• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

WAN Protocols

Extracts from this document...

Introduction

What are WAN Protocols? WAN Protocols are the standardised method of sending data between computers. The protocol will determine how the data is compressed, the error checking to be used, how the sending device will indicate that all data is sent, how the receiving device will declare it's received everything. The WAN protocols are found in The Internet Protocol Suite. They are shown below in the diagram showing where they lie in the 4 layer TCP/IP Model. Sometimes, the TCP/IP protocol will be extended to include the physical layer also, but this is fairly uncommon and all protocols will work over all medias. Just like the OSI model, each protocol must pass the data down the layers to send out information and then send up the layer to receive information. So for example, the File Transfer Protocol will pass its data down to TCP which will pass it down to IT, which will pass it down to Ethernet which will place it on a physical media such as coaxial cable. To receive the data back, it must travel back through the stacks back to FTP. Each of the protocols on each stack will have its own set of tasks that it must carry out before sending the data on. Using this set group of protocols ensures that computers are capable of communicating between each other and therefore allows compatibility across devices. ...read more.

Middle

For example, a HTML page must be displayed in HTML. A page linking to a zip file will require an unzip based program to handle it. FTP is an unsecured method of transferring files across the network. It is not considered a good method for secure documents to be sent as any security that has been added can very easily be decrypted and the contents can easily be viewed. All information sent along with the file, for example: passwords or destination are not encrypted and are sent in standard text. This means that anybody with access to the network could pull the file down and check its contents. It sends the file without checking with the other computer if the entire file has been received. Some clients will add an extra level on top of the FTP file that can calculate and check for file completion but this has to be enforced by both clients and is infrequently used. FTP is not really suitable for regular business situations. FTP replaces Simple File Transfer Protocol. Telnet is a method of connecting two computers together via a remote connection. Usually, the connection is aimed at a headless server. Once the connection is established using Telnet software, the user has access as though they are in front of that computer. SSH has vastly replaced Telnet because of its security problems across networks that are untrusted. ...read more.

Conclusion

The last update was in 2006 and this further improved the protocol and ensures that it stays the standard method of accessing newsgroups. This protocol is popular with the types of businesses that require access the news posting sites - these are particularly popular with computing based businesses. The IMAP protocol is capable only reading and so is not a viable alternative. X.25 is a packet switching protocol that predates IP. It is still found in situations where an extremely reliable system is required such as EPOS systems that allow businesses to take debit and credit cards. It is also popular in the developing world where it the cheapest and most reliable method of connecting to the internet. It is much slower than IP as it requires all of its packets to be received before moving the packets again. IP is the current industry standard packet switching method and was designed in 1981. It is a network level protocol that splits data into packets, addresses them and sends them forward. IP works closely with TCP to ensure that the data packets are received correctly as it sends the packets without ensuring they are received. All other protocols will work through IP as it converts upper layer data into packets. IPv4 is the current version in use, but users are being encouraged to move towards IPv6 as it allows more addresses to be used. ?? ?? ?? ?? 1 WAN Protocols Information Sheet ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. LAN & WAN Protocols

    - Responsible for end to end packet delivery. Talks to the transport layer and the data link layer and decides either whether to accept or reject the data. IPv4 - A data orientated protocol used on an Ethernet protocol. IPv6 - It is the next version up from IPv4.

  2. Top Ten Troubleshooting Issues

    A problem which can be solved with a workaround c. An intermittent problem causing minor disruption to work flow d. Any small technology project that can be scheduled in advance 5. Send the completed problem report to the CIO for prioritization.

  1. AQA Computing CPT3

    and the dispensed petrol clock (variable - fuelClock). The button will also change the current pump status of "Pump Is In Use" to "Pump Stopped, Replace Nozzle". The Replace Nozzle button will change the current status of the pump from "Pump Stopped, Replace Nozzle" to "Awaiting Payment", this will allow

  2. Smart Card System

    There is a speed penalty associated with using the per-directory configuration files, but that's the trade-off you have to take. Access control for a given directory is controlled by a specific file in the directory with a filename as specified by the "AccessFileName" directive.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    Considering spreadsheet software is dedicated to numerical analysis I do not think that a spreadsheet would be a suitable solution for my system. Neither would it cater for the storage of records like customer details etc and it would not be as appealing as a GUI.

  2. Definition-nature of the problem solved - Car Mechanic business

    Another approach to improve the current system would be to include partial computerisation. This would be a system where a search device would contain records of the locations of customer information. By using the search tool it will direct the manager to exactly where the documents they require are stored.

  1. Coursework 1 (c)Install Apache Web Server on Unix ...

    Program pipe.c It is a pipe program. 1 Preprocessor Commands #include <stdio.h> #include <stdlib.h> #include <unistd.h> #include <sys/types.h> #include <sys/wait.h> Functions 10 20 30 void client(int readfd, int writefd) /*Child call this function*/ { char buf[1024]; int cnt; /* read from stdin and write to pipe */ cnt = read(0,

  2. Flexible Architectures in Communication Security Application

    Decryption is the process of retrieving plaintext from ciphertext. Two forms of cryptography are commonly used in information systems today: secret-key ciphers and public-key ciphers. Secret-key ciphers (sometimes referred to as symmetric-key ciphers) use a single private key to encrypt and decrypt as illustrated in Figure 1.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work