Nt1330 Unit 3 Assignment 1

Improved Essays
Web server
A web server processes requests using HTTP, the most basic network protocol used for information on the World Wide Web.
HTML is the most frequent protocol for WWW and it may include images, scripts and style sheets in addition to text content.
A user agent (eg. a browser) communicates by requesting a specific set of data using HTTP.
This requests is than received by a server, which responds by sending the requested data or refusing to do, showing an error message of some sort.
Its primary purpose is to serve content, but a full HTTP implementation is also capable of receiving content from clients.
Some of the most used web-servers out there:
• Apache
• Microsoft
• Ngingx

Internet service provider
“An Internet service provider (ISP) is
…show more content…
After this, a data packet is typically forwarded, to reach its destination node.
Then, it directs the packet to the next station (network) on its journey by using information in its routing table/routing policy. This creates an overlay internetwork.
Use of multiple routers in interconnected networks:
Exchanging information about destination addresses using a dynamic routing protocol.

A router has different physical ways to operate network connections, such as:
• Fibre optic
• Copper cables
• Wireless
A router also contains several firmware for different networks’ protocol standards.
It also may include a firewall, virtual private network handling and other security functions.
But, these can be handled by dedicated/separate devices.

Browsers
“A web browser (commonly referred to as a browser) is a software application for retrieving, presenting, and traversing information resources on the World Wide Web,,
Basically, it allows any user to browse on the web (access data/information). It displays the controls and the websites using a simple-to-use, graphical user

Related Documents

  • Improved Essays

    On october 12, 2015 at or about 1102 hours i was dispatched to 1735 east young circle (publix supermarket), hollywood florida, in reference to a cellphone being taken. Upon further investigation it was later found that the cellphone would equal the amount to grand theft (over $300.00usd). Let it be also noted during the time of this investigation, i was working an off-duty detail at the above location. Upon arrival i made contact with the james othman, herein after referred to as the victim. The victim advised me that at approximately 1051 hours his phone was taken from the customer service counter (located at the south side of the store).…

    • 587 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    In order to provide reliability and quality of service (QoS) rules or policies that prioritize packets for outbound port queue will be in implement to meet the bank management requirement. The Internet and WAN connection will use multi-protocol label…

    • 452 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The protocols that are used are TCP and UDP. The data link layer is responsible for encapsulation of packets into frames and then transferring them to the physical layer. It is also responsible for flow control and addressing. 5. A three-way handshake is when two parties need to synchronize their segment sequence numbers used during their transmission.…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Implementing Firewall Filter Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network. First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    A routing loop is a situation that occurs between two or more routers in which a packet is continuously routed between the routers as a result of irregularities from the routing algorithms and/or the routing tables of the routers. (routing loops, 2015). An example is when three routers are connected in a triangular pattern i.e. router A is connected to router B, router B is connected to router C and router C is connected to router A, when the network is converged, all three routers will have sent their routing tables to their neighbors. If router C goes down and router B tries to send a packet to C at the same time the router went down before it receives an updated table from router A, it will look into its routing table and it sees that router A can get to C, so it will update its route to C through A and will send the packet through router A. the same thing happens when router A receives the packet from router B, since it received no update on a change from B, it also checks its table and sees that B can get to C, so it updates its route to C through B and sends the packet to B and the packet keeps getting sent this way until the maximum hop count is reached…

    • 677 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    is a software-based protocol that provides a way to locate files, devices or even individual in a network. LDAP uses port 389 and is uses by Microsoft as the main protocol that opens up this type of access. LDAP is lightweight which indicates a smaller version with a smaller code and it is part of X.500. The latter acts as a standard for network directory services. /***************************…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Policy-based management: SQL server has a feature called policy-based management which is used to define and also implement policies in SQL server. It is used if we want to apply any policy against a table or database and then checks whether the database or table satisfies with the given policy. If target database objects are not satisfied with the policies then either a trigger should be fired or we can enforce it so that an administrator will come to know that there is some policy violation. It will manage one or more instances of SQL server.…

    • 391 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1461 Words
    • 6 Pages

    ABC Company has a few diverse equipment and software needs to meet the prerequisites of their network. We've investigated the different pieces of equipment and software to suit the needs of the company. We've looked into what every building will require with respect to what benefit every site gives and decided their needs based on those results. Servers…

    • 1461 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    THE DEFERENCES OF HANDLING SOCKET AND SERVERSOCKET First of all what is a socket? A socket is the one end –point of two-way communication link between two programs running over the network. This means the programs run on different computers, usually referred as the local and the remote computer.…

    • 1130 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    VPN A virtual private network is used by organisations to help secure data on a network. It’s very hard to access these private networks meaning that the data becomes much more secure and it can be used across a large area of a network, including many computers. This isn’t an expensive thing to do anyone can do it by using simple publicly available infrastructures. VPN also makes use of encryption firewalls and authentications services when sending data across the web.…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 1 Assignment

    • 1292 Words
    • 6 Pages

    TCP/IP Transmission control Protocol/Internet protocol used to connect host computers on internet. First internet ARPANET was developed when US Department of research projects agency (ARPA) in the end of 1970s needed a system to share the resources of their big mainframe systems. In start ARPANET used Network Control Protocol but in 1974 TCP protocol was introduced and all pervious protocols were replaced with TCP Protocol. TCP/IP was the leader in protocols used as a communication protocol on the internet. TCP/IP is still being used as a communication protocol in network operating systems (Abbate, 1994).…

    • 1292 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Describe the responsibility of the medical office specialist to protect all protected health information (PHI). Here are my thoughts based on all that I have learned in this program over past few months. The medical office specialist (MOS) has a legal responsibility/duty to maintain the security of protected health information (PHI). The sharing of PHI is controlled by the privacy rule contained in HIPAA.…

    • 957 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    NT1330 Unit 1 Essay

    • 486 Words
    • 2 Pages

    So the previous section was discussing the findability Layer which enables humans and applications to search and find the smart thing's services they need, however in this section the main concern is to know more the next layer which is sharing layer. This layer’s main concern is to keep human and machine updated with the new information so the main concern was making this communication secure and free from hacks so researchers tried to use already existing protocols like HTTP that is already provides authentication mechanisms for securely sharing resources by which it allows clients to provide their user names and passwords in order to make HTTP request on a server and it is followed with SSL/TLS in order to make sure that the user names and…

    • 486 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The Internet was originally called the ARPANET, and in order to enhance the ARPANET to be enable may different types of computer networks to all communicate with each other, an open source protocol needed to be created, hence the development of TCP/IP. TCP/IP improved communications throughout the network and allowed all computers to easily communicate with one another. Another technology that helped expand the ARPANET to more users in a specific location was the development of the Ethernet. Ethernet is a coaxial cable that is still used today in many local area networks. Ethernet is highly effective in moving data from one computer to another at high speeds.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays