Unit 1.1 Describe Common Physical Network Topologies

Great Essays
1.1 Describe common physical network topologies

Topologies

Topologies describes the how different computers or other devices in a computer network is arranged. Topologies can be either physical (meaning placement of the components are arranged in a particular shape) or logical (meaning how data flows despite of its physical layout). There are different recognised topologies including star, mesh, tree and ring.
In a star topology, each network device (computer or peripheral) is linked to a central hub or a switch with a point-to-point access or connection. All the data and information is passed through the central hub before reaching to its destination. For example, in a small home network, all the computers or devices are connected to single
…show more content…
This layer provided the interface between applications used on the computer. Protocols such has Telnet, FTP, HTTP, SMTP etc are used on this layer. There aren 't any special devices operating in this layer, just the actual computer itself.

Layer 6 which is presentation layer in OSI model helps with formatting of the data, for example if you are sending email, presentation layer will format data into email format which can be understood for other protocols. In this layer, depending on the type of the data it will be converted to certain formats including WMV, AVI etc for video JPG, BMP etc for images and WAV,MP3 etc for audio. It also includes data conversion, data compression and data encryption. There aren 't any special devices operating in this layer, just the actual computer itself.

Layer 5 which is session layer in OSI model helps with establishing, monitoring, maintain and terminating communication session with the receiving device. Popular protocols such as RPC, METBIOS or SQL etc are used. There aren 't any special devices operating in this layer, just the actual computer

Related Documents

  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    Nt1330 Unit 1 Term Paper

    • 455 Words
    • 2 Pages

    5.2.3Direct Access DirectAccess is new to the Windows 7 operating systems. DirectAccess enables a remote user to work on their corporate network when they are away from the office without the need of a VPN. As long as the remote user is connected to the Internet, DirectAccess will automatically connect the remote user to the corporate network without the need of any user intervention.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Assignment

    • 867 Words
    • 4 Pages

    Sources Used: (Rouse, 2015) (Describe The Function of TCP/IP Protocol in easy words, 2015) The application layer remains the single one that immediately connects with the user used for communication protocols across the network. The application layer protocols are HTTP, HTTPS and SMTP. HTTP, this is where it will transmit out a request for the web client to be able to transfer the data across to the website. The HTTPS is where it will use a secure connection such as using paid methods online and e-commerce.…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    This specifies the general interface between the network layer (IP etc.) and the Data Link layer (Ethernet, Token Ring etc.) It’s the standard for the upper Data Link layer sublayer, also known as the Logical Link Control layer. It’s responsible for flow and error control. The Data Link layer wants to send some data over the network, 802.2 LLC helps make this possible. b. 802.3 – Ethernet 802.3 is the standard which Ethernet operates by.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Physical layer: also referred to as layer 1 is responsible for the electrical signals, radio signal, and light signals. It is basically the hardware layer for the OSI model. Devices such as switches and hubs operate at this layer. 2. Data link layer; is responsible for interpreting the electrical signals transmuted through the physical layer.…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Use of multiple routers in interconnected networks: Exchanging information about destination addresses using a dynamic routing protocol. A router has different physical ways to operate network connections, such as: • Fibre optic • Copper cables • Wireless A router also contains several firmware for different networks’ protocol standards.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    IPsec is often installed on today's IPv4 networks to protect communication over VPN networks. It is used to access VPN, as well as between VPNs. IPv6 transition mechanisms can use this kind of infrastructure to achieve a certain level of protection, even in the absence of IPv6 IPsec. Remote IPv4 hosts access private networks by establishing encrypted VPN access to a gateway device set up for this purpose. If the same host is capable of IPv6, it can break through an IPv6 tunnel over this IPv4-protected communication channel.…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The following are the top 10 types of packets: IPv4: Internet Protocol version 4 (IPv4) is the standard version of the internet protocol, that acts as the platform for standard internet protocols and existing internet models (ISP). Extensive use of this protocol led to exhaustion of IP addresses. Therefore, we are bound to use IPv6, in the near future. A feature called as sub-netting is used for IP address allocation. It is defined in RFC 791.…

    • 917 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The protocols that are used are TCP and UDP. The data link layer is responsible for encapsulation of packets into frames and then transferring them to the physical layer. It is also responsible for flow control and addressing. 5. A three-way handshake is when two parties need to synchronize their segment sequence numbers used during their transmission.…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    It is composed of software controllers that communicate with the forwarding network fundamentals through standard interfaces, referred also as the South Bound Interface. The last layer is called Application Layer which takes care of…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    So you have an old Dell PowerEdge 2900 Server laying around with a few hard drives and your thinking I would really like to use this equipment as a NAS drive. It could happen, in our case it did. There were some stumbling blocks on the way though. Here is how we got through them… The goals we wanted to accomplish were creating a RAID5 array of 8 (7+1 Hot Spare) 1TB hard drives and then wanted to connect this FreeNas volume through and iSCSI channel to a file server that will present the NAS as a shared folder all of our servers could use. We quickly found that using the factory PERC (PowerEdge RAID Controller) to create a RAID 5 Array was not going to work.…

    • 608 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    In OSI stack, presentation layer converts data transferred by the application layer of the transport node. The functions of presentation layer are : 1. Data transcription 2. Data reconstruction 3.…

    • 139 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Ethernet Technology The Ethernet technology was mostly used in the LAN because; 1. We used Ethernet speed of 10mbps for areas in the LAN that required higher bandwidth 2. Our campus network model supports dual links between each distribution layer routers and case switches. We are there able to load balance the aggregate traffic from multiple access switches across the links.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Superior Essays

    According to Valdes and Roos (citation pending), the most common types are ATA, IP phones, and computer-to-computer…

    • 1455 Words
    • 6 Pages
    Superior Essays