Top-Rated Free Essay
Preview

NTC 405 Week 4 TCP IP Paper

Powerful Essays
1263 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NTC 405 Week 4 TCP IP Paper
TCP/IP

Analyze the current options available for use of TCP/IP and OSI models for businesses.

The 5-layer model serves essentially the protocols regarded as Transmission Control Protocol (TCP) as well as Internet Protocol (IP), or mutually, TCP/IP. The User Datagram Protocol (UDP) is likewise served by this particular model. The 5-layer model was produced alongside with these protocols, anteceding the 7-layer model, and is from time to time known as the TCP Model.

Layer
Name
Function
5
Procedure & Applications
Offer applications services to consumers and programs
4
Transport
Manages information-consistency capacities, i.e., gives a dependable byte stream between two nodes on a system. TCP and UDP exert at this particular level.
3
Internet (occasionally named as the Network Layer)
Gives system addressing and routing, and does so in such a manner as additionally to give a regular address space across numerous lower-level protocols. This makes conceivable the interconnection of systems that describes the Internet. The IP protocol works at this level.
2
Network (occasionally named as the Data Link Layer)
This layer holds whatever IP will run above, e.g., Ethernet, token-ring, and Fiber Distributed Digital Interface (FDDI) systems. Distinct network protocols, e.g., Ethernet, exertion at this level.
1
Physical
Not by any stretch of the imagination a piece of the model, since TCP and IP, as protocols, manages with software as opposed to hardware. This layer is in general considered of as alluding to all hardware with regards to the Network Layer.
It is not difficult to perceive that the 5-layer model was created principally exactly, as individuals picked up experience with the genuine issues of working with inter-computer links and with the answers to those issues.
The point when individuals discuss about OSI, they are typically alluding to what is formally known as the Basic Reference Model (BRM) for Open Systems Interconnection (OSI). The BRM is presently looked after by the International Organization for Standards (ISO), despite the fact that a great part of the starting drafting of the model and its initial declaration was carried out by the International Consultative Committee on Telegraphy and Telephony (CCITT), at the moment referred as the Telecommunications Standardization Sector of the International Telecommunications Union (ITU-TSS or ITU-T). The working gatherings concerned with OSI are a portion of the formal global structure for creating and looking after standards that are regulated by the ISO, inasmuch as the working assemblies concerned with TCP/IP values, the Internet Engineering Task Force (IETF) as well as the Internet Architecture Board, are sort of less formal.

Research options for improving the current use of TCP/IP and recommend new software and equipment that’s available.

The BRM for OSI comprises of 7 layers of protocols, i.e., of 7 diverse ranges in which the protocols work. On a fundamental level, the zones are different and of expanding generality; in practice, the limits between the layers are not generally sharp. The model draws a vibrant difference between services, somewhat that an application system or a higher-level protocol usages, as well as the protocols themselves, which are sets of guidelines for giving services.
Here are the seven levels in the Basic Reference Model intended for Open Systems Interconnection:

Layer
Name
Function
7
Application
Manages with the interface between a client and the host workstation: e.g., Microsoft Word interpreting a signal, started by the client's typing in a series of characters and afterward discouraging the "Search" capacity key, into guidelines to Windows (or System X) to attempt to discover that string in a document.
6
Presentation
Manages with syntactic representation of information: e.g., assent on character code (e.g., ASCII, amplifications to ASCII, Unicode), information-compression and information-encryption routines, representations of designs (e.g., files utilizing the .PIC or .BMP formats)
5
Session
Manages with making and overseeing sessions when one application methodology demands access to an alternate applications methodology (e.g., Microsoft Word importing a particular chart from Excel)
4
Transport
Manages with information transfer between end systems; stream control for two machines (e.g., how Netscape on your computer discusses with the UT Libraries Online Webpage)
3
Network
Manages with building ways for information between a pair of Pcs and taking care of any exchanging around elective courses between the machines, and also with meanings of how to break documents (or messages) up into unique packets of information, in such a manner that the packets could be transferred and afterward reassembled.
2
Data-Link
Manages with the transmission of information frames (e.g., packets) over a physical connection between network substances, comprising the combination of mistake-correction coding into the information frames.
1
Physical
Manages with the physical (i.e., electrical and mechanical) parts of transmitting information (e.g., voltage levels, pin-connector outline, cable

Describe how use of equipment, software, and multiplexing could aid in improving use for communications which would reduce network congestion.

The OSI movement was a critical thrust in the realm of PCs and computing in the early 1990s. Its objective was, and is, to give principles to which all workstation hardware and software sellers will follow, with the goal that the current variety of interconnection as well as interface practices can be decreased, hence decreasing the expenses of outlining and transforming both hardware and software. The U.S. Government, over and done with the National Institute of Standards and Technology (NIST; previously, the National Bureau of Standards), and numerous states, comprising Texas, have upheld the OSI development through contractual arrangements and enactment. On the other hand, in numerous areas, the OSI development has failed to win backing for its formal models, de jure guidelines, which have offered approach to standards forced in the commercial center, de facto norms.
The O'Reilly Dictionary of PC Hardware and Data Communications Terms amounts up the OSI advancement as:

