tanenbaum, 2003). The non-routable protocols are not applied to the networks that are outside the physical network a device is connected to at the time.

Connection-oriented protocols are more reliable than non-connection-oriented ones. This is because they perform a check on their structures. These protocols resend a message in case the receiver does not receive one (Forouzan, 2003). In this case, they tend to be more networks oriented. The non-connection-oriented protocols are not session-based and can thus be ended at any time.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Network Protocol Essay Example | Topics and Well Written Essays - 250 words, n.d.)
Network Protocol Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1602004-network-infrastructure-basics
(Network Protocol Essay Example | Topics and Well Written Essays - 250 Words)
Network Protocol Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1602004-network-infrastructure-basics.
“Network Protocol Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1602004-network-infrastructure-basics.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Protocol Issues

Routing Protocols for Ad-hoc Wireless Network

This gives rise to other issues besides the issue of unpredictable connectivity changes related to dynamic topology (Schiller, 2000).... issues with Routing in MANETs Asymmetric links: Many wired networks are based on the fixed symmetric links as opposed to the MANETs where the nodes are wireless and also, dynamic as they keep changing their network position.... Although the sequence inhibits loops from being created, however, can also bring new issues....
20 Pages (5000 words) Dissertation

Routing Protocol Security

This would be done using authentication method to compare both of them in order to pinpoint the issues arising from it.... In order to achieve the set project objective, issues of concern included the history of OSPF, types of OSPF packet type, Authentication Mechanisms in OSPF v2, OSPF security, Authentication Mechanism in OSPF v2, Digital Signature of OSPF, methodology used, system design, hardware and software, testing scenarios, and analysis of data analysis....
3 Pages (750 words) Dissertation

Sensor Network Secure Routing Protocols

Therefore, having a secure network protocol implemented ensures that in the event a software/hardware fails it doesn't affect the stability of the other network routing configurations hence this study proposes a number of secure ad hoc network protocols.... However, this work, focuses on medium-sized systems, and it doesn't reflect on scalability issues; though, mechanisms like clustering, which advance the scalability in other on-demand routing protocols for ad hoc networks, are also able to improve the scalability of this approach....
18 Pages (4500 words) Coursework

Networks and How They Work

This paper also outlines some issues regarding these networks.... Given below are some of the possible issues with TCP/IP based network communication and working: (USENIX, 1997; Kirch & Dawson, 2000) ... On the other hand, various issues regarding complicated memory management make it hard to program this protocol for a network.... For this purpose, the Internet uses a communication protocol that is known as TCP/IP (Transfer Control protocol/Internet protocol) (TechsChange, 2010; Nash, 2000; Turban, Leidner, McLean, & Wetherbe, 2005)....
5 Pages (1250 words) Essay

Network Protocols

However, protocol can get used in various perspectives, among them in the diplomatic field.... However, protocol can get used invarious perspectives, among them in the diplomatic field.... In the computer environment, rules of protocol apply in the same manner.... protocol suits are also another issue that a user needs to understand.... The most common protocol suites in networking are Ethernet and TCP/IP.... Users also need to understand Ethernet as it is a low-stage protocol....
1 Pages (250 words) Case Study

A Network Model For an International Organization

This Chapter will also include an understanding of the theories and concepts based on the research of other academics on the ground of equal opportunities and disability issues.... While most organizations that carry out explore in computer security focal point exclusively on the technical issues, it is proposing a truthfully multidisciplinary endeavor with ability from three departments.... It is this amalgamation of technology, business issues, strategy concerns and ethics that construct our program exclusive and will permit us to manufacture extremely capable researchers and IT specialists....
20 Pages (5000 words) Research Proposal

Network Time Protocol

ntrusion Prevention System (IPS) can also be useful in mitigating security issues that are involved in the implementation of NTP.... It listens for any attack on the network traffic, then issues alerts and issue TCP resets whenever necessary. ... This coursework "Network Time protocol" describes the analysis of Network Time protocol (NTP).... NETWORK TIME protocol Network Time protocol Introduction and functioning of NTP Network Time protocol (NTP) refers to a protocol that is used in synchronization of computer clock time in network of computers....
9 Pages (2250 words) Coursework

Network Protocol Services

This term paper "network protocol Services" describes computer networks that constitute a major aspect of the global economy in terms of communication, operation, efficiency and reliability.... network protocol Services ... In fact, it eliminates the use of error-handling and flow-control routines commonly used by many protocols, although it utilizes other higher-level protocols in higher layers of the OSI model to recover from errors and congestion-related issues....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us