• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15

Unit 5 - Communications Technology

Extracts from this document...

Introduction

Assignment 2- Task 5 - P4-describe and illustrate the role of the various components, which make up a LAN. LAN Components LAN consists of a server computer and several network station computers. Each computer must have a network card, which is normally called an NIC (network interface card), and there must be some way of interconnecting the computers. There are 3 different types of components that get together to make up Each node or computer in the LAN has its own computing power but it can also access other devices on the LAN subject to the permissions it has been allowed. These could include data, processing power, and the ability to communicate or chat with other users in the network. The components are as follow: 1. Workstations Workstations http://homepages.uel.ac.uk/u0311625/star.html A Server is a computer that provides LAN services to all the workstation computers. There is not essentially any thing special about the hardware of a server computer; the services it provides to the LAN are software based. In a PC, Network Interface Card (NIC) is an extended card that slots into the motherboard. A network interface card is designed to work with a particular type of network and media. The most common type today is the Ethernet NIC, fitted with RJ45 socket for use with UTP cables. Fast Ethernet NICs can often work at either 10Mbps or 100Mbps and automatically select the correct speed. 2. Token Ring In Token Ring, the computers are connected so that the signal travels around the network from one computer to another in a logical ring. A single electronic token moves around the ring from one computer to the next. If a computer does not have information to transmit, it simply passes the token on to the next workstation. If a computer wishes to transmit and receives an empty token, it attaches data to the token. The token then proceeds around the ring until it comes to the computer for which the data is meant. ...read more.

Middle

(It can also be prevented by buying switches that can detect and deal with loops, for example by implementing the Spanning Tree Protocol). * A cheap hub with a 10BASE2 port is probably the cheapest and easiest way to connect devices that only support 10BASE2 to a modern network (cheap switches don't tend to come with 10BASE2 ports). The same goes for linking in an old thicknet network segment using an AUI port on a hub (individual devices that were intended for thicknet can be linked to modern Ethernet by using an AUI-10BASE-T transceiver). Switches Switches look very much like hubs and on the surface they perform the same function, i.e. they connect a number of computers together in an Ethernet LAN. However, hubs are 'dumb' devices; they simply receive a message, intensify it and broadcast it to all the other computers that are connected to the hub. Switches are 'intelligent'; they inspect the message sent from one computer, recognize the computer to which it is being sent and transmit the message only to that computer, not all the others connected to the switch. The benefit of this is that network traffic is significantly reduced, which reduces the prospect of collision occurring. Switches are slightly more costly to buy than hubs but, of their capability to improve the performance of the network, they are normally used in favourite to hubs. Switches vs HUBs - Which one is better? If you have anything more than one computer with a dial-up phone connection, you likely to have your computer connected to other equipment using Ethernet. Your setup could be as simple as one computer connected to a cable modem or DSL modem using Ethernet. If you have multiple machines, you either have a router with multiple ports (Ethernet connectors), a switch or a hub. If you have a router, it's simply a special case of being either a switch or a hub. ...read more.

Conclusion

I typed in 456 in phone text box and following screen appeared on my computer. Step 5 The system is asking me to choose an option from the connection availability screen. I am allowed to make new connection to all users or just to my self. If I choose it just for myself, connection will not be available until I log on to the PC. I chose connection for all users' option and clicked on next button. System showed me following screen on PC. Step 6 Network and dial-up connections screen is asking me to choose one of the options from the following options. I can choose from "Make a new connection, AAA, Local area Connection or Computer 1". I chose Computer 1 as an option and the following screen appeared on my system. Step 7 Connect computer 1 screen is asking me to choose user name and password and then click on dial button to connect to the Internet. After selecting my user name and password, I clicked on dial button as I was told by the system to do so. Following screen appeared on my system. Step 8 Virtual Modem screen is telling me to wait for the connection to be made. System is waiting for incoming connection on TCP port 28800 on Virtual modem. After a while system showed following screen on my PC. Step 9 This screen shows Network Area Connection status, which shows that connection is made and the speed of the Internet is, 10Mbps, so therefore my installing progress in completed and it is Internet Connection is successfully installed on the PC. I can now use the Internet. Final Conclusion To use FTP software, user must know the URL of an FTP server, and have a valid FTP user name and password. Once you have successfully logged on to an FTP server, you can transfer files to and from the server. ?? ?? ?? ?? Amjad Qazi Unit 5 - Communications Technology Bob Collins ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    from the customer returning their vehicle. During my observation of Fred's Car Rentals, one thing I noticed was that all the overdue fees are calculated manually by the employees. The calculation of overdue fees manually by the employees means that there is room for human error to raise its ugly head.

  2. Marked by a teacher

    Evaluation. In this unit of controlled assessment I have developed a website using multimedia ...

    I think the banner is suitable for the task because it relates to children travelling to school. Sound- For this part of the implementation stage, I used an original sound file and edited it accordingly, using the software ?Audacity.? I used a range of techniques to enhance this to fit the purpose of my website.

  1. Marked by a teacher

    Ecommerce Case Study

    perhaps with the use of generated passwords or a limited number of licences. Trading online has a number of knock on effects such as high street stores closing. With the introduction of e-commerce high street stores are beginning to close and the number of shops in a given city or town has fallen.

  2. Peer reviewed

    Explain the role of web architecture in website communications

    3 star(s)

    Wikipedia is free to everyone although it does frequently ask for donations. Wikipedia is the biggest web encyclopaedia and has been praised for how quickly the pages get updated after recent news happens.

  1. Assignment 1 unit 7 Security Assessment Report (.coursework.info)

    audit logs check the logs for your username against your password and do you have authorisation to access to continue if so more checking, keeping systems secure. Firewall Firewalls are metaphorically a wall between you and the Internet which denies access to anything you haven't specified (i.e., hackers and malicious websites or material).

  2. Review articles that take a complex approach to new organisational structures and proposed several ...

    a lot of organisations, it might not be representative of every one. Furthermore, some organisations will only have one of the characteristics. Because each organisation is different and because each agent has different needs, the network form is not adaptable to every system This summary of the past research, concerning

  1. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    Personal Attributes-Personal Skills (flexibility/determination/career Minded) These are about how an employee can amend themselves and work under pressure sometimes do things that they may not expect such as tidy up or staying behind extra hours, employers want this from their employees as it is a vital skill.

  2. Explain the function of computer hardware components

    the bootstrap loader starts up as soon as the computer is turned on. It can load an operating system or other software that may be needed. Before it can load the operating systems it much complete self-tests. It starts of by reading the hard drives boot sector and then loads

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work