• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Principles of Computer Networks

Extracts from this document...

Introduction

BTEC National Certificate for IT Practitioners Unit 27 Principles of Computer Networks Assignment 1 Introductions In this assignment I am going to describe the types of networks available and how they relate to particular network standards and protocols and I am also going to describe, using examples, why different network standards and protocols are necessary LAN This is type of network which covers a small office, home or a school network. A LAN uses either wired Ethernet or wireless RF technology. Using a LAN can be much easier when there is a printer available or sharing a file throughout the network. Updating software is much easier because updating software will automatically update all the other software's. LAN has much higher transmission rates because it is wired connection rather than wireless. Ethernet and Wi-Fi as most widely used technologies, however many others such as token rings have been used before. This relates to standard IEEE 802.2. This standard allows two connectionless and one connection orientated operational mode: Type 1 which allows frames to be sent to a single destination or multiple destinations on the same network is a connectionless mode. Type 2 is the oriented operational connection mode. In this mode it uses something called sequence numbering which makes sure that when the data is send it gets to the destination in the correct order and not a single frame has been lost. Type 3 which is also a connectionless service, but only support point to point communication. Infrared is related to this service because in computer infrared network it can receive and transmit data either through the side of the device or the rear side of the device. When connections are made using Microsoft Windows Infrared the same method used for LAN connections can be used. Infrared technology has been extended to allow more than two computers to be connected semi permanent networks. ...read more.

Middle

* Each device connected to the network is isolated; this prevents any non-centralized failure to affect other devices on the network. * Expanding the network is very easy because of centralization. It can also analyze traffic and determine whether suspicious behaviour. * This topology overall is very easy to understand, design and navigate. This topology discards the need of complex routing/message forwarding protocols Disadvantages * There are setbacks of this type of topology because the network is dependent on the system functioning of the central hubs, If there is a problem with the central hub then the whole network will stop working. * The whole network will also depend on the performance and capabilities of the central hub. The performance will depend on the number of connection that can be made simultaneously to the server. * Centralization can be a drawback if it there is high utilizing of the network because it will result in performance drop in the traffic on the network. Mesh Topology - In this type of topology each of the nodes are connected with each other. This means that the internet is the largest type of mesh topology. When the data is transmitted it will automatically know where the data is to be sent and it will take the shortest route. Advantages * Even if there is a fault in the cable the traffic will still be sent because all the nodes on the network are joined together. The node can automatically reroute itself if the cable is broken because there is not gateway computer. Disadvantages * Takes a long time to set up beach each node needs to be connected to each other, so data can flow around without problems. * It requires a lot more cable than other types of topologies because all the node are connected, so the more nodes that are connected the more cable is needed. ...read more.

Conclusion

IEEE 802.16 It is known as the Broadband Wireless Access. This is the standard for the upcoming WiMax system. It stands for Worldwide Interoperability for Microwave Access. It is a telecommunication technology which uses wireless transmission to deploy broadband to anywhere. It uses 75 Mbps broadband speed without the need for cables. FDDI It stands for Fibre Distributed Data Interface. A protocol which allows digital data to be sent over fibre optic cable. FDDI networks are also token passing networks but support speeds up to 100 Mbps. There is also an extension to FDDI called FDDI2 which supports voice and video transmission as well as data transmission. Infrared Similar to Bluetooth but has not got as good transmission or sending range but it's a technology which allows devices to communicate at short range using wireless signals. Computers equipped with infrared can transfer digital data bidirectionally. As mentioned before infrared communications have very short distances. Unlike Bluetooth it can't penetrate thought walls and only works in direct line of sight. Infrared technology exists in three forms IrDA-SIR (slow speed) infrared supporting data rates up to 115 Kbps. IrDA-MIR (medium speed) infrared supporting data rates up to 1.15 Mbps. IrDA-FIR (fast speed) infrared supporting data rates up to 4 Mbps. Bluetooth A wireless transmission protocol which has been around for a lot of years but recently been used more than ever. It is a short distance data exchanging over short distances fixed and mobile devices which make up PAN's. Benefit of using Bluetooth is that it can overcome the problem of synchronization. Bluetooth in other words is a standard and communication protocol which has been designed for low power and cost transceiver microchips in every device. Another benefit of using Bluetooth is that as long as the transmission device has enough power it can be as far apart and no bee in sight of each other they can still transmit or communicate. Conclusion Only one standard or various standards cannot be used for different things, this would result in things not working properly and not compatible with different devices. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