A set of protocols and principles supported by the ISO for information interchanges between otherwise contrary PC systems.
Unluckily (for the numerous individuals and organizations that invested so much time and cash on the exertion), the TCP/IP set of protocols has obscured OSI, and you don't perceive much about OSI any longer (with the exception of a couple of applications, for example, the X.500 directory administration).
The point when work started (in the late 1970s) on giving a standard strategy for interchanges between distinctive hardware platforms, TCP/IP was not viewed as a choice for genuine business applications, ever since TCP/IP: Obliged you to run UNIX (which, at the moment, was not utilized for business applications and had just a command-line client interface) had lowly security and management characteristics. Had excessively little an address size

Along these lines the ISO pushed improvement of OSI (how palindromic).
Despite the fact that all significant (and numerous minor) computer merchants now have OSI items, the OSI protocols were never generally executed, and TCP/IP has turned into the first decision for multivendor networking, on account of its: Lower-expense and more-proficient execution (less CPU time necessary, littler programs)
Accessibility for most operating systems
Quick standardization and improvement cycle (normally utilizing the Internet to facilitate correspondences) when a new prerequisite is distinguished
Recognition around college graduates (universities utilize TCP/IP, so as soon as out of school, a graduate's first decision when planning a system is to utilize TCP/IP)
Simpler-to-access (and no-cost) documentation and norms (they are all accessible on the Internet)

Reference
Panko,R.R.,&Panko,J.L.(2011).Businessdatanetworksandtelecommunications(8thed.).UpperSaddle River,NJ:PearsonEducation.

Peterson,L. L., &Davie,B. S.(2012)Computernetworks(5thed.).Burlington,MA:Elsevier Serpanos,D.,&Wolf,T.(2011).Architectureof networksystems.Burlington,MA:Elsevier.

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 9

    • 1048 Words
    • 5 Pages

    It accepts Layer 3 packets and decides the path by which to forward a frame to a host on a remote network.…

    • 1048 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    The 7 layers can be split logically into two subgroups. Layers 7 thru 4 focus on the end to end communication of data source and destinations. Layers 3 thru 1 are provide consistent communication between the network devices. An easier way of looking at the OSI model is dividing the upper layers (7, 6, 5) from the lower layers (4, 3, 2, 1). The upper layers deal with application issues and are implemented only in software. The highest layer, the application layer, is the closest to the end user. The lower layers are responsible for the transportation of the data. The physical layer and the data link layer are implemented in hardware and software. The lowest layer, the physical layer, is closest to the physical network medium (the wires, for example) and is responsible for placing data on the medium.…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    NT1210Unit3Lab3

    • 1288 Words
    • 4 Pages

    Exercise 3.3.3 The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and functions of each of these.…

    • 1288 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 1 Assignment

    • 987 Words
    • 4 Pages

    Layer 3: The network layer...This layer handles the routing of the data (sending it in the right direction to the right destination on outgoing transmissions and receiving incoming transmissions at the packet level). The network layer does routing and…

    • 987 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    4. The data link layer strips the data-link header and trailer, and then passes the remaining data up to the network layer.…

    • 648 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    TCP/IP reference model; includes all information as OSI but only has 5 layers and not 7, Layer 5 includes layers 5, 6 and 7 combines.…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Essay

    • 418 Words
    • 2 Pages

    The Network Layer is accountable for implementing a logical addressing scheme and for transporting the packets from one end to the other end. The network layer can be connectionless or it can be connection oriented. This layer is also responsible for breaking larger packets up for delivery depending on the media this is known as packet switching. These protocols include Apple talk DDP, IP, and IPX.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT 1210, Unit 3 Homework

    • 1335 Words
    • 5 Pages

    6. The TCP/IP model refers to standards other than those the IETF defines in RFCs. Which of these standards…

    • 1335 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1210 Final Exam Notes

    • 1243 Words
    • 5 Pages

    The TCP/IP model organizes its standards into layers. The layers make TCP/IP easier for humans to understand what TCP/IP does. It also makes it easier to divide the work among different products. * - write protocols, - create standards, - how networks work*…

    • 1243 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Mis 589 Unit 7

    • 943 Words
    • 4 Pages

    Each computer in the network has software that operates at each of the layers and performs the functions required by those layers. Each layer in the network uses a formal…

    • 943 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    unit 3 assignment 3

    • 854 Words
    • 3 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.) C) The physical layer sits just below the data link layer. D). The network layer sits in the middle of the five layers.…

    • 854 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Using the five layer Internet model - A message transmitted from one computer to another would start in the application layer where letters, numbers, and keystrokes of the message are converted into HTTP packet. The message would then be send through the transport layer, which would establish, maintain, and terminate the connection between the computers for…

    • 721 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The notes discuss many aspects of computing and computer communication focusing in networking protocols, procedures, programs, and concepts, but also including meeting notes, opinion, and sometimes humor. The specification documents of the Internet protocol suite, as defined by the Internet Engineering Task Force (IETF) and its steering group (the IESG), are published as RFCs. Many of the TCP/IP protocols and PPP protocols are defined by rfc's. RLOGIN Remote Login, allows UNIX users of one machine to connect to other UNIX systems across the Internet and interact as if their terminals are directly connected to the machines (TCP/IP). RLP Radio Link Protocol RM Cells Rate Management cells (ATM cells).…

    • 3215 Words
    • 13 Pages
    Satisfactory Essays