• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Types of Network.

Extracts from this document...

Introduction

Types of Network LAN-Local Area Network LAN connects computers within an organisation so that they can share data and resources. Some LANs have only two or three computer but others link together hundreds of computers. Most LANs are set up in a single building. But a LAN can extend through adjacent buildings. WAN-Wide Area Network WAN use modems and the telephone system to communicate computer by greater distance than those covered by LAN. MAN- Metropolitan Area Network MAN is a data network intended to serve an area the size of a large city. Such networks are being implemented by innovative techniques, such as running optical fibre through subway tunnels. A popular example of a MAN is SMDS. SMDS- switched multi-megabit data service which is an emerging high-speed datagram-based public data network service and expected to be widely used by telephone companies as the basis for their data networks. PSDN-Packet Switch Data Network PSDN is a data communication network that is based on the principal of packet switching. As opposed to circuit switching that is use in public telephone networks. ISDN-Intergraded Service Digital Network ISDN is a system of digital phone connection that allows data to be transmitted simultaneously across the world using end to end digital connectivity. ...read more.

Middle

This could include discovering the existence of the problem, identifying the source, and possibly repairing (or at least isolating the rest of the network from) the problem. * Performance management: is the process of measuring the performance of various network components. This also includes taking measures to optimise the network for maximum system performance (periodically measuring of the use of network resources). * Security management: is the process of controlling (limiting, restricting) access to the network and resources on it. This could include setting up and managing access lists in routers (creating "firewalls" to keep intruders out), creating and maintaining password access to critical network resources, identifying the points of entry used by intruders and closing them. Network Hardware File server File sever is a processor that controls a central repository of data that can be downloaded or manipulated in some manner by a client. The most common choice for file server software is Network file system. A protocol which allows a computer to access files over a network as if they were on its local disks. Email server An email sever is a device that distributes files or information in response to requests sent via electronic mail. ...read more.

Conclusion

Firewall A combination of hardware and software that provides a security system, usually to prevent unauthorized access from outside to an internal network or intranet. A firewall prevents direct communication between network and external computers by routing communication through a proxy server outside of the network. The proxy server determines whether it is safe to let a file pass through to the network. A firewall is also called a security-edge gateway. Window The operating system for Personal Computers and Networked Computers. Constantly upgraded. Commonly used version are Windows 95, Windows 98, Windows Me, Windows 2000, Windows NT4, Windows XP (Home and Professional). Window NT The most advanced version of the Windows operating system, Windows NT is a 32-bit operating system that supports pre-emptive multitasking. There are actually two versions of Windows NT: Windows NT Server, designed to act as a server in networks, and Windows NT Workstation for stand-alone or client workstations. Class C Network Address (194.10.1.0) for diagrams. Building Subnet 1 IP address Head office 194.10.1.1-194.10.1.7 194.10.1.1 194.10.1.2 194.10.1.3 Subnet 2 IP address 194.10.1.8-194.10.1.14 194.10.1.8 194.10.1.10 194.10.1.11 194.10.1.12 Subnet 3 IP address 194.10.1.16-194.10.1.23 194.10.1.16 194.10.1.17 194.10.1.18 194.10.1.19 Subnet 4 IP address 194.10.1.24-194.10.1.32 194.10.1.24 194.10.1.23 194.10.1.24 194.10.1.25 194.10.1.26 Subnet 5 IP address 194.10.1.33-194.10.1.64 194.10.1.33 194.10.1.34 194.10.1.35 194.10.1.36 Subnet 5 IP address 194.10.1.65-194.10.1.129 194.10.1.33 194.10.1.34 194.10.1.35 194.10.1.36 Task2 Network Monish Bosquet ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    DIFS (DCF - Distribution combination function, IFS - Inter frame spacing). This parameter denotes the longest waiting time and has the lowest priority for medium access. This waiting time is used for asynchronous data service within a contention period. It defines as SIFS plus two slut times.

  2. OCR GCSE Business & Communication Task 7 Report

    I can resolve this problem by ensuring these sources remain has clear and understandable as possible, whilst still incorporating high amounts of information within them. I can do this by ensuring the colours used are not conflicting the colour or type of font, therefore making it easier to read.

  1. ICT Systems in Everyday Life: Your Local Community

    The first interface represents the relationship between the End user and Automated Teller Machine. The second interface occurs between the ATM and the central bank computer. Now 70% of Americans use an ATM debit card, a credit card, or a VISA check card, and they often rely on them.

  2. Free essay

    Impact of ICT in Community

    Evaluate the technology - good and bad features? Advantages/disadvantages Advantages The OWASYS 22c Mobile Phone plays two low tones if you lose Network coverage and two high-pitched tones when you go back into Network coverage. The buttons on the phone are widely spaced and are easily found and operated.

  1. Networks LAN = Local Area Network.

    * Because networks are often complicated, they need expensive expert staff to look after them. * As the number of users increase on the network, the performance of the system can be affected and things start to slow down. Network Topologies.

  2. Shareware and Its Network Security

    Knopf - encouraged the copying of his programs, which actually bought him new business as the consumers were more eager to pay for a "service" that was cheaper than go to stores and may hefty sums to buy software they quite possibly have never used.

  1. Here are 3 ways of receiving internet broadband access. ISDN - ...

    ISDN - The installation costs are expensive - If there is a problem in the system, there would have to be an engineer present to fix it. - It cost for you to convert the ISDN system back to an analogue system.

  2. Observing Interactions between carers and clients

    Padley use with Nathan effectively was that She maintained good eye-contact, this was shown when Nathan was telling Mrs. service about a family holiday he had went to, making eye contact gave the impression to her client that she was focusing all her thoughts on what her client was saying,

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work