Analysis of Network Communication and Data Transmission
VerifiedAdded on 2025/09/03
|6
|1764
|445
AI Summary
Desklib provides solved assignments and past papers to help students understand complex topics.

Introduction
A desktop network is a telecoms network that enables the transfer of information between
pcs. Computer networking is a technical field that seeks to explore and evaluate the method
of communication between multiple interlinked or networked device devices or systems to
communicate data. Here are normal networking designs to give meaning to each aspect of
the network discussions, such as those mentioned during the eBay acquisition. This training
also provides an overview of some of the techniques to be extended in subsequent training
classes on the networking and security stream.
For the networking or to establish a network, CAT 6 cables are used with some
qualifications. Understanding the qualities and use of CAT 6 cables are for the professionals
but a normal user can establish their connection using Wi-Fi as well. Various devices are
used to establish a network connection with any website like a system, a web server,
communication link between the systems and website, Payment server, Bank server etc.
Following are networking tools to establish and control a connection:
Wireshark is a Protocol Analyser which enables us to capture and analyse and display binary
data that form the Network Traffic in ways to help us understand this. While Virtualization
supports data centres throughout the world. It is only a user of the desktop; however, it is of
considerable importance in the industry.
Following are 4 types of number systems that are used for the networking process:
Binary: used to store data in system and investigate.
Decimal: Represents quantities, IPv4 addresses.
Hexadecimal: It is used to represent large numbers like IPv6
Octal: works with Linux
Packet Switching & Network Models
A devoted channel is created in Circuit Switched Networks before information is sent. The
Plain Old Telephone System (POTS), as used in many companies and households, is the
finest illustration of a circuit-switched network.
A desktop network is a telecoms network that enables the transfer of information between
pcs. Computer networking is a technical field that seeks to explore and evaluate the method
of communication between multiple interlinked or networked device devices or systems to
communicate data. Here are normal networking designs to give meaning to each aspect of
the network discussions, such as those mentioned during the eBay acquisition. This training
also provides an overview of some of the techniques to be extended in subsequent training
classes on the networking and security stream.
For the networking or to establish a network, CAT 6 cables are used with some
qualifications. Understanding the qualities and use of CAT 6 cables are for the professionals
but a normal user can establish their connection using Wi-Fi as well. Various devices are
used to establish a network connection with any website like a system, a web server,
communication link between the systems and website, Payment server, Bank server etc.
Following are networking tools to establish and control a connection:
Wireshark is a Protocol Analyser which enables us to capture and analyse and display binary
data that form the Network Traffic in ways to help us understand this. While Virtualization
supports data centres throughout the world. It is only a user of the desktop; however, it is of
considerable importance in the industry.
Following are 4 types of number systems that are used for the networking process:
Binary: used to store data in system and investigate.
Decimal: Represents quantities, IPv4 addresses.
Hexadecimal: It is used to represent large numbers like IPv6
Octal: works with Linux
Packet Switching & Network Models
A devoted channel is created in Circuit Switched Networks before information is sent. The
Plain Old Telephone System (POTS), as used in many companies and households, is the
finest illustration of a circuit-switched network.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

After the circuit has been established, for the duration of a telephone call, you and the person
on the other end of the telephone effectively have a telephone link. However, this class
mainly concerns the packet networks.
An old cell turned network incorporating cell picking and TCP / IP applications, the
ARPANET or Advanced Research Projects Agency Network. The Internet is underpinned by
both these techniques. Developing equipment that could transfer messages between
networked computers needed to be developed.
Only tiny messages of (up to 1500 bytes) can be processed by Internet network infrastructure.
The fundamental idea of protocol shifting depends on messages being fragmented and
reassembled. Large emails at the origin must be broken down into manageable packages so
that each message can discover its own route. Therefore, packages are needed to be
reassembled at the location. Any batch in question could inevitably have been postponed.
The Internet Model
The Internet system provides us with a structure for understanding how TCP / IP networking
functions. The two most significant networking technologies currently in use, TCP
(Transmission Control Protocol) and IP (Internet Protocol), are technologies used on the
Internet and are therefore support for the bulk of network transactions. Further Protocol
Suites were common for a number of years, including sets of communication protocols such
as novelle IPX / SPX and DECnet, but were all disused for TCP / IP.
