• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

LAN & WAN Protocols

Extracts from this document...

Introduction

BTEC National Certificate for IT Practitioners Unit 8 Communication Technologies Assignment 2 Introduction In this assignment I am going talk about what network protocols are and what do they do. I will list the different types of protocols LAN's & WAN's use to communicate. Communication Protocols A protocol is a computer communication language which allows computers to talk to each other on a network. Networks depend on protocols. Without the protocols the hardware is useless. OSI Model 7 Layers & Protocols Layer 1 (Physical) - This layer contains the protocols which allow transmission of binary either on a cable or over hardware. There are lots of different types of protocols that work at this layer. ADSL - Allows faster rates of transmission over copper cables, this system commonly known as broadband. ADSL stand for Asymmetric Digital Subscriber Line. ISDN - Integrated Services Digital Network allows the integration speech and data on the same telephone line RS-232 - Recommended Standard 232 allows the modem and pc connection. It is a quite old system, normally used with a serial port. Layer 2 (Data Link) - Allows the transmission of data on the same network but to different computers. This has the ability of correcting error is any were made by the L1. Ethernet - Commonly used cable when creating LAN networks. ...read more.

Middle

PPP PPP which is Point to Point Protocol which enable and establishes a direct connection between two device over a serial cable, including phone lines and fibre optic links. There are two sub categories of PPP. PPP over Ethernet and PPP over ATM, both used for similar things using DSL internet service. PPP works at the data link layer protocol; it is another important protocol because it acts as a connection for synchronous and asynchronous circuit which have stopped using non-older standard Serial Line Internet protocol. Ethernet Widely used for LAN technology. It uses coaxial cable and is also used in wireless LAN's. The newer used Ethernet systems are called the 10 BASE T. They reach up to transmission speeds of 10Mbps. It works in the data link layer. It is quite important because everywhere you go you would mostly see the Ethernet system's deployed. Internet Protocol (IP) Internet Protocol (IP) is the protocol which allows communication across packet switched internetwork using TCP/IP. IP is and really important protocol because it delivers the packets from the source host to the destination node based on its address. It also defines the addressing methods and structuring for datagram encapsulation. IPv4 is the main dominant protocol for the internet although the IPv6 is more widely known and deployed. This works at the network layer. ...read more.

Conclusion

DNS DNS which stands for Domain Name System is a naming system for computers, services, or any other resource in the Internet. It will translate the human text to binary indentifies associated; this allows network equipment to locate and addresses these devices world-wide. Often the concept of a phonebook is applied to make someone understand the theory of DNS, It acts as a phonebook for the Internet by translating the human text to IP addresses. For example www.google.co.uk is translated to 74.125.76.104. SMTP SMTP protocol which stands for Simple Mail Transfer Protocol. SMTP is an internet standard for electronic mail transfer across IP addresses. This is also a text based protocol. In text based one or more recipients can be added and other encoded subjects can also be attached and transfer. When the mail is transferred it will first go to a remote server using different commands of quires and responses between the server itself and the client. MIME Multi Purpose Internet Mail Extensions (MIME) is a Internet Standard which extends the format of an e-mail to support character sets other than the US-ASCII, non-text attachments, message bodies with multiple parts header information in non ASCII character sets. It works at the presentation layer and it is important for e-mail because it defines mechanisms which allow other kinds of information to be sent via the e-mail. This include text language other than English using character encoding other than ASCII and 8 bit binary content and files containing sound, video, images and computer programs. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    The chance of being hit by a Network failure is quite low because all the computer systems are connected to the central node. Each of the devices connected have their own connection. The connections are made by network cable running from the central node directly to the device.

  2. Describe the following networking technologies:TCP/IP addresses Ports Protocols Domain name. The ...

    An example of this service is login page. File transfers- file transfer is the movement of one file to another location. The file is transferred by electronically, so it will transfer data from one computer to another. Resource sharing - allows you to run programs across a network and allow you to use the program without you having the program.

  1. Introduction of Communication

    Another advantage is that companies can send visitors a map of the office building, since a lot of people are on contract with their phones they get changed to the latest model, which will often have a larger screen. Disadvantages MMS works using the 3G network, if customers have a

  2. Signal Theory

    Analogue signals can have varying amplitude and frequency. Amplitude analyzes the loudness of the signal and Frequency determines the pitch of the signal. "Pitch" mostly used to refer to low and high notes. If the frequency is lowered than you get a low note and if the opposite is applied than you get a high note.

  1. Subnetting and IPs IP addresses are an extremely important part of sending and ...

    However, the first two bits are reserved to show that it's a Class B address. Even this allows for more networks and fewer hosts, it is still too much for many organisations and so many addresses are wasted if Class B addresses aren't managed carefully.

  2. WAN Protocols

    The transport layer, containing UTP and TCP is the same on both models. The network layer is the actual Internet Protocol, as well as a few older alternatives such as X.25. The data link layer is the same and are the protocols controlling the actual transfer onto the physical line

  1. Asynchronous and Synchronous

    This is very in efficient. Its packet structure is known as a packet frame. Asynchronous Transmission Start bit Stop bit Parity bit The synchronous transmission form occurs when bits are sent in the packet form. This form of data sending is normally sent through bigger Networks.

  2. The seven layer osi model

    This is important to any file whether it be text based or media. Data encryption is encoding of bits when sent by using a mathematical process. This then means that the message can be made secure, and prevents from security issues such as hacking and so on.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work