• Join over 1.2 million students every month
• Accelerate your learning by 29%
• Unlimited access from just £6.99 per month
Page
1. 1
1
2. 2
2
3. 3
3
4. 4
4
5. 5
5
6. 6
6
7. 7
7
8. 8
8

LAN &amp; Topologies &amp; Data Flow

Extracts from this document...

Introduction

BTEC National Certificate for IT Practitioners Unit 8 Communication Technologies Assignment 3 Introduction In this assignment I am going to list and describe the components that make up a LAN. I will also state how they can be interconnected and interact with each other. I will show some LAN topologies and illustrate them. Finally I will explain and describe how data travels around the various topologies and list the advantages and disadvantages of each topology. LAN I am going to look at the components that make the LAN and describe them. Ethernet, Hardware, NIC's, Hubs/Switches/etc these are the list of components that make up the LAN and now I am going to explain each of these components. NIC's - Network Interface Card are used for connecting a RJ-45 cable. Nearly all the modem PC's or PC's which connect through dial-up connection need a NIC. On either ends is a RJ-45 connector which then allows you connect to another computer on the network or another device. The NIC is interconnected to other hardware such as the motherboard; this allows it to communicate with the computer. There are 3 ways the NIC can be connected to the computer. As mentioned before it can be integrated on the motherboard, connected through a PCI slot or connected using a ISA slot (Industry Standard Architecture). For the NIC's to communicate with each other properly they need to have been connected with a RJ-45 connector on either end to one of the computers. ...read more.

Middle

Conclusion

* It requires a lot more cable than other types of topologies because all the node are connected, so the more nodes that are connected the more cable is needed. * It can workout to be quite expensive to setup. Ring Topology - The node are interconnected with each other like mesh but each node is exactly connected to two other node, which result in a pathway for signal that are transmitted. The data which is transmitted is handled by each node on the network and then sent back with an acknowledgement of receipt. When the node transmitting the data receives the receipt it destroys the token ring. Either a token ring or a small packet is continuously passed around the network so when a device needs to send something it will reserve the token ring. Advantages * Network is not dependent on a centralized node because each of the nodes on the network can support the transmission rates around the network. Each of the nodes has the ability to take control of the transmission rate. * Extremely high transmission rate can be achieved. Typically speed of transmission is around 10 Mbps which is quite quick. For e.g. it will take around 2 minutes to send a 100MB file which is pretty quick. * Compared to a star topology it performs a lot better under heavy load. * Network server is not required to manage the network. ?? ?? ?? ?? Anas Patel Assignment 3 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

• Start learning 29% faster today
• 150,000+ documents available
• Just £6.99 a month

Here's what a teacher thought of this essay

3 star(s)

*** A good decription of topologies with useful diagrams but the earlier topics include too many terms that are not explained properly and require a lot of knowledge

Marked by teacher Ivor Borkin 01/04/2012

Not the one? Search for your essay title...
• Join over 1.2 million students every month
• Accelerate your learning by 29%
• Unlimited access from just £6.99 per month

Related AS and A Level Computer Science essays

1. information systems assignment 2

4 star(s)

* Subject to some exceptions for organisations that only do very simple processing, and for domestic use, all entities that process personal information must register with the Information Commissioner. * Entities holding personal information are required to have adequate security measures in place. Those include technical measures (such as firewalls)

2. Future needs of Computer

Computers are used to store patient data. All financial transactions are done by computer software. They provide security, speed and convenience. One can book air tickets or railway tickets and make hotel reservations online. Telecommunication software is widely used here. Also all mobile phones have software embedded in them. Defense software is embedded in almost every weapon.

1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

2.Magnetic floppy disk Floppy disks hold a relatively small amount of information. Most software is too large to be stored on a floppy disk, as are commercial files of data. Advantages * A floppy disk is very portable, allowing for easy communication of data from one stand-alone computer to another.

2. Computer systems assignment 1

Motherboard allows them to communicate via BUSes which. They are little cables or printed Circuits which computer components share In order to exchange communication. There are various amounts of data that can be carried by a bus at once. They usually range from 16 to 64 bits and this is called a width of the bus.

1. Activity Based Costing system

So the total cost of each Danish pastry should be 1+2+4000\1000=\$7 If the company produces 1000 Danish pastries and 1000 lamingtons at the same time, the production overheads is \$5500 also based on direct material. The cost per unit would be like following: Lamington 1+2+5000\2000=\$5.5 Danish pastries 1+2+5000\2000=\$5.5 The numbers calculated this time is much different from the above two.

2. The impact of the availability of electric information on individuals and society

The other way how availability of electronic information affected my parents' daily lives is the way they find out the latest news. Only a few years ago they used to buy newspapers, listen to radio or watch TV news broadcast to get the latest news, while now they are doing

1. System Analysis The aim of the Jewellery store system is to make the work ...

Phase 7: Implementation After having the user acceptance of the new system developed, the implementation phase begins. This stage also involves two activities as follows: 1. The user training The users are to be given training for operating a new information system.

2. Evaluate the design and operation of Frito-Lay's logistic network.

The objectives of the logistics are tied to the goals of Frito-Lay's corporate headquarters. The private fleet also may allow Frito-Lay to provide back haul service and act as a profit center. The VSP system will probably need to be upgraded, however, in order to accomplish this.

• Over 160,000 pieces
of student written work
• Annotated by
experienced teachers
• Ideas and feedback to