• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

LAN & WAN Protocols

Extracts from this document...

Introduction

BTEC National Certificate for IT Practitioners Unit 8 Communication Technologies Assignment 2 Introduction In this assignment I am going talk about what network protocols are and what do they do. I will list the different types of protocols LAN's & WAN's use to communicate. Communication Protocols A protocol is a computer communication language which allows computers to talk to each other on a network. Networks depend on protocols. Without the protocols the hardware is useless. OSI Model 7 Layers & Protocols Layer 1 (Physical) - This layer contains the protocols which allow transmission of binary either on a cable or over hardware. There are lots of different types of protocols that work at this layer. ADSL - Allows faster rates of transmission over copper cables, this system commonly known as broadband. ADSL stand for Asymmetric Digital Subscriber Line. ISDN - Integrated Services Digital Network allows the integration speech and data on the same telephone line RS-232 - Recommended Standard 232 allows the modem and pc connection. It is a quite old system, normally used with a serial port. Layer 2 (Data Link) - Allows the transmission of data on the same network but to different computers. This has the ability of correcting error is any were made by the L1. Ethernet - Commonly used cable when creating LAN networks. ...read more.

Middle

PPP PPP which is Point to Point Protocol which enable and establishes a direct connection between two device over a serial cable, including phone lines and fibre optic links. There are two sub categories of PPP. PPP over Ethernet and PPP over ATM, both used for similar things using DSL internet service. PPP works at the data link layer protocol; it is another important protocol because it acts as a connection for synchronous and asynchronous circuit which have stopped using non-older standard Serial Line Internet protocol. Ethernet Widely used for LAN technology. It uses coaxial cable and is also used in wireless LAN's. The newer used Ethernet systems are called the 10 BASE T. They reach up to transmission speeds of 10Mbps. It works in the data link layer. It is quite important because everywhere you go you would mostly see the Ethernet system's deployed. Internet Protocol (IP) Internet Protocol (IP) is the protocol which allows communication across packet switched internetwork using TCP/IP. IP is and really important protocol because it delivers the packets from the source host to the destination node based on its address. It also defines the addressing methods and structuring for datagram encapsulation. IPv4 is the main dominant protocol for the internet although the IPv6 is more widely known and deployed. This works at the network layer. ...read more.

Conclusion

DNS DNS which stands for Domain Name System is a naming system for computers, services, or any other resource in the Internet. It will translate the human text to binary indentifies associated; this allows network equipment to locate and addresses these devices world-wide. Often the concept of a phonebook is applied to make someone understand the theory of DNS, It acts as a phonebook for the Internet by translating the human text to IP addresses. For example www.google.co.uk is translated to 74.125.76.104. SMTP SMTP protocol which stands for Simple Mail Transfer Protocol. SMTP is an internet standard for electronic mail transfer across IP addresses. This is also a text based protocol. In text based one or more recipients can be added and other encoded subjects can also be attached and transfer. When the mail is transferred it will first go to a remote server using different commands of quires and responses between the server itself and the client. MIME Multi Purpose Internet Mail Extensions (MIME) is a Internet Standard which extends the format of an e-mail to support character sets other than the US-ASCII, non-text attachments, message bodies with multiple parts header information in non ASCII character sets. It works at the presentation layer and it is important for e-mail because it defines mechanisms which allow other kinds of information to be sent via the e-mail. This include text language other than English using character encoding other than ASCII and 8 bit binary content and files containing sound, video, images and computer programs. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    The data is often summarised from an information system. The main use of this sort of system is where management or other workers would like to ask the same question on a regular basis repeatedly, although about different topics. Questions used within this are often listing certain areas of data in order for management to make analysis and planning.

  2. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    * Transmission rate are relatively high compared to other network. The cable faults can also be easily identified. Disadvantages * The data is transmitted to every computer when the data is just to be sent and received between two computers.

  1. Describe the following networking technologies:TCP/IP addresses Ports Protocols Domain name. The ...

    A client server network is either connected to a server or LAN. The client server runs around the server, everything you do will process through he server. The network allows you to communicate with computer like P2P; the network is plugged into a server, which a computer has to log into.

  2. Flexible Architectures in Communication Security Application

    The intermediate vector IV ensures that the diffusion process propagates to all remaining ciphertext in the communication stream. The ciphertext value of encrypted block i is first XOR'ed with plaintext block i+1 before it is encrypted. The end result is that the cipher kernel execution is a very long recurrence with virtually no parallelism.

  1. Introduction of Communication

    is in the shop instead of trying to explain to him what I need I can send him a picture of what I need. Advantages MMS has many advantages over SMS, MMS messages are not size restricted, they can be as large as you need them to be.

  2. Signal Theory

    It does it by finding out the person you want to email he's email address and then you will send him an email and click send and then that person will receive it. Signal Theory When talking about signal theory data is represented by digital format which is dependent on binary or base 2 principles.

  1. Subnetting and IPs IP addresses are an extremely important part of sending and ...

    However, the first two bits are reserved to show that it's a Class B address. Even this allows for more networks and fewer hosts, it is still too much for many organisations and so many addresses are wasted if Class B addresses aren't managed carefully.

  2. WAN Protocols

    The transport layer, containing UTP and TCP is the same on both models. The network layer is the actual Internet Protocol, as well as a few older alternatives such as X.25. The data link layer is the same and are the protocols controlling the actual transfer onto the physical line

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work