StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Basic Network Technology, Structure, and Protocols - Research Paper Example

Cite this document
Summary
Presently, computer networking has become the basis of communicating, collaborating and sharing files or resources between businesses established around the world. Keeping this fact in mind, the two tutorials selected were the ones that shed light on the basic technical details of this client server interaction…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
Basic Network Technology, Structure, and Protocols
Read Text Preview

Extract of sample "Basic Network Technology, Structure, and Protocols"

Presently, computer networking has become the basis of communicating, collaborating and sharing files or resources between businesses established around the world. Keeping this fact in mind, the two tutorials selected were the ones that shed light on the basic technical details of this client server interaction. Tutorial 1 (Gal, Ilan & Shreiber, 2005) provided an insight into how by entering a website’s address into a browser, all the content of website gets loaded, while Tutorial 2 (Podolsky & Margolis, 2005) provided slightly advanced detail of the steps in-between request placement and content delivery.

In Tutorial 1 described that every networked computer is connected to a DNS and a router that it has the physical (MAC) address of. In case of unknown MAC, ARP request can be broadcasted to which only the targeted devices respond with their MACs. On entering a website address in browser, the computer contacts the DNS, which responds with the logical (IP) address of the website. In case, a DNS doesn’t have it, it forwards the request to another DNS server higher in the hierarchy. The IP address is passed down to the requesting computer.

Once IP is known, a TCP segment destined for port 80 containing HTTP_GET request is formed. The website’s IP address is appended to it forming an IP packet. This IP packet is forwarded to the router’s MAC to be delivered to the website server. On receiving, the server removes IP tags, extracts the HTTP_GET request from the TCP segment and replies with a new TCP segment containing requested content e.g. text, audio, video, etc. After attaching IP of requesting computer, it forwards the IP packet to local router’s MAC.

Routers have routing tables that indicate where to forward next. When packet arrives at destination, IP headers are removed and requested content is extracted from the TCP segment. It is forwarded to port 80, and displayed in the browser. Tutorial 2 shows a network diagram comprising of local and remote servers. It demonstrates how the ARP, ICMP, DNS, and IP packets travel from within different networks to get a request processed over the Internet. It shows how the IP packets travel from local router to some remote router, and eventually to the destination address’s local router before being delivered at the target.

It shows how the ARP request packets are broadcasted in a network by the router in order to learn the MAC to deliver the IP packets next to. It shows how the DNS request packets travel between DNS servers (local and remote) to trace an IP address of a website. And it shows, how the ICMP error message comes back to the sender in case the request times out. The tutorials give an insight into the requirements for setting up an online collaboration business. It helps understand the fact that instead of a brick and mortar company, a dot-com company can be established too by setting up a website on the Internet.

The employees and managing staff can connect to one another and share information globally. A dot-company could save a lot of investment e.g. building charges, travelling costs, communication and availability issues, etc. Having a high level technical knowledge of how information travels within a client server arrangement of a network, knowing the protocols and various network jargons e.g. topology, routers, switches, etc., a better understanding of the solution designs presented by developers can be achieved.

Understanding the basic working of Internet would inspire possibilities of networking existing businesses locally or remotely, increasing the business productivity and support. Understanding about the flow of traffics, optimization strategies can be devised, etc. Both the tutorials were animations so the teaching method was visual. Tutorial 1 presented a simple slide show while Tutorial 2 provided flexibility to user to define the scenarios. The flow of information could be seen afterwards. The language of the tutorials was kept simple and precise.

In Tutorial 1, every new term was explained briefly as it came along in the presented Internet scenario. The tutorials highlighted the main aspects of how information travels on the Internet without going into extensive details and confusing the beginners. By visually seeing the working of routers, DNS servers, ARP, etc. the intended high level idea of networking was achieved. References Gal, N., Ilan, N. & Shreiber, D. (2005). Internet Communications Flash Animation. Retrieved from http://www2.rad.com/networks/2005/internet/main.

htm Podolsky, S. & Margolis, R. (2005). Client-Server Flash Interactive Animation. Retrieved from http://www2.rad.com/networks/2005/clieserv/main.htm

