• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Describe the following networking technologies:TCP/IP addresses Ports Protocols Domain name. The estate agency will be adding ICT to their company, which will create a network. in network there are lots of assets which gradually builds a network. I am

Extracts from this document...

Introduction

Q2. Describe the following networking technologies: (P3) TCP/IP addresses Ports Protocols Domain name. TCP/IP addresses- are a network that identifies the addresses of a computer or any devices on a TCP/IP network. The networks that use the protocol to route information contains a message which has a destination reach to. A TCP/IP addresses contains nine numbers but separated by a full stop. Each number can start from 0 and has a limit up to 255. The TCP/IP connects networks that are different sizes and system of different types. The IP address os 32 bit number which uniquely identifies a host such as, a computer, wireless printer and so on. Ports- a port can be found internally and externally within a computer. A port can be described as a socket. Most computers contain more then one serial ports. The serial port allows you to connect devices or USB slots e.g. scanners, printers. Protocols- the protocol will be moving around information, it's a language most computers use over the internet, and also it allows two or more computers to communicate at once. ...read more.

Middle

I am going to list five network assets which are ... * Server * Cables * Computer * Printer * HUB I have suggested all the five network assets above; these are the most common that builds a network. Server- a server will be needed; the server will be controlling all the computers and running the computers. The server will be checked, if the server failed, most computers will be affected unless they had a back up server. Cables- the cables will need to be regularly checked because, cables sometime tend to break or be faulty. If this occurred than, this will stop computers from running and also data cannot be transferred. Computer- the computer will be needed to be regularly checked because, computer sometime fail and stop working, this can be reason for viruses or operating system failure. Also if the computer is not regularly checked, the computer performance maybe decreasing and you need to check why that is. Printer- the printer needs to be regularly checked because; printers always need refilling in order to print out work and also sometimes printer tend to have paper jam so its need monitoring. ...read more.

Conclusion

The sever can access be accessed in multiply platforms. The other advantage is the server examine s the poor performance and improves it, also data is handled by the server which allows the network to run more efficient. The last advantage is, the network which is connected to the server collects all the data and stores it, which makes it easier to back up data. The disadvantage of this network are, it tends to run slow because it is controlling so many computers at once and trying to make them all communicate at once, also another disadvantage is the silent server network is generally more expensive to set up. The other disadvantage is, if there was a problem occurred in the server, everything will fail, also the server can overload. Server- the server is required because; server is the same as a computer, the server will provide data such as e.g. work, the eight computers will not save the work, the data will be saved in the server and the server will transfer the data to the specific computer. Also the server will keeps logs of things, so if the company need to check anything recent the server can provide them with that information. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    * Maintenance of the network in long period may be high, and also long term running more computers are added to the network the performance will drop. Star Topology - Star topology is a central node with outlying nodes. In a star topology the messages are transmitted via a switch, hub or even a computer.

  2. Social Networking

    On the University level the use of SNS are same as in other educational areas. But I have noticed that after being encouraged and directed by their professors student have made good use of these resources. A lecturer at John Cabot University in Rome reveal that he encourage the students

  1. System I designed in order to produce a promotion package for her newly formed ...

    You can change this setting so that Internet Explorer searches automatically without prompting. For more information, see Related Topics below. Protecting your identity over the Internet You can use a personal certificate to protect your identity over the Internet. A certificate is a statement guaranteeing the identity of a person or the security of a Web site.

  2. Infernowear is a new company run by a self-employed creative designer aiming to producing ...

    This makes building the system easy as it can be worked on at home in school and even in the final workplace. Because of the outweighed benefits of using a customised database system that can be purpose built to solve the clients needs I will be recommending using this type of solution.

  1. The purpose of this coursework is to design a network for a small to ...

    Figure 2 shows that each computer connecting to a switch with just a cable. Fig 2 Cabling The media which will be used to connect each user and the company servers to the internet will be Category 6, 1000BASE-T twisted-pair cables these cables will be able to give the support

  2. AS ICT Corsework - Mr Brookes K-Fit Ltd

    the products to the basket when the link "add to basket" is clicked works correctly. I will go through my products and check that every "add to basket" link works and tells the user that there item has been added.

  1. Future Developments in ICT

    the lack of any moving parts, with failures becoming far less likely and reliability soaring through the roof. Currently, research is underway to further increase read and write speeds via the use of stacked memory, meaning the signals have a smaller distance to travel.

  2. Small Office Network Implementation - hardware and security.

    Low-end network switches appear nearly identical to network hubs, but a switch contains more "intelligence" (and a slightly higher price tag) than a network hub. Workstation Jump to: navigation, search Source - ConceptDraw NetDiagrammer Workstations are intended primarily to be used by one person at a time, although they can usually also be accessed remotely by other users when necessary.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work