3 star(s)

Response to the question

The student has explained clearly in the introduction what this document will discuss and goes on to provide a detailed list of various types of computer networks. Regarding network topologies, the student adopts a diagrammatic approach along with explaining ...

Read full review

Response to the question

The student has explained clearly in the introduction what this document will discuss and goes on to provide a detailed list of various types of computer networks. Regarding network topologies, the student adopts a diagrammatic approach along with explaining the pros and cons for each setup. This is considered a very useful form of practice due to that fact that it caters for visual learners. Information-wise, this document is a very good reference guide to the basics of computer networking.

Level of analysis

The writer provides an in-depth and detailed analysis of network methodologies and even going a step further by listing common examples, explaining industry networking standards and outlining the advantages and disadvantages where appropriate. The document however lacks references and citations to external sources and information. A bibliography is recommended as it allows the reader to further explore the topic being discussed and thus gain a broader range of knowledge, as well as confirming any statements, assumptions and conclusions made.

Quality of writing

The document contains frequent grammatical errors throughout and lacks any use of paragraphs and this makes the writing difficult to read. The document also does not include a table of contents and page numbers, which makes it difficult to navigate – this is of particular concern if the reader only wishes to read about certain areas of computer networks.


Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by finalfantasy 01/03/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. The Seven Domains of IT Infrastructure

    Without applying security updates to the workstation, there is no way in which the system will be able to protect itself from malicious software. The absence of an antivirus program can also cause a computer's workstation to become infected with malware.

  2. Future needs of Computer

    For that purpose they need to move around in the World. The most important thing we need for these persons is vehicles.

  1. What are the principle advantages and disadvantages of the Airbus A380 in respect of ...

    CCQ and MFF, quoted times to type rate for A380 have been 10 days1. Airlines already taking advantage of this include Air Mauritius and Cathay Pacific. It is believed that the introduction of A380 to the market of Large Passenger Jets will increase the competition in the Boeing dominated market, therefore creating healthy competition on price etc.

  2. Video Rental System

    PURCHASE ORDER: RENTAL ITEM AND VENDOR: TRANSITIVE DEPENDENCY: 3rd NORMAL FORM: Since the PUR_ORDER_DETAIL_ID is dependent on PURCHASE_ORDER_ID the table is formed with the following constraints. PUR_ORDER_ID - (PUR_ORDER_DATE, PUR_RECEIVED, PUR_RECEIVED_DATE) ITEM_ID - ITEM_NAME VEND_ID - VEND_NAME PUR_ORDER_DETAIL_ID + PUR_ORDER_ ID - (ITEM_QTY + ITEM_ID)

  1. Signal Theory

    If the frame is comes from the same port as the destined port than it simply discards the frame. If the destined location is not known than it will be flooded throughout the outgoing ports and segments. Repeaters -One of the less complex hardware of the networking world, because it

  2. Identify the constituent parts of a total computer system.

    important small files that are stored on your hard disk * to store restricted files that you don't want all other users of your computer seeing Hard disks or hard drives Hard disks have storage capacities thousands of times larger than floppy disks.

  1. Computer systems assignment 1

    When chosen press next to start the installation. When the installation process reaches 100% press finish to finalize the process And now a printer driver is installed and the printer is ready to use. I was asked to perform another installation of a device driver which in turn will be a DVD-Writer.

  2. The impact of the availability of electric information on individuals and society

    Also because of such a facility to use on-line banking my parents started to shop on-line. It often saves them huge amounts of money because only in a few clicks of mouse, comparison websites such as www.confused.com can find the cheapest price of some certain product or service available which is very helpful if you want to save some money.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work