• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Describe the following networking technologies:TCP/IP addresses Ports Protocols Domain name. The estate agency will be adding ICT to their company, which will create a network. in network there are lots of assets which gradually builds a network. I am

Extracts from this document...


Q2. Describe the following networking technologies: (P3) TCP/IP addresses Ports Protocols Domain name. TCP/IP addresses- are a network that identifies the addresses of a computer or any devices on a TCP/IP network. The networks that use the protocol to route information contains a message which has a destination reach to. A TCP/IP addresses contains nine numbers but separated by a full stop. Each number can start from 0 and has a limit up to 255. The TCP/IP connects networks that are different sizes and system of different types. The IP address os 32 bit number which uniquely identifies a host such as, a computer, wireless printer and so on. Ports- a port can be found internally and externally within a computer. A port can be described as a socket. Most computers contain more then one serial ports. The serial port allows you to connect devices or USB slots e.g. scanners, printers. Protocols- the protocol will be moving around information, it's a language most computers use over the internet, and also it allows two or more computers to communicate at once. ...read more.


I am going to list five network assets which are ... * Server * Cables * Computer * Printer * HUB I have suggested all the five network assets above; these are the most common that builds a network. Server- a server will be needed; the server will be controlling all the computers and running the computers. The server will be checked, if the server failed, most computers will be affected unless they had a back up server. Cables- the cables will need to be regularly checked because, cables sometime tend to break or be faulty. If this occurred than, this will stop computers from running and also data cannot be transferred. Computer- the computer will be needed to be regularly checked because, computer sometime fail and stop working, this can be reason for viruses or operating system failure. Also if the computer is not regularly checked, the computer performance maybe decreasing and you need to check why that is. Printer- the printer needs to be regularly checked because; printers always need refilling in order to print out work and also sometimes printer tend to have paper jam so its need monitoring. ...read more.


The sever can access be accessed in multiply platforms. The other advantage is the server examine s the poor performance and improves it, also data is handled by the server which allows the network to run more efficient. The last advantage is, the network which is connected to the server collects all the data and stores it, which makes it easier to back up data. The disadvantage of this network are, it tends to run slow because it is controlling so many computers at once and trying to make them all communicate at once, also another disadvantage is the silent server network is generally more expensive to set up. The other disadvantage is, if there was a problem occurred in the server, everything will fail, also the server can overload. Server- the server is required because; server is the same as a computer, the server will provide data such as e.g. work, the eight computers will not save the work, the data will be saved in the server and the server will transfer the data to the specific computer. Also the server will keeps logs of things, so if the company need to check anything recent the server can provide them with that information. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    * Transmission rate are relatively high compared to other network. The cable faults can also be easily identified. Disadvantages * The data is transmitted to every computer when the data is just to be sent and received between two computers.

  2. LAN & WAN Protocols

    A micro filter allows for this to happen. It allows the ADSL connections as well as the voice calls working simultaneously on the same line. It can be used for short distance communication of around 4 Km. The phone lines differ in the quality because they are originally made with DSL technology.

  1. I have been given the task to design a database for a company called ...

    Access has disadvantages as well as advantages these include: - * Access is more sophisticated than Excel and is therefore harder to use for a novice. * Access is used by professional system designers who design systems for end users.

  2. Free essay

    Setting up and E-Commerce Site

    of packages can we get for business and are they worth it? Updates Updates are critical on the system, do we want to pay someone to do it for us, or can we do it ourselves, in top of this what about software updates and hardware?

  1. Smart Card System

    The Java source synchronization feature can save the user time by automatically generating all of the implementation methods used for the source code. Forte for Java provides special support for creating JavaBeans components, including generation of properties, event sets, and bean info.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    TFormBooking.CBweekChange(Sender: TObject); begin inc(pos); // Add one to position variable pos:=strtoint(CBweek.Text); // Position becomes equal to the week selected in combo box showrecord; // Show the week selected end; procedure TFormBooking.FormActivate(Sender: TObject); var x: integer; customers : TStringList; begin begin Customers:=TStringList.Create; // Create a string list for the customers pos:=0;

  1. Introduction to Viruses

    One of the most common viruses, the STONED virus is not intentionally harmful. Unfortunately the author did not anticipate other than 360K floppy disks, with the result that the virus will try to hide its own code in an area on 1.2mb diskettes which causes corruption of the entire diskette.

  2. Future Developments in ICT

    features such as over provisioning; the use of more memory (128GB of memory on a 100GB drive) to allow writes to be spread over larger amounts of NAND, minimising wear and performance decreases. To bypass all of the difficulties of packing large computing power into a small device, many are turning to cloud computing as the solution.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work