Nt1310 Unit 3 Types Of Internet Architecture

Improved Essays
Internet architecture is basically a huge network of thousands of networks communicating using a common protocol. The Internet sends a transmission to a host computer that sends it on to another computer that is connected to the host computers network. If the receiving computer is not connected to the host computers network, the host computer sends it on to another computer that can then send it to the receiving computer. It is not unusual for the message to pass through several routers before it finally reaches its destination. The transmission of these messages from one computer to another is the Internet.
Telecommunications
networks form the
Internet when they are linked together to pass data back and forth in packets.
Each of these packets
…show more content…
These users can be employees, customers, or business partners, to name a few.
In order to protect the information on the extranet, authentication protocols are used, such as a user name and password that allows an individual user to access the information.

Network topology refers to the structure of the network that describes how the communication links and hardware devices are set up. Three different types of network topology include the star network, the bus network, and the mesh network. In a star network all of the network devices connect to each other through one single device called a hub node. A bus network connects through a common backbone that is a shared communication medium. In a mesh network, multiple access points link devices that communicate with each other and create a communication network that covers a large area.
There are several types of networks that include personal area network (PAN), local area network (LAN), metropolitan area network (MAN), and the wide area network (WAN). A personal area network is a computer network that is used for the transmission of data between devices like computers, phones, and digital assistants.
A local area network connects computers inside a limited area, for example, schools, homes,

Related Documents

  • Improved Essays

    Figure 3 demonstrates the 3 layers that make up the SDN structure. Lowest layer represents the Infrastructure Layer or Forwarding Plane, mainly focusing on data forwarding but it also takes care of monitoring local information and gathering statistics. Next layer represents the Control Layer or Control Plane which is responsible for programming and managing the Forwarding Plane. Control Plane makes use of the information gathered by the Forwarding Plane in order to define the route and operation of the network.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Use of multiple routers in interconnected networks: Exchanging information about destination addresses using a dynamic routing protocol. A router has different physical ways to operate network connections, such as: • Fibre optic • Copper cables • Wireless A router also contains several firmware for different networks’ protocol standards.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1380 Words
    • 6 Pages

    First to connect to the internet you need an internet service provider to have access to the internet which is a router to connect to your home network to the ISP. It can be wired or wireless connected to your home network. The web browser is a program which allows me to browse web pages such as my sync email account. You need a domain name to identify the IP address to have access; they are used in URLs to find particular web pages. URL first part is named a protocol finder and indicates what protocol should be used, the last part is a resource name and it identifies the IP address of where the resource is placed.…

    • 1380 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Ethernet Technology The Ethernet technology was mostly used in the LAN because; 1. We used Ethernet speed of 10mbps for areas in the LAN that required higher bandwidth 2. Our campus network model supports dual links between each distribution layer routers and case switches. We are there able to load balance the aggregate traffic from multiple access switches across the links.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    Michael Argyle theory is for one to one communication. Argyle theory was based on two people communicating with each other. When they are communicating they will be using the communication cycle, which they both will be sharing ideas where they both can understand each other. Michael Argyle has stated that the interpersonal communication is a skill where they can learn and develop in many ways such as learning how to drive a car. As Michael Argyle’s said as we are driving a car we can automatically change our mood while driving.…

    • 491 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    It 340 Network Management

    • 519 Words
    • 3 Pages

    The telephone network is circuit switched and the Internet is a mixture of several technologies. Both uses equipment’s to send and receive. Telephone uses telephone switches on the Central Office, while the Internet uses layer 3 and layer 2 switches, multiplexers, frame relay switches, routers, satellites and a couple of other stuff. Similarities - both use cables and fiber, both allow end-to-end transmission of data. Differences - telephone network uses…

    • 519 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Introduction Business users and applications rely on core infrastructure components to be available in order to effectively do the job for which they have been tasked. An internet protocol (IP) network is critical to business functions; however, obtaining an IP address is not enough. Client workstations should make use of the Dynamic Host Configuration Protocol (DHCP) for the dynamic assignment of addresses, as well as other name resolution components, such as DNS, and WINS. Active Directory is also essential in providing authorization, and authentication mechanisms for the people, and systems used throughout the network. DHCP Infrastructure Strategy…

    • 1580 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Stakeholder Concerns In order to optimize and upgrade the Leonard Cooper Network, I will have to understand and solve the current concerns of the stakeholders. The results from the interview conducted on four stakeholders indicate that: the existing network sometimes gets congested, collisions proliferate, and the network’s throughput slows down when the teachers report simultaneously on attendance and check emails. The existing bandwidth of the network is 10Mb and the fifty networked printers occasionally get all filled up. As such, the HVAC technician deems it convenient for wireless access points to be installed and all the 23 classrooms located in the new wing be added to the network.…

    • 779 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Workplace Environment In this occupation, network architects interact with computers most of the time, but communication with peers, supervisors, and other subordinates is important as well. Many tools and software is used during work. Network architects work with a variety of computer servers, including file, domain name servers (DNS), backup, and high-end database servers. Use of access servers is also frequent, such as remote access and lightweight directory access protocol servers (LADP).…

    • 460 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Introduction There are several types of crimes committed on a daily basis. Whether it is Robbery, Murder, Grand Theft and the list goes on. As of 2005, in over 7,000 (seven thousand) businesses, 67% were detected to at least have one cybercrime committed. Out of that 67%, 60% had more than one cybercrime committed. (Bureau of Justice Statistics, 2010)…

    • 868 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    This initially started with the introduction of the Packing Switch Theory. This involved packets of data, where each packet of data had information regarding both the origin and the destination of the info. Electronic messages were broken down into packets and was sent through a communications packet-switching network, like the internet. Another technology that aided the growth of the Internet and the WWW was Computer Networking. A computer networking is a decentralized network of computers that could communicate with one another.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Implications Of Bitcoin

    • 799 Words
    • 4 Pages

    Let’s save the world through the internet for the first time in the history of humanity, we can use smart, programmable and decentralized money. this has seismic implications. forcing transparency to governments, disrupting bank monopolies, democratise the stock market, and dramatically reduce the cost of sending money. today more than 6 billion people are excluded from the most basic financial services, they don 't have credit, medical insurance or access in the internet economy. however we can solve that.…

    • 799 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    1. (5 points) Compare and contrast the three types of addresses used in a network. Application layer – A port is assigned to an application for direct routing of incoming and or outgoing data. Network layer – IP addresses are assigned to each individual computer.…

    • 766 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays