This website uses cookies to ensure you have the best experience. Learn more

Network Essay

2656 words - 11 pages

2.1.1 Network History

The history of computer networking is complex.

It has involved many people from all over the world over the past 35 years. Presented here is a simplified view of how the Internet evolved. The processes of invention and commercialization are far more complicated, but it is helpful to look at the fundamental development.
In the 1940s computers were large electromechanical devices that were prone to failure. In 1947 the invention of a semiconductor transistor opened up many possibilities for making smaller, more reliable computers. In the 1950s mainframe computers, which were run by punched card programs, began to be used by large institutions. In the late ...view middle of the document...

The drawback to this type of system was that there was very little direct communication and then only with those who knew about the bulletin board. Another limitation was that the bulletin board computer required one modem per connection. If five people connected simultaneously it would require five modems connected to five separate phone lines. As the number of people who wanted to use the system grew, the system was not able to handle the demand. For example, imagine if 500 people wanted to connect at the same time. Starting in the 1960s and continuing through the 70s, 80s, and 90s, the Department of Defense (DoD) developed large, reliable, wide-area networks (WANs) for military and scientific reasons. This technology was different from the point-to-point communication used in bulletin boards. It allowed multiple computers to be connected together using many different paths. The network itself would determine how to move data from one computer to another. Instead of only being able to communicate with one other computer at a time, many computers could be reached using the same connection. The DoDs WAN eventually became the Internet.
2.1.3 Networking Devices
Equipment that connects directly to a network segment is referred to as a device. These devices are broken up into two classifications. The first classification is end-user devices. End-user devices include computers, printers, scanners, and other devices that provide services directly to the user. The second classification is network devices. Network devices include all the devices that connect the end-user devices together to allow them to communicate.

End-user devices that provide users with a connection to the network are also referred to as hosts.

These devices allow users to share, create, and obtain information. The host devices can exist without a network, but without the network the host capabilities are greatly reduced. Host devices are physically connected to the network media using a network interface card (NIC). They use this connection to perform the tasks of sending e-mails, printing reports, scanning pictures, or accessing databases.

A NIC is a printed circuit board that fits into the expansion slot of a bus on a computer motherboard, or it can be a peripheral device. It is also called a network adapter. Laptop or notebook computer NICs are usually the size of a PCMCIA card.

Each individual NIC carries a unique code, called a Media Access Control (MAC) address. This address is used to control data communication for the host on the network. More about the MAC address will be covered later. As the name implies, the NIC controls host access to the medium.

There are no standardized symbols for end-user devices in the networking industry.

They appear similar to the real devices to allow for quick recognition.

Network devices provide extension of cable connections, concentration of connections, conversion of data formats, and management...

Other Papers Like Network

Network Addressing Essay

638 words - 3 pages Network Addressing In standard computer networking there are two different addresses associated with each host on the network; they are termed logical and physical addresses. The physical hardware address is a 48-bit , 12-digit number that is burned into the memory of each network interface card, and it works on the data link layer of the OSI model. An example of this “hexadecimal” number is 02-C3-7E-3D-0A-B4. This MAC address is

Network design Essay

657 words - 3 pages geographic factorsOur Implementation plan for implementing the new network will be cost effective and efficient. We will purchase the materials needed, such as hardware, software, cables, advise you on what kind of systems are needed, and what is needed for wireless communications. As well as getting IP address assigned so that there will not be any problems with the network being bottlenecked.As an organization grows its technology needs will

Network Security

586 words - 3 pages Nasario Birrueta IT 200: Milestone Three Network Security Network security is one of the most important aspects of implementing a fully functional working network, downtime caused by poor network security can cause major economic loses. The two matters that need to be addressed is the User and Physical equipment. Network security begins with the user. As such would implement a Network Use policy that the employee must sign and

Airborne Network

997 words - 4 pages Airborne networks: uses, advantages and disadvantages The term airborne network refers to the networking technology currently being developed and used by the United States Armed forces whereby an aircraft is used as the hub for a network. Thus the network is a mobile network that moves and shifts as the aircraft moves and shifts. This networking model has been developed majorly for the mode of warfare known as network centric warfare. As

