Unit 5 assignment 1 P1 Describe Network Technology Network technologies are needed to create a network. They include network: Operating systems (OS) System working frameworks are the product that keep running on a server and permits the server to control the capacities in a system, for example, oversee information, clients, bunches, security, applications, and other systems administration capacities. For Example: Windows Linux OS X (SnowLeopard) Protocols A convention permits PCs to correspond with one another. It is a situated of standards, which are utilized by PCs to correspond with one another in a system, which must be comprehended, acknowledged and utilized for PCs to have the capacity to convey. It …show more content…
empowers PCs to impart easily. 0TCP/IP (Transfer Control Protocol/ Internet Protocol) At the point when information is transmitted through the web it leaves the PC in advanced frame and must be changed over to simple structure to go down the telephone line, once it achieves the destination it should be changed over back to computerized structure. This is done through the utilization of a convention stack, otherwise called TCP/IP (exchange control convention/ web convention) convention suite. 0HTTP (S) (Hyper Text Transfer Protocol/ Secure) Permits information to be exchanged through the web and HTTPS permits the information to be transferred through the web all the more safely, in light of the fact that it scrambles the information while it is being exchanged. 0FTP (File Transfer Protocol) Allows files to be exchanged over the web, as HTTP. 0SNMP V.3 (Simple Network Management Protocol) It is a web standard convention for overseeing gadgets on IP systems. It is normally bolstered by switches, switches, servers, workstations, printers, modem racks and so on. 0ICMP (Internet Control Management Protocol) It is utilized by the working frameworks of organized PCs to send mistake messages showing, for instance, that an asked for administration is not accessible or that a host or switch couldn't be come to. The PING summon, for instance, utilizes ICMP to test an Internet association. Layout All networks have layouts, and as implied by the name it is how the network components are laid out. Ring Laid out in a ring, all of the nodes are connected to two nodes, data transfers either clockwise or anticlockwise, across the network to reach the destination one cable has an error or a node breaks down the whole network breaks down.
Bus Laid out in a line – Has a single cable connecting all of nodes. If one node breaks down the whole network breaks down Star All computers are connected to a hub, switch or router. Require more cabling, but failure of one node does not break down the network. Mesh Computers are connected to more than one computer – adv- if one breaks down the rest can still communicate.disad- lot of wires needed. Cabling For wired networks cables are needed. Wireless For wireless networks cables are not needed, signals are transmitted wirelessly. Devices Devices are needed to create a network and to run it affectively. For example, some common devices: Hub A network hub is a device which enables more than one computer to interconnect on a network. Router A router is a device that connects two networks – frequently over large distances. It understands one or more protocols. Switch A network switch is a small hardware device that joins multiple computers together within one LAN.
Gateway A gateway allows two networks using different protocols to be joined, it could be completely implemented in software, hardware or both depending on the types of protocols they support. Bridge Allows one network to be connected to another network with a similar protocol. Repeater Repeaters attempt to preserve signal integrity. Servers Servers are used to control networks rather than a computer because it has distinctive features e.g. faster processor and memory, more RAM, larger hard drives, higher reliability, redundant power supplies, redundant hard drives (RAID), compact size and shape etc.
N.p., 7 Jan. 2005. Web. The Web. The Web. 16 Mar. 2014. The 'Standard' of the 'Standard'.
When using routers, you need many routers in order to route the information to the correct location, as one router will not be able to manage this task. Explain how the routing schemes handle this problem.
Network computing was created in an effort to allow users of a computer application to share data more easily than using stand alone computers. Clients on a client/server network store their application data on a central server. There are two categories of clients on a network. They were originally categorized by their hardware design, but today clients are categorized by the software application design and where the bulk of the processing is done and where the bulk of the application software is stored.
Ethernet cables or Unshielded Twisted Pair (UTP) cables usually connects Star topologies. The star is configured around a central wiring device or switching element, usually an intelligent hub. The hub interprets and routes electrical signals using a high-speed backplane or bus. Each device (workstation, server, etc.) is connected singly to a port on the hub. (Bloom, 1998). Star topologies can be expensive to install, however, quickly identified nodes on the network through the switches, or hubs, will drastically decrease downtime.