The Application Layer
Application for the users helps to relate and interact with the system providing so many
services along with the devices on local network. This describes the application layer and
enables the one to use network connections.
Following are the architecture types of the network application layer:
Peer-to-Peer architectures, Client/Server Architectures, Host-based architectures, Cloud-
based architectures. Here, cloud-based architectures are further divided into its subparts that
are Software-as-a-service, Platform-as-a-service, Infrastructure-as-a-service. Following are
the communication protocols of application layer:
Set up consistent sender-receiver rules.
on the other end of the telephone effectively have a telephone link. However, this class
mainly concerns the packet networks.
An old cell turned network incorporating cell picking and TCP / IP applications, the
ARPANET or Advanced Research Projects Agency Network. The Internet is underpinned by
both these techniques. Developing equipment that could transfer messages between
networked computers needed to be developed.
Only tiny messages of (up to 1500 bytes) can be processed by Internet network infrastructure.
The fundamental idea of protocol shifting depends on messages being fragmented and
reassembled. Large emails at the origin must be broken down into manageable packages so
that each message can discover its own route. Therefore, packages are needed to be
reassembled at the location. Any batch in question could inevitably have been postponed.
The Internet Model
The Internet system provides us with a structure for understanding how TCP / IP networking
functions. The two most significant networking technologies currently in use, TCP
(Transmission Control Protocol) and IP (Internet Protocol), are technologies used on the
Internet and are therefore support for the bulk of network transactions. Further Protocol
Suites were common for a number of years, including sets of communication protocols such
as novelle IPX / SPX and DECnet, but were all disused for TCP / IP.
The Application Layer
Application for the users helps to relate and interact with the system providing so many
services along with the devices on local network. This describes the application layer and
enables the one to use network connections.
Following are the architecture types of the network application layer:
Peer-to-Peer architectures, Client/Server Architectures, Host-based architectures, Cloud-
based architectures. Here, cloud-based architectures are further divided into its subparts that
are Software-as-a-service, Platform-as-a-service, Infrastructure-as-a-service. Following are
the communication protocols of application layer:
Set up consistent sender-receiver rules.

Specify the structure of data within messages and the type of messages sent from source
to destination.
Manage a message dialogue, e.g. which object first communicates and how to handle the
response.
The Data Link Layer
The Data Link only covers the communication between 2 machines connected to the same
network. This network could be your home Wi-Fi network, a part of your university network
(for example, all labs 1 and 2) or two machines, which can be connected to a long fibre optics
or satellite connection on each end.
Therefore the idea of a local one is more concerned with the connection to a single network
than it is about distance when discussing networks at the data link. At the end of each 1-meter
cable, two computers are considered to be local, and at each end of a geostationary satellite
connection are connected by two routers. The data-link layers of a local PC packet a request
and sends it to the Local Router, the first hop on the journey to a remote Web server
(Ethernet Frame). Now the Local Router has the request of the PC and it is therefore
responsible for sending it to the next hop. The following step can be used by a totally
different technology from the former, for example the National Broadband Fibre or NBN.
Datalink layer is divided into two subparts that are:
Logical Link Layer or (LLC): The LLC is the high-level interface. It allows simultaneous
transactions of IPv4, IPv6, IPX and other protocols.
Media Access Control or (MAC): The layer Media Access Control sends network media
traffic and retains network media traffic.
The Internet (Network) layer
A web layer is a group of methods of Internet networking, protocols and Internet protocol
suite specifications for the transportation, if necessary, of network packets from the
originating host to the destination host specified by an IP address. The network layer is level
3 in the seven-layer OSI computer network model. The network element is accountable for
message transmission including initial transmission. Network layer delivers the traffic of a
particular network to some another Host. It is a kind of Host exchange service where both of
the Hosts are addressed using a long distance in between them. There are two ways to
determine the network address of a particular IP address. The first way is by replacing all the
to destination.
Manage a message dialogue, e.g. which object first communicates and how to handle the
response.
The Data Link Layer
The Data Link only covers the communication between 2 machines connected to the same
network. This network could be your home Wi-Fi network, a part of your university network
(for example, all labs 1 and 2) or two machines, which can be connected to a long fibre optics
or satellite connection on each end.
