• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Types of Network.

Extracts from this document...

Introduction

Types of Network LAN-Local Area Network LAN connects computers within an organisation so that they can share data and resources. Some LANs have only two or three computer but others link together hundreds of computers. Most LANs are set up in a single building. But a LAN can extend through adjacent buildings. WAN-Wide Area Network WAN use modems and the telephone system to communicate computer by greater distance than those covered by LAN. MAN- Metropolitan Area Network MAN is a data network intended to serve an area the size of a large city. Such networks are being implemented by innovative techniques, such as running optical fibre through subway tunnels. A popular example of a MAN is SMDS. SMDS- switched multi-megabit data service which is an emerging high-speed datagram-based public data network service and expected to be widely used by telephone companies as the basis for their data networks. PSDN-Packet Switch Data Network PSDN is a data communication network that is based on the principal of packet switching. As opposed to circuit switching that is use in public telephone networks. ISDN-Intergraded Service Digital Network ISDN is a system of digital phone connection that allows data to be transmitted simultaneously across the world using end to end digital connectivity. ...read more.

Middle

This could include discovering the existence of the problem, identifying the source, and possibly repairing (or at least isolating the rest of the network from) the problem. * Performance management: is the process of measuring the performance of various network components. This also includes taking measures to optimise the network for maximum system performance (periodically measuring of the use of network resources). * Security management: is the process of controlling (limiting, restricting) access to the network and resources on it. This could include setting up and managing access lists in routers (creating "firewalls" to keep intruders out), creating and maintaining password access to critical network resources, identifying the points of entry used by intruders and closing them. Network Hardware File server File sever is a processor that controls a central repository of data that can be downloaded or manipulated in some manner by a client. The most common choice for file server software is Network file system. A protocol which allows a computer to access files over a network as if they were on its local disks. Email server An email sever is a device that distributes files or information in response to requests sent via electronic mail. ...read more.

Conclusion

Firewall A combination of hardware and software that provides a security system, usually to prevent unauthorized access from outside to an internal network or intranet. A firewall prevents direct communication between network and external computers by routing communication through a proxy server outside of the network. The proxy server determines whether it is safe to let a file pass through to the network. A firewall is also called a security-edge gateway. Window The operating system for Personal Computers and Networked Computers. Constantly upgraded. Commonly used version are Windows 95, Windows 98, Windows Me, Windows 2000, Windows NT4, Windows XP (Home and Professional). Window NT The most advanced version of the Windows operating system, Windows NT is a 32-bit operating system that supports pre-emptive multitasking. There are actually two versions of Windows NT: Windows NT Server, designed to act as a server in networks, and Windows NT Workstation for stand-alone or client workstations. Class C Network Address (194.10.1.0) for diagrams. Building Subnet 1 IP address Head office 194.10.1.1-194.10.1.7 194.10.1.1 194.10.1.2 194.10.1.3 Subnet 2 IP address 194.10.1.8-194.10.1.14 194.10.1.8 194.10.1.10 194.10.1.11 194.10.1.12 Subnet 3 IP address 194.10.1.16-194.10.1.23 194.10.1.16 194.10.1.17 194.10.1.18 194.10.1.19 Subnet 4 IP address 194.10.1.24-194.10.1.32 194.10.1.24 194.10.1.23 194.10.1.24 194.10.1.25 194.10.1.26 Subnet 5 IP address 194.10.1.33-194.10.1.64 194.10.1.33 194.10.1.34 194.10.1.35 194.10.1.36 Subnet 5 IP address 194.10.1.65-194.10.1.129 194.10.1.33 194.10.1.34 194.10.1.35 194.10.1.36 Task2 Network Monish Bosquet ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    DIFS (DCF - Distribution combination function, IFS - Inter frame spacing). This parameter denotes the longest waiting time and has the lowest priority for medium access. This waiting time is used for asynchronous data service within a contention period. It defines as SIFS plus two slut times.

  2. Critical Path Analysis

    It reminds people wanting to take your work, that is it not theirs to take. Copyright information also advertises your site designing to other people without affecting the appearance of the page. L Copy template pages throughout site, adjust headers - Before text and images can be added there must be somewhere to place them.

  1. OCR GCSE Business & Communication Task 7 Report

    By using my letterhead I am able to reflect and incorporate my company image which can help to further advertise and include my corporate image. By having a date and time tool, I am able to automatically change the date on my letter, therefore keeping the letter up to date and applicable.

  2. Strategic Management of Innovation.

    The ever-increasing use of hand held devices that also can use wireless technology to access the Internet are an integral part of a user's personal organizational management system. Rather than use their wireless phone, users often would download email and access the Internet via their handheld devices.

  1. Comparing documents

    Coffee controls image is just a cup of coffee, personally I think that this does not catch the reader's attention because it is only a cup of tea and has no meaning to it, but this image is related to the text because it is discussing about their new iced latte.

  2. ICT Systems in Everyday Life: Your Local Community

    As traditional film technology is universally being replaced by digital technology, the logic of the filmmaking process is being redefined. What I describe below are the new principles of digital filmmaking which are equally valid for individual or collective film productions, regardless of whether they are using the most expensive professional hardware and software or its amateur equivalents.

  1. Free essay

    Impact of ICT in Community

    The computer is controlled by a standard keyboard using key combinations called keyboard shortcuts, instead of a mouse. Some blind people also use a Braille display, which provides information on the screen on a tactile display, which sits underneath the keyboard.

  2. Networks LAN = Local Area Network.

    * Because networks are often complicated, they need expensive expert staff to look after them. * As the number of users increase on the network, the performance of the system can be affected and things start to slow down. Network Topologies.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work