• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

This report will discuss the benefits and constraints of network systems and topologies.

Extracts from this document...


Transfer-Encoding: chunked ´╗┐Networking Technologies L 01 Understanding Networking principles Network arrangement in an organization might help to decrease the effort and enhance the data safety. The report will discuss the benefits and constraints of network systems and topologies. The report will discuss the impact of technology and standards along with actual application of different networking system. The report will also discuss the role of hardware and software components and control the server and terminal requirement of network. The report will present the network design and will evaluate the network along with implementation, testing of requirements and recommended solutions to possible problems in network. The report will present the network maintenance schedule. htts//wwwlifewire.com/computer-network-topology-8178840 28/05/2017 Task 1.1 Discuss the benefit and constraints of different networking system type and topologies. Topology is the layout of connecting devices. This object introduces the average topologies of networking. *Network type * WAN, LAN, WLAN, MAN *WAN- wide area network. *LAN- Local area network. *WLAN- Wireless local area network. *MAN- Metropolitan area network. * Wide Area Network (WAN)A wide area network (WAN) is a network that exists over a large-scale geographical area. A WAN joins different smaller networks, including local area networks (LANs) and metro area networks (MANs). This guarantees the computers and operators in one area that can connect with computers and operators in other locations. ...read more.


and communication between two or more people will not be possible. 1.3 Discuss how protocols enable the effective utilization of different networking systems. I shortlist a number of well known protocols, such as: TCP/IP, FTP, FTP and RIP. The mentioned protocols define rules and basic conventions for communication between network devices. The protocols are machine independent and on the other hand any involved workstation or a network device (say a router or a switch) should be able to accommodate the protocol requests. Protocols could be better understood by examples. Thus, I elaborate the following protocols: HTTP protocol: this is a protocol enabling web or LAN users to navigate throw different web or LAN resources. Browsers are implementing the specifications of the HTTP protocol. For instance, due to the HTTP protocol, browser agents should be able to deliver GET, PUT, POST, DELETE requests among different devices. TCP/IP, UDP, TCP and RTP: are protocols associated with the Transporation Layer of the OSI standard. TCP/IP(transmission control protocol/Internet protocol): is a networking protocol suite that Microsoft Windows uses to communicate over the internet with other computers UDP (user datagram protocol): are used to transmit network data to and from server and client applications TCP (transmission control protocol): used to manage the connection of computer systems to the Internet. RTP ( realtime transportation protocol): is an Internet protocol standard that requires a way for databases to manage the real-time transmission of ...read more.


It is connected to at least three network, it also located at the gatway where all the network connected with is own IP address. Switch All the networks adevice from switch between LAN segments. Switches operate at the data link layer the network layer (layer 3) of LANs that use switches to join segments are called switched LANs or, in the case of Ethernet networks, switched Ethernet LANs. Htt//www.Networking for Dummie Task 4.2 Test network systems to meet user requirements. Your testing includes functionality of the network to ensure that your developed network will operate seamlessly in a physical environment so that it can satisfy user requirements. The network is design and testing have being conducted. C:\Users\AISOSA\Dropbox\Screenshots\Screenshot 2017-07-18 11.42.34(2).png the Network is fully designed line of high-quality IP (Internet Protocol) Network topology. connect directly with from Router to every PC and switch, the network includes a wide range of IP Network topology, Servers, and other Accessories at various price points and capabilities. Htt//www.Networking for Dummie Task 4.3 Document and analyse test results against expected results Task 4.4 recommend potential enhancements for the networked systems. in task 4.1 I have already talk DHCP, ROUTERS, SWITCH * . * DNS-( Domain Name System) this is lcint sever that communicate automatically with the network * QoS-(Qulity of service) this is software that enables composite networks to control a positive variety of network applications and traffic types. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Traffic Light Simulation and Machine Code Program.

    in programmer time generally far outweigh the inefficiencies of the finished product. This is because the cost of writing a program is nearly constant for each line of code, regardless of the language. Thus, a high-level language where each line of code translates to 10 machine instructions costs only one

  2. Network Design

    That mean wireless access point with IEEE 802.11g will support to work with 802.11b wireless adapters. IEEE 802.11n According to Black Box (2008). Wireless Networking Whitepaper, IEEE 802.11n supports up to 100Mpbs data rates and higher, better signal intensity than older standards, is backward compatible with other standards.

  1. The project explains various algorithms that are exercised to recognize the characters present on ...

    This technique is utilized in the Defragmentation Algorithm and it drastically improved the performance by 50%. 5.5.2 Cache Optimization In order to speed up the execution speed of the CPU, cache plays a very important role provided it is configured correctly.

  2. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    the development time for new applications is greatly reduced; secondly, the quality of developed applications is improved." Batty, P. et al. (1994). However research has indicated that "70% of the CASE tools are never used, 25% are used only by a limited number of people in the organisation, and 5% are widely used but not to capacity."

  1. Geometric Brownian Motion. The aim of this project is to gain an understanding ...

    fact that it does not assume a normal distribution of asset returns. Lastly, Monte Carlo simulation is where future asset returns are more or less randomly simulated. [4] This is the most complex and difficult method to understand and implement. This model will be explained further on the next page.

  2. Ethics and professionalism in computing - examples from Facebook and Google

    complains about a username that does not closely relate to a user's actual name). GOOGLE Former Google CEO Eric Schmidt has also made this suggestion, calling online anonymity "dangerous" and predicting that governments will eventually "demand" that people use their names for all online activity.

  1. Toronto Airport Case Study Wireless Applications

    The IP network is used to support voice, data, and video traffic. VOIP is used for the voice communications and there are voice switches in each of the communications hubs. Feeds from security cameras are also handled over the same network.

  2. Precautions against internet scamming

    Government Action on internet frauds There are several departments and agencies in the United states that deals frauds in internet. Some of these agencies are FBI, Departent of Justice, Federal Trade Commision among others. Identity Theft and Assumption Deterrence Act is a federal law thatdeals with the problem of identity theft which was enacted by the Government in 1998.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work