Therefore the idea of a local one is more concerned with the connection to a single network
than it is about distance when discussing networks at the data link. At the end of each 1-meter
cable, two computers are considered to be local, and at each end of a geostationary satellite
connection are connected by two routers. The data-link layers of a local PC packet a request
and sends it to the Local Router, the first hop on the journey to a remote Web server
(Ethernet Frame). Now the Local Router has the request of the PC and it is therefore
responsible for sending it to the next hop. The following step can be used by a totally
different technology from the former, for example the National Broadband Fibre or NBN.
Datalink layer is divided into two subparts that are:
Logical Link Layer or (LLC): The LLC is the high-level interface. It allows simultaneous
transactions of IPv4, IPv6, IPX and other protocols.
Media Access Control or (MAC): The layer Media Access Control sends network media
traffic and retains network media traffic.
The Internet (Network) layer
A web layer is a group of methods of Internet networking, protocols and Internet protocol
suite specifications for the transportation, if necessary, of network packets from the
originating host to the destination host specified by an IP address. The network layer is level
3 in the seven-layer OSI computer network model. The network element is accountable for
message transmission including initial transmission. Network layer delivers the traffic of a
particular network to some another Host. It is a kind of Host exchange service where both of
the Hosts are addressed using a long distance in between them. There are two ways to
determine the network address of a particular IP address. The first way is by replacing all the
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

node bits of an IP address by zero, and then it will come as network address. Another way to
find out the network address is by doing a bitwise AND process of a particular IP address
using a Subnet mask, then also the network address can be obtained.
Network Address Translation (NAT)
The computers (hosts) on most home networks use private IP addresses (allocated by the
DHCP server in the router). Home network routers use NAT to provide Internet access to
those hosts. This is achieved by changing the IP address of requests to that of the IP address
on the ISP side of the router. IP ports (discussed in Topic 6) are used by the NAT router to
distinguish the traffic from different hosts on the home network.
DNS (Domain Name System)
Internet names name resolution is handled with DNS. Name resolution is the method by
which an Internet word IP address is searched or a hostname of a specific IP address can be
retrieved for an inverse query. Name resolution is done on the local DNS server or the DNS
computer of your ISP.
The Transport Layer or (TCP layer & UDP layer)
Individual implementation meetings cover ports. Well-known server servers are being used.
For customer meetings, other ports are used. The transport layer is a mental method section
of the layered protocol design of the network pile in the Internet protocol set and OSI system
during internet networking. host-to-host communication facilities for apps are provided by
the layer protocols.
The Transportation Layer divides big pieces of information into manageable sections so that
they can be managed by the Network Lays (routers) and so various apps can each reach the
Network. The segments of the information at the location must be returned in the type
returned through the transmitting machine by the transport layer.
Benefits of TCP
TCP is a protocol that is link-oriented. It ensures secure and in-command information
distribution from sender to recipient. The sender and the recipient must establish a link before
transmitting the information. The sender and recipient exchange numbers for use during the
conversation. The information transactions are tracked through the meeting using the serial
digits. The recognition is used to verify the effective provision of information during the
find out the network address is by doing a bitwise AND process of a particular IP address
using a Subnet mask, then also the network address can be obtained.
Network Address Translation (NAT)
The computers (hosts) on most home networks use private IP addresses (allocated by the
DHCP server in the router). Home network routers use NAT to provide Internet access to
those hosts. This is achieved by changing the IP address of requests to that of the IP address
on the ISP side of the router. IP ports (discussed in Topic 6) are used by the NAT router to
distinguish the traffic from different hosts on the home network.
DNS (Domain Name System)
Internet names name resolution is handled with DNS. Name resolution is the method by
which an Internet word IP address is searched or a hostname of a specific IP address can be
retrieved for an inverse query. Name resolution is done on the local DNS server or the DNS
computer of your ISP.
The Transport Layer or (TCP layer & UDP layer)
Individual implementation meetings cover ports. Well-known server servers are being used.
For customer meetings, other ports are used. The transport layer is a mental method section
of the layered protocol design of the network pile in the Internet protocol set and OSI system
during internet networking. host-to-host communication facilities for apps are provided by
the layer protocols.
