This website uses cookies to ensure you have the best experience. Learn more

Intro To Network Essay

1478 words - 6 pages

The comparison and contrast between the 2 main reference models which uses the concept of protocol layering. Open System Interconnection Model (OSI) Transport Control Protocol /Internet Protocol (TCP/IP). Transmission Control Protocol (TCP) A connection-oriented transport protocol. Connection-oriented transport protocols provide reliable transport, in that if a segment is dropped, the sender can detect that drop and retransmit that dropped
segment. Specifically, a receiver acknowledges segments that it receives. Based on those acknowledgments, a sender can determine which segments were successfully
received.

TCP operates at the transport layer of the OSI model.

TCP three-way ...view middle of the document...

In addition, FTP transmits data between sender and receiver in an unencrypted format.
Identify the purpose, features, and functions of the following network components:
• Hubs
• Switches
• Bridges
• Routers
• Gateways
• CSU/DSU
• Network interface cards (NICs), ISDN adapters, and system area network cards
• Wireless access points (WAPs)
• Modems
A wide range of devices are used in modern networking. As a Network+ certified technician, you will need to have a good understanding of commonly used devices.
Given an example, identify a Media Access Control (MAC) address.
MAC addresses are the means by which systems communicate at a base level. As a network administrator, you will need to understand the purpose, function, and expression of MAC addresses.
Outline
• Introduction
• Hubs
• Switches
• Switching Methods
• Working with Hubs and Switches
• Hub and Switch Ports
• Cables Connecting Hubs and Switches
• Hub and Switch Indicator Lights
• Rack Mount, Stackable, and Freestanding Devices
• Managed Hubs and Switches
Typically, a local area network exists in a house or a university campus, while a wide area network exists over many office buildings separated by a vast distance. The office buildings in a WAN may be in different countries or even continents. For example, the headquarters may be in USA, the regional office may be in the UK, and the branch office may be in India. The workers in these three buildings use a Wide Area Network to collaborate with each other. The Internet can also be considered as a WAN, with the Ethernet being a classic example of WAN. Let us have a look at the two structures and their differences.

The Differences
In a LAN setup, devices are connected to a switch or a hub. Shared devices are also connected to a switch that is centrally located. In case the devices need to be connected to the Internet, the switch is then connected to the ISP and thus, to the Internet. The data that is shared amongst these devices is stored in servers. If more devices need to be added, an extra hub or switch can be added.

Local Area Network (LAN) has higher bandwidth, thus is faster when compared to a WAN. The maximum speed of a LAN can be 1000 megabits per second. As LAN is faster, it is widely preferred for sharing computers in a network. The network is easy to set up, most computers and laptops manufactured today come with the RJ45 port built-in on the motherboard, which is used to connect to the network. In case of older machines that do not have this port, a separate NIC (Network Interface Card) will be required to be installed. This card fits in the PCI slot on desktops, and the PCMCIA slot on laptops.

The main advantage of using LAN is the ease of sharing. Computers, if connected to the same LAN, can even share a printer. The biggest hurdle that a firm faces while connecting computers in a LAN is the monitoring of traffic for the Internet. If there is too much load put on only one computer or on a...

Other Papers Like Intro to Network

Week 6 It 241 Essay

712 words - 3 pages NETWORK COMPONENTS 1 Network Components Roy Craven IT/241 INTRO TO W-LAN TECHNOLOGIES June 15, 2014 JOSEPH KALUZNY NETWORK COMPONENTS 2 There are many components that can go with wired and wireless networks. A wireless router performs functions of a router. A wireless router operates through a signal so I think it would depend on an access point. The price range I have found for this device is 15 to 2200. It also allows

Science Meets Real Life Essay

1671 words - 7 pages Approach, 4th Edition, Retrieved from http://akademik.del.ac.id/ebooks/Network/Artech.House,.The.Satellite.Communication.Applications.Handb.pdf McQuerry, (2004), Intro to Cisco Networking Technologies, Retrieved from http://www.ciscopress.com/articles/article.asp?p=169686

Playstation Network

2224 words - 9 pages .....................................................................................................................3 Intro………………………………………………………………...............................................4 Relation to DB communications……..........................................................................................4 Features…………………………………………….....................................................................5 The Dashboard……….…………………………………………………....................................6 How it works

Wide Area Networking

760 words - 4 pages Cecilia Lopez Instructor: Ms. Ybarra Intro to Networking NT1210 Wide-Area Networking Unit 7 Lab 7.1: Distance Considerations Exercise 7.1.1 It’s impractical for an organization to own the entirety of a WAN because it would be very expensive for the company to run all the lines necessary and to pay for all the labor to keep the WAN up and running. It is less expensive for an organization to own a LAN so that’s why it is favorable for them

