Preview

Internet Protocols

Satisfactory Essays
Open Document
Open Document
542 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet Protocols
Internet Protocols
NAME
CIT/278
May 27, 2013
Professor
Internet Protocols
Internet protocols, or Internet rules, are the standards used to send data from one computer to another. The protocols that expedite data transfer include Internet Protocol Versions Four and Six, Remote Access, Hyper Transfer, File Transfer, Electronic Mail, and Network News Transfer. Communication and information transfer on the Internet is becoming available in constantly increasing speeds. Internet protocols use these increasing speeds by facilitating communication, and information transfer, while benefiting the end user.
Internet Protocol Versions Four and Six are systems that give each device connected to the Internet an address. Similar to a physical street address, the creators of the Internet ensure the accommodation of the enormous number of current and future Internet users (Lane, p. 92, 2011). Internet Protocol Version Six eventually will take the place of Version Four. Version six can handle more end users, is more efficient, and faster than its predecessor. As an end user, my Internet devices use this Internet protocol every day and thankfully, speeds are always increasing.
Remote Access Protocols are used by remote devices during dial-up and direct Internet connections. These devices, such as personal computers, are capable of operation independently of a network or the Internet. Most dial-up connections use Point-to-Point Protocol while direct Internet connections use Point-to-Point Protocol over Ethernet (Lane, p. 93, 2011). These two protocols use the same methods but Point-to-Point Protocol over Ethernet allows the connection to take place at faster speeds. My family and I currently utilize Point-to-Point Protocol over Ethernet by cable modem that allows for fast connections.
Hypertext Transfer Protocol and File Transfer Protocol are both capable of downloading files. Hypertext Transfer Protocol allows transfer of Web pages and file exchange across the Web.

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 4 Assignment

    • 1851 Words
    • 8 Pages

    CHAPIN, L. 1992. The Internet Standards Process [Online]. IEFT. Available: https://tools.ietf.org/html/rfc1310 [Accessed 10th April 2016].…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    File Transfer Protocol. This is the main protocol, or service that is utilized during file transferring between…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In a computer network internet protocol is used for communication, to each device such as printers and computers a numerical label called an IP (Internet Protocol) Address is assigned. There are two functions of an IP Address a host or network interface identification, and also provides a location addressing. The basic elements of a network are the IP Address and Subnet Mask. There is also switching and routing which after you connect devices to switches and routers, data packets can be moved across the network. The Internet Protocol Version 4 (known as IPv4) is a protocol highly used even today, this IP Address consist of a 32-bit number in decimal or binary in four parts. In 1995 Internet Protocol Version 6 (known as IPv6) was created due to a high growth of the Internet, and the reduction of…

    • 413 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    With admirable foresight, the Internet Engineering Task Force (IETF) initiated as early as in 1994, the design and development of a suite of protocols and standards now known as Internet Protocol Version 6 (IPv6), as a worthy tool to phase out and supplant IPv4 over the coming years. There is an explosion of sorts in the number and range of IP capable devices that are being released in the market and the usage of these by an increasingly tech savvy global population. The new protocol aims to effectively support the ever-expanding Internet usage and functionality, and also address security concerns.…

    • 981 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    TCP / IP Model - provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.[1][2] From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment (link), the internet layer, connecting hosts across independent networks, thus establishing internetworking.…

    • 559 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Final Exam

    • 2055 Words
    • 9 Pages

    The set of rules for delivering Web page files over the Internet is in a protocol called the Hypertext Transfer Protocol (HTTP).…

    • 2055 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Today the Internet and the means to access the Internet has changed radically from the days of the modem. We now use lightning fast networks that include broadband, T1, satellite and digital wireless connections. The modernization of network technology has enabled the invention of cell phones, and other devices that allow users to access the Web and other networks from almost anywhere in the world and beyond.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computers use network protocols to communicate with computer network there are many network protocols as Hallberg (2005, p92) said “for example, transmission control protocols/internet protocols (TCP/IP) defines a set of rules used to send data from one node on a network to another node”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Exercise 1

    • 617 Words
    • 2 Pages

    Transferring data that is being sent by the user who has created and initialized the transfer of information using a source such as an email service for example. How do you get information from one computer to another, and how do you make it simple and easy to do this?…

    • 617 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 9 L3 BTEC IT P2

    • 339 Words
    • 2 Pages

    A protocol is the set of rules used when computers communicate. In this report I am going to explain the importance of protocols and standards.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Rescorla, E. and Schiffman, A. (1999). The secure hypertext transfer protocol. Internet engineering task force. Retrieved from http://tools.ietf.org/html/rfc2660…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Protocol (TCP/IP). TCP/IP is the most pervasively used networking model in the history of networking. You can…

    • 9655 Words
    • 37 Pages
    Good Essays
  • Satisfactory Essays

    The designers of the Internet Protocol defined an IP address as a 32-bit number and this system, known as IPv4, is still in use today. However, due to the enormous growth of the Internet and the predicted depletion of available addresses, a new version IPv6, using 128 bits for the address, was developed in 1995. IPv6 was standardized as RFC 2460 in 1998, and its deployment has been ongoing since the mid-2000s.…

    • 534 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Tcip and Ip Protocols

    • 845 Words
    • 4 Pages

    The factors that account for the success and popularity of TCP/IP are integrated addressing system, design for routing, underlying network independence, scalability, open standards and development process, and university. TCP/IP includes within it a system for identifying and addressing devices on both small and large networks. Unlike some network layer protocols, TCP/IP is specifically designed to facilitate the routing of info over a network of arbitrary complexity. TCP/IP operates primarily at layers three and above, and includes provisions to allow it to function on almost any lower layer technology, including LANs, wireless LANs, and WANs of various sorts. One of the most amazing characteristics of TCP/IP is how scalable its protocols have proven to be. The TCP/IP standards are not proprietary, but open standards freely available to the public. Everyone uses TCP/IP because everyone uses it.…

    • 845 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Ipv6 Security Issues

    • 3070 Words
    • 13 Pages

    Internet Protocol v6 (IPv6) is replacing Internet Protocol v4 (IPv4). The need for IPv6 has risen to the forefront due to the depletion of IPv4 addresses. Security concerns and issues have slowed the adoption of the new protocol. Trade information is readily available for IPv6. A simple web search on the topic will lead you to trade magazine articles, books, white paper and even the government agency recommendations. The marketplace is brimming with “solutions” to IPv6 security issues, but industry experts warn against implementing the ‘software solution’ in lieu of advanced investigation and planning (Ashford, 2011; Gont, 2012; Goodin, 2010).…

    • 3070 Words
    • 13 Pages
    Best Essays

Related Topics