The Transportation Layer divides big pieces of information into manageable sections so that
they can be managed by the Network Lays (routers) and so various apps can each reach the
Network. The segments of the information at the location must be returned in the type
returned through the transmitting machine by the transport layer.
Benefits of TCP
TCP is a protocol that is link-oriented. It ensures secure and in-command information
distribution from sender to recipient. The sender and the recipient must establish a link before
transmitting the information. The sender and recipient exchange numbers for use during the
conversation. The information transactions are tracked through the meeting using the serial
digits. The recognition is used to verify the effective provision of information during the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

whole meeting. Reliable communication is based on the serial figures and the corresponding
acknowledgements.
Identification of Applications
Users usually operate various networked apps simultaneously. A browser, an e-mail client
and Skype, for example. Each client application is assigned by the transport layer a port
number to differentiate it from other networked apps operating on that machine. Also
assigned gateway number are server daemons operating on network computers. This enables
client apps to define a specific server daemon by combining an IP address and port number.
This also enables the server daemons to differentiate between various apps and meetings
operating on a client computer (separate browser tabs).
TCP connection establishment
TCP connections can last throughout the meeting, or throughout the entire meeting, a meeting
between the client software and a server daemon. The 3-way handshake TCP connections are
installed.
The Physical Layer
Two types of data
Digital computers hold digital data. The related digital media, including hard drive, USB
drive, etc., contain text files, programs, lyrics, pictures etc. Digital information is
characterized by being completely composed of binary data and zeros. Any piece of
information is either one or null.
Analogue Data
Analogue information may bring on an endless amount of concentrations, for example speech
data. The following diagram demonstrates analogue speech information which was recorded
via the Audacity program. The analogue signal can be digitalised and digitally transmitted for
analogue data via digital networks (e.g. VoIP, streaming video and any other apps).
Digital transmission of Data
Between a sender and recipient, digital signals happen. For example, this could be two
Ethernet Network Cards. The Ethernet Protocol requires voltage concentrations, cable sizes,
the receiver's starting and finish and many other characteristics in order to guarantee that the
acknowledgements.
Identification of Applications
Users usually operate various networked apps simultaneously. A browser, an e-mail client
and Skype, for example. Each client application is assigned by the transport layer a port
number to differentiate it from other networked apps operating on that machine. Also
assigned gateway number are server daemons operating on network computers. This enables
client apps to define a specific server daemon by combining an IP address and port number.
This also enables the server daemons to differentiate between various apps and meetings
operating on a client computer (separate browser tabs).
TCP connection establishment
TCP connections can last throughout the meeting, or throughout the entire meeting, a meeting
between the client software and a server daemon. The 3-way handshake TCP connections are
installed.
The Physical Layer
Two types of data
Digital computers hold digital data. The related digital media, including hard drive, USB
drive, etc., contain text files, programs, lyrics, pictures etc. Digital information is
characterized by being completely composed of binary data and zeros. Any piece of
information is either one or null.
Analogue Data
Analogue information may bring on an endless amount of concentrations, for example speech
data. The following diagram demonstrates analogue speech information which was recorded
via the Audacity program. The analogue signal can be digitalised and digitally transmitted for
analogue data via digital networks (e.g. VoIP, streaming video and any other apps).
Digital transmission of Data
Between a sender and recipient, digital signals happen. For example, this could be two
Ethernet Network Cards. The Ethernet Protocol requires voltage concentrations, cable sizes,
the receiver's starting and finish and many other characteristics in order to guarantee that the

recipient knows the information sent out from the sender. One such thing is the encoding of
the data bits. The manner binary null parts and binary one-pieces are depicted on the record
can be defined as encryption.
Conclusion
In this report, various networking technologies and their types are entertained and assessed.
Here different kind of layers in a network are explained like an Application layer, data link
layer, internet or network layer, transport layer, physical layer. This report also describes
packet switching and networking technology and its models.
the data bits. The manner binary null parts and binary one-pieces are depicted on the record
can be defined as encryption.
Conclusion
In this report, various networking technologies and their types are entertained and assessed.
Here different kind of layers in a network are explained like an Application layer, data link
layer, internet or network layer, transport layer, physical layer. This report also describes
packet switching and networking technology and its models.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.