• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

Networking Systems. Network Cabling, Network Interface Cards,Network Connectivity

Extracts from this document...


Task 1 * What does networking design involve? This involves considering the design for computer networks which cover a wide range of topics such as security and layout. * What is required for networking installation? The desires for network installation include different devices such as hubs, routers, switch and cat5 Ethernet cable etc. * What is network configuration? To communicate with other computers, computers need a network connection. This is accomplished by having the operating system recognize an interface card (such as Ethernet, ISDN modem, or token ring) and configuring the interface to connect to the network. * How can network security be improved? Setting up a firewall, freeware security package and a separate defence can amplify the security on a network, adding passwords and setting use permission settings. * What are the main functions of a network? Although the main function of network layer is routing, routing itself is done from source network to destination network a router doesn't store IP address of hosts it only has the IP prefix of the networks. * How does managing a client-server network differ from peer to peer networks? Managing for example a client-server network will be different to a P2P network as the operating system between the two will be dissimilar. ...read more.


These features include more harsh specifications for crosstalk and system noise. This also provides performance of up to 250MHz and is suitable for a faster type of Ethernet such as 10BASE-T. The latest standard was announced in February 2008 named Category 6a or Augmented Category 6 and has defined at frequencies up to 500MHz double the velocity of its predecessor. The length regulated stands at 100 metres for the Cat6 cable. 90 metres of which should be horizontal. Fibre optic cable is used to carry signals for broadband, TV and voice. Made of very thin strands/threads of glass or plastic that can carry large amounts of digital information for long distances using light, fibre optic cables can carry a lot more data at one time than traditional copper wires. Fibre optic cables are reliable (they don't suffer from electromagnetic interference,) but they are expensive to install. Network Interface Cards A universal problem with NICs is a hardware fault; this is most likely caused by Electrostatic discharge. This usually is caused by incorrect handling of the hardware such as not using devices to protect against Electrostatic discharge e.g. Antistatic wrist bands, antistatic floor mats etc these can help protect Electrostatic discharge on electronic devices. The only way to diagnose this problem is to see if the hardware works or not, you may not even know you have damaged the device when handling it. ...read more.


Websites, documents and software can always be blocked out by the proxy servers. These are used to as a small layer of protection for the network. This should stop the potential employees for downloading any volatile software or programs. SNMP (Simple Network Management Protocol) configure This is a production standard for network management. SNMP is usually used by the managers of the network, this allows them to modify the network to suit their business needs. It gathers information about the performance of the software and hardware on the network which then is observed by the user to project how the network components are working. Any network can potentially suffer from performance problems. I will be studying 3 case studies for comparison reasons. A smaller home network with a couple of computers both connected together, a larger sized network which is a classroom inside my college and finally the large scale network which is my workplace of Alliance Boots. Speed is the most important factor. Network performance is key to success; if the network is down in any of these places then nothing will get done. There would be a massive delay in everything that would need to be completed. All these places would need to make certain that they can cope with higher speeds for a beneficial performance. There was a vast difference within the networks. The small network will usually be running a couple of computers at a time ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

3 star(s)

Response to the question

The majority of answers given do not reflect the questions posed. As an example, immediately in Task 1, the answer to the first question is too vague and shows lack of research. Network design essentially involves the hardware architecture and ...

Read full review

Response to the question

The majority of answers given do not reflect the questions posed. As an example, immediately in Task 1, the answer to the first question is too vague and shows lack of research. Network design essentially involves the hardware architecture and network infrastructure of a business, consisting of at least the topology design, planning (through a variety of means which may even involve simulators such as Packet Tracer), associated costs etc. network design forms a core part of ERP. As for security, this is typically described in a business continuity plan.
A few other examples: In Task 2, the response to physical size affecting design shows a lack of understanding of computer networks, the response to security requirements neglects key examples of password encryption and good practice (e.g. alphanumerical, mixed case and symbols) and regular change. In Task 3, colour coding and types of cables (e.g. crossover, rollover, straight-through) is not mentioned in Network Cabling.
I would strongly recommend further research and to read the question carefully before answering.

Level of analysis

The coursework is largely opinionated, contains very few examples and lacks any citations. The latter two should at least not have been the case considering that this is an A-Level piece of work. The student has however demonstrated a good level of understanding in the technical terms involved in networking.

Quality of writing

Quality of writing - Is the writing accurate in terms of spelling, grammar and punctuation? Has the writer used technical terms expected at this level of qualification? To what extent does the writer follow conventions and expectations for written work at this level?
Minor grammar and punctuation mistakes are present throughout. The student presents this coursework as a very informal document which is evidenced through the style of writing and lack of even the most basic document administration (front page with short abstract, contents, bibliography, page numbers etc). Task 2 is informative yet let down by informal writing and repeating similar patterns as described above in Task 1 - the student shows a remarkable lack of understanding in network security, offering only vague answers to security requirements.
Overall, this coursework is not at an A-Level standard.

Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by finalfantasy 18/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Compare the effectiveness of different transmission methods.

    distances up to 3km carrying a single beam of light and the multimode is used for short distances up to 2km carrying multiple numbers of light beams which means more data. UTP & STP: Effectiveness of different transmission UTP & STP both these two stand for unshielded and shielded twisted pair which uses copper wires.

  2. Marked by a teacher

    Application Software

    File Transfer Protocol (FTP) SGT was a widely used tool and remains available today, though largely unknown to non-ICT specialists. FTP?s origins lie in the days of text-based interfaces but today both GUI based and WWW based FTP software is available. Users of Microsoft Windows can access a text based of FTP programme through the command prompt.

  1. Computer Hacking

    of the idea of "Hacking" is because some people files are very important or "Top Secret" and they do not want that information to fall into the wrong hands. An example of this is when a certain company has confidential files or information, and the company's competitors hire a "hacker"

  2. Explain the functions of network management

    Configuration Configuration is to set up the services in server and control the network. Configuration is to set up certain rolls on server for example what site the users can go on, sending files, automatic IP address and DNS. The configuration is to set up the network and connect all the computers.

  1. Discuss the Causes and Effects of the Digital Divide

    boost the income of the country in this modern day and age, Also countries that don?t have internet access are unable to carry out e-commerce and e-business putting their companies at a significant disadvantage with in the global market. The Rich getting Richer at the Disadvantage of the Poor This

  2. Explain the function of computer hardware components

    The speed is measured in MHz (Megahertz) or GHz (Giga hertz). Motherboard The motherboard contains all the main elements of the computer. It is the main circuit board which connects and communicates with all devices. All transitions on the computer must pass through the motherboard.

  1. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    Another example would be if a computer program doesn?t work. Responding to it calmly and trying to solve it on your own would include problem solving. This will include independent work to help solve the problem. Analysing and investigating-This will require a lot of thinking and will help you to exactly find out what your problem may be.

  2. AO3 Investigate how search engines work

    This is why the alternate method is used more often then search engine URL pages, just to get their website on crawler bot databases quicker. Promoting your websites The best way to promote a site is by giving your site a good description of your site, to attract people to your website.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work