Switchers have the ability to create VLANSs (Virtual LAN). According to (Pintello, 2013) A VLAN refers to a group if hosts that share a common set of requirements for communication and are grouped together via Layer 2 of the OSI Model. VLANs are also used to make networks more secure.
A network card is a piece of hardware which allows the computer to communicate with a network. Nowadays, there are rarely used because most computer come with them built in.
The definition of a switch or network switch is a small device that joins multiple computers together, working on layer two of the OSI, to form a local area network or LAN. Network switches are also known as smart hubs. Rather than simply dispersing the data evenly across a network the switch actually inspects the data packets for destination information, and then forwards the data to a specific location. By forwarding the data to its intended location bandwidth on the network is better controlled (Mitchell, 1999).
In most cases cable or DSL companies such as Comcast or DirectPC are just a single type of Internet connection company. But sometimes companies acquire these one-connection companies to make their companies bigger and better such as AOL buying Time Warner. As these companies get bigger and start to offer more types of connections they also start to have more security conflicts. AOL’s software for its dial up connection has a firewall built in to it, the firewall protects it users from hackers and unwanted programs from running. And the software works almost perfectly for keeping unwanted people or programs out, but the only catch is you have use their software. Road Runner, which is now part of AOL, is a cable company, which only provides high-speed Internet access, not full proof security. This problem leaves you open for hackers that are randomly barraging Internet connected PC’s with “pings” or “port scans”, probing to find unprotected PCs. Once found, a hacker can compromise your PC with a dangerous Internet threat such as a Trojan horse, spyware or even a malicious worm (Zone Labs).
...nnected through four repeaters, or concentrators, and only three of the five segments may contain user connections.
Network Solutions, Inc. is a worldwide leader in hardware, software, and services essential to computer networking (Aguinis, 2013, p.31). In the past, this company has used over 50 different systems to measure performance management. Even with the large amounts of different systems to measure performance, only a fraction of employees were receiving performance reviews, and less than 5% of employees received the lowest category of ratings. Also, the organization had no recognition program for employees with a higher category of ratings. In addition to the lack of employees not receiving reviews, it was noticed in the organization that performance problems were not being addressed or resolved.
Have you ever listened or sat in on a concept or network design meeting and been fed an alphabet soup of acronyms and words or technical jargon that just didn’t make sense to you? Well, the chances are that Ethernet, Token Ring, FDDI, and Wireless were among some of those being spoken.
Mesh networks are reliable, stable, and redundant. If a node can no longer operate, all the others are not affected as they can still communicate either directly or through one or more intermediate nodes. Mesh networks can be very expensive due to the large amount of cable and connections required. Bus Topology Bus topology refers to a local area network (LAN) arrangement where each node or device is connected to a main cable or link called a bus. The bus network is simple yet very reliable.
Local Area Networks also called LANs have been a major player in industrialization of computers. In the past 20 or so years the worlds industry has be invaded with new computer technology. It has made such an impact on the way we do business that it has become essential with an ever-growing need for improvement. LANs give an employer the ability to share information between computers with a simple relatively inexpensive system of network cards and software. It also lets the user or users share hardware such as Printers and scanners. The speed of access between the computers is lighting fast because the data has a short distance to cover. In most cases a LAN only occupies one or a group of buildings located next to each other. For larger area need there are several other types of networks such as the Internet.
It can also be an issue as the wiring can be expensive to buy and install and if the network is down, all computers would be out of use.
People in the present society have turned from the use of the old means of communication to the more advanced and technological ways of communicating. Technology has made it easier for people to communicate in a faster, efficient, and cost saving means through the introduction of the communication channels. The world has turned out to be the centre for technology with different technologies emerging daily as the people continue to develop from time to time to cope with the growing technology. The benefits of adopting the communication technology are explained in this article which shows why people do not function without technology.