Preview

Nt1210 Network Essay

Good Essays
Open Document
Open Document
618 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1210 Network Essay
1. A LAN or local area network is a group of computers all located in the same area that are usually connected via some means. (Wireless or wired).
2. 3 types of servers are FTP, web, and application server. A file transfer protocol server is used to secure transfer files between 2 computers while providing ease of use (transfer protocols). A web server serves content to the web browser and allows the content to be displayed on user web browsers, all done with the aid of http. Lastly, an application server hold a lot of data that connect to the both the user and a database usually to access data, update data or remove data.
3. The basic components of wired LAN consist of clients, servers, NICs, network cables, hubs/switches and software. The way it works is that the Ethernet being used is either Hub-based or switched based. Generally, every computer is connected to one another through wires. It must not be directly connected as the message can be resent through another computer that the message wasn’t intend for or through a switch sending it to the correct location.

10. Both logical and physical topology show how the network layout looks. With logical you see it theoretically and with physical is shows how exactly the network is really installed.
11. CSMA/ CD is carrier sense
…show more content…
Cut through, store and forward, and fragment free switching are all forms of switching modes. With cut-through it is quicker but wastes capacity as it retransmits frames as soon as the destination address is read; it does not wait to receive the entire packet. Store and forward is a much more effective method as it has few errors because it retransmits the frames once the entire frame is received and then does an error check but it is thus slower. Lastly, the fragment free switching is a middle ground between the two latter. It retransmits the frames after the first 64 bytes (which consist of the header) is received and has no errors. It is in between the two latter in

You May Also Find These Documents Helpful

  • Good Essays

    2. Which switching method describes a switch that transfers a frame as soon as the destination MAC address is read?…

    • 966 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Each and every packet has a VCI (virtual circuit identifier) in the data transfer phase, the VCI is used by the frame across the two switches and is a small number containing a switch scope only.…

    • 573 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    The LAN (Local Area Network) is used so much because it is used in small areas. Small businesses use LANs a great deal because they are small and they wouldnt need a WAN or a MAN because there business is usually ran out of one or maybe two buildings. You will usually find LANs in buildings, schools, and even in homes at times. Some buildings even have multiple LAN 's in them for certain purposes.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Essay

    • 437 Words
    • 2 Pages

    Case - A case is a sort of chassis for the internals of a computer and acts as a kind of protection from dust etc. It is also more appealing to look at rather than the internals of the computer.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Next, a physical network diagram is a diagram of the way computers are connected and placed across the network. This diagram might also include some basic addressing and the host names of the computers present on the network, making it easy to look at your network at a glance. Similar to the physical network diagram, the logical network diagram displays the layout and configuration of your network devices on an addressing level. This means that it shows their IP addresses, subnets, and other configuration details, like DNS servers, Gateways, and more. This can be extremely useful in the event of a misconfiguration, or a computer not communicating properly on the network. The configuration documentation details the configurations for all of the network’s critical systems. This will give the network administrators a backup in the event that a device crashes and the configuration is lost. Next, the regulations on the network are pretty self-explanatory. These are the guidelines that are the dos and don’ts of the workplace, keeping networks…

    • 518 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Wireless LAN - A wireless local area network links two or more devices using a wireless connection.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 3 Essay

    • 604 Words
    • 3 Pages

    I believe that the importance of correct programming and setting up of part is very important in today’s CNC manufacturing world as you are producing very precise components that need to be produced first time, every time or this is bad news for the company because of loss profits, scrap material and expensive repair costs. So ensuring correct programming and setting up of CNC machines is critical.…

    • 604 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 4 Essay

    • 1197 Words
    • 5 Pages

    Complete the necessary documentation relating to customer problems and solutions Unit 2.4Describe the types of information customers require in Resort Unit 2 2.1…

    • 1197 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Nt1330 Unit 1 Essay

    • 601 Words
    • 3 Pages

    The number one web based attack of 2009 was Malicious PDF activity 49% of web based attacks--attempts to deliver malicious pdf content to victims through the web. The pdf attack is designed to exploit arbitrary vulnerabilities in applications that are able to process pdf’s. A successful pdf attack could compromise the integrity and security of affected computers. (Symantec Corporation, 2009)…

    • 601 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    Vulnerability is a weakness or a fault within the system, such as software package flaws, unlocked doors, or an unprotected system port. Vulnerability leaves things open to an attack or damage. Exposure on the other hand, is a single instance when the system is open to damage. Vulnerabilities (weaknesses) can in turn be the cause of exposure (system open for attack).…

    • 764 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 4 Essay

    • 364 Words
    • 2 Pages

    How will I use the concepts and principles from Experience 1 to improve work results?…

    • 364 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Application Layer: Principles of Network Applications – The Web and HTTP – FTP – Electronic…

    • 25392 Words
    • 102 Pages
    Good Essays
  • Powerful Essays

    * Logical network refers a group of devices that associated by the arrangement of a hierarchical addressing scheme.…

    • 1742 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Technology in the Office

    • 2154 Words
    • 9 Pages

    groups on a much larger scale. The purpose of such a network is simple; it brings…

    • 2154 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Ftp File Transfer Protocol

    • 1199 Words
    • 5 Pages

    File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet.…

    • 1199 Words
    • 5 Pages
    Better Essays