Top-Rated Free Essay
Preview

WIMAX

Satisfactory Essays
1166 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
WIMAX
Table of Contents
1.Introduction 3 1.1 Background………………………… 1.1 Overview…………………………………………………………………………………………………………………………………………………2 1.2 Objectives…………………………………………………………………………………………………………………………………………………
2.Methodology 4
2.1Guideline Books 5 2.2 Web Browsing……………………………………………………………………………………………………………………………………………7 2.3 Research Articles…………………………………………………………………………………………………………………………………........8 2.4 Social Survey
3.Discussion
3.1 Analysis of Internet Protocol in communication networking. 3.1.1 TCP/IP Technology 3.1.2 TCP/IP Protocols stack 3.1.3

1.INTRODUCTION
1.1 Background
The Internet protocols are the world’s most open system protocol suite because they can be used to communicate across any set of interconnected networks and are equally well suited for LAN and WAN communications. The Internet protocol consists of a suite of communication protocols, of which the two best known are TCP (Transmission Control Protocol) and IP (Internet Protocol). The IP suits not only include the lower layer protocol (such as TCP and IP) , but it also specifies some of the applications such as: Electronic mail and File Transfer.
Internet Protocols were firstly developed in mid- 1970s, when the DARPA ( Defence Advanced Research Projects Agency) became interested in establishing a packet-switched network that would facilate communication between dissimilar computer system in research institutions. The result of this development effort was Internet Protocol suite , completed in 1970s.
TCP/IP later was included with Berkeley Software Distributions (BSD) UNIX and has since become the foundation on which the internet and the World Wide Web (WWW) are based.
The documentation of the Internet Protocols (including new or revised protocols) and policies are specified in technical reports called Request for Comments (RFC’s), which are published and then reviewed and analyzed the Internet community. And, the protocols refinements are published in the new RFCs.
1.2 Overview In these days, the evolution of technology has been rapidly turning in advanced mode. The protocols are also mainly responsible for it. An actual communications are defined by various communication protocols, without standard protocols any network model itself doesn’t provides specific communication methods. In the context of data communication, A Protocols is a formal set of rules, conventions and data structure that governs how computers and other network devices exchange information over a network. In other words, Protocols is a standard procedure and format that two data communication must understand, accept and use to be able to talk each other.
A wide variety of communication protocols are in existence. These protocols are defined by many well-known standard organizations throughout the world and by technology vendors overs years of technology evolution and development. One of the most popular and important protocols suites is TCP/IP, which is also known as the heart of internetworking communications. The IP (Internet Protocol) is responsible for exchanging information between routers while, TCP (Transmission Control Protocol) is responsible for ensuring the data packets which are transmitted across the network reliably and error free. The LAN and WAN are also the critical protocols in communication networking.
Today’s new technologies are based on accumulation over years of technologies, which may be still existing or obsolete. Because of this, the protocols which define the network communications, are highly inter-related. Many protocols rely on others for operation. For example, many routing protocols use other network protocols to exchange information between routers.
In modern protocol design, the protocols are layered according to OSI (Open System Inter-connection ) model. Layering is a design principle which divides the protocol design into to the number of smaller parts. Layering is also permits familiar protocols to be adapted to unusual circumstances. The header in each layer reflects the structure of the protocols. Actually, detailed procedures and rules of protocols are often defined by lengthy document. For example:- IETF uses RFCs(Request For Comments) to define protocols and updates the protocols.
Most of recent protocols are designed by IETF for Internet working communication, and IEEE for local area networking (LAN) metropolitan area networking (MAN) and telecommunications protocols. ISO also has its own suites of protocols for internetworking communications, which is mainly developed in European countries.

