The History Of Communication Protocols Analysis

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Name of student

Name of course instructor

OSI Model:

Practically all networks operating today are based in some manner on the Open Systems Interconnection (OSI) guideline. The center of this guideline is the OSI Reference Model, a pack of seven layers that describe the different phases that data must go through to cover from one device to another over a network. The seven layers are separated into two sets:

Application Set

Layer 7: Application - This layer interacts with the application or the OS whenever the user selects to read messages and transfer files etc.

Layer 6: Presentation - It takes the data supplied by the Application layer and transforms it into a standard format, understandable for other layers.

Layer 5: Session – It sets up, preserves and ends communication with the receiving device.

Transport Set

Layer 4: Transport - This layer retains flow control of data and checks for errors and retrieval of data between the devices. Flow control means that it looks if data is coming from more than one application and combines data of each application into a single flow for the physical network.

Layer 3: Network - The manner in which the data will be sent to the recipient device is control is dealt in it. Routing, Logical protocols and addressing are tackled here.

Layer 2: Data - the appropriate physical protocol is allocated to the data, here. The packet sequencing and the kind of network are determined.

Layer 1: Physical - This is the level of the genuine hardware. It describes the physical characteristics of the network such as voltage levels, connections and timing.

The OSI Reference Model is actually a set of instructions. Actual protocol stacks often amalgamate one or more than one of the OSI layers into a single layer. (Wison, 2003).

UDP:

UDP (User Datagram Protocol) is a communication convention that presents a restricted quantity of service when messages are interchanged between computers in a network that uses the Internet Protocol (IP). UDP is a substitute to the Transmission Control Protocol (TCP) and in combination with IP it is sometimes known as UDP/IP. (Suman, 2008).

Similar to the Transmission Control Protocol, UDP uses the Internet Protocol to get a data unit from one computer to another. Dissimilar to TCP, UDP does not supply the service of splitting a message into packets and gathering together again at the other end. Particularly, UDP doesn't supply sequencing of the packets that the data comes in.

This shows that the application program that is running on UDP must be capable to make sure that the whole message has come and is in the correct order. Network applications that want to reduce processing time because of their small data units to exchange may rather have UDP to TCP. Only Trivial File Transfer Protocol (TFTP) uses UDP as a substitute for TCP.

UDP supplies two services not given by the IP layer. It provides a checksum potential occasionally to confirm that whole data reached and port numbers to assist discriminate different requests of users. In the Open Systems Interconnection (OSI) communication model, UDP is used in the Transport Layer (Layer 4).

One commonly use of UDP is as a tunneling protocol, where a underpass endpoint summarizes the packets of another protocol inside UDP datagrams and transfers them to another underpass endpoint, which de-capsulate the UDP datagrams and forwards the actual packets included in the payload. Underpasses set up artificial connections that become visible to directly link locations that are far off in the physical Internet topology, and can be used to produce private networks. Using UDP as an under passing protocol is appealing when the payload protocol is not maintained by middle boxes that may exist along the route, because many middle boxes maintain UDP transmissions.

TCP/IP protocols:

TCP/IP (Transmission Control Protocol/Internet Protocol) is the fundamental communication language of the Internet. It can also be recognized as a communications protocol in a private network. When you are established with direct entry to the Internet, your computer is supplied with a copy of the TCP/IP program just as every other computer that you may get information from or send messages to the one, which also has a duplicate of TCP/IP.

TCP/IP is a two-layer program. The upper layer, controls the gathering of a file or message into smaller packets. The lower layer manages the address section of each packet so that it gets to the accurate destination. TCP/IP uses the server framework of communication in which a client appeals and is given a service, for example, sending a Web page by another server in the network. TCP/IP communication is essentially point-to-point means each communication is from one point in the network to another point or computer. (Garry, 1995).

TCP/IP and certain other applications that use it are mutually called as stateless because each client request is contemplated a new request not related to any previous one – different from usual phone conversations that need a committed link for the duration of call. Being stateless unoccupied network routes so that everyone can use them unbrokenly. Remember that the TCP layer itself is not stateless if any one message is concerned. Its link stays in place until all packets in a message have been acquired.

Protocols related to TCP/IP comprise of the User Datagram Protocol (UDP), which is used in place of TCP for distinctive motives. Network host computers for exchanging router information use other protocols. These consist of the Interior Gateway Protocol (IGP), Internet Control Message Protocol (ICMP), and the Border Gateway Protocol (BGP), the Exterior Gateway Protocol (EGP)

NAT:

Network Address Translation permits a single device, for instance a router, to behave as broker between the Internet (public network) and a local (private) network. The Internet is growing at a rapidly increasing rate. As the quantity of resources and information increases, it is becoming a need for homes and even the smallest businesses to link to the Internet.

Network Address Translation (NAT) is a way of linking multiple computers to the Internet using one IP address. This grants home users and small businesses to link their network to the Internet inexpensively and logically. The momentum towards increasing use of NAT comes from a variety of factors: security needs, a world shortage of IP addresses and Ease and flexibility of network administration. (Steudler, 2000).

NAT is the transcription of an I.P. address used in the company of one network to a different IP address known within another network. One network is classified the ‘network inside’ and the other is the ‘network outside’. Normally, a company plans its local inside network addresses to one or more global outside IP addresses and un-plans the global IP addresses on incoming packets back into local IP addresses.

Moreover, It assists in making sure the security since each incoming or outgoing request must go through a transcription process that also proffers the chance to authenticate or qualify the request or compare it to a previous request. NAT also saves the number of global IP addresses that an organization requires and it enables the organization use a single IP address in its communication with the world. 

NAT is consisted of as part of a router and is a part of a corporate firewall. Network administrator forms a NAT table that does the local-to-global or global-to-local IP address mapping. NAT can also be used in association with policy routing. NAT can be steadily described or it can be establish to boldly translate from and to a pool of IP addresses.

Communication Protocols Recommendations:

For Cane Ridge Medical Center, I will suggest client-server model should be used; TCP/IP and UDP should be used for distributed networking. It becomes apparent that these standard protocols give substantial assistance with the low-level features of reliable network communications.

In client-server applications, the server supplies certain services, for instance, operating database questions or sending out valid stock prices. The client uses the service given by the server, either portraying database query solutions to the user or making stock purchase suggestions to an investor. The communication that happens between the server and the client must be authentic. No data can be released and it must reach to the client side in the same sequence in which the server sent it.

There are a number of servers we experience in a distributed system. For instance, file servers control disk storage units on which file systems inhabit. Database servers house databases and make them accessible to clients. Network name servers execute a mapping between a service description or symbolic name and a value such as an IP address and port number for an operation that supplies the service. (Paul, 2003).

The Internet Protocol (IP) apartment is the group of communication protocols that permit for communication on the Internet and most commercial networks. The Transmission Control Protocol (TCP) is one of the central protocols of this apartment. Using TCP, clients and servers can establish links to one another, over which they can interchange data in packets. The protocol guarantees authentic and in-order carriage of data from sender to receiver.

The IP suite can be perceived as a pack of layers, each layer having the characteristic that it only uses the purposes of the layer below, and only exports functionality to the layer over. A system that executes protocol action comprising of layers is referred to as a protocol stack. Protocol stacks can be executed either in software or hardware, or a mixture of both. Normally, only the lower layers are executed in hardware, with the higher layers being executed in software.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now