Pm3110 Unit 4 Test Paper

Great Essays
1. What are the four generic architectural components of a public communications network? Define each term?
The Generic architectural Components are Subscribers, Subscriber Line, Exchanges and Trunks.
Subscribers: The gadgets that connect to the system, for example, phones and modems.
Subscriber Line: The link between the subscriber and the network.
Exchanges: The exchanging focuses in the system.
Trunks: The branches between trades. Trunks convey numerous voice-recurrence circuits utilizing either FDM or synchronous TDM.
2. Explain the difference between datagram and virtual circuit operation?
In the data gram approach, every packet is dealt with freely, with no reference to Packets that have gone some time recently. In the virtual circuit approach, a pre-arranged course is set up prior to any packets are sent. When the course is set up, every one of the packets
…show more content…
Briefly explain ATM, VCC, and VPC.
ATM: An Asynchronous Transfer Mode (ATM) Pseudo wire (PW) is utilized to convey ATM cells over a MPLS system. This empowers administration suppliers to offer "imitated" ATM administrations over existing MPLS systems.
VCC: The data transmission of a virtual way is coherently isolated into particular virtual channels utilizing a virtual divert identifier in the ATM header. Not at all like virtual ways, have virtual channels shared the data transmission inside of a virtual way powerfully.
VPC: The data transmission of the transmission way is consistently isolated into discrete virtual ways what's more, recognized utilizing the VPI as a part of the ATM header. Each virtual way is dispensed an altered measure of transfer speed. Virtual ways don't powerfully change their data transfer capacities past what has been assigned.
4. What are the three layers of IEEE 802 reference models? What are their major functions?
The layers of IEEE 802 Reference Models are 1. LLC Sublayer (logical link control) 2. MAC Sublayer (Media Access Control) 3. Physical layer.

Related Documents

  • Improved Essays

    Nt1310 Unit 4 Test Paper

    • 419 Words
    • 2 Pages

    1. Maintains an exact replica of one disk on another offering 100% fault tolerance. 2. Data redundancy - If one disk fails, data can be recovered from the other. 3.…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Part B: VoIP Computer-to-Computer Voice over Internet Protocol (VoIP) is the process of taking analog signals, such as a human voice, and transmitting them over the Internet as digital data. Computer-to-computer VoIP is usually thought of as the simplest way to use VoIP, as it simply requires a computer with basic peripherals, an internet connection and can easily be used with popular software such as Skype. What devices are involved from transferring Alice’s voice to the sound that Bob receives?…

    • 513 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    However, it was soon realized that the 60 GHz standard is not likely to be an evolutionary move and, therefore, a parallel standardization effort in the 5 GHz band was started to address this intention. As a result, two 802.11 standards , known as 802.11ac and 802.11ad, that address physical layer upgrades exist. However, 802.11ac & 802.11ad is now accepted as the evolutionary upgrade from 802.11n. 3.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 5 Test Paper

    • 597 Words
    • 3 Pages

    Student Name: Caroline machinjili THIRD YEAR DEGREE IN COMPUTING AT CCT DUBLIN SUBJECT: ADVANCED SWITHCING AND ROUTING PORTFAST AND ETHERCHANNEL October 2015 PORTFAST in my network I have setup portfast on all the 18 access switches connected to the workstations and also on the core switches connected to the servers. on both switches I have used ports fa0/1 to fa0/2. portfast on these ports will reduce the time the devices spend to connect to other devices on the network since these ports will not go through the spanning tree process of blocking, listening , learning and then forwarding which cause a delay of about 45 -50 seconds instead the ports will go straight to forwarding stage there by speeding up communication between devices in a network. for example in a company that have servers which provide services to clients. I have observed this process in my network and I will strongly recommend for the use of portfast.…

    • 597 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    This specifies the general interface between the network layer (IP etc.) and the Data Link layer (Ethernet, Token Ring etc.) It’s the standard for the upper Data Link layer sublayer, also known as the Logical Link Control layer. It’s responsible for flow and error control. The Data Link layer wants to send some data over the network, 802.2 LLC helps make this possible. b. 802.3 – Ethernet 802.3 is the standard which Ethernet operates by.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Internet Connectivity – Wide range of Internet connectivity should be considered based on the size of the company. Wired and Wireless connections should be arranged with high frequency range. Network…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    3.2.2 GloMo Sim GloMoSim is a scalable simulation atmosphere for wired and wireless network systems, formulated by PCL (Parallel Calculation Laboratory) of UCLA ( the University of California in Los Angeles). It utilizes Parallel Simulation atmosphere for Complex System (PARSEC) that is a C-based simulation language for parallel and sequential execution of Discrete event simulation model. Glomosim Supports protocol for a purely wireless network. Advantages:- Network model scalability can be increased up to thousands of nodes.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 4 Paper

    • 551 Words
    • 3 Pages

    In T8.1, services and their corresponding user communicate with each other by passing data in a well-defined, shared format, or by coordinating an activity between two or more services. The services are located in a central service pool and can use a so-called Service Bus (often Enterprise Service Bus or ESB), should be shared in parallel by different application systems and beyond, combined by a service composition to arbitrarily complex complete systems. This, also called orchestration combination of various distributed services from many different administrative domains is an essential feature of a service-oriented architecture. A Service bus is used to provide communication between all services and any user, User sends request to the service…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Use of multiple routers in interconnected networks: Exchanging information about destination addresses using a dynamic routing protocol. A router has different physical ways to operate network connections, such as: • Fibre optic • Copper cables • Wireless A router also contains several firmware for different networks’ protocol standards.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Abstract: With a specific end goal to outline and fabricate the secured network system, numerous elements must be thought seriously about, for example, the topology and position of hosts inside of the system, the determination of equipment and programming innovations, what's more, the cautious arrangement of every part. My paper will be an examination of the issues percentage in outlining a safe Local Area Network (LAN) and a best's portion practices proposed by security specialists. I will examine securing a LAN from network's perspective. [1] Introduction: With most complex innovations, there's not one size-fits-all arrangement regarding the matter of network administration. The needs and assets of every one of a kind association will relate…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Router to router 4. Pc to pc. Wi-Fi Technology This was used to connect the electronic devices used in the network using the 2.4-gigahertz.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Core Credit Union Case

    • 1381 Words
    • 6 Pages

    Discussion Points 1. To what extent are CORE Credit Union’s networks as converged? Identify and briefly describe additional network convergence opportunities. A1. The Core Credit Union initially used traditional methods of financial transactions.…

    • 1381 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Importance Of MIS

    • 969 Words
    • 4 Pages

    Q3: How can you use the five-component model? The five components of an information system: 1. Hardware runs and makes up the computer system; 2.…

    • 969 Words
    • 4 Pages
    Improved Essays