Nt1310 Unit 7

Great Essays
1. What provides the physical connection between workstations on the network? The cables/wires and network interface card (NIC) provide the physical connection between work stations on the network.

2. What directs the flow of data over the network? A switch/hub/router directs the flow of data over the network.

3. What are the three functions of network software?
The three functions of the network software are:
To make sure that the information is addressed properly.
To organise information into packets (a series of messages that a file is broken down into) on the sending workstation and putting the packets back to make a file on the receiving workstation.
To check that each packet reaches the designated workstation.
4. What are the
…show more content…
The token in a token ring network is used to prevent collision as no device can transmit data without the token. When the token is available to the workstation, it attaches the data to the token and the token then carries the data to its designated location.

14. How do workstations know that a message can be sent in a token ring network?
When the sending device removes the message from the token, it changes the signal to indicate that the token is available and then sends the token along the network. Through this message, the workstations know that a message can now be sent.

15. How does a network card determine that a message is meant for a particular device?
Each packet of data that is sent, contains the unique IP address of the workstation that the data is meant for. The network card identifies the workstation using the IP address and sends the packet to the designated computeréworkstation.

16. After a message has been read, what happens to the token and the message? After a message has been read, the receiving workstation removes the message from the token and then it sends a signal along the network that the token is available. After this message has been sent, the token is sent along the

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Case Study

    • 1143 Words
    • 5 Pages

    I would install the Star topology which is the most common type of network topology that is used in offices. Star topology is the best since each node is connected by more than one link basically two connection to reach a node. The speed of most star configurations is hundred megabits of data per second with gigabit hub or switches and NIC cards speeds can be at one thousand megabits per second. In a star topology is possible to have all the important data back ups on the hub in a private folder so if the computers fails, the employees can still use the data using the next computer in the network and accessing the backup files on the hub. If the hub adds a device like a printer all the other computers on the network can access the new device by simple accessing the hub.…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Part B: VoIP Computer-to-Computer Voice over Internet Protocol (VoIP) is the process of taking analog signals, such as a human voice, and transmitting them over the Internet as digital data. Computer-to-computer VoIP is usually thought of as the simplest way to use VoIP, as it simply requires a computer with basic peripherals, an internet connection and can easily be used with popular software such as Skype. What devices are involved from transferring Alice’s voice to the sound that Bob receives?…

    • 513 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The protocols that are used are TCP and UDP. The data link layer is responsible for encapsulation of packets into frames and then transferring them to the physical layer. It is also responsible for flow control and addressing. 5. A three-way handshake is when two parties need to synchronize their segment sequence numbers used during their transmission.…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Figure 3 demonstrates the 3 layers that make up the SDN structure. Lowest layer represents the Infrastructure Layer or Forwarding Plane, mainly focusing on data forwarding but it also takes care of monitoring local information and gathering statistics. Next layer represents the Control Layer or Control Plane which is responsible for programming and managing the Forwarding Plane. Control Plane makes use of the information gathered by the Forwarding Plane in order to define the route and operation of the network.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    CS320 Assignment 1 Andrew McConnon 13349871 You want to connect different computers, at different locations, so that they can exchange data with each other. What are the different challenges that you need to overcome? Host Identification on small networks isn’t a problem as it can be set up with manual ways of addressing, but will be exponentially harder the larger a network becomes. Protocols, DHCP servers and addressing are a huge need if you want to create and sustain a large, expanding network.…

    • 399 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change. When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices. The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    After this, a data packet is typically forwarded, to reach its destination node. Then, it directs the packet to the next station (network) on its journey by using information in its routing table/routing policy. This creates an overlay internetwork.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 1 Term Paper

    • 510 Words
    • 3 Pages

    The router takes information from the modem and moves it to the computer. You don’t need to have a router but they are very useful as they allow you to take data from multiple networks and then send that data to multiple computers therefore allowing more than one person to use the internet at the same time using the same connection. Web server: A web server is a computer that stores all the information needed to display a website. This will include things such as images, files, scripts and pages that make up the website. Once there is an access to the site the browser will get the data from the web server.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    This also helps to detect strange traffic running across the servers 3. Secure Workstations: Creating user log in set ups so that only the corresponding person can access the network from a work station help to prevent lower security level personnel from gaining access. 4. Secure the Network: Access level assignments…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Ethernet Technology The Ethernet technology was mostly used in the LAN because; 1. We used Ethernet speed of 10mbps for areas in the LAN that required higher bandwidth 2. Our campus network model supports dual links between each distribution layer routers and case switches. We are there able to load balance the aggregate traffic from multiple access switches across the links.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Morse Code Research Paper

    • 472 Words
    • 2 Pages

    Morse Code There are many different ways to communicate. Hundreds of years ago, if you wanted to communicate long distance, a message would be written and delivered by a carrier. It wasn’t until a tragedy entered a great painters life that he turned from painting to becoming a great inventor.…

    • 472 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays