• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  27. 27
    27
  28. 28
    28

Industry standards - Ensuring communication standards are followed.

Extracts from this document...

Introduction

Task 1 - Ensuring communication standards are followed A standard is a definition or format that has been approved by a recognized standards organisation or is accepted as an expected standard by the industry. Standards exist for programming languages, operating systems, data formats, communication protocols, and electrical components. There has always been a need for standardisation especially when it comes to connections of computers. With out standards computer software would not be able to communicate with the hardware let alone one computer communicating with another. Essentially we would not be able to compute There are two main different types of standards: * Standards imposed by law * Standards representing public demand (Industry standards) Standards that allow progress to be achieved Certain standards are an extremely important part of choosing building and configuring any computer network especially a state of the art one! Some of the reasons why certain standards are not only important but critical to the Design and implementation of the new C&T block are: * To create an efficient network * To protect consumers * To enable compatibility with new technologies Standards to create an efficient network One of the primary reasons for ensuring certain standards are followed is to create an efficient network. For example there is an organisation called the IEEE (Institution of Electrical and Electronics Engineers) which have created LAN (Local are Network) standards such as: IEEE 802.1- Standards related to network management IEEE 802.2- General standard for the data link layer in the OSI Reference Model IEEE 802.3- Defines the MAC layer for bus networks that use CSMA/CD With out using products that adhere to these standards the network would be destined to run into major problems with out much back up. Standards protect consumers To protect consumers-making sure that there are universal standards Without standards the consumer would be very limited and open to abuse. Standards to allow compatibility with new technologies Various standards allow a combination of products from different manufacturers to create a customised system. ...read more.

Middle

Twisted pair cable (10BASE-T) Twisted pair (also known as 10BASE-T) is ordinary telephone twisted pair wire. Twisted pair (10BASE-T) supports Ethernet's 10 Mps transmission speed hence "10" in 10BASE-T. The "BASE" refers to base band signaling and the "T" represents twisted pair just like the "F" for fiber optics in 10 BASE-F. There are many variations of twisted pair cable including: * STP (Shielded Twisted Pair) * UTP (Unshielded Twisted Pair) * ScTP (Screened UTP) Coaxial cable (10BASE-2) Coaxial cable was invented in 1929 and first used commercially in 1941. Coaxial cable is called "coaxial" because it includes one physical channel that carries the signal surrounded (after a layer of insulation) by another physical channel. The outer channel serves as an earth. Many of these cables or pairs of coaxial tubes can be placed in a single outer casing and, with repeaters, can carry information for a great distance. Fiber optics (10BASE-F) Fiber optics sends digitized messages or information by light pulses along hair-thin glass fibers. Surrounding each fiber is a protective shell. This protective shell has a high index of refractance so that the light is internally reflected and travels the length of the fiber without escaping. Optical fiber cable can be made smaller and lighter than the conventional cooper or coaxial cable, yet they can carry much more information and is in general not subject to electromagnetic interference (EMI) and the need to retransmit signals. Most telephone company long-distance lines are now of optical fiber and it's also commonly used as a back bone linking two or more sections of a network.. However the glass fiber requires more protection within an outer cable than copper. For this reason and because of costs many companies do not use it. The two most popular types of network cab ling are twisted-pair (also known as 10BASE-T) and thin coax (also known as 10Base2). 10BaseT cabling looks like ordinary telephone wire, except that it has 8 wires inside instead of 4. ...read more.

Conclusion

provide one allocated area for storing all documents (word processing, spreadsheets, database, audio and Image documents etc). This in turn enables backing up data to be done more easily as well as efficiently. *Saving and retrieving files from remote locations Students or staff may have worked on a project or task at home or college but may be to large to store on transportable disks, however hey could use the Internet to access the college network (internal Internet-Intranet) either by sending it to a mail server then retrieving when needed or by the network administrators setting up remote access privileges to staff or students. *Communicating with colleges across the building or across the continent A staff member or student may be stuck for inspiration or may simply need some advice from another member of staff or a fellow student. His is not always convenient for both parties not to mention time consuming. One of the features of a computer network is the ability to send messages to any persons (providing you know their log in names) either individually or the same message to a selected number of people or for management purposes a broadcast message can be sent to all users in a particular school or the entire college network. Benefits of installation of network at new site Accessing resources, printing to multiple printers, saving and retrieving files from remote locations, and communicating with a colleague across the building or across the continent are the advantages of a computer network that helps users get their work done easier, and gives students the ability to increase their learning. As you can see the advantages of having a computer network at Uxbridge College out weighs the disadvantages. Uxbridge College's management staff can monitor on a daily basis any useful statistics such as overall achievments, profit margins, payments and other information. Without a computer network linking the massive College, a significant amount of time would be required to assemble this kind of information. Uxbridge College's network would allow the company to identify schools that are struggling and meet them with appropriate responses. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    of information in the system and the efficiency of this flow General Findings about Current System Fred's Car Rentals currently has six members of staff, consisting of including the manager, assistant manager, stock controller and floor staff. The members of staff have a little experience in ICT.

  2. communication and values

    The clients appeared relax and confident when communicating with me this shows the meeting of the emotional needs. I considered the clients self-esteem, abilities and their physical and safety needs. I used the supportive skills of understanding such as warmth and sincerity in order to create appropriate caring relationships.

  1. The Impact of Mobile Phones on social Interaction

    6.3 - Mobile phones as a symbol of status What was perhaps most evident from the focus group discussion was that in the case of this particular age group, mobile phones are seen as more then just a tool for communication and interaction.

  2. The Operating System and You - Operating System Design and the Need for Human-Computer ...

    The benefits were therefore only available for the experienced programmer such as the easy development of software because the programming language C was the basis for the system. Being designed by programmers for programmers, the UNIX shell, or interface, is one tailored towards the experienced user.

  1. Explain the functions of network management

    Fault management The main job of Fault management is concerned with the identification of the discrepancies of the network. Fault management system is helpful in isolating the faults and vulnerabilities present in the network and uses trend analysis to identify errors so that the network remains active at all times.

  2. Explain the function of computer hardware components

    the computer system Heat Sink A heat sink is a device that gets rid of unwanted heat. It does this by scattering heat into the surrounding medium. By doing this, it gets the heat away from the CPU and cools downs the computer?s processor after it runs many programs at

  1. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    In summary the Computer Misuse Act prevents hackers and people from accessing data and gaining access to computer without permission, this could also include stealing, changing or causing damage to data and computers. The Act protects companies because it stops hackers from gaining unauthorised access to computers.

  2. AO3 Investigate how search engines work

    The second rule followed by crawler based search engines is the frequency of the keywords used by the user. So if a certain keyword relating to the user search, appears on site quite frequently this would be ranked fairly high by the search engine.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work