.

Sunday, April 7, 2019

WAN Protocols Case Essay Example for Free

WAN Protocols Case EssayWAN Protocols atomic number 18 the billised method of displace information surrounded by computers. The communications protocol will determine how the entropy is compressed, the error lay offing to be used, how the sending twirl will indicate that all data is sent, how the receiving device will decl be its received everything.The WAN protocols be found in The Internet Protocol Suite. They be shown below in the diagram showing where they equivocation in the 4 layer transmission control protocol/IP Model. Sometimes, the TCP/IP protocol will be extended to include the visible layer also, besides this is fairly uncommon and all protocols will take shape over all medias. Just like the OSI nonplus, each protocol must pass the data pop pop the layers to send out information and then send up the layer to receive information. So for example, the accommodate Transfer Protocol will pass its data toss off to TCP which will pass it down to IT, whic h will pass it down to Ethernet which will place it on a physical media such as coaxial cable.To receive the data back, it must travel back through the stacks back to FTP. separately of the protocols on each stack will deliver its own set of tasks that it must carry out before sending the data on. Using this set group of protocols get a lines that computers are capable of communicating among each other and therefore allows compatibility across devices. It is only when manufacturers stray away from these set protocols that compatibility problems will occur. count 1 The Protocols and their Relationship with the TCP/IP ModelThe OSI ModelThe TCP/IP Protocol retinue does not directly map to the OSI model as TCP/IP relies on four layers and the OSI model uses 7. The top three layers of the OSI model map straight to the Application, Presentation and the Session layers of the TCP/IP Suite. nigh of the protocols mentioned on this information sheet are found at the application layer of the OSI model FTP, HTTP, SNMP, Telnet are all found here.The transport layer, containing UTP and TCP is the same on both models. The net belong layer is the real(a) Internet Protocol, as well as a few older alternatives such as X.25.The data link layer is the same and are the protocols controlling the actual transfer onto the physical line which is the physical layer that does not appear on the TCP/IP model as it does not solicitude about the physical hardware.The TCP/IP Model squishes the top three layers of the OSI Model onto a hit layer.Figure 2 Protocols and their Relationships with the OSI ModelEvaluation of ProtocolsAl around all of the protocols of the past couple of decades are lighten in use in one way or another. Many have gained popity as they buy the farm the capabilities of their older equivalents and some are a lot less common than they used to be. As the uses of WANs plump more complicated, so must the protocols being used to provide the services expected. In general, older versions of protocols have been phased out and replaced by updated versions with new capabilities for the WANs they are placed on.HTTP is the standard method of transferring all sorts of webpage across the web. To do this it must reach across to servers to ask for data and then present it using whatever protocol the page is displayed in. For example, a HTML page must be displayed in HTML. A page linking to a zip file will require an unzip based program to handle it.FTP is an unlocked method of transferring files across the network. It is not considered a good method for secure documents to be sent as any security that has been added can very easily be decrypted and the contents can easily be viewed. All information sent along with the file, for example passwords or destination are not encrypted and are sent in standard text. This representation that anybody with access to the network could pull the file down and check its contents. It sends the file without checkin g with the other computer if the entire file has been received. Some clients will add an extra aim on top of the FTP file that can calculate and check for file completion but this has to be enforced by both clients and is infrequently used. FTP is not really suitable for mending business situations. FTP replaces Simple File Transfer Protocol.Telnet is a method of connecting two computers together via a remote connection. Usually, the connection is aimed at a headless server. Once the connection is established using Telnet software, the drug user has access as though they are in front of that computer. SSH has vastly replaced Telnet because of its security problems across networks that are untrusted. Telnet is frequently used in troubleshooting situations where the required software is not available on both computers. Telnet is mostly not used so much by businesses anymore as it has been superseded by SSH in most secure network situations.SMTP is a text based protocol where every thing in the email is bundled together and sent. The email is sent to a remote server which continuees the email down to the specific DNS. It relies on DNS to find the mitigate domain name for the recipient and then filters to find the correct username at that domain. As it is a push protocol and not a pull protocol like POP3 or IMAP, it usually requires other protocols to work alongside it. SMPT does not however, have a successor and is considered a staple protocol in the TCP/IP Protocol family.SNMP is the network management protocol. It relies on a agreements being managed by other systems. A piece of software called an agent runs on the user computers and this sends information back to the managing systems via SNMP. The system is designed to manage available resources and to keep a check on how the users computers are acting. When this protocol was first developed i.e. SNMPv1, its mathematical function was simple just to simply monitor the network. It included no security or integrity to ensure that the data being requested was from the correct computers and hadnt been tampered with in transit apart from an unencrypted password and so was incessantly criticized for its security problems. SNMPv2 improved slightly on this issue, and enhanced security was also added. The ability to talk between two managing systems also added the ability to check the integrity of the data being sent as it was mathematical to check past behaviour against new behaviour.The newest version, SNMPv3 which was released in 2004, adds this extra layer of security for managements piece of mind. This means that it is the securest version to date and is therefore considered industry standard with all old versions being deemed obsolete.NNTP is the standard protocol for reading and posting Usenet submissions. The last update was in 2006 and this further improved the protocol and ensures that it stays the standard method of accessing newsgroups. This protocol is popular with the ty pes of businesses that require access the news posting sites these are particularly popular with computing based businesses. The IMAP protocol is capable only reading and so is not a feasible alternative.X.25 is a package switching protocol that predates IP. It is still found in situations where an extremely reliable system is required such as EPOS systems that allow businesses to take debit and credit cards. It is also popular in the developing world where it the cheapest and most reliable method of connecting to the internet. It is much slower than IP as it requires all of its packets to be received before moving the packets again.IP is the current industry standard packet switching method and was designed in 1981. It is a network level protocol that splits data into packets, addresses them and sends them forward. IP works closely with TCP to ensure that the data packets are received correctly as it sends the packets without ensuring they are received. All other protocols will work through IP as it converts upper layer data into packets. IPv4 is the current version in use, but users are being encouraged to move towards IPv6 as it allows more addresses to be used.

No comments:

Post a Comment