Network Management

3884 words - 16 pages Network Management Template Group Project Tech Corp 5/19/2013 * Table of Contents 1. Introduction 2 1.1 Individual Responsibility 2 2. Configuration Management 3 2.1 Inventory Management 3 2.1.1 Management Criteria 3 2.1.2 Design Overview 3 2.1.3 Usage & Rationale behind the Template 4 2.1.4 Value to Management 4 3. Performance Management 5 3.1 Performance Log 5 3.1.1 Management Criteria 5

Network Security

1846 words - 8 pages A 5 page paper on network security with 5 references NETWORK SECURITY Let us go back, twelve years. Where's Internet? Concentrated in the cables that connect the offices and cubicles of the American ministry of defense. Things were simple, and despite the sensitive nature of the data transferred no body talked about net work security, no body knew what was to follow. Some how a revolution was triggered, the information net burst out of its

Network Design

1178 words - 5 pages Running head:PROJECT #3 Unit #3 Individual Project - Network Design For Champions, Inc. Travis Lee Thompson ITCO103-1201A-05 American International University Table Of Contents Network Architecture/Model ........................................................................................ Page 3 Star Network Topology (before the donation) .............................................................. Page 5 Star Network

Network Design

2608 words - 11 pages April 4th 2011 ACME Network Design Anthony G, Buddy W, Anthony P, & Ryan O University of Phoenix Mike Kanfer Introduction As a network consultant hired by Acme Manufacturing, the company has asked Team A to develop a new networking design for Acme’s expanding business. The description below describes the key steps involved in developing a WAN for Acme Manufacturing. The company has six different buildings in six different locations

Network Evaluation

2416 words - 10 pages In a computer network evaluation it is important to cover various areas to determine which are satisfactory and which are in need of improvement. The following 15 evaluations will be used to access the current state of the network: 1. Evaluation of Client Computer Hardware In the evaluation of client computer hardware, this evaluation seeks to identify all client computer assets owned by the company. All laptops and desktops owned by the

Network Security

966 words - 4 pages Network Security When it comes to networking and the security of networks, there are several different methods of protecting networks. Of these differing methods, some of them sound similar, but provide differing levels of security. In the following paragraphs, I will try to explain the differences between some of the methods used. • Explain the difference between historical and statistical logging. Logging is a simple way of keeping a

Wireless Network

2018 words - 9 pages Wireless network Introduction Wireless mobile computing solutions adoption has been of benefit to government institutions and learning institutions among others. This is as a result of higher customer satisfaction and higher productivity. Wireless network is a computer network which is not connected by any cable. This assists business enterprises and organizations to avoid cabling value in a building. The network is implemented by use of

Related Essays

Network Essay

927 words - 4 pages . Principles of Electric Circuits By: Thomas L.Floyd Publisher: Pearson International Edition. Year : 2007 2. Notes from Network Analysis By: Lecturer from UniKL BMI Year : 2012 3. Internet

Network Connections Essay

615 words - 3 pages The physical connections on a computer network, the cabling and the arrangement between the network devices and computers is known as, network topology. As the definition implies the name is loosely tied to the actual appearance the network. There are several topologies; three of the more known ones are Star, Bus, and Ring. The Star topology is a network that is connected through a central device and all the network devices; printers, computers

Network Design Essay

655 words - 3 pages  Network Management Team Job Aid Student Name Course Title Course Number Professor College Affiliation Date Week Two: Individual Choosing a network management protocol There are several network management protocols both for in-band and out-band management systems. To identify the best or suitable protocol for an organization it is important to consider factors like; 1. Type of communication 2. Ease of using 3. System

Network Design Essay

863 words - 4 pages Network Design Proposal Prepared for: University of Maryland University College Prepared by: Tim Black I. Physical Network Design A. Network Topology Business Needs In this section, you will assess the business needs of the company. Use the information provided in the scenario to analyze the need for infrastructure or equipment. If you need more information, feel free to ask your instructor or make some assumptions. If you