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Basic Network Technology, Structure, and Protocols Research Paper”, n.d.)
Retrieved from https://studentshare.org/other/1425430-basic-network-technology-structure-and-protocols
(Basic Network Technology, Structure, and Protocols Research Paper)
https://studentshare.org/other/1425430-basic-network-technology-structure-and-protocols.
“Basic Network Technology, Structure, and Protocols Research Paper”, n.d. https://studentshare.org/other/1425430-basic-network-technology-structure-and-protocols.
  • Cited: 0 times

CHECK THESE SAMPLES OF Basic Network Technology, Structure, and Protocols

Communication Process with X-Stream Server

Various issues surrounding the communication processes need in-depth investigation of the entire channel to find out the technicalities and interoperability potential of these layers and protocols.... These layers and protocols are discussed at length in the following lines; A remote user starts this process by accessing the X-Stream Server through internet explorer.... On the other hand TCP/IP is a suite of protocols which operates over this hypothetical model....
5 Pages (1250 words) Essay

Network Analysis - What Is Networking

Through this, there will be a provision on the basis for mutual support and the opportunity in order to recognize partnerships as well as resource-sharing protocols (Andrew, 2006).... Networks can have no specific structure or management, thus being informal.... network Analysis Name: Instructor: Course: Date: network Analysis Networking What is networking?... These relationships will be strengthened and provide more cohesion within a sector during the course of the network development....
5 Pages (1250 words) Essay

Cryptographic Overhead of IPsec Protocol Suit

So to solve this issue researchers are trying to increase the network security at each layer by designing a range of security protocols.... The designed protocols include PGP, S/MIME, and SET which are specifically designed to ensure the security of the application layer.... IPSec IPSec is a complete suite of protocols, which carry out specific tasks.... In this race, IPSec is one of the most important security protocol, which is designed for dealing with the network layer security, ensuring the availability of security services like that data source authentication, access control, data confidentiality and integrity and processing data packages on the IP packet layer (Zheng & Zhang, 2009; Meng, et al....
5 Pages (1250 words) Research Paper

Quality of Service in WiMAX Based Broadband Wireless Networks

Existing protocols and solutionsIEEE's 802 LAN/MAN Standards Committee is almost anonymous with a wireless standards body.... hellip; WiMAX Forum a leading industry consortium and IEEE working groups are working in collaboration of research community to overcome current infrastructure, QoS and implementation issues that are restriction the adoption of WiMAX technology.... WiMAX technology promises a better, more robust and cost effective alternative to existing wireless networking technologies and traditional wire-based broadband Internet connections. IEEE 802....
9 Pages (2250 words) Essay

The New Version of the Internet Protocol

The paper entitled 'The New Version of the Internet Protocol' presents the emergence of information technology that has influenced all the fields of life such as business, health, engineering, manufacturing, communication, entertainment and news and so on.... hellip; Information technology implementations and revolutions are generally business-oriented, with few scholarly applications, some examples include e-mail, customer service, and virtual updates to software, new online multimedia....
7 Pages (1750 words) Term Paper

The Role of Network Topologies in Designing a Network

hellip; Communication protocols characterize rules and ways for exchanging information and data in a computer network.... One of the widely used protocols is the Ethernet, Today, computer networks have become an important aspect of present-day communication.... he network infrastructures like hubs and switches as well as network protocols that are means of accessing remote hosts for exchange of information poses a great risk on the network.... Further, adoption of peer-to-peer technology to reduce the expense of coaxial cables in Ethernet LAN, at the same gives unsecured networking because it bases its operation on the sharing of information....
8 Pages (2000 words) Essay

Computer Technology and the Networked Organization

This essay articulates on network setup and design of a medium-sized food store, the structure of securing, socio-technical linkages and maintaining the network.... Network structure design is compulsory for any computer network, whether it is small business or home network.... The network structure is designed earlier prior linking and installing the software and hardware components.... nbsp;… According to the paper the perfect network for medium-sized food store therefore must be candid and effortlessly controlled....
4 Pages (1000 words) Assignment

Common Use IP Networks: Should They Be Implemented in a Mall

In this report, I have also presented a brief but comprehensive overview of the IP based network implementation support, technology, overview, and data types at the network.... "Common Use IP Networks: Should They Be Implemented in a Mall" paper is about the detailed analysis of the IP network implementation at Mall.... This report provides a comprehensive overview of the main implementation overview of the IP network at Mall....
9 Pages (2250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us