• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

WAN Devices

Extracts from this document...

Introduction

What Devices Are Needed? Types of Device Switches Switches are very similar to hubs with the exception of containing the ability to read the packets received. This means that the device gets the packets, reads them and only forwards them to the appropriate attached device. Because switches can read the packets instead of just sending them on to all devices, it means they operate at the data link layer, layer 2. Repeaters A repeater is a simple device that boosts the signal so that it can travel much greater distances or avoid "obstacles". They operate at Layer 1 of the OSI Model. Hubs A hub is simply a device that connects parts of LANs together. They are multiport devices and copy the data received from one port onto the other ports. Hubs operate at the physical layer (level 1) as they operate by using simple physical transmissions to send data from one device to the next. Hub's only use bits to send the data and cannot understand anything above bits on the OSI model. ...read more.

Middle

* Can have problems with interference. * Cheaper than newer types of technology. * Main different types used for many varied uses. * Created when two conductors are twisted together. * More twists desirable - less interference. Coaxial Cable TV, broadband and radio Between 750ft and 1500ft dependant on cable type * Uses insulation to carry the signal with the least amount of interference. * A lot of research has gone into creating the most effective systems - those with space carry the signal better. * Extremely cheap and easily available. * Two types - rigid and flexible. Fibre Optic Cable TV, broadband and radio 160km when used with amplifiers. * Light is sent down an optical cable. * Created in the 1980's. * Replacing older systems. * Much more reliable - less chance of interference. * Expensive. Wireless Ethernet Sharing a connection or resources across a short distance network 30 meters. * Standards known as 802.11. G and B are the most common. ...read more.

Conclusion

Smaller businesses will usually have less space to place their hardware, particular the type of safe and secure space that is required by such important devices. Finding a device that is small enough to be stored but still fulfils other requirements is required. Cost The cost of a device is not going to be all that important to larger businesses; spending a lot of money on a useful device seems only natural. But when spending the vast majority of a network's budget on a single device, cost definitely becomes a factor. It must be the right device and it must do the job it's required to do but it should also be at the right cost to the business. Connectivity Connectivity is heavily dependent on the number of computers that are being connected as well as what services the network is trying to provide and how the devices are going to be connected. The device that is eventually chosen must be a combination of the most important needs of the network. Placing a value on each of these factors should suggest the device that is needed. ?? ?? ?? ?? 1 WAN Devices Information Sheet ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Each of the nodes has the ability to take control of the transmission rate. * Extremely high transmission rate can be achieved. Typically speed of transmission is around 10 Mbps which is quite quick. For e.g. it will take around 2 minutes to send a 100MB file which is pretty quick.

  2. Computing Project

    table adofilms.post;//send this to the table showmessage ('DVD Has Been Added To The Selection')//show this message end; end;//end end; 5. Procedures and Variables List Procedures Setting Up Username And Password Form procedure TFMSetupUserandPass.BtnSaveClick(Sender: TObject); This button is used to save the new username and password the user has selected to the usernames and passwords table.

  1. Computing Project

    Once the instructor logs on, he will come to the main menu of the system, I am going to show him to basic things in this tutorial, how to find the phone number of a student and then how to make a booking.

  2. LAN & WAN Protocols

    Very similar but very flexible when finding addresses and routing network traffic. Larger address space allows for this to happen. Layer 4 (Transport) - In charge of encapsulating packets to they are compatible for transmitting to defined host. TCP - Allows transmission of data between computers over the internet.

  1. WAN Protocols

    - which is the physical layer that does not appear on the TCP/IP model as it does not 'care' about the physical hardware. The TCP/IP Model 'squishes' the top three layers of the OSI Model onto a single layer. Figure 2 Protocols and their Relationships with the OSI Model Evaluation

  2. The seven layer osi model

    Not all forms of encryption take place on the 6th layer as some may take place further down the line. Compression is another process that can be undertaken by the presentation layer. The reason this is used is to increase the actual data throughput of the system.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    Testing strategies Bottom up testing - where modules are tested individually, and then where they are combined together into larger program and finally into a system. Tests are carried out along this process. Top-down testing - where skeleton of a complete system is tested, rather than run each procedure message

  2. Definition-nature of the problem solved - Car Mechanic business

    of the records and would have to discard any before a certain date. This could take a fair amount of time and needs so he needs to find an alternative method. I also feel the system is lacking a high enough amount of security.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work