• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

LAN & WAN Protocols

Extracts from this document...


BTEC National Certificate for IT Practitioners Unit 8 Communication Technologies Assignment 2 Introduction In this assignment I am going talk about what network protocols are and what do they do. I will list the different types of protocols LAN's & WAN's use to communicate. Communication Protocols A protocol is a computer communication language which allows computers to talk to each other on a network. Networks depend on protocols. Without the protocols the hardware is useless. OSI Model 7 Layers & Protocols Layer 1 (Physical) - This layer contains the protocols which allow transmission of binary either on a cable or over hardware. There are lots of different types of protocols that work at this layer. ADSL - Allows faster rates of transmission over copper cables, this system commonly known as broadband. ADSL stand for Asymmetric Digital Subscriber Line. ISDN - Integrated Services Digital Network allows the integration speech and data on the same telephone line RS-232 - Recommended Standard 232 allows the modem and pc connection. It is a quite old system, normally used with a serial port. Layer 2 (Data Link) - Allows the transmission of data on the same network but to different computers. This has the ability of correcting error is any were made by the L1. Ethernet - Commonly used cable when creating LAN networks. ...read more.


PPP PPP which is Point to Point Protocol which enable and establishes a direct connection between two device over a serial cable, including phone lines and fibre optic links. There are two sub categories of PPP. PPP over Ethernet and PPP over ATM, both used for similar things using DSL internet service. PPP works at the data link layer protocol; it is another important protocol because it acts as a connection for synchronous and asynchronous circuit which have stopped using non-older standard Serial Line Internet protocol. Ethernet Widely used for LAN technology. It uses coaxial cable and is also used in wireless LAN's. The newer used Ethernet systems are called the 10 BASE T. They reach up to transmission speeds of 10Mbps. It works in the data link layer. It is quite important because everywhere you go you would mostly see the Ethernet system's deployed. Internet Protocol (IP) Internet Protocol (IP) is the protocol which allows communication across packet switched internetwork using TCP/IP. IP is and really important protocol because it delivers the packets from the source host to the destination node based on its address. It also defines the addressing methods and structuring for datagram encapsulation. IPv4 is the main dominant protocol for the internet although the IPv6 is more widely known and deployed. This works at the network layer. ...read more.


DNS DNS which stands for Domain Name System is a naming system for computers, services, or any other resource in the Internet. It will translate the human text to binary indentifies associated; this allows network equipment to locate and addresses these devices world-wide. Often the concept of a phonebook is applied to make someone understand the theory of DNS, It acts as a phonebook for the Internet by translating the human text to IP addresses. For example www.google.co.uk is translated to SMTP SMTP protocol which stands for Simple Mail Transfer Protocol. SMTP is an internet standard for electronic mail transfer across IP addresses. This is also a text based protocol. In text based one or more recipients can be added and other encoded subjects can also be attached and transfer. When the mail is transferred it will first go to a remote server using different commands of quires and responses between the server itself and the client. MIME Multi Purpose Internet Mail Extensions (MIME) is a Internet Standard which extends the format of an e-mail to support character sets other than the US-ASCII, non-text attachments, message bodies with multiple parts header information in non ASCII character sets. It works at the presentation layer and it is important for e-mail because it defines mechanisms which allow other kinds of information to be sent via the e-mail. This include text language other than English using character encoding other than ASCII and 8 bit binary content and files containing sound, video, images and computer programs. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Even though it is has a relatively high transmission rate it does not cope well with eavy traffic rates. * There is a limited amount of cable and workstations that can be used and connected. * If the network is cable is broken it can cripple the whole network, the computer will be functioning but cannot communicate with each other.

  2. Different ways of data capture

    networks * Improved compression techniques which allows faster transmission of text and graphics. Human Computer Interface A HCI is a term used to describe the interaction between a user and a computer i.e.

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    It must first undergo a process of conversion from analogue to digital form. It then must be compressed so that it can be transmitted efficiently. Before the signal is finally sent into the air, it must be tailored so that it travels effortlessly through the air medium.

  2. I have been given the task to design a database for a company called ...

    One-to-one, e.g. relationship between Person and National Insurance number which is unique to every person. 2. One -to-many, e.g. relationship between Customer and Parcel Order. 3. Many-to-many, relationship between Customer and parcel. Below are examples of data entities, which are relevant to my system.

  1. Signal Theory

    Bit is a binary digit which represents value of 0 which is normally off and 1 which is normally on. Bit can also be referred to as a electrical pulse which is generated by the inner clock in the control unit or data register.

  2. Asynchronous and Synchronous

    This is very in efficient. Its packet structure is known as a packet frame. Asynchronous Transmission Start bit Stop bit Parity bit The synchronous transmission form occurs when bits are sent in the packet form. This form of data sending is normally sent through bigger Networks.

  1. Introduction of Communication

    Another advantage is that companies can send visitors a map of the office building, since a lot of people are on contract with their phones they get changed to the latest model, which will often have a larger screen. Disadvantages MMS works using the 3G network, if customers have a

  2. Smart Card System

    For some protocols, we create one access list to filter inbound traffic, and one access list to filter outbound traffic. To create an access list, we need to specify the protocol to filter, we assign a unique name or number to the access list, and we define packet-filtering criteria.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work