Protocol And Network Management Essay

PAGES
3
WORDS
928
Cite

Alicia Dease Written Summary of Chapter Seven "Multimedia Networking" from the text

"Computer Networking: A Top-Down Approach"

The internet is becoming a place which increasingly meets the all the electronic needs of its users. With the advent of multimedia content and the ability of people, even in remote areas, to have access to broadband capabilities, any function of a telephone, television, or other single-use multimedia device is becoming intertwined with a computer's new multimedia ability. Chapter seven in the text defines and discusses the technologies that are, and are becoming, available to the public. This summary will include what these multimedia services are, a simple synopsis of how they work, and, finally, the future of the many applications that providers continue to implement.

The text broke the advances into three simple groupings -- streaming stored audio and video, one-to-many real-time audio and video, and real-time interactive audio and video (Krouse and Ross 598) -- which encompass all phases of the technology currently in use. Streaming stored audio and video can be further broken down into three component parts: stored media, which is prerecorded and stored on a dedicated server; streaming, audio or video that continues to load as the customer is watching it; continuous playout, which requires that the media be received instantly by the consumer or "users experience frustrating buffering delays"...

...

Streaming live audio and video is an application that can be used like the more traditional television video signal. This drawback is that it cannot be fast forwarded, like stored media, but it can usually be paused and reversed. There is also generally a delay between when the user logs on to the feed and when they actually begin receiving the streamed content (601). The third category, real-time interactive audio and video, is "often referred to as internet telephony" (601), and it is becoming a much more critical aspect of broadband internet use. So far, this form of media has not been able to catch up to the use of a telephone for voice or picture quality because of "packet jitter" (602), but suppliers are looking into ways to make this technology more user friendly with better quality.
This media can be complicated, which is illustrated by the sometimes questionable quality, but researchers are beginning to make inroads into a product that can mimic the real time aspects of traditional television and telephone technology. As any media type improves, so does the quality of reception within the type. Voice recording began on a tin tube with notches, holes or groves cut into it. Now, people can enjoy a voice experience that resembles a live performance. Streaming stored audio video can be used either with a regular server or "special streaming servers" (608). One of the ways that this multimedia function has recently been enhanced is via…

Sources Used in Documents:

Work Cited

Krouse, James F., and Keith W. Ross. Computer Networking: A Top-Down Approach (5th ed.). Upper Saddle River, NJ: Addison-Wesley, 2009. Web.


Cite this Document:

"Protocol And Network Management" (2010, November 23) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/protocol-and-network-management-122410

"Protocol And Network Management" 23 November 2010. Web.19 April. 2024. <
https://www.paperdue.com/essay/protocol-and-network-management-122410>

"Protocol And Network Management", 23 November 2010, Accessed.19 April. 2024,
https://www.paperdue.com/essay/protocol-and-network-management-122410

Related Documents

Another aspect of the security management area of a network management system is the development of policy-based auditing and alerts by role in the organization (Merilainen, Lemmetyinen, 2011). This is one of the areas of knowledge-enabled security management, specifically in the area of role-based access and advanced auditing and reporting. Fault management is also an area that no single suite of network management systems can completely meet per the ISO standards

Network Management and System Administration The aim of the paper is to establish the difference between a system administrator and a network administrator. The paper is thus divided into three sections. The first section deals with the basic definition and responsibilities of a system administrator; the second does the same for a network administrator and the third compares their responsibilities to clearly identify the differences between the two. System Administrator The maintenance of

). Such security should also preplan strategic responses to attacks associated with the network (Dawkins et al.). A book entitled "Surviving Security: How to Integrate People, Process, and Technology" explains that the rapid expansion networking and networking technologies necessitates greater security needs. The author asserts that parts of the network such as routers, switches and even network printers are vulnerable (Andress). The article further explains that the router or switch contained

competitive, fast-paced business world, a network failure can be disastrous. The pressure placed on network administrators to fix issues immediately is daunting; these important players need all the tools they can get to troubleshoot, prevent, and repair problems. Network administrators must remain vigilant and work constantly to monitor for interface or host failures, detect route flapping or intrusions, perform LAN segment switches or bandwidth adjustments, and monitoring overall performance

Network Design The process of gathering technical requirements for a network design project may differ from one organization to another, but the requirements themselves can be described using many of the concepts discussed in the lecture this week (i.e. Scalability, Availability, Network performance, Security, Manageability, and Affordability). Analyzing technical requirements for the customer is important in helping one best fulfill the customer's expectations. The various objectives that need to be fulfilled involve

Network Design Proposal
PAGES 15 WORDS 4024

Network Design Proposal Network Requirements ABC School Stats/User Counts Having a current strength of approximately 845 students, ABC School provides education from Pre-Kindergarten to the 12th Grade. According to the requirements of The New York School District, 250 Curriculum computers along with 75 Administration computers are to be installed. The requirements for the wiring per room of layer 1 are that it should adjust a total of 25 computers, 24 of which will