• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Types of Network.

Extracts from this document...


Types of Network LAN-Local Area Network LAN connects computers within an organisation so that they can share data and resources. Some LANs have only two or three computer but others link together hundreds of computers. Most LANs are set up in a single building. But a LAN can extend through adjacent buildings. WAN-Wide Area Network WAN use modems and the telephone system to communicate computer by greater distance than those covered by LAN. MAN- Metropolitan Area Network MAN is a data network intended to serve an area the size of a large city. Such networks are being implemented by innovative techniques, such as running optical fibre through subway tunnels. A popular example of a MAN is SMDS. SMDS- switched multi-megabit data service which is an emerging high-speed datagram-based public data network service and expected to be widely used by telephone companies as the basis for their data networks. PSDN-Packet Switch Data Network PSDN is a data communication network that is based on the principal of packet switching. As opposed to circuit switching that is use in public telephone networks. ISDN-Intergraded Service Digital Network ISDN is a system of digital phone connection that allows data to be transmitted simultaneously across the world using end to end digital connectivity. ...read more.


This could include discovering the existence of the problem, identifying the source, and possibly repairing (or at least isolating the rest of the network from) the problem. * Performance management: is the process of measuring the performance of various network components. This also includes taking measures to optimise the network for maximum system performance (periodically measuring of the use of network resources). * Security management: is the process of controlling (limiting, restricting) access to the network and resources on it. This could include setting up and managing access lists in routers (creating "firewalls" to keep intruders out), creating and maintaining password access to critical network resources, identifying the points of entry used by intruders and closing them. Network Hardware File server File sever is a processor that controls a central repository of data that can be downloaded or manipulated in some manner by a client. The most common choice for file server software is Network file system. A protocol which allows a computer to access files over a network as if they were on its local disks. Email server An email sever is a device that distributes files or information in response to requests sent via electronic mail. ...read more.


Firewall A combination of hardware and software that provides a security system, usually to prevent unauthorized access from outside to an internal network or intranet. A firewall prevents direct communication between network and external computers by routing communication through a proxy server outside of the network. The proxy server determines whether it is safe to let a file pass through to the network. A firewall is also called a security-edge gateway. Window The operating system for Personal Computers and Networked Computers. Constantly upgraded. Commonly used version are Windows 95, Windows 98, Windows Me, Windows 2000, Windows NT4, Windows XP (Home and Professional). Window NT The most advanced version of the Windows operating system, Windows NT is a 32-bit operating system that supports pre-emptive multitasking. There are actually two versions of Windows NT: Windows NT Server, designed to act as a server in networks, and Windows NT Workstation for stand-alone or client workstations. Class C Network Address ( for diagrams. Building Subnet 1 IP address Head office Subnet 2 IP address Subnet 3 IP address Subnet 4 IP address Subnet 5 IP address Subnet 5 IP address Task2 Network Monish Bosquet ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    DIFS (DCF - Distribution combination function, IFS - Inter frame spacing). This parameter denotes the longest waiting time and has the lowest priority for medium access. This waiting time is used for asynchronous data service within a contention period. It defines as SIFS plus two slut times.

  2. ICT Systems in Everyday Life: Your Local Community

    The first model was presented in 1939. Nowadays, roughly about 1, 5 million are installed worldwide. The second of it has been to take into consideration the purpose which could be a part and a parcel of any communicative act.

  1. Information Security.

    Also, the "dedicated bandwidth" is only dedicated between your home and the DSL provider's central office ; the providers offer little or no guarantee of bandwidth all the way across the Internet. How are broadband services different from traditional dial-up services?

  2. Unit 23: Investigating Communications and Networks

    * A fault in the network can cause user to lose the data. * If the network stops operating then it may not be possible to access to various computers. * It is difficult to make the system secure from hackers, novices or industrial espionage.

  1. Computer Networks and Distributed Systems - Wireless network of devices: General packet radio services ...

    * Other new applications for GPRS, profiled later, include file transfer and home automation - the ability to remotely access & control in-house appliances & machines. Service access * To use GPRS, users specifically need: * A mobile phone or terminal that supports GPRS (existing GSM phones do NOT support GPRS)

  2. OCR GCSE Business & Communication Task 7 Report

    Failing to do this would go against the Data Protection (1998) law meaning I could face a compensation charge or prison sentence. To produce my form to an acceptable standard towards viewers I made sure clean, understandable language was used and the Data Protection Law was followed.

  1. Networks LAN = Local Area Network.

    * Because networks are often complicated, they need expensive expert staff to look after them. * As the number of users increase on the network, the performance of the system can be affected and things start to slow down. Network Topologies.

  2. Tesco plc is the most innovative food retailer in the UK retail market.

    Consumers are becoming more sophisticated. They want to get product information, learn more about the company, ask questions, research warranties, understand return policies and buy the products whether it's six o'clock in the morning or midnight. Yes, there were enough prospective customers who are using home or/and office PCs to make Tesco's online shopping venture a success.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work