Unit 1 P1 Research Paper

Improved Essays
Task 1 ( P1)
Explain how networks communicate.
Wired: Used to transfer information over networks some include twisted pair cables, coaxial cables and telephone lines.
Wireless: Are used when it is impossible or difficult to install wires or cables it is sends communication signal via microwaves, satellite, infrared signals and so on.
Physical Layouts:
Ring: Each computer is connected to two other forming a single continuous pathway for signals.
Star: Consists of a central switch, hub or computer which acts like a conduit to transmit messages.
Line: Data is sent to all nodes on the network at the same time. Devices are positioned along a line.
Tree: Is a combination of bus and star topology the central cable are linked to a bus.
Mesh: Is a
…show more content…
TCP/IP Model - TCP and IP stand for Transmission Control Protocol and Internet Protocol this network model has only four layers these are the application layer, the transport layer, the internet layer and the network access layer.
These two protocols are used on the internet all the time for transporting data to allow communication to others on the internet and so on with TCP/IP instead of having separate layers for the presentation layer and the session layer instead it is combined into the application layer this model also is a simpler model due to the fact that it has less layers than OSI.
TCP/IP is quite dependant on protocols and the services, interface and protocols are not as clearly separated compared to OSI this model is also kind of the implementation of the OSI and the network layer only provides connectionless services.
Protocols:
Bluetooth – Allows short ranged interconnections through the use of electronic devices like mobiles and computers.
Wi-Fi – Allows devices to gain access to the internet wirelessly.
IrDA -
Cellular radio -
GSM/UMTS -
WAP -
WML

Related Documents

  • Improved Essays

    The protocols that are used are TCP and UDP. The data link layer is responsible for encapsulation of packets into frames and then transferring them to the physical layer. It is also responsible for flow control and addressing. 5. A three-way handshake is when two parties need to synchronize their segment sequence numbers used during their transmission.…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    It is composed of software controllers that communicate with the forwarding network fundamentals through standard interfaces, referred also as the South Bound Interface. The last layer is called Application Layer which takes care of…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    CS320 Assignment 1 Andrew McConnon 13349871 You want to connect different computers, at different locations, so that they can exchange data with each other. What are the different challenges that you need to overcome? Host Identification on small networks isn’t a problem as it can be set up with manual ways of addressing, but will be exponentially harder the larger a network becomes. Protocols, DHCP servers and addressing are a huge need if you want to create and sustain a large, expanding network.…

    • 399 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    We must be to create a custom network as appropriate with our thesis such as star topology or random topology or simple topology [35], by using the python script to make the network and must be to create topology like in chapter four to compare the result and throughput with other paper. 2.9.3 Design algorithm We need to get the best result and best throughput…

    • 464 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    802.7 IEEE 802.7 is a sub-standard of the IEEE 802 which covers broadband local area networks with a coaxial cable. This standard was developed for cable internet companies. e. 802.11 (a, b, g, n) – Wireless Network Standards 802.11 is the collection of standards setup for wireless networking. They include four different standards including; 802.11a, 802.b, 802.11g and the most recent standard 802.11n. Each standard uses a frequency to connect to the network and has a defined upper limit for data transfer speeds.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Internet Connectivity – Wide range of Internet connectivity should be considered based on the size of the company. Wired and Wireless connections should be arranged with high frequency range. Network…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    3.2 Simulator Various methods available to measure the performance of data communication protocols involving live network tests, hardware emulation, test-beds and mathematical models. Software simulation, since, is usually a time effective and cost efficient method. Researchers around the globe are utilizing software simulation tools because it offers a controlled atmosphere within which any network model performance can be measured easily and efficiently. Nowadays, the popularity of the available network simulators and specifically that of Ad Hoc networks varies from one simulator to another.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    THE DEFERENCES OF HANDLING SOCKET AND SERVERSOCKET First of all what is a socket? A socket is the one end –point of two-way communication link between two programs running over the network. This means the programs run on different computers, usually referred as the local and the remote computer.…

    • 1130 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The following are the top 10 types of packets: IPv4: Internet Protocol version 4 (IPv4) is the standard version of the internet protocol, that acts as the platform for standard internet protocols and existing internet models (ISP). Extensive use of this protocol led to exhaustion of IP addresses. Therefore, we are bound to use IPv6, in the near future. A feature called as sub-netting is used for IP address allocation. It is defined in RFC 791.…

    • 917 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    After this, a data packet is typically forwarded, to reach its destination node. Then, it directs the packet to the next station (network) on its journey by using information in its routing table/routing policy. This creates an overlay internetwork.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Answer the following questions in your own words , in no more than 4 sentences each. QUES- Discuss the case when the load is low or high in a Bit Map Protocol. What will be the wait slot for a low numbered station and high numbered station? ANS - Under conditions of low load, the bit map will simply be repeated over and over, for lack of data frames.…

    • 523 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Switch to PC or server 3. Hub to PC or server. Cross-over technology was used to connect these devices 1. Switch to hub 2. Hub to hub 3.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    The Internet was originally called the ARPANET, and in order to enhance the ARPANET to be enable may different types of computer networks to all communicate with each other, an open source protocol needed to be created, hence the development of TCP/IP. TCP/IP improved communications throughout the network and allowed all computers to easily communicate with one another. Another technology that helped expand the ARPANET to more users in a specific location was the development of the Ethernet. Ethernet is a coaxial cable that is still used today in many local area networks. Ethernet is highly effective in moving data from one computer to another at high speeds.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In this design methodology two types of connections are defined:- 1. Channel:- if two cells being interconnected lie in the same row then space used for interconnecting is called channel. 2. Feed through :-if cells which are to be interconnected lie in different rows then space used for interconnecting is called feedthrough.…

    • 1052 Words
    • 5 Pages
    Improved Essays