• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

LAN & WAN Protocols

Extracts from this document...

Introduction

BTEC National Certificate for IT Practitioners Unit 8 Communication Technologies Assignment 2 Introduction In this assignment I am going talk about what network protocols are and what do they do. I will list the different types of protocols LAN's & WAN's use to communicate. Communication Protocols A protocol is a computer communication language which allows computers to talk to each other on a network. Networks depend on protocols. Without the protocols the hardware is useless. OSI Model 7 Layers & Protocols Layer 1 (Physical) - This layer contains the protocols which allow transmission of binary either on a cable or over hardware. There are lots of different types of protocols that work at this layer. ADSL - Allows faster rates of transmission over copper cables, this system commonly known as broadband. ADSL stand for Asymmetric Digital Subscriber Line. ISDN - Integrated Services Digital Network allows the integration speech and data on the same telephone line RS-232 - Recommended Standard 232 allows the modem and pc connection. It is a quite old system, normally used with a serial port. Layer 2 (Data Link) - Allows the transmission of data on the same network but to different computers. This has the ability of correcting error is any were made by the L1. Ethernet - Commonly used cable when creating LAN networks. ...read more.

Middle

PPP PPP which is Point to Point Protocol which enable and establishes a direct connection between two device over a serial cable, including phone lines and fibre optic links. There are two sub categories of PPP. PPP over Ethernet and PPP over ATM, both used for similar things using DSL internet service. PPP works at the data link layer protocol; it is another important protocol because it acts as a connection for synchronous and asynchronous circuit which have stopped using non-older standard Serial Line Internet protocol. Ethernet Widely used for LAN technology. It uses coaxial cable and is also used in wireless LAN's. The newer used Ethernet systems are called the 10 BASE T. They reach up to transmission speeds of 10Mbps. It works in the data link layer. It is quite important because everywhere you go you would mostly see the Ethernet system's deployed. Internet Protocol (IP) Internet Protocol (IP) is the protocol which allows communication across packet switched internetwork using TCP/IP. IP is and really important protocol because it delivers the packets from the source host to the destination node based on its address. It also defines the addressing methods and structuring for datagram encapsulation. IPv4 is the main dominant protocol for the internet although the IPv6 is more widely known and deployed. This works at the network layer. ...read more.

Conclusion

DNS DNS which stands for Domain Name System is a naming system for computers, services, or any other resource in the Internet. It will translate the human text to binary indentifies associated; this allows network equipment to locate and addresses these devices world-wide. Often the concept of a phonebook is applied to make someone understand the theory of DNS, It acts as a phonebook for the Internet by translating the human text to IP addresses. For example www.google.co.uk is translated to 74.125.76.104. SMTP SMTP protocol which stands for Simple Mail Transfer Protocol. SMTP is an internet standard for electronic mail transfer across IP addresses. This is also a text based protocol. In text based one or more recipients can be added and other encoded subjects can also be attached and transfer. When the mail is transferred it will first go to a remote server using different commands of quires and responses between the server itself and the client. MIME Multi Purpose Internet Mail Extensions (MIME) is a Internet Standard which extends the format of an e-mail to support character sets other than the US-ASCII, non-text attachments, message bodies with multiple parts header information in non ASCII character sets. It works at the presentation layer and it is important for e-mail because it defines mechanisms which allow other kinds of information to be sent via the e-mail. This include text language other than English using character encoding other than ASCII and 8 bit binary content and files containing sound, video, images and computer programs. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    than other tools due to many reasons which the other tools cannot do. Data When data is inputted into a system the management area must first make sure the information is as accurate as possible and meets the needs of the supermarket.

  2. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    * It can workout to be quite expensive to setup. Ring Topology - The node are interconnected with each other like mesh but each node is exactly connected to two other node, which result in a pathway for signal that are transmitted.

  1. Signal Theory

    Because no start or stop bits are involved data transmission is faster, but more problems occur because if latency takes into effect then the synchronization clock will be out of timing therefore the receiving node will get the wrong timings that have been acknowledged in the protocol sending and receiving data.

  2. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    Briefly explain and suggest organizations and application which would be likely to use: > Leased lines > Dial-up connections To access external networks. Justify your choice in each case. What is a modem? Modulator-demodulator - a device or program that enables a computer to transmit data over analogue telephone lines.

  1. Describe the following networking technologies:TCP/IP addresses Ports Protocols Domain name. The ...

    Now list and describe at least 5 network assets that would need to be regularly identified and checked. (P5) The estate agency will be adding ICT to their company, which will create a network. in network there are lots of assets which gradually builds a network.

  2. WAN Protocols

    The transport layer, containing UTP and TCP is the same on both models. The network layer is the actual Internet Protocol, as well as a few older alternatives such as X.25. The data link layer is the same and are the protocols controlling the actual transfer onto the physical line

  1. Smart Card System

    However, Java programming is very flexible and each of the classes can be reuse in different system. In creating the user interface, the team found that it is not as easy as Visual Basic. The team is required to spend a lot of time and efforts in designing the user interfaces.

  2. Introduction of Communication

    phone that is seven years old or older their phones might not support 3G. Although smaller messages can be sent via the 2nd generation network, GPRS. Mobile Telephone (Done) A WAP browser provides all of the basic services of a computer-based web browser but simplified to operate within the restrictions of a mobile phone, such as its smaller view screen.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work