• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Types of Network.

Extracts from this document...

Introduction

Types of Network LAN-Local Area Network LAN connects computers within an organisation so that they can share data and resources. Some LANs have only two or three computer but others link together hundreds of computers. Most LANs are set up in a single building. But a LAN can extend through adjacent buildings. WAN-Wide Area Network WAN use modems and the telephone system to communicate computer by greater distance than those covered by LAN. MAN- Metropolitan Area Network MAN is a data network intended to serve an area the size of a large city. Such networks are being implemented by innovative techniques, such as running optical fibre through subway tunnels. A popular example of a MAN is SMDS. SMDS- switched multi-megabit data service which is an emerging high-speed datagram-based public data network service and expected to be widely used by telephone companies as the basis for their data networks. PSDN-Packet Switch Data Network PSDN is a data communication network that is based on the principal of packet switching. As opposed to circuit switching that is use in public telephone networks. ISDN-Intergraded Service Digital Network ISDN is a system of digital phone connection that allows data to be transmitted simultaneously across the world using end to end digital connectivity. ...read more.

Middle

This could include discovering the existence of the problem, identifying the source, and possibly repairing (or at least isolating the rest of the network from) the problem. * Performance management: is the process of measuring the performance of various network components. This also includes taking measures to optimise the network for maximum system performance (periodically measuring of the use of network resources). * Security management: is the process of controlling (limiting, restricting) access to the network and resources on it. This could include setting up and managing access lists in routers (creating "firewalls" to keep intruders out), creating and maintaining password access to critical network resources, identifying the points of entry used by intruders and closing them. Network Hardware File server File sever is a processor that controls a central repository of data that can be downloaded or manipulated in some manner by a client. The most common choice for file server software is Network file system. A protocol which allows a computer to access files over a network as if they were on its local disks. Email server An email sever is a device that distributes files or information in response to requests sent via electronic mail. ...read more.

Conclusion

Firewall A combination of hardware and software that provides a security system, usually to prevent unauthorized access from outside to an internal network or intranet. A firewall prevents direct communication between network and external computers by routing communication through a proxy server outside of the network. The proxy server determines whether it is safe to let a file pass through to the network. A firewall is also called a security-edge gateway. Window The operating system for Personal Computers and Networked Computers. Constantly upgraded. Commonly used version are Windows 95, Windows 98, Windows Me, Windows 2000, Windows NT4, Windows XP (Home and Professional). Window NT The most advanced version of the Windows operating system, Windows NT is a 32-bit operating system that supports pre-emptive multitasking. There are actually two versions of Windows NT: Windows NT Server, designed to act as a server in networks, and Windows NT Workstation for stand-alone or client workstations. Class C Network Address (194.10.1.0) for diagrams. Building Subnet 1 IP address Head office 194.10.1.1-194.10.1.7 194.10.1.1 194.10.1.2 194.10.1.3 Subnet 2 IP address 194.10.1.8-194.10.1.14 194.10.1.8 194.10.1.10 194.10.1.11 194.10.1.12 Subnet 3 IP address 194.10.1.16-194.10.1.23 194.10.1.16 194.10.1.17 194.10.1.18 194.10.1.19 Subnet 4 IP address 194.10.1.24-194.10.1.32 194.10.1.24 194.10.1.23 194.10.1.24 194.10.1.25 194.10.1.26 Subnet 5 IP address 194.10.1.33-194.10.1.64 194.10.1.33 194.10.1.34 194.10.1.35 194.10.1.36 Subnet 5 IP address 194.10.1.65-194.10.1.129 194.10.1.33 194.10.1.34 194.10.1.35 194.10.1.36 Task2 Network Monish Bosquet ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    DIFS (DCF - Distribution combination function, IFS - Inter frame spacing). This parameter denotes the longest waiting time and has the lowest priority for medium access. This waiting time is used for asynchronous data service within a contention period. It defines as SIFS plus two slut times.

  2. OCR GCSE Business & Communication Task 7 Report

    To further ensure my report remains effective I have to assure readers that it remains suitable for all abilities, therefore not discriminating clients and attracting a wider audience. I can resolve this issue by running a readability check upon the report.

  1. Critical Path Analysis

    O Add forms and plug-ins - Forms throughout the site will be sent to various email addresses of the clients, permitting feedback, queries and on-line sales from visitors to the site. Plug-ins and forms are quite difficult to test offline.

  2. Strategic Management of Innovation.

    The birth of a Smart Phone with micro-browsers is the key to answering users needs to access the Internet via their wireless phones. Picture of the Wireless Market As the wireless web continues to mature, opportunities for growth are illustrated by notable levels of interest in wireless data services among key consumer segments.

  1. ICT Systems in Everyday Life: Your Local Community

    Digital Cinema Distribution Masters. The DCDM-Image defines a common set of image structures for Digital Cinema by specifying an image containers and colorimetric for a Digital Cinema Distribution Master (DCDM). The DCDM-Audio specifies the following characteristics: bit depth, sample rate, minimum channel count, channel mapping and reference levels.

  2. Free essay

    Impact of ICT in Community

    The phone lets you to send text message and received text messages. * The user can listen to their phonebook, call registers, received and edited messages, caller identification, signal coverage and other common mobile phone functions * The Phonebook which lists name can store up to 250 addresses, home phone,

  1. Networks LAN = Local Area Network.

    * Because networks are often complicated, they need expensive expert staff to look after them. * As the number of users increase on the network, the performance of the system can be affected and things start to slow down. Network Topologies.

  2. Shareware and Its Network Security

    Jim Knopf therefore used a database to monitor all users and he attached notes to his downloads to send money voluntarily as the managing of such a big network and programs become more time consuming. The need for software "piracy" arose, except for in this case the author - Jim

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work