Network Standards Research Paper

Network Standards A Brief Look Since 1995

This is a research paper that focuses on network standards and protocols that involve strategies in management. Leadership strategies cannot handle the need for network standards to handle billions of users and user generated applications. Therefore management strategies are more appropriate. Furthermore the history of network standards shows layering through the OSI models follows a management approach vs. A leadership approach.

In the OSI model, there are seven layers. The seven layers then acts as a means of managing problems within that layer as it is separated and contained. People can run communication through these layers much more easily and smoothly than through a singular, whole layer. The several layers are more efficient and can handle and spot problems and inefficiencies more quickly. It serves as the basis for network standards.

The history behind network standards provides valuable insight into how organizations emerged to deal with the influx of problems associated with the advent of the internet in the 1990's. Several organizations have been created to deal with such problems and new services have emerged due to better handling of protocols and development of higher standards. These new services aim for international use.

For example, standards documents produced in the United States are typically developed in English, nonetheless are also regularly translated into other tongues. European standards are slightly different as they are frequently published concurrently in English, German, and French, and possibly other languages too. Currently, almost all networking standards exist as "open" standards, managed and directed by a standards society or commerce group. Open standards are more prevalent than patented ones in the computer trade, and that's predominantly, as it pertains to networking. In fact, the scarce technologies where there no universally-accepted open standard exist have been losing compared to open standards, predominantly in the zones of home networking and wireless LANs.

Introduction

Over-all, Network Standards denote a series of classifications for Data (including Voice) Networks that are distributed by countless organizations like IEEE, ISO, TIA/EIA, and CCITT (ITU). These standards delineate how networks are theoretically meant to work in respects to design, interface, electrical, and general development standards. Protocols are information communication guidelines aimed to postulate the order and arrangement of the bits within an information stream. For instance, every time a person accesses the Internet, prints a document, sends an email, and so forth, the computer utilizes information protocols to appropriate the information in the correct form at the right time. Mutually, protocols and standards are important for people to properly design software and equipment that can inter-function with other software and equipment. It's been almost 20 years since operating first began to gain prevalence. This paper is meant to show the history of operating systems within the framework of network standards as well as describe some of the things typically attached to it and how it has evolved in almost 20 years for several operating systems and how they have or have not overcome the hurdle of proper network standards and protocols. The main obstacle with network standards is providing access internationally while also managing said access now that the internet has grown to include activity from billions of users. These standards thus present themselves as a way or organizations to evolve and overcome such obstacles in order to consistently deliver adequate services, reliability, and accessibility. Is this handled via a management or leadership protocol as standards are often frequently modified and updated? This paper takes the position of management as first initiated by the history of the internet, the OSI model, and the various organizations in control of the internet and standards and protocols.

The first step towards discussing the history of network standards is discussing the OSI model. OSI is the abbreviation for Open System Interconnection. Within the model, exists an abstract, layered description for computer network protocol design and communications. OSI operates as a model with set standard specifications meant to allow communication of data with each other, in an open manner, it is utilized to deal with the interconnection amongst systems. In essence, it helps the way in which systems interchange data. None of the model focuses on the internal function of a specific system (Faynberg, 1997, p. 45).

OSI Model

The OSI break apart the network structure into seven strata. These are: data link, network, physical, transport, presentation, session, application. The order in which information is received is first through the physical layer, then data link, then network, then transport,...

...

When transmitting data, the order is then reversed making the application layer first. Both transmit and receive are connected via a physical link.
Because systems need structure and design to make process smooth and faster, a layered approach to the model allows for less impact on other layers when there is modification made on one layer. If the model only contained one layer, any modifications made would affect the entire model vs. just one layer. Protocol designers also are allotted specialization in area or layer, without concern for how many possible effects their design may have on other layers.

Layering allows separation of processes. It minimized an extremely intricate set of activities, topics, and actions into numerous, smaller, consistent groups. Understanding and learning the actions within the layers is also much easier than if done under one, single layer. Troubleshooting is also better because trouble shooing efforts are given a chance to pinpoint any suspected problem or cause of a problem more easily and quickly.

The single most significant reason to use a layered mode is for the purpose of establishing a prescribed rule for interoperability amongst various information communication tasks. For instance anything that needs to be quickly targeted and cleaned can thanks to the layered approach. It also increases security. OSI is the basis and foundation for network standards.

The seven layers of the OSI Model begin with the physical layer which is the first or lowest layer. It comprises of cabling, repeaters, and connectors and is the physical networking. This layer outlines the physical network structure as well as define the electrical and mechanical specifications for utilizing transmission medium, bit transmission encoding, and lastly, time rules. The physical layers does not grant any kind of error correction. The protocols within this layer are however, transmission-media-specific.

The second layer, the data link layer, controls or regulates communication between the physical layer and the network layer. Its main function is to separate information it received from the layer below, the network layer, and then split into distinct frames. These frames are then transmitted through use of the physical layer. The second layer organizes the first level's information into logical groups of data or "frames." It also corrects and detects errors along with controlling data flow and identifying other computer within the network.

Layer three is the Network layer. And its main function is to move information to a particular network location. It performs this actions through translation of logical addresses into the appropriate physical address. After this, the third layer chooses on the best way for the information to take from the path of sender to receiver. One important thing to note is the data link layer only operated on a single network as it relates to performing the actions of addressing. This is the opposite for the network layer that addressing only function on multiple internetworks (Faynberg, 1997).

