• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Describe the following networking technologies:TCP/IP addresses Ports Protocols Domain name. The estate agency will be adding ICT to their company, which will create a network. in network there are lots of assets which gradually builds a network. I am

Extracts from this document...

Introduction

Q2. Describe the following networking technologies: (P3) TCP/IP addresses Ports Protocols Domain name. TCP/IP addresses- are a network that identifies the addresses of a computer or any devices on a TCP/IP network. The networks that use the protocol to route information contains a message which has a destination reach to. A TCP/IP addresses contains nine numbers but separated by a full stop. Each number can start from 0 and has a limit up to 255. The TCP/IP connects networks that are different sizes and system of different types. The IP address os 32 bit number which uniquely identifies a host such as, a computer, wireless printer and so on. Ports- a port can be found internally and externally within a computer. A port can be described as a socket. Most computers contain more then one serial ports. The serial port allows you to connect devices or USB slots e.g. scanners, printers. Protocols- the protocol will be moving around information, it's a language most computers use over the internet, and also it allows two or more computers to communicate at once. ...read more.

Middle

I am going to list five network assets which are ... * Server * Cables * Computer * Printer * HUB I have suggested all the five network assets above; these are the most common that builds a network. Server- a server will be needed; the server will be controlling all the computers and running the computers. The server will be checked, if the server failed, most computers will be affected unless they had a back up server. Cables- the cables will need to be regularly checked because, cables sometime tend to break or be faulty. If this occurred than, this will stop computers from running and also data cannot be transferred. Computer- the computer will be needed to be regularly checked because, computer sometime fail and stop working, this can be reason for viruses or operating system failure. Also if the computer is not regularly checked, the computer performance maybe decreasing and you need to check why that is. Printer- the printer needs to be regularly checked because; printers always need refilling in order to print out work and also sometimes printer tend to have paper jam so its need monitoring. ...read more.

Conclusion

The sever can access be accessed in multiply platforms. The other advantage is the server examine s the poor performance and improves it, also data is handled by the server which allows the network to run more efficient. The last advantage is, the network which is connected to the server collects all the data and stores it, which makes it easier to back up data. The disadvantage of this network are, it tends to run slow because it is controlling so many computers at once and trying to make them all communicate at once, also another disadvantage is the silent server network is generally more expensive to set up. The other disadvantage is, if there was a problem occurred in the server, everything will fail, also the server can overload. Server- the server is required because; server is the same as a computer, the server will provide data such as e.g. work, the eight computers will not save the work, the data will be saved in the server and the server will transfer the data to the specific computer. Also the server will keeps logs of things, so if the company need to check anything recent the server can provide them with that information. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    The data is encapsulated in a UPD datagram to allow communication with other application on other host by even more encapsulation into IP to allow internet working to remote sites. After the encapsulation take place in frame relay for voice and data.

  2. Social Networking

    On the University level the use of SNS are same as in other educational areas. But I have noticed that after being encouraged and directed by their professors student have made good use of these resources. A lecturer at John Cabot University in Rome reveal that he encourage the students

  1. Smart Card System

    Structure traveling with the flow: Lab Assistance Username and Password Volume / Time: 1 / Each Use Time Comments: Lab assistance supply their username and password to login to the server application. Relation Description Form Name: User Information Request Description: This data flow carries the request from server application before

  2. System I designed in order to produce a promotion package for her newly formed ...

    or locked by another person, you can't edit data in the form. Why did the size of my database increase significantly more than the size of the object I added? The amount of information used to represent an object is often greater than the size of the object itself.

  1. Propose to research the WTLS or Wireless transport layer security protocol along with the ...

    A WAP device, after sending data to the wired network, has been encrypted using WTLS. Thus the WTLS encrypted data must be translated to SSL which is the encryption standard of the Internet. After reviewing a description of the WTLS and examining the different features of it, along with the

  2. Infernowear is a new company run by a self-employed creative designer aiming to producing ...

    are a quantity of pre-printed garments that are available to the customers. This means that Mr Hull wont have to wait to get a number of orders together to send to the printer. Instead he can do individual orders as they get telephoned through, this speeds up delivery times and keeps things moving.

  1. Future Developments in ICT

    To make these massive multi-core processors, the processes by which we manufacture them must decrease in size so as to lower costs, power consumption, heat and production yields. These are again, pioneered by Intel in their fabrication labs. Most recently we have seen a drop to 22nm ?3D Tri-Gate transistors?,

  2. Small Office Network Implementation - hardware and security.

    The configuration that is eventually chosen must match the resources available to install and maintain it. With the right configuration, anyone can do this. * The environment of the network- whether the network is being set up in a business or home, environmental factors can affect the choices available.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work