Nt1310 Unit 3 Network Analysis

Improved Essays
Task 1
List the classification of network in detail according to the area covered. Also explain each classification of network in detail with its application.

LAN – (Local Area Network)
A LAN is a network that covers a relatively small area. It is a network that mostly links computers within a single building. Schools, colleges and office buildings would all use a LAN to interconnect their computer systems. They typically range from 1 – 10km. They are able to transmit data much faster than what can be transmitted over a phone line usually around 100kbps – 100mbps, they are cheap to set up compared to the other networks needing a switch and a hub.

MAN – (Metropolitan Area Network)
A MAN is similar to a LAN but able to cover an entire city.
…show more content…
Their range would be well beyond 100km. Devices connected to a WAN are normally connected through the telephone system. They can be connected via satellite or leased lines as well. The equipment needed for these networks range from microwave to infrared laser this makes WANs very expensive.

Task 2
Describe in detail the OSI model and its each layers responsibility in detail for networking.

Application – The application layer is used to enable the user to access the network. This is the only layer in the OSI model that directly interacts with the end user. This layer enables the user to surf the web or transfer files. It also has responsibilities such as data flow, error handling and recovery.

Presentation – The presentation layer is used to present the data to the application layer, it also is used for data encryption, translation and data compressing. Provides syntax (frame and format) and semantics (protocols) for communication between layers.

Session – This layer is able to establish and terminate sessions between computers, it also is used to synchronize data between different sources. This layer supports half and full duplex operations and creates procedure for restart and
…show more content…
OSI provides layer functioning and defines the functions of each layer whereas TCP/IP is based on protocols and these protocols are not flexible with other layers. The transportation layer within OSI guarantees the delivery of its packets however TCP/IP does not. The network layer of the OSI provides both connection orientated and a connectionless functionality, TCP/IP can only provide connectionless. Protocols are hidden within OSI and this makes them easily replaceable as new technology comes about in TCP/IP replacing the protocols is not easy causing a lot of trouble when the technology

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Case Study

    • 1143 Words
    • 5 Pages

    I would install the Star topology which is the most common type of network topology that is used in offices. Star topology is the best since each node is connected by more than one link basically two connection to reach a node. The speed of most star configurations is hundred megabits of data per second with gigabit hub or switches and NIC cards speeds can be at one thousand megabits per second. In a star topology is possible to have all the important data back ups on the hub in a private folder so if the computers fails, the employees can still use the data using the next computer in the network and accessing the backup files on the hub. If the hub adds a device like a printer all the other computers on the network can access the new device by simple accessing the hub.…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The protocols that are used are TCP and UDP. The data link layer is responsible for encapsulation of packets into frames and then transferring them to the physical layer. It is also responsible for flow control and addressing. 5. A three-way handshake is when two parties need to synchronize their segment sequence numbers used during their transmission.…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    - LAN networking is used in Clustered system, in Multiprocessor system LAN etc. is not required. - The aim is high availability in clustered system whereas in multiprocessing it is time saving. - The processors share same system clock and common data structures. 7.…

    • 681 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    So you have an old Dell PowerEdge 2900 Server laying around with a few hard drives and your thinking I would really like to use this equipment as a NAS drive. It could happen, in our case it did. There were some stumbling blocks on the way though. Here is how we got through them… The goals we wanted to accomplish were creating a RAID5 array of 8 (7+1 Hot Spare) 1TB hard drives and then wanted to connect this FreeNas volume through and iSCSI channel to a file server that will present the NAS as a shared folder all of our servers could use. We quickly found that using the factory PERC (PowerEdge RAID Controller) to create a RAID 5 Array was not going to work.…

    • 608 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    This protocol is classified into rounds; every round composed of two phases; Set-up Phase (1) Advertisement Phase (2) Cluster Set-up Phase Steady Phase (1) Schedule Creation (2) Data Transmission A. Setup Phase: Every node selects independent of other nodes if it will become a CH or not. This selection takes into consideration when the node behaved as a CH for the last time. In the advertisement phase, the CHs inform their neighboring node with an advertisement packet that they become CHs. Non-CH nodes take the advertisement packet with the strongest obtained signal strength.…

    • 547 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    CS320 Assignment 1 Andrew McConnon 13349871 You want to connect different computers, at different locations, so that they can exchange data with each other. What are the different challenges that you need to overcome? Host Identification on small networks isn’t a problem as it can be set up with manual ways of addressing, but will be exponentially harder the larger a network becomes. Protocols, DHCP servers and addressing are a huge need if you want to create and sustain a large, expanding network.…

    • 399 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 2 Assignment

    • 505 Words
    • 3 Pages

    The assignment during the third week was to find the information that would entail the usage of the two definable word with, which came as an abstraction and encapsulation in reference to the design methods of object oriented programming. The example that would come to mind is the design of one or more of the software application used during the past few weeks within the online lecture class and the usage of hiding information by design. The design of any program can be the structure of the application and it does only what its attribute’s and behavior entail it to do, forgetting what other purposes the application has in mind for operation. The information that would best describe the usage comes as the control flow of the design on the programming that have been implemented so far in the published manual areas during the past week. This is encompassed by the design of the statement in the functionality of the program setting of the statements, functions and the way the program is executed for operations.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    It operates in the 2.4GHz band and supports up to 11 Mbps. The range goes up to around several hundred feet in theory. It was the first real consumer option for wireless and very popular. 802.11g – Similar to 802.11b, it operates in the 2.4GHz band and therefore meaning it is compatible with the 802.11b equipment. It can also achieve a maximum of 54 Mbps.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Internet Connectivity – Wide range of Internet connectivity should be considered based on the size of the company. Wired and Wireless connections should be arranged with high frequency range. Network…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 4 Paper

    • 551 Words
    • 3 Pages

    In T8.1, services and their corresponding user communicate with each other by passing data in a well-defined, shared format, or by coordinating an activity between two or more services. The services are located in a central service pool and can use a so-called Service Bus (often Enterprise Service Bus or ESB), should be shared in parallel by different application systems and beyond, combined by a service composition to arbitrarily complex complete systems. This, also called orchestration combination of various distributed services from many different administrative domains is an essential feature of a service-oriented architecture. A Service bus is used to provide communication between all services and any user, User sends request to the service…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Use of multiple routers in interconnected networks: Exchanging information about destination addresses using a dynamic routing protocol. A router has different physical ways to operate network connections, such as: • Fibre optic • Copper cables • Wireless A router also contains several firmware for different networks’ protocol standards.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Internet was originally called the ARPANET, and in order to enhance the ARPANET to be enable may different types of computer networks to all communicate with each other, an open source protocol needed to be created, hence the development of TCP/IP. TCP/IP improved communications throughout the network and allowed all computers to easily communicate with one another. Another technology that helped expand the ARPANET to more users in a specific location was the development of the Ethernet. Ethernet is a coaxial cable that is still used today in many local area networks. Ethernet is highly effective in moving data from one computer to another at high speeds.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays