This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Media

Communication and media

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Communication and media

Question one

The internet protocol has been termed as the method by which information or rather a data is transferred through the internet from one computer to another. Each of the computers is known to have an IP address that is unique and identifies it differently from other computers. Its communication process entails data being broken down or rather parsed into small data in form of packets thatwould be transmitted through the Application Layer as well as the TCP layer containing the sender’s computer Internet address, the receiver’s computer address, and a portion of the message. Each packet is assigned a port number. Many programs may be using the TCP/IP stack and sending messages. For the transmission to be complete, individuals need to identify which program on the receiver’s endrequires to receive the message because it will be listening on a specific port.

An Internet protocol (IP) address is assigned uniquely by network mostly using Dynamic Host Configuration Protocol (DHCP).An IP address can be assigned to a host either dynamically as they can be changed later on when connected to a network, this identifies the computer as having a dynamic IP address. It can also be assigned permanently by the configuration of the host hardware or software, which is also identified as using a static IP address.

An IP address can be tracked only when the computer connected to the network has to be in sync with the public network in most instances where the information or data sent must be on a connected service network. This is in most cases allow easy flow of information from the sender to the receiver because both IP addresses are fully open and revealing to each other making tracking possible.On occasions some IP addresses cannot be tracked because they are exclusively private hence cannot be identified by anyone other than their trusted network. They can be connected to the public router but with a public IP address but still keep their addresses hidden from trackers..

Don't use plagiarised sources.Get your custom essay just from $11/page

Question two

The Internet router is used to connect networks, routing data packets from sender to receiver. To be able to complete transmission of data through networks, the Internet router figures out how to move packets from one network to another and to accomplish that they use forwarding tables to determine where a packet shouldbe delivered to. When a packet gets to a router, it will identify the destination address to determine where to sendthe packet.

A router stays up to dateonly if the typology of the network continuously changes because when the changes occur in the network topology, routing tables need to be updated. Each routertransmits the contents of its routing tables to other routers prompting an exchange that will happen until all routers are done updating their routing tables to reflect new network topology also known as convergence.There will be a notice of higher resource utilization on the routers throughout the process. Some packets may be dropped or rather deem undeliverable. Because of this, faster convergence is necessary.

A hopis identified when a packet is transmitted from one network segment to the following. The data packets pass through routers as they commute between the sender to the receiver. The hop count is referred to as the number of intermediate devices through which data must pass between the sender and the receiver.  The hop limit isa limit on the number of hops a packet is allowed before being discarded. As data is transmitted through packets, routers modify them, keeping in check the respective hop limit fields. They never forward packets with a field of 0 or less preventing a forever loop.

Question three

23.37.74.87. Through an IP lookup, one can find out the location of an IP address and additional information on the device, for example about the owner, country, zip code, organization, time zone, speed connection and many more, (Roh,2007).

 Question four

TCP guarantees delivery of dataas well as that of packets being delivered in the same order in which they were sent. To determine which data has been sent and delivered, sequence numbers are used and retransmission can be effectively delivered if data is determined to be lost. The TCP promises reliability through a reliable medium with streams, reliable delivery layer, network adaptability, and flow control by making sure that data reached its intended destination. It achieves this through Acknowledgments (ACKs). When TCP receives data from the upper part which is the application layer, it breaks down the data into segments and appends its header and hiding most IP shortcomings. To monitor which data has been transmitted and received, sequence numbers are used.

The TCP has ways of identifying errors by looking at those segments that are corrupted, missing, out-of-order, and duplicated. To ensure error-free delivery of information, the TCP uses three techniques: The checksum technique where every segment contains a spectrum that is used to find a corrupted segment and if the data is found tampered with, the segment is destroyed and lost. Acknowledgment of another firm technique that identifies complete delivery of transferred data. Control segments that contain no data but has sequence number will be but ACK segments are not acknowledged. Retransmission the last technique whereby when segments areidentified as missing or delayed to deliver to the receiver and tempered with when it is checked by receiver then that segment is retransmitted again. TCPis identified as a stream protocol and the data packets can be assembled to its intended order by following the sequence numbers of both sides. Every TCP Packet goes to the IP level and can be fragmented there. The packets can be assembled by collecting all of the fragments and following the fragment offset from the header.

TCP header, the source, and destination port numbersare used to specify the application or services offered on local or remote hosts. After identifying the receivers address by the sender,port number to which the data or request should be sent to on the remote host are required and in case of a request, it allows the sender to specify the service it is intending to use as well asallowing Individuals to identify the service or application our data or request must be sent to.

 

Question five

TCP is used to control the size of the segment, data exchange rate, controls the flow and congestion of the network, as well as being preferred for error correction. UDP, on the other hand, is largely used by those in a rush while attending to a huge number of clients.

TCP is important for applications that are highly reliable, fast and with fewer errors. UDP, on the other hand, is used forapplications that need fast and efficient transmission as well as serving a huge number of clients.

Question six

A firewall is a system made to hinder unauthorized personnel from accessing data to or from a private computer network hence an employee can prevent an employee from sending confidential information onto the internet. The firewall can be used toprotectan organization against hacking and accidents that generates outside a company’s network.  The firewall allows an easy and legitimate flow of information while preventing unwanted data.

REFERENCES

Roh, E. S. (2007). U.S. Patent No. 7,286,537. Washington, DC: U.S. Patent and Trademark Office.

 

 

 

 

 

 

 

 

 

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask