Verified Document

IT Management Class Networking Protocols Are Powerful Essay

IT Management Class Networking Protocols Are Powerful Catalysts of Collaboration

Across Organizational Boundaries

The foundation of the Internet is based on the Transmission Control Protocol/Internet Protocol (TCP/IP) networking protocol that serves to arbitrate control of the many connections that comprise the Web, with design criterion specifically designed to avoid packet collisions and ensure the highest performance possible. The TCP/IP protocol is based on the Carrier Sense Multiple Access/Collision Detect (CSMA/CD), an approach to managing network traffic to anticipate and reduce packet collisions, increasing networking fidelity, performance and stability over the long-term. Inherent in the design of the CSMA/CD standard is support for simplex transmission, half-duplex and full duplex transmission approaches, all designed to enable the highest levels of performance possible for a given TCP/IP network configuration (Cisco Tutorial, 2007). The CSMA/CD standard is credited with the proliferation of the World Wide Web, as it successfully supported the Hypertext Transfer Protocol (HTTP) and its many variants and development languages. The HTTP protocol has been one of the most disruptive technologies in the last twenty years, effectively rending the traditional desktop operating system obsolete given the wide versatility of this protocol. These rapid innovations in networking standards and performance emanate from the Open Systems Interconnect (OSI) Model defined by the International Organization for Standardization (ISO). Of the many electronic standards organizations and bodies that work to define frameworks, models and techniques for integrating systems together, the ISO standards committees and teams have led the greatest level of disruptive change and technological shifts in computing over the last fifty years. The intent of this analysis is to illustrate how the OSI Model has successfully enabled enterprise-wide collaboration and continues to serve as an accelerator of change to communication patterns and the structures that support them globally through companies and organizations from all industries and sectors. All of these developments taken together have made the globalization of value chains possible, spurred and enabled...

The OSI Model has evolved in design to support the logical groupings of data and commands over diverse networks. As the TCP/IP network protocol has become nearly ubiquitous as the foundation of the Internet there has been a continual refinement of its Application Programmer Interface (API) to support the rapid interchange of data across diverse applications and computing platforms. Inherent in the design of the OSI Model is a modular architecture that was specifically designed to ensure enough agility and customization to integrate with non-standardized network architectures and platforms. The design objectives of the OSI Model specifically focus on how to create enough scalability within its layers to ensure a high level of customization for networks already in place within enterprises. The OSI Model was specifically designed to also allow for wide variation in the design of network topologies. This translates into the ability to use the OSI Model in smaller workgroups where interoperability across divergent or disparate applications and systems are needed to scaling up to support multi-platform-based networks as well.
As a result the OSI Model is comprised of five different layers including the Application, Presentation and Session layers as the higher-order strata of the model. The Data Link and Physical layers are used for the critical tasks of mapping physical connections across divergent networks to common interface points throughout disparate networks. This physical-to-logical workflow connection is initiated in these lower layers of the OSI Model, creating a formatted data stream of packets for the upper layers of the Model (Green, 2001). Figure 1, the Open Systems Interconnect Model, illustrates how each of the layers are dependent on…

Sources used in this document:
References

Ciampa, Mark (2005). Security+ Guide to Network Security Fundamentals. 2nd Edition. Massachusetts: Thomson Course Technology, 2005

Cisco Tutorial (2007). Basics of the OSI Model and associated documents. Accessed from the Internet on March 27,2011from location: http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/introint.htm

Cisco Systems (2007). Networking Guides and Programs for Protocol Support . Retrieved March 27, 2011 from location:

http://www.cisco.com/en/U.S./docs/security/pix/pix62/configuration/guide/config.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Network Technology, Structure and Protocols
Words: 635 Length: 2 Document Type: Term Paper

In addition, The potential for IPv6 to significantly reduce the overall costs of supporting an enterprise-wide network are also very clear as well. ATM portals and technologies are ideal for creating a unified computing and networking platform corporate-wide, especially if a company has operations in several countries, and across continents. The speed and bandwidth considerations of running a global enterprise are also accentuated by this technology, as is a drastic

Wireless Networking
Words: 12201 Length: 44 Document Type: Term Paper

Wireless Networking Phenomenon Today's world is faced with a myriad of challenging and complex issues that require advanced technological solutions. As technology becomes increasingly user-friendly and focused on the consumer, it is evident that users have become more dependent on wireless technological devices as mechanisms that promote convenience, survival, and economic prosperity. Devices such as cellular phones, laptop computers, and personal digital assistants have become absolute essential components for many consumers

Healthcare in Saudi Arabia Project
Words: 13191 Length: 40 Document Type: Research Proposal

Lack of accountability, transparency and integrity, ineffectiveness, inefficiency and unresponsiveness to human development remain problematic (UNDP). Poverty remains endemic in most Gulf States with health care and opportunities for quality education poor or unavailable, degraded habitats including urban pollution and poor soil conditions from inappropriate farming practices. Social safety nets are also entirely inadequate and all form part of the nexus of poverty that is widely prevalent in Gulf countries.

Small Computer Systems Proposed Research
Words: 4808 Length: 15 Document Type: Term Paper

According to Paul B. Mckimmy (2003), "The first consideration of wireless technology is bandwidth. 802.11b (one of four existing wireless Ethernet standards) is currently the most available and affordable specification. It allows a maximum of 11 megabits per second (Mbps)" (p. 111); the author adds that wired Ethernet LANs are typically 10 or 100 Mbps. In 1997, when the IEEE 802.11 standard was first ratified, wireless LANs were incompatible and

Cloud Computing to Combat DDOS
Words: 3088 Length: 10 Document Type: Research Paper

Monitoring the type of DDoS attack, the frequency of the attack, duration of attack, and the aggressiveness of the attack all provide clues as to whom may be instituting the attack. The packet stream can be disrupted by the victim by 'pretending' to go offline to the protocol receiving the bandwidth from that particular attack. The rerouting of using available bandwidth to other protocols via an alternative port can

Broadband Wireless and Bluetooth-Based Communications
Words: 1909 Length: 5 Document Type: Thesis

Of these three approaches ad-hoc is considered the most adaptable to roaming users and therefore shows the greatest opportunity to support contextual-based use of wireless networks. The concept of the cellular network on the other hand is much more stationary and focused on a set of base stations that require base controllers and network infrastructure to effectively function. This fixed platform nature of the cellular network approach is juxtaposed

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now