Network Infrastructure Focusing On Wireless Networks: Bluetooth, Wi Fi And Mobile Phone Networks.

4377 words - 18 pages

Network InfrastructureThe Internet is a worldwide network of computers, this network means that each computer can send data to and receive data from any other computer on the internet. Since some computers may use different operating systems and use different hardware from the others means they will store information differently. In order for these machines to communicate a set of rules were made and they defined how computers communicate. A protocol describes a set of data formats and communication rules that network rules programs must follow in order to exchange information. For example, the rules may define how fast programs will send and receive data, the size of the messages, and how a program receiving data will notify the program sending the data if an error occurs. In order for two programs to be able to communicate with each other, they must implement that same protocol. TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It is part of what is known as the internet protocol suite. This is a collection of protocol uses by computers connected to the internet. In addition to the TCP and IP protocols, it includes protocols such as the HTTP protocol (which defines how web browsers and web servers communicate) and the SMTP protocol (which defines how mail clients and mail servers communicate). Any program that connects to the internet must use a program that implements the TCP/IP protocols. TCP/IP uses a client-server architecture of communication. TCP/IP communication is mainly point to point, this means that each communication is from one host computer in a network to another host computer. [2][3]In order to understand how the TCP/IP protocols work, it is necessary to have some understanding of how computer networks and the internet itself work. This is best explained in terms of the ISO Open Systems Intereconnection (OSI) reference model. The ISO/OSI reference model provides a framework network developers can use to design networks and their protocols. The OSI reference model divides the operation of a computer network into seven layers. These are outlined below, along with a description of where the TCP/IP protocols fit into the model.
Layer 1 - PhysicalThe physical layer defines the relationship between a communication device and a physical medium it uses to communicate with other devices. This includes the physical and electrical layout of connectors and cable used to connect two or more devices together. The physical layer simply defines how to send a bitstream from one device to another. It provides no error control or flow control, in other words, a receiver has no way of telling a sender that an error occurred or that it is sending data too fast.[4]Layer 2 - Data LinkThis layer adds error control and flow control to the basic service provided the physical layer. It does this by adding additional control data to the (user) data to be transmitted. The user data and...

Find Another Essay On Network infrastructure focusing on Wireless Networks: Bluetooth, Wi-Fi and Mobile Phone networks.

Literature Review on Underwater Wireless Sensor Networks

2272 words - 9 pages ." Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2006 4th International Symposium on. IEEE, 2006. Syed Ariffin, Sharifah Hafizah, Farizah Yunus, and Yasser Zahedi. "A survey of existing Medium Access Control (MAC) for Underwater Wireless Sensor Network (UWSN)." (2010): n-a. Park, Min Kyoun, and Volkan Rodoplu. "UWAN-MAC: An energy-efficient MAC protocol for underwater acoustic wireless sensor networks." Oceanic Engineering, IEEE

The insecurities surrounding wireless networks with a brief background on how wireless networks work.

2362 words - 9 pages about their daily routines paying no attention to the fact that a hacker could be accessing their whole network. This paper will talk about the insecurities surrounding wireless networks with a brief background on how wireless networks work.Wireless NetworksWireless Local Area Network technologies allow us to finally connect multiple users to share Internet connections without messy and expensive cable installation procedures. WLAN networks make

Feel Safe and Secure With Dropcam HD Wi-Fi Wireless Video Monitoring Camera

651 words - 3 pages surveillance systems because of its topnotch features, functionality and reliability. Meet Dropcam HD Wi-Fi Wireless Video Monitoring Camera, the only IP surveillance camera you’ll ever need. The company’s “60-second setup” promise is what attracts would-be clients and have received thumbs up on numerous Dropcam reviews. What make this Dropcam camera special are its features: it is very user-friendly. Anyone can install it in no-time. All you need to do

Design a Network Infrastructure Because Networks are Configured in Many Ways, Network Systems and Data Communications Analysts are Needed to Design, Test, and Evaluate Systems Such as Local Area...

