Nt1310 Unit 3 Types Of Internet Architecture

Improved Essays
Internet architecture is basically a huge network of thousands of networks communicating using a common protocol. The Internet sends a transmission to a host computer that sends it on to another computer that is connected to the host computers network. If the receiving computer is not connected to the host computers network, the host computer sends it on to another computer that can then send it to the receiving computer. It is not unusual for the message to pass through several routers before it finally reaches its destination. The transmission of these messages from one computer to another is the Internet.
Telecommunications
networks form the
Internet when they are linked together to pass data back and forth in packets.
Each of these packets
…show more content…
These users can be employees, customers, or business partners, to name a few.
In order to protect the information on the extranet, authentication protocols are used, such as a user name and password that allows an individual user to access the information.

Network topology refers to the structure of the network that describes how the communication links and hardware devices are set up. Three different types of network topology include the star network, the bus network, and the mesh network. In a star network all of the network devices connect to each other through one single device called a hub node. A bus network connects through a common backbone that is a shared communication medium. In a mesh network, multiple access points link devices that communicate with each other and create a communication network that covers a large area.
There are several types of networks that include personal area network (PAN), local area network (LAN), metropolitan area network (MAN), and the wide area network (WAN). A personal area network is a computer network that is used for the transmission of data between devices like computers, phones, and digital assistants.
A local area network connects computers inside a limited area, for example, schools, homes,

Related Documents

  • Decent Essays

    Nt1330 Unit 7 Exercise 1

    • 556 Words
    • 3 Pages

    IP Transit, also known as Internet Transit, is what allows traffic from a network to cross or "transit" to a provider network. This type of service is generally used to connect one of the smaller internet service providers to the rest of the internet.…

    • 556 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    On the second stage of the communication cycle is the message coded , on this stage…

    • 491 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    IPv6 IPsec can be used for protection and control levels and data levels between two routers.…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The media access technique, the approach network access is controlled and collisions prevented, relies on the network topology instead of the network topology. To effectively troubleshoot communications issues, it's necessary to understand not solely the network topology of a network however conjointly the network topology, so you recognize what path the info packets take as they travel from one laptop to a different. to higher perceive current and future configuration, routing, security, DNS, workload, performance, and economic problems.…

    • 670 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The northbound API presents a network abstraction interface to the applications and management systems at the top of the SDN stack. The information from these applications is passed along through a southbound interface. The southbound interface allows a controller to define the behavior of switches at the bottom of the SDN "stack." Essentially, the northbound interface and southbound interface allow a particular network component to communicate with a higher- or lower-level network component, respectively…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Routers – These devices uses protocols such as ICMP (Internet Control Message) Protocols, using these protocols, routers will search and determine the best path between the two hosts to send data packets back and forth.…

    • 2216 Words
    • 9 Pages
    Improved Essays
  • Decent Essays

    Hackers use spoofed addresses toFool other computers and double cross them into thinking a message originated from a different machine.…

    • 102 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    It 340 Network Management

    • 519 Words
    • 3 Pages

    The telephone network and the Internet are both networks, they both send signals from end to end. The telephone network is circuit switched and the Internet is a mixture of several technologies. Both uses equipment’s to send and receive. Telephone uses telephone switches on the Central Office, while the Internet uses layer 3 and layer 2 switches, multiplexers, frame relay switches, routers, satellites and a couple of other stuff.…

    • 519 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    In this occupation, network architects interact with computers most of the time, but communication with peers, supervisors, and other subordinates is important as well. Many tools and software is used during work. Network architects work with a variety of computer servers, including file, domain name servers (DNS), backup, and high-end database servers. Use of access servers is also frequent, such as remote access and lightweight directory access protocol servers (LADP). Network architects spend much of their time planning, designing, and maintaining communication networks. That is why it is necessary to know how to properly use software. Switch/router, security, operating system enhancement, and network monitoring software…

    • 460 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    The first step in an effective DHCP infrastructure strategy is to ensure the right number of…

    • 1580 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    In order to optimize and upgrade the Leonard Cooper Network, I will have to understand and solve the current concerns of the stakeholders. The results from the interview conducted on four stakeholders indicate that: the existing network sometimes gets congested, collisions proliferate, and the network’s throughput slows down when the teachers report simultaneously on attendance and check emails. The existing bandwidth of the network is 10Mb and the fifty networked printers occasionally get all filled up. As such, the HVAC technician deems it convenient for wireless access points to be installed and all the 23 classrooms located in the new wing be added to the network. In addition, there are slow connections, especially…

    • 779 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Network protocols include Transfer Control Protocol / Internet Protocol (TCP/IP), Internetwork Packet exchange /Sequenced exchange (Novelle IPX/SPX), and IBM System Network Architecture (SNA).In the internet the most widely used protocol is TCP/IP stack which has become a…

    • 9803 Words
    • 40 Pages
    Great Essays
  • Improved Essays

    TCP – Using TCP a computer will send packets to a website and in return the…

    • 766 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    network. Another way is to have a red flag raised when information outside of the network…

    • 868 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Implications Of Bitcoin

    • 799 Words
    • 4 Pages

    now users maintain the network in every sense of the word by using a software compatible with your home computer.…

    • 799 Words
    • 4 Pages
    Improved Essays