Transferring data inside a network is not as easy as it seems. File transfers introduce high-volume traffic onto the net. This traffic flow can have a big impact on overall network throughput. While file transfers are throughput-demanding, they usually have low response-time needs.
File transfer has the following basic characteristics: 1. this type of traffic has an unpredictable bandwidth usage. This happens because it is typically user initiated and for that reason cannot be constantly predicted. 2. this type of traffic has big packet sizes. File traffic protocol for example uses big packet sizes for efficient transfer. These big packets might create delay for other types of traffic when the net becomes congested.
Moreover, it is essential to classify the amount of users that use file transfers on a steady basis. File traffic protocol is not the only kind of file transfer traffic on a local area network. Transferring data from shared network folders and downloading big files using HTTP protocol have similar characteristics to FTP protocol.
From this info, the network architect can predict the throughput requirements. When these requirements go above the net capacity, it is essential to enable quality of service methods to guarantee that delay-sensitive applications will work as expected.
Electronic mail is one of the most widespread network services. With its straightforwardness and speed, Electronic mail has changed the way computer users communicate. However, to run on a PC or other network device, electronic mail needs a number of applications and services. Two email protocols are Post Office Protocol (POP) and Simple Mail Transfer Protocol (SMTP).
Email Client
Email users usually use an application called "email client" in order to send and receive electronic messages. The email client allows users to create and send messages, and then puts received messages into the user's mailbox.
Email Server Processes
The email server is responsible for transferring and delivering emails to the email client. While a single email does not create substantial traffic, it is possible a large amount of emails to be transmitted that flood the network or servers with data.
Supporting File Transfer and Email Applications
Clients usually demand instant access to their emails and to the data that they are sharing or updating. In order to provide this availability, the network architect must take the next steps: Secure file and mail servers in a central location, for example a server farm. Safeguard the site from unapproved access by physical and logical security measures. Build redundancy in the server farm that guarantees that if one device fails, all files are not lost. And these are just the basic file transfer considerations.
Manolis Skoras is a Cisco, Microsoft and HP Certified Trainer and systems-network engineer. Recently he created a CCNA certification website to help his students and people around the world to better understand the material they will be tested on, thus having greater success rates. Check Certify4Sure today!
No comments:
Post a Comment