Wwf Essay

556 words - 3 pages World Wildlife Fund Essay Outline I. Introduction [Intro] a. San Diego Zoo panda cancer story b. Gao Gao c. developed a plan for reducing human activities in habitat areas, conserving the bamboo forests, and maintaining captive populations of pandas d. In order to remain balance in our world between human and animal, the World Wildlife Fund is dedicated to protecting the world's wildlife and wild lands II. Well over

Physical Security Policy

749 words - 3 pages Associate Level Material Appendix E Physical Security Policy Student Name: xxxxxxxxxxx University of Phoenix IT/244 Intro to IT Security Instructor’s Name: xxxxxxxxx Date: 4.14.13 Physical Security Policy

Algorithms Notes

5033 words - 21 pages integers ranging from 0 to k. Partition subsequences so that the difference between the sum of the two is minimized THINK OF EVERYTHING AS AN ARRAY * Lecture 17 (03/18)
Posted on: Monday, March 18, 2013

Topics: Dynamic Programming (Edit Distance, Matrix Multiplication) * Readings: DPV (6.3), CLRS (15.2, 15.3) * Lecture 18 (03/20) Posted on: Wednesday, March 20, 2013 Topics: Network Flows Readings: CLRS (26.1

Input Controls

837 words - 4 pages Monitoring:  Audit trails may be used to track and monitor problems that can occur on-line. Such real time monitoring helps in detection of problems like disk failures, over utilization of system resources or network outages (Gopalakrishna, 2000). 4. Intrusion Detection:  This is process that detects any unauthorized use. Audit trails can help in intrusion detection if they record appropriate events (Gopalakrishna, 2000). Determining what

Access Control Policy

1684 words - 7 pages Associate Level Material Appendix F Access Control Policy Student Name: Charles Williams University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Tarik Lles Date: December 4, 2011 Access Control Policy Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems Access control is used to restrict operations, which authorized users can

Databases

872 words - 4 pages CHICAGO STATE UNIVERSITY COMPUTER SCIENCE AND MATHEMATICS CPTR 4600-01 INTRO TO DATABASES CLOUD DATABASES SUBMITTED BY: ALICIA RUCKER INSTRUCTOR: DR. LUIS VIDAL SPRING 2016 Abstract A cloud database is a database that typically runs on a cloud computing platform. Users can run databases on the cloud independently, using a virtual machine image, or they can purchase access to a database service, maintained by a cloud database

Social Media

921 words - 4 pages Social Media by Erma LaFleur SOC1000 Intro to Human Society Capella University March 9, 2014 Problem Definition Over time, our lives are being consumed with Social networking. Is Social networking creating a safe environment or creating chaos? Some of the social networking sites have caused people to lose their identity, predators have lured children away from home, but yet some people have reunited with friends and family, and

Related Essays

Tech 140 Essay

648 words - 3 pages HW 1-Intro to Networking True/False - Indicate whether the statement is true or false. ____ 1. The simplest form of a network is a client/server network. ____ 2. Clients on a client/server network share their resources directly with each other. ____ 3. Hands-on experience to improve networking hardware and software skills is important when attempting to enter the networking field. Multiple Choice - Identify the choice that best

Scientific Article Essay

599 words - 3 pages Scientific Article 1 Intro to Psychology Risk-takers are smarter according to new study In a recent study using functional magnetic resonance imaging (fMRI), images taken of the brains of young men revealed major differences in what is called “white matter” between two separate groups of participants. The University of Turku in Finland under the direction of SINTEF claims young men that make quick decisions in risky situations have a

Sec280 Week1 Essay

1298 words - 6 pages , leak of confidential data such as bank accounts, and loss of goodwill and trust. Ping Sweeps and Port Scans Intro Ping sweeps and port scans are two methods commonly used by hackers to detect vulnerabilities on computer networks (InfoSoc, 2014). Hackers use ping sweeps to check on which computers are active and being used; while they use port scan to find open ports which can be used to breach a network. If these two methods are used by

Cisco Week 1 Hw Essay

620 words - 3 pages Kelsie Imaduddin WAN Technology and Application Week 1 Homework Assignment 1.1 Vocab Exercise: Matching 13. o 14. x 15. u 16. b 17. e 18. p 19. g 20. i 21. c 22. k 23. s 24. m 13. o 14. x 15. u 16. b 17. e 18. p 19. g 20. i 21. c 22. k 23. s 24. m 1. n 2. h 3. v 4. j 5. q 6. r 7. i 8. a 9. i 10. w 11. d 12. f Concept Questions: 1. The most important function of the router is to direct the traffic of data across a network. It allow