• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Types of Network.

Extracts from this document...

Introduction

Types of Network LAN-Local Area Network LAN connects computers within an organisation so that they can share data and resources. Some LANs have only two or three computer but others link together hundreds of computers. Most LANs are set up in a single building. But a LAN can extend through adjacent buildings. WAN-Wide Area Network WAN use modems and the telephone system to communicate computer by greater distance than those covered by LAN. MAN- Metropolitan Area Network MAN is a data network intended to serve an area the size of a large city. Such networks are being implemented by innovative techniques, such as running optical fibre through subway tunnels. A popular example of a MAN is SMDS. SMDS- switched multi-megabit data service which is an emerging high-speed datagram-based public data network service and expected to be widely used by telephone companies as the basis for their data networks. PSDN-Packet Switch Data Network PSDN is a data communication network that is based on the principal of packet switching. As opposed to circuit switching that is use in public telephone networks. ISDN-Intergraded Service Digital Network ISDN is a system of digital phone connection that allows data to be transmitted simultaneously across the world using end to end digital connectivity. ...read more.

Middle

This could include discovering the existence of the problem, identifying the source, and possibly repairing (or at least isolating the rest of the network from) the problem. * Performance management: is the process of measuring the performance of various network components. This also includes taking measures to optimise the network for maximum system performance (periodically measuring of the use of network resources). * Security management: is the process of controlling (limiting, restricting) access to the network and resources on it. This could include setting up and managing access lists in routers (creating "firewalls" to keep intruders out), creating and maintaining password access to critical network resources, identifying the points of entry used by intruders and closing them. Network Hardware File server File sever is a processor that controls a central repository of data that can be downloaded or manipulated in some manner by a client. The most common choice for file server software is Network file system. A protocol which allows a computer to access files over a network as if they were on its local disks. Email server An email sever is a device that distributes files or information in response to requests sent via electronic mail. ...read more.

Conclusion

Firewall A combination of hardware and software that provides a security system, usually to prevent unauthorized access from outside to an internal network or intranet. A firewall prevents direct communication between network and external computers by routing communication through a proxy server outside of the network. The proxy server determines whether it is safe to let a file pass through to the network. A firewall is also called a security-edge gateway. Window The operating system for Personal Computers and Networked Computers. Constantly upgraded. Commonly used version are Windows 95, Windows 98, Windows Me, Windows 2000, Windows NT4, Windows XP (Home and Professional). Window NT The most advanced version of the Windows operating system, Windows NT is a 32-bit operating system that supports pre-emptive multitasking. There are actually two versions of Windows NT: Windows NT Server, designed to act as a server in networks, and Windows NT Workstation for stand-alone or client workstations. Class C Network Address (194.10.1.0) for diagrams. Building Subnet 1 IP address Head office 194.10.1.1-194.10.1.7 194.10.1.1 194.10.1.2 194.10.1.3 Subnet 2 IP address 194.10.1.8-194.10.1.14 194.10.1.8 194.10.1.10 194.10.1.11 194.10.1.12 Subnet 3 IP address 194.10.1.16-194.10.1.23 194.10.1.16 194.10.1.17 194.10.1.18 194.10.1.19 Subnet 4 IP address 194.10.1.24-194.10.1.32 194.10.1.24 194.10.1.23 194.10.1.24 194.10.1.25 194.10.1.26 Subnet 5 IP address 194.10.1.33-194.10.1.64 194.10.1.33 194.10.1.34 194.10.1.35 194.10.1.36 Subnet 5 IP address 194.10.1.65-194.10.1.129 194.10.1.33 194.10.1.34 194.10.1.35 194.10.1.36 Task2 Network Monish Bosquet ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    DIFS (DCF - Distribution combination function, IFS - Inter frame spacing). This parameter denotes the longest waiting time and has the lowest priority for medium access. This waiting time is used for asynchronous data service within a contention period. It defines as SIFS plus two slut times.

  2. OCR GCSE Business & Communication Task 7 Report

    I can also use line spacing, which can help to space out my text which can add to the aesthetical standard of my letter. By using this it can also add to the professionalism of my letter and reflect my corporate image.

  1. ICT Systems in Everyday Life: Your Local Community

    Like a tap on a film camera, it is useful for framing reference, but the image available on the negative is not done justice. It provides some good information, but we wouldn't make lighting or exposure choices solely based on viewing the tap.

  2. Networks LAN = Local Area Network.

    * Because networks are often complicated, they need expensive expert staff to look after them. * As the number of users increase on the network, the performance of the system can be affected and things start to slow down. Network Topologies.

  1. Shareware and Its Network Security

    Knopf - encouraged the copying of his programs, which actually bought him new business as the consumers were more eager to pay for a "service" that was cheaper than go to stores and may hefty sums to buy software they quite possibly have never used.

  2. Here are 3 ways of receiving internet broadband access. ISDN - ...

    - Some websites may have a different in speed of response - No difference to the browsing experience on the web SATELLITE - Satellite internet doesn't use a telephone lines or cable systems however it uses a satellite dish for two-way uploading and downloading data communication system.

  1. Observing Interactions between carers and clients

    would hold his hand and take him to different activities on different tables and ask him what he would like to do, she treated Nathan differently from the rest of the class. There are not many strengths that the carer had as most of the time she acted very inappropriately The 3 different communication skills that I saw Mrs.

  2. Unit 23: Investigating Communications and Networks

    * Fast data transfer as each user has an independent link to the server. Disadvantages of a Star Topology * Requires more cable length than a linear topology. * If the hub or concentrator fails, nodes attached are disabled. * More expensive than linear bus topologies because of the cost of the concentrators.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work