1.1Objectives
1. To understand the TCP/IP technology in communication networking.
2. To understand the stack part of the TCP/IP in communication networking.
3. To understand the Advantages of TCP/IP in real world.
4. To understand the working mechanism of TCP/IP. 2. Methodology
2.1 Guideline Books
The primary source for my research is the protocols guideline books. I uses most of the books related to protocols but primary books are 2nd edition of protocol handbook and 4th edition of Data communication and networking by Behrouz A. Forouzan. This helps me a lot for this research. This guidelines hardcopy has mentioned the detailed information of networking communication architecture and protocols, Different Applications, Network communication protocol maps, working mechanism of protocols, Advantages and Disadvantages of protocols etc. 2.2 Web Browsing
The Internet surfing process is one of the best way to collect and find out the actual descriptions and information. I often use various search engines like: Google, Ask, etc. for my research because it contains all the information related to the development history of protocols, working mechanism, application parts of protocol, system model structure of protocols, etc. Though My primary source of gathering information are Protocol guidelines books and Research articles but it also help me a lot for other related tasks like visual description of system architecture used in protocols and so on.
2.3 Research Articles
However, this type of method is similar to Guideline book but I preferred it in different way by searching articles in internet rather than searching hardcopy. This was also helpful for my research. The s

3. Discussion
3.1 Analysis of TCP/IP in Computer Networking
3.1.1 TCP/IP Architecture Model
TCP/IP architecture model is different from OSI model. It has only four layer which is less than OSI. The Four layer of it is designed in such a way that when data is sent, each layer treats all of the information from upper layer of the data, adds control information to the front of the data and then pass to lower layer. And when data is received , the opposite procedure takes place and removes its header before passing the data to the upper layer. It has four layer that has been described below:
(i)Application layer:- It groups the function of OSI Application, Presentation layer and Session layer. Most of the application layer protocols are associated with one or more port number.
(ii)Transport layer:- Here , we have two Transportation protocol which are TCP and UDP. TCP(Transmission Control Protocol) gurantees the information transmission and UDP(User Datagram Protocol) transports datagram without end-to-end realibility.
(iii) Network layer:- However, IP is the primary protocol for TCP/IP Network layer. There are also other protocol like ICMP to manager routing process.
(iv)Network Access layer:- The Data link layer and are Physical layer are grouped together to become a Network Access layer in TCP/IP.

3.1.2 How TCP/IP Protocol Stack Works?
In above figure, we can see the TCP/IP Protocol stack block diagram which includes 4 layers: Application layer, Transportation layer, Network layer and Network Access layer. Now, we will discuss the working mechanism of different stack protocols. There are many protocols included in four layer of TCP/IP which is shown detailed in below table chart:-

You May Also Find These Documents Helpful

  • Powerful Essays

    NT1210Unit3Lab3

    • 1288 Words
    • 4 Pages

    Exercise 3.3.3 The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and functions of each of these.…

    • 1288 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    In a computer network internet protocol is used for communication, to each device such as printers and computers a numerical label called an IP (Internet Protocol) Address is assigned. There are two functions of an IP Address a host or network interface identification, and also provides a location addressing. The basic elements of a network are the IP Address and Subnet Mask. There is also switching and routing which after you connect devices to switches and routers, data packets can be moved across the network. The Internet Protocol Version 4 (known as IPv4) is a protocol highly used even today, this IP Address consist of a 32-bit number in decimal or binary in four parts. In 1995 Internet Protocol Version 6 (known as IPv6) was created due to a high growth of the Internet, and the reduction of…

    • 413 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    With admirable foresight, the Internet Engineering Task Force (IETF) initiated as early as in 1994, the design and development of a suite of protocols and standards now known as Internet Protocol Version 6 (IPv6), as a worthy tool to phase out and supplant IPv4 over the coming years. There is an explosion of sorts in the number and range of IP capable devices that are being released in the market and the usage of these by an increasingly tech savvy global population. The new protocol aims to effectively support the ever-expanding Internet usage and functionality, and also address security concerns.…

    • 981 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    TCP / IP Model - provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.[1][2] From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment (link), the internet layer, connecting hosts across independent networks, thus establishing internetworking.…

    • 559 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    NT 1210, Unit 3 Homework

    • 1335 Words
    • 5 Pages

    6. The TCP/IP model refers to standards other than those the IETF defines in RFCs. Which of these standards…

    • 1335 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Geico

    • 4161 Words
    • 15 Pages

    workforce. The top five are described in the text (pp. 15-17). The following paragraphs discuss…

    • 4161 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    6) TCP/IP: The Transmission Control Protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet and the methods for reassembly of the original document or file at the destination. The Internet Protocol specifies the structure of those packets and how to route them to the proper destination.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Best Essays

