Unit 7 Computer Networks

Superior Essays
Computer networks
LAN – Is a Local Area Network which is a computer network that covers a small area which is sometimes a single room, an office building or a group of buildings. A local area network can be connected with others over a distance for example a telephone line, a radio or a mobile phone call, as a LAN is a network that covers the geographic distance that also involves internet links. A system of LANs that are all connected together is called a WAN, which is a wide area network. http://www.webopedia.com/TERM/L/local_area_network_LAN.html
WAN – is a Wide Area network, this is when a computer network that is connected in a large geographical area is known as a WAN, which is when two or more LANs are connected together. These are through
…show more content…
WAP – This is called a wireless application protocol and this access information through a mobile wireless network with mobile phones that use protocols. These phones can allow internet to be accessed which also includes e-mails.
Broadband – this is a telecommunication that is a wide band of frequencies in where information is multiplexed and is sent on different frequencies allowing information to be transmitted in an amount of time.
Network operating system – this is operating system in a computer that is designed to support a personal computer that is connected to a local area network. An example of this is a Microsoft LAN manager. This is provides a printer sharing.
Network connection software - this is a software that is designed to set, manage or monitor computer networks; these are available to manage and monitor the network from home networks in the largest enterprise.
Access methods – this is a program that moves data between a computer and a device like a hard disk. This is also referred to the location of specific data, which is located in a larger unit of data like a

Related Documents

  • Improved Essays

    IPsec is often installed on today's IPv4 networks to protect communication over VPN networks. It is used to access VPN, as well as between VPNs. IPv6 transition mechanisms can use this kind of infrastructure to achieve a certain level of protection, even in the absence of IPv6 IPsec. Remote IPv4 hosts access private networks by establishing encrypted VPN access to a gateway device set up for this purpose. If the same host is capable of IPv6, it can break through an IPv6 tunnel over this IPv4-protected communication channel.…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Figure 3 demonstrates the 3 layers that make up the SDN structure. Lowest layer represents the Infrastructure Layer or Forwarding Plane, mainly focusing on data forwarding but it also takes care of monitoring local information and gathering statistics. Next layer represents the Control Layer or Control Plane which is responsible for programming and managing the Forwarding Plane. Control Plane makes use of the information gathered by the Forwarding Plane in order to define the route and operation of the network.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    So you have an old Dell PowerEdge 2900 Server laying around with a few hard drives and your thinking I would really like to use this equipment as a NAS drive. It could happen, in our case it did. There were some stumbling blocks on the way though. Here is how we got through them… The goals we wanted to accomplish were creating a RAID5 array of 8 (7+1 Hot Spare) 1TB hard drives and then wanted to connect this FreeNas volume through and iSCSI channel to a file server that will present the NAS as a shared folder all of our servers could use. We quickly found that using the factory PERC (PowerEdge RAID Controller) to create a RAID 5 Array was not going to work.…

    • 608 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    CS320 Assignment 1 Andrew McConnon 13349871 You want to connect different computers, at different locations, so that they can exchange data with each other. What are the different challenges that you need to overcome? Host Identification on small networks isn’t a problem as it can be set up with manual ways of addressing, but will be exponentially harder the larger a network becomes. Protocols, DHCP servers and addressing are a huge need if you want to create and sustain a large, expanding network.…

    • 399 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The application layer contains programs or processers that use transport layer protocols so that it delivers the data to the destination of the computers. The application layer has many protocols that programs use to communicate with the second layer which is called Transport layer. Some of the application layer protocols are: Simple mail transfer protocol (SMTP), File transfer protocol (FTP), Hypertext transfer protocol (HTTP) and Simple network management protocol (SNMP). Transport layer The second layer of TCP/IP protocol suite is the transport layer.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Use of multiple routers in interconnected networks: Exchanging information about destination addresses using a dynamic routing protocol. A router has different physical ways to operate network connections, such as: • Fibre optic • Copper cables • Wireless A router also contains several firmware for different networks’ protocol standards.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 1 Term Paper

    • 510 Words
    • 3 Pages

    The router takes information from the modem and moves it to the computer. You don’t need to have a router but they are very useful as they allow you to take data from multiple networks and then send that data to multiple computers therefore allowing more than one person to use the internet at the same time using the same connection. Web server: A web server is a computer that stores all the information needed to display a website. This will include things such as images, files, scripts and pages that make up the website. Once there is an access to the site the browser will get the data from the web server.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    This also helps to detect strange traffic running across the servers 3. Secure Workstations: Creating user log in set ups so that only the corresponding person can access the network from a work station help to prevent lower security level personnel from gaining access. 4. Secure the Network: Access level assignments…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1380 Words
    • 6 Pages

    First to connect to the internet you need an internet service provider to have access to the internet which is a router to connect to your home network to the ISP. It can be wired or wireless connected to your home network. The web browser is a program which allows me to browse web pages such as my sync email account. You need a domain name to identify the IP address to have access; they are used in URLs to find particular web pages. URL first part is named a protocol finder and indicates what protocol should be used, the last part is a resource name and it identifies the IP address of where the resource is placed.…

    • 1380 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Router to router 4. Pc to pc. Wi-Fi Technology This was used to connect the electronic devices used in the network using the 2.4-gigahertz.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Great Essays

    Introduction SkillQuest Services provides a wide variety of interesting and challenging activities all day for our participants. It is our mission to create and develop a variety of interesting and creative activities to meet socialization and therapeutic recreational needs of all our participants at every level. Technology is personalized learning also narrows the digital divide between students and promotes responsible use of today’s ever changing technologies. I. Acceptable use of iPads 1.0 Purpose: Providing participants at SkillQuest Services (SQS) with access to an iPad provides an opportunity to enhance each participant’s overall experience.…

    • 960 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    The Internet was originally called the ARPANET, and in order to enhance the ARPANET to be enable may different types of computer networks to all communicate with each other, an open source protocol needed to be created, hence the development of TCP/IP. TCP/IP improved communications throughout the network and allowed all computers to easily communicate with one another. Another technology that helped expand the ARPANET to more users in a specific location was the development of the Ethernet. Ethernet is a coaxial cable that is still used today in many local area networks. Ethernet is highly effective in moving data from one computer to another at high speeds.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays