Thursday, June 20, 2019
The processes that occur in the Network when you Essay
The processes that occur in the Network when you - Essay ExampleThere are several processes that are running concurrently, both at horde and client ends, to make this communication a success. A thorough knowledge of these devices and their roles, protocols and associated technologies, at various levels of the net profit, is required for understanding the process that take place in a network for communication to occur successfully. Analyzing the process at various layers of a network demands a methodical comprehension of a broad clean picture of the communication channel and protocol stack that might be at work behind the scene. More often than not, access to snobby networks, standardized the X-Stream server from our home or some other remote location is materialized through Virtual Private Network (VPN) technology. VPN is drug abused to access a private network, like a university Learning Management System (LMS), over a public network like the Internet. When a student access X-Stream Server over a public network, this implementation of VPN is known to be an Access VPN. VPN ensures a secure access to the private resource through implementation of security at various layers of the communication channel. ... rs used to define communication spectrum over the transmission control protocol/IP suit of protocols includes Application grade, armament to Host Layer , Internet Layer and Network Access Layer. The process that occurs on the network is mainly the study of data as it travels through the TCP/IP stack because WAN is hardly used as a vehicle to carry data and no significant processing is done as far the data is concerned. There are several important protocols that forms a part of the TCP/IP protocol suite which includes FTP, TFTP, VoIP, HTTP, ICMP, UDP, ARP and RARP etc. Moreover the RIP and OSPF are also the part of TCP/IP protocol suite which ensures the routing of the information over a network. From a users perspective the process that occur on a n etwork starts with the use of application software that can talk to a underlying network e.g. a web browser that uses HTTP to make things happen for a user. arriver refers this as the application level internet service and states, From a users point view, the internet appears to consist of a set of application programs that use the underlying network to carry out useful communication tasks(3). Moreover the academic term of communication instance is maintained at the Application Layer, however these session are not logged by HTTP. Each HTTP request is self-contained the server does not keep a history of prior request or previous sessions (Comer, 490). At next level the processes to ensure and enforce the data integrity, correctness and reliable packet delivery are guarded by the Host to Host layer. This layer also segments and sequences the continuous stream of data that leaves a user end and reassembles it at server end while acknowledging the receipt of each segment. As each seg ment of data is received at the destination, an
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.