    References: Gilbert, H. (1995). Introdcution to TCP/IP. Retrieved April 6, 2008, from Yale.edu Web site: http://www.yale.edu/pclt/COMM/TCPIP.HTM…

    • 2834 Words
    • 12 Pages
    Best Essays
  • Satisfactory Essays

    It 240 Appendix F

    • 260 Words
    • 2 Pages

    Transmission Control Protocol / Internet Protocol (TCP/IP) TCP is the protocol used in networking that provides a connection-oriented, reliable way for applications to communicate large amount of data at one time over a network. IP is a connectionless protocol responsible for addressing network devices, and routing packets between…

    • 260 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cis532 Assignment

    • 3352 Words
    • 14 Pages

    In 1970 the head of the Network Working Group, Steve Crocker and his team finished modifying original ARPANET host-to-host protocol and named it NCP (Network Control Protocol). This was possible because of IMP (Interface Message Processor) creation by Bob Kahn. IPM enabled computers to interact with other computers from other packet-switched networks (known today as a LAN – Local Area Network).…

    • 3352 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 9 L3 BTEC IT P2

    • 339 Words
    • 2 Pages

    A protocol is the set of rules used when computers communicate. In this report I am going to explain the importance of protocols and standards.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    TCP/IP was first created from research projects by the United States Department of Defense (DOD), through the group called the Advanced Research Projects Agency (ARPA). Although IPv4 has worked well for many years, like all things it will be replaced by a better standard. IP version 6 (IPv6) will eventually replace IPv4 as the standard most commonly used. It has taken over a decade to migrate to IPv6, even though it was defined as a standard in the 1990s.…

    • 360 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    IP uses the Address Resolution Protocol, ARP, to bind a next-hop IP address to an equivalent MAC address. ARP defines the format of messages that computers exchange to resolve an address, the encapsulation, and the rules for handling ARP messages. The NAT mechanism allows a site to have multiple computers using the Internet through a single IP address. The User Datagram Protocol provides end-to-end message transport from an application running on one computer to an application running on another computer (Comer, 2009).…

    • 1195 Words
    • 5 Pages
    Better Essays
  • Good Essays

    religion in the colonies

    • 773 Words
    • 4 Pages

    Since the very first colony was founded in 1607 in Jamestown, Virginia, religion played a very important role in America. Nine of the thirteen colonies had established churches. Having an established church meant you paid taxes for the support of that church whether or not you were a member. The colonies with official state or established churches of the Congregational (Puritan) church denomination consisted of Maine, Connecticut, and Vermont. Colonies that remained a part of the original Church of the England were Virginia, Maryland, North Carolina, South Carolina, Georgia, and New York.…

    • 773 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Network 320

    • 979 Words
    • 3 Pages

    First, I have to define the term RFC. The acronym "RFC" stands for "Request for Comment". This refers to a description of a standard for new or modified internet or networking protocols. When standards are proposed, they are made available for public comment so that they can be refined and agreed upon. The document which details the proposed standards is called a "request for comment" document, or RFC. When the standards are finalized, they keep the same "RFC" Three organizations under the Internet Society are responsible for the actual work of standards development and publication: Three organizations under the Internet Society are responsible for the actual work of standards development and publication:name. Now a Request for Comments (RFC) is a publication of the Internet Engineering Task Force (IETF) and the Internet Society, the principal technical development and standards-setting bodies for the Internet. Request for Comments documents were invented by Steve Crocker in 1969 to help record unofficial notes on the development of ARPANET. RFCs have since become official documents of Internet specifications, communications protocols, procedures, and events. Today, it is the official publication channel for the Internet Engineering Task Force (IETF), the Internet Architecture Board (IAB), and — to some extent — the global community of computer network researchers in general. A new model was proposed in 2008, refined, and published in August 2009, splitting the task into several roles, including the RFC Series Advisory Group (RSAG). (The model was updated in 2012. The RFC series contains three sub-series for IETF RFCs. Not all RFCs are standards. Each RFC is assigned a designation with regard to status within the Internet standardization process. This is a partial list of RFCs (request for comments memoranda). I wasn 't aware of how many RFC 's there are, and found to my…

    • 979 Words
    • 3 Pages
    Powerful Essays