Reliability is the main task for layer four or "transport layer." Its main function is to guarantee information sent from one computers comes reliably. This means no errors and within the correct sequence. The error control apparatus allotted by the lower layer afford for last chance error recovery. Another responsibility for the fourth layer is flow control and determining rate of transmission. Information sent via a computer, is divided and split into packets that are the supreme size that the kind of network can manage. Its job it to sequence and segment data from the host's system and then reassemble into information for a data stream on the receiving side of a host's system.

The fifth layer or session layer provides processing for regulation of dialogue among two end systems. It delineates how to begin, regulate, and finish conversations or "sessions" between applications. Users need to establish a logical connection in this layer. Passwords and log-on or log-in information is handled by the session layer. It also terminate connection and provides service like dialogue discipline. Dialogue discipline can take two forms, half duplex or full duplex. One last important function to note in the session layer is it can provide check-point processing so in case there exists a failure of any kind between checkpoints, all information can be resent from the latest or last checkpoint.

The sixth layer or presentation layer is one of the shortest layer in terms of responsibilities and uses. This layer essentially defined the format for which information is exchanged amongst two interactive entities. It also handles data encryption and data compression. This layer ensures readability and translation of multiple data formats through of a common format.

The final layer, the…

Sources Used in Documents:

References

Faynberg, I. (1997). The intelligent network standards. New York: McGraw-Hill.

Haase, J. (2012). Wireless Network Standards for Building Automation. Embedded Systems, 53-65. Doi: 10.1007/978-1-4419-8795-2_4

Panayides, A., Antoniou, Z., Pattichis, M., Pattichis, C., & Constantinides, A. (2012). High efficiency video coding for ultrasound video communication in m-health systems. IEEE, 2170.

Siep, T., Gifford, I., Braley, R., & Heile, R. (2000). Paving the way for personal area network standards: an overview of the IEEE P802.15 Working Group for Wireless Personal Area Networks.IEEE Personal Communications, 7(1), 37-43. doi:10.1109/98.824574
Web.archive.org, (2014). A BRIEF HISTORY OF RECENT UK TELECOMS AND OFTEL. Retrieved 12 December 2014, from http://web.archive.org/web/20030405153523/http://www.sigtel.com/tel_hist_brief.html


Cite this Document:

"Network Standards" (2014, December 14) Retrieved April 18, 2024, from
https://www.paperdue.com/essay/network-standards-2154097

"Network Standards" 14 December 2014. Web.18 April. 2024. <
https://www.paperdue.com/essay/network-standards-2154097>

"Network Standards", 14 December 2014, Accessed.18 April. 2024,
https://www.paperdue.com/essay/network-standards-2154097

Related Documents

Standards Protocols Standards and Protocols What are standards/protocols? The evolution and proliferation of web usage has prompted the need for a wide variance of governing rules, regulations and conventions. The purposes of these standards and protocols is to promote consistency, control and oversight even as new communication and data exchange technologies emerge. Thus, simply stated, a web or network protocol is a system regulating the format of messages being exchanged across said network.

Network Plan for ABC Corp
PAGES 9 WORDS 2595

The paper creates Extended Access Control Lists for ABC Corporation using Port Numbers. Extended Access Control Lists for ABC Corporation using Port Numbers access-list 101 permit tcp 172.16.3.0. 0.0.0.255 any eq 20 access-list 101 permit tcp 172.16.5.0. 0.0.0.255 any eq 21 access-list 101 permit tcp 172.16.3.1/16. 0.0.0.255 any eq 22 access-list 101 permit tcp 172.16.3.254/16. 0.0.0.255 any eq 25 access-list 101 permit tcp 172.16.5.254/16. 0.0.0.255 any eq 35 access-list 101 permit tcp 172.16.0.254/16. 0.0.0.255 any eq18 access-list 101

Another aspect of the security management area of a network management system is the development of policy-based auditing and alerts by role in the organization (Merilainen, Lemmetyinen, 2011). This is one of the areas of knowledge-enabled security management, specifically in the area of role-based access and advanced auditing and reporting. Fault management is also an area that no single suite of network management systems can completely meet per the ISO standards

Standards 802.11 "a," "b," "g" and "n" allow different applications to be deployed as mobility services. Based on the readings what might be the steps to setup a wireless network. Steps to establishing a wireless network The steps to setting up a wireless network are the following: Scaling the area Scale the area that you want wireless network set up in so that you can have an initial idea of layout. Meraki's WiFi Stumbler

Network/IT Communications Selecting the type of cable to be used when developing a LAN from the ground up can be a complex process with many considerations, including issues of functionality and of cost. Twisted pair cables provide a cheaper alternative to other cable types and are also the most flexible type of cable, but they are less secure and are more prone to losses in data integrity than are other standard

The company should use the Cisco hedge router to make the company to achieve a reliable communication over the internet. The edge router will also make the company to achieve higher capacity, scalability, and improve routing protocol convergence at lower costs. As traffic volume increases, the solution will allow the company to implement incremental bandwidth upgrades without necessarily changing the router interface. The edge firewall will be used to