Nt1310 Unit 6 Essay

Improved Essays
This specifies the general interface between the network layer (IP etc.) and the Data Link layer (Ethernet, Token Ring etc.) It’s the standard for the upper Data Link layer sublayer, also known as the Logical Link Control layer. It’s responsible for flow and error control. The Data Link layer wants to send some data over the network, 802.2 LLC helps make this possible.

b. 802.3 – Ethernet
802.3 is the standard which Ethernet operates by. The original 802.3 standard is 10mbps. Commonly, Ethernet networks transmit data in packets, as previously stated. A packet can be a minimum size of 72 bytes or a maximum of 1518 bytes.
The most common topology for Ethernet is the star topology, which will be explained later in this report.

c. 802.5 – Token Ring
Originally, token ring operated at a speed of
…show more content…
802.7
IEEE 802.7 is a sub-standard of the IEEE 802 which covers broadband local area networks with a coaxial cable. This standard was developed for cable internet companies.

e. 802.11 (a, b, g, n) – Wireless Network Standards
802.11 is the collection of standards setup for wireless networking. They include four different standards including; 802.11a, 802.b, 802.11g and the most recent standard 802.11n. Each standard uses a frequency to connect to the network and has a defined upper limit for data transfer speeds.
802.11a – This was one of the first wireless standards. It operates in the 5GHz radio band and can achieve a maximum of 54Mbps.
802.11b – This was the more preferred choice because of the lower price and higher range. It operates in the 2.4GHz band and supports up to 11 Mbps. The range goes up to around several hundred feet in theory. It was the first real consumer option for wireless and very popular.
802.11g – Similar to 802.11b, it operates in the 2.4GHz band and therefore meaning it is compatible with the 802.11b equipment. It can also achieve a maximum of 54 Mbps. 802.11a is not compatible with the 802.11b or 802.11g since it operates within a different

Related Documents

  • Great Essays

    The port types available are Standard, Fast and Gigabit Ethernet which transmits from a range of speeds from 10Mb/s to…

    • 1605 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Nt1330 Unit 7 Exercise 1

    • 556 Words
    • 3 Pages

    1. Ethernet Ethernet is a combination of computer networking technologies most commonly used in local, metropolitan, and wide area networks. 2. Server A computer or computer program that manages access and distributes information through a centralized service in a network.…

    • 556 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    SIP Trunking BroadConnect boasts its many years of experience and emphasis on customization. We take every business and design the best phone systems content for it, based on your needs and budget. Since we understand that communication is a major component of a successful business, you will never receive excessive or useless features that will only hinder your company’s ability to grow. Our network is prevalent throughout North America, and it uses converged T1 that is fast and reliable.…

    • 480 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    802.11b and 802.11a WLAN standards were made official in September of 1999 by the IEEE committee. Included with its ratification was Wired Equivalent Privacy (WEP) technology for authentication and encryption. When utilizing the WEP standard every frame is encrypted before transmission over wireless LAN by using the RC4 encryption technique. WEP utilized shared key authentication and open system authentication.…

    • 199 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    1. What file transfer protocols would you recommend? Be prepared to support your recommendations. The Data Link Layer allows various protocols to transmit data between nodes in a network. This layer involves framing of data, synchronization of nodes and multiplexing of nodes.…

    • 380 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Alejandro Carriegos 9/1/2015 Network Layer The main purpose of the network layer packet is connecting with the destination; it must be familiar with the topology subnet and choose the appropriate paths through it. When the source and destination are on different networks, the network layer (IP), have to deal with these differences. The services provided by the network layer should be independent of the topology subnet.…

    • 423 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    P1 Unit 3 Network Analysis

    • 1515 Words
    • 7 Pages

    Networking P1: DESCRIBE THE TYPES OF NETWORKS AVAILABLE AND HOW THEY RELATE TO PARTICULAR NETWORK STANDARDS AND PROTOCOLS There are many types of wireless networks available. This includes: WAN, LAN, MAN, PAN, WLAN. Below, I will go into detail about each type that will help you understand exactly what each type of network is and what it consists of.…

    • 1515 Words
    • 7 Pages
    Improved Essays
  • Decent Essays

    802.11 Frames

    • 106 Words
    • 1 Pages

    The 802.11 standard defines classes of frames for use in transmission of data, control, and management. A data frame has the following fields: frame control, duration, address (1~3), sequence, data, check sequence. The frame control field is made up of 11 subfields, which contain version bits, frame type bits, distribution system bits, and so on. The duration field tells the channel occupancy time. The address fields indicate the receiver, the transmitter, and the distant endpoint address.…

    • 106 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    802.11a Pros And Cons

    • 235 Words
    • 1 Pages

    Because 802.11 was the first WLAN standard, it only supported a maximum bandwidth of 2 Mbps. 2 Mbps is extremely slow for most applications and for this reason is no longer manufactured (Mitchell, 2017). 802.11a was actually created about the same time as 802.11b. While 802.11a does provide faster maximum speed, it is also more expensive and has a shorter-range signal that can be more easily obstructed (Mitchell, 2017).…

    • 235 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    802.11 Cons

    • 1585 Words
    • 7 Pages

    The 802.11 is the standard protocol for wireless networks, which includes WEP (wired equivalent privacy). The standards committee for 802.11 left many of the difficult security issues such as key management and a robust authentication mechanism as open problems. The standards they have established have many flaws that have led to a number of practical attacks. With the increase number of wireless technology there is an increase in the range of places people can perform their business. As a result wireless networks or WIFI have become increasingly popular.…

    • 1585 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    The Federal Communication Commission is responsible for overseeing all television, radio and telephone industries in America. It is managed by five members picked by the president. These people work until their five year term ends regulating communication through all the mass media. Only three workers can be from the same political party. There are many different jobs for the FCC.…

    • 1338 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    One thing that can block 2.4GHz signals are other 2.4GHz signals, so can microwaves. A solution would be to switch to 5GHz, but 2.4GHz is better at getting a signal through walls. One other thing that can block a WiFi signal is water, which is also why humans can block one, because most of the human body is water. Mirrors can block a wifi signal, which is why a wifi signal…

    • 230 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Interoperability allows for effective and clear communication among individuals. Wireless broadband will help improve interoperability and communication. Wireless broadband will work in any area as long as it is designed to work in the environment where it will be deployed, however, it will not solve all public safety problems, but it will offer tremendous benefits for public safety. The main elements needed to help with safety problems are planning, design, and…

    • 232 Words
    • 1 Pages
    Improved Essays
  • Great Essays

    That implies security groups should be similarly quick in redesigning both the viability and proficiency of their security design and controls [20]. The multifaceted nature of conveyed endeavors, notwithstanding, make the aggressors ' employment less demanding by creating information over-burden for those security groups. Numerous customary ways to deal with security and consistency may fulfill evaluators yet are just speed knocks to the progressed focused on assaults saw today. Conclusion…

    • 1042 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    In today’s world we are exchanging data and communicating faster than ever before. In a click of a button we can send and receive messages or even video chat. Any device that can be connected to a network has the power to do so. Continuing our technology advancements, we always have the need to upgrade and improve our networks for many reasons. There are a lot more households using Local Area Networks (LAN) in this generation than past generations.…

    • 839 Words
    • 4 Pages
    Improved Essays