8965 words - 36 pages communicated"Some of the more commonly used packet switching methods are detailed below.X.25X.25 technology is connection orientated and will allow computers on different public networks to communicate through an intermediary computer specifically at the Network Layer of the OSI. It is a packet switched device that is used to exchange data between the DCE (Data Circuit Equipment) and the DTE (Data Terminal Equipment) in Public Switched Telephone

Routing Protocols for Ad Hoc Mobile Networks

2227 words - 9 pages Introduction Wireless networks have gained immense popularity since its advent in 1970s and even more prominently since the last decade. Mobile wireless networks currently have two implementation architectures: infrastructured networks infrastructureless networks[1]. In the network architecture for Infrastructured networks, there are fixed wired gateways, known as base stations installed across the desired coverage area. A device within the

Transmission Power Control in Single-hop and Multi-hop Wireless Sensor Networks

2291 words - 9 pages 1 Transmission Power Control in Single-hop and Multi-hop Wireless Sensor Networks Abstract—A major challenge in wireless sensor network (WSN) deployment is to minimize sensor node’s energy consumption to prolong the lifetime of the finite-capacity batteries. Power control is one of the main techniques used to conserve energy in wireless sensor networks. In this paper we provide an efficient power control scheme for WSNs based on Telosb

STABLE AND SELF ADAPTIVE ROUTING FOR MOBILE AD HOC NETWORKS USING CROSS LAYER DESIGN

2857 words - 12 pages Reliable Routes in Mobile Ad Hoc Networks”, Wireless Pers Commun (2012) 66:207–216 [10] Hang SHEN, Guangwei BAI, Junyuan WANG, Yong JIN, Jinjing TAO, “Performance Study of a Cross-Layer Based Multipath Routing Protocol for IEEE 802.11e Mobile Ad Hoc Networks”, International Journal on Communications, Network and System Sciences, 2008, 4, 285-385 [11] Husnain Mansoor Ali, Amina Meraihi Naimi, Anthony Busson, Veronique Veque, “Signal Strength Based Link

Communication Networks: Communication Structure of Social Network Analysis (SNA)

2096 words - 8 pages ) adeptly point out that “organizational communities can be considered as diverse sets of interacting population that form functional interdependencies with each other in shared environmental spaces” (p. 760). From here, it is noted that the beginnings of an “if this” then “that” scenario ensues. Further noted in their study on communication networks in organizational communities, the “ecology and interorganizational network research share a

Investing in the Future: Why the Medical Field Should Invest in Wireless Networks

1140 words - 5 pages other class, he considers using Wi-Fi to replace cables and argues that traditional network cables are not functionally effective [1]. For instance, we can already stream emergency situations from ambulance cameras to hospital computers without cables. In addition, going all-wireless can save money because several commercial wireless adapters can power on without power adapters and wireless networks can serve a suddenly increased number of clients

Investing in the Future: Why the Medical Field Should Invest in Wireless Networks

926 words - 4 pages work more efficiently and provide better care to patients. A wireless internet protocol (IP) phone is a mobile phone that connects to wireless networks and functions include voice, fax, text and voice messaging. Nurses need to communicate with many different people in hospitals: doctors, radiologists, physical therapists and patients. Agarwal claims as nurses’ responsibilities increase, they need to quickly reach the right people at the right

Investing in the Future: Why the Medical Field Should Invest in Wireless Networks

1073 words - 5 pages Protection of Wireless Networks Setting security policy is important for a wireless network. Improvements in the security of wireless technology will guarantee its continued safe use, and system administrators’ duties are to take measures against unauthorized access. A media access control address (MAC address) is an identity number assigned to each network device. Most Wi-Fi access points and routers come with a function called MAC address

Similar Essays

Mobile And Wireless Communication: Mobile Ad Hoc Networks

2437 words - 10 pages and arbitrary topologies of Ad Hoc network freely and dynamically.It provides the users to use internetwork connection without any pre-required infrastructure. Hence we can see a Mobile Ad Hoc networks as an autonomous collection of all the mobile devices such as mobile phone, sensors, laptop etc. which transfer the data and communicate to each other on wireless link and they provide the required functionalities of the network when the fixed

Wireless Area Networks Essay

1978 words - 8 pages ability to quickly setup mobile networks. Students in college campuses around the country and world are able to access library information and other educational material without being connected directly to a wired port. Other areas that rely on wireless LAN systems include network managers, trade shows and branch office workers, warehouse supervisors, and senior company executives. In each of these areas, wireless LAN systems allow for more

Wireless Sensors Networks Security Essay

2213 words - 9 pages Sensor Network" Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'02) June 10 - 12, 2002 Pittsburgh, Pennsylvania, USA [5] Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci "Wireless Sensor networks: a survey" 2001 [6] Chee-Yee Chong, Srikanta P. Kumar "Sensor Networks: Evolution, Opportunities, and Challenges", 2003 [7] Pfleeger, CP & Pfleeger, SL

Wireless Sensor Networks Essay

1238 words - 5 pages A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. Trust in networks may be defined as the degree of belief or confidence about the nodes on the past interactions and observations. So trust becomes a major issue for reliable communication in WSN under constraints. We propose a