Applications uses network to interact with thousands of services and devices on the internet. The following are the examples of services which applications interact over the internet.
Application layer at the local level enable the following local user applications include:
Sneaker Net. This involves an approach that’s users shared data by transporting from source to the destination using floppy disk. This happens if the source and destination of computers does not have network which will enable them to share directly.
Categories of Application Interactions
Client Server Architecture
This type of architecture have one or more clients consuming resources. The server is dedicated to produce resources that are being consumed by the client. The host that is server host and manages the resources for the client(s).
Example of Client Server Application include:
Role of Server in this Architecture
Peer to Peer Architectures
In this model a machine a machine in a network can act as a server and client at the same time. All the peers’ machine in the network can share shared resources hosting by another peer. Therefore does not requires a dedicated server in the network. The server roles can be shared among peers in the network.
Advantages of Peer and Peer Network and Client Server Architectures
Disadvantages of Peer to Peer and Client Server Architectures
This involves mainframe computers which are powerful and have attached dummy terminals for inputting jobs and outputting. The mainframe will process jobs instructed to do through terminals for example Citrix server.
Cloud Based Architectures
This involves cloud operators giving resources such as platforms, applications, operating system and network services to the organization which consumes by using their infrastructure. The resources consumed by the organization will be charged. The following are the examples of cloud providers include:
Infrastructure as a service
This involves cloud providers managing hardware and networking component as services while the organization is responsible for providing Softwares such as operating system which are responsible to run on the hardware. The organization are responsible to provide virtualization if they want to use in the organization.
Platform as Services
This involves cloud providers offering hardware, software, and base database and any other software. The organization manages their own data and custom applications.
Software as a Services
This involves cloud providers providing infrastructure and Softwares to the client. Organization only modify the application to suit their own needs.
Common Internet Application
Network Protocols
Protocols are set standard of rules which applications must adhere in order to communicate in the network for example Web Applications uses Hypertext Transfer Protocol.
Application Layer Protocol
Role of Application Layer Protocol
Basic Aim of Networking
Data being sent in the network must remain intact without being changed.
Protocol Headers
Data passes protocol stack in the network. Each protocol stack add data to the header at each layer for example:
The headers supply information to the associated layer of the destination machine. The information in these headers informs the destination where the data came from and other essential details.
Internet Network Layer
Address Resolution Protocol determines MAC address of local machine in the network with a specific IP address attached. ARP sends broadcast message asking for the owner of IP address. If the computer owning the IP address respond the MAC address is created by entering into ARP Cache. ARP entries are created when communication is established in the network. ARP entries age out depending on the operating system platforms.
IP Addressing
There are two types of IP address:
In the network one IP address is allocated to one machine.
How Computers Get Ip address in a network
Manual Administration. This involves assigning IP to computer using static methods. The administrator will keep track of IP Address in the spreadsheet. Though this method is tedious in a complex network which have many users.
Automatic Administration. This involves using Dynamic Host Configuration Protocol to allocate IP address, gateway and DNS settings dynamically to the computer in network.
Network / Node components of an IP address
An IP address has two components include: Network Bit which identify the network subnet which host is in it. Node bit this is a unique to each unique computer in the network and it is used to identify each computer in the network. Subnet Mask a subnet mask applies to all machines (hosts) on an IP network.
Determining the network address of an IP address
Type of IP Address include
Network Address Translation
NAT provide internet to computers in local area network. This is achieved through NAT translating local IP address to the router IP address.
Role of Router
It move the packet from one path to its destination. Router is intelligent device in the network that communicate with one another to ensure all routers know about network changes.
Internet Assigned Numbers Authority (IANA)
IANA is the overseeing body for the naming of Internet domains. IANA delegates naming for different geographical regions of the world to other naming authorities.
Physical Layer
This is the connections of physical devices in the network.
Type of data
Data Transmissions
Point to Point Circuit This involves connections between two devices in the network.
Multipoint Circuit. This involves one media being shared by several devices in the network for example WIFI.
Data Flow
Simplex Data Flow This involves sending data in one direction.
Half Duplex Data Flow. This involves data moving from both direction but one at a time.
Full Duplex Data Flow. This involves data moving in both direction at the same time.
Multiplexing
This involves dividing communication channels so that it allow several connection at the same time.
Methods of Multiplexing
Digital Transmission of Data. This involves data being send by a sender to receiver through a media of communication.
Example of Transmission media
Topics Questions
Topic 4
LLC receives the frames from the physical Layer below and hand over the datagram to L3 protocol at the network layer above.
One of router NIC is connected to the local area network while the other one is connected to the other networks. This will ensure router to perform NAT.
When there is local traffic new ARP entries are created so IP Address and Mac address are added as an entry. ARP entries are removed from cache when the period has expired. Expiry period of ARP cache varies from different Operating System
Because next hope must know the packet details such as source, destination and type of data to be exchange between the sender and receiver. The headers supply information to the associated layer of the destination machine. The information in these headers informs the destination where the data came from and other essential details.
Topic 6
16 bits
Explain how you arrived at this number.
8 *2 = 16 bits
Discuss how the data meant for one browser tab is never mixed up with that of the other tab.
Each browser tab have unique port number which will be used to combine the host IP address and a unique port number for every request to be made therefore data are isolated from mixing up.
Client sends a SYN packet data to server through internet protocol. If the server has an open port then it accept the connection and acknowledge the client that it has accepted through a SYN/ACK packet data. Then client respond back to the server with ACK data packet acknowledging that the connection has been initiated.
TCP uses sender buffer to store packets needed to be send and TCP receiver will use receiver buffer to extract all the packets.
Topic 8
Type 1 virtualization run directly on a hardware while Type 2 run on the operating system.
Describe the changes that have occurred.
1G only supported voice. 2G Supported Voice and Simple data such text message. 3G supports Web browsing, email, video downloading, picture sharing. 4G speed range between 100Mbps and 1Gbps.
Cell is responsible for transmitting and receiving signal. Base station is responsible for sends and receives radio signals and is responsible for forming the cell area. Mobile switching center. This is where call set up and switching for mobile takes place.
Base station is responsible for handing over a mobile phone to another base station when user is leaving a radius that base station can cover and approaching another radius of another base station. Mobile switching is responsible for call set up and switching and routing mobile phone to another route of new base station.
References
What is a Base Station Controller? – Definition from Techopedia. (2018).
Cellular Base Stations – Engineering and Technology History Wiki. (2018).
Cellular Base Stations – Cellular Sites. (2018).
Quick Tips: Flush the ARP cache in Windows 7. (2018).
An Inside Look at TCP Headers and UDP Headers. (2018).
What is a Three-Way Handshake? – Definition from Techopedia. (2018).
profile, V. (2018). Circuit Switching, Packet Switching, and Message Switching.
What’s the difference between Type 1 and Type 2 hypervisors?. (2018).
TCP Flow Control. (2018).
Functions of LLC and MAC sub-layers of Data Link Layer | Computer Networking Demystified. (2018).
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download