StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Network technologies and system administration - Assignment Example

Cite this document
Summary
For the transmission of the signal copper wires are being in utilization for many years however, as the technology regarding the transmission media developed, wireless technologies got the importance as wireless technologies require less management and lack the burden of wires…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
Network technologies and system administration
Read Text Preview

Extract of sample "Network technologies and system administration"

Download file to see previous pages

Transmission media is very important in the transmission of signals. For the transmission of the signal copper wires are being in utilization for many years however, as the technology regarding the transmission media developed, wireless technologies got the importance as wireless technologies require less management and lack the burden of wires. In a wired transmission system, digital signals are utilized in the transmission, where various voltage levels are considered to be binary zero and binary one (Omega.com, np). The signal is then transmitted to the copper wire as the voltage signals and a reference voltage is also transmitted.

At the other side the transmitted signal is received and the reference voltage signal is created and thus the wired transmission and reception system works. In wired communication twisted pair, coaxial cable and optic fiber cables are utilized. However, optic fiber cable does not come in the category of copper wire and signal is transmitted in the form of light. The major problem that arises in the transmission of signal through the wired medium is that the copper wires are much influenced by the electromagnetic energy and thus a distorted signal is received due to the interference of the electromagnetic radiations.

These electromagnetic radiations are produced by the electrical appliances and transmission lines near the signal wire. This type of problem is more in twisted pair cable as compared to the coaxial cable. However, the twists in the cable help minimize the interference. Another problem with the wired transmission is the difficulty in the management and detection of problem (Polenin, np). There is a need to replace the whole cable if a little defect in the cable arises like small cuts, etc. In order to eliminate the problems of the electromagnetic interference, a pair cable is twisted to reduce the interference.

Boosters are utilized at after some fair distances to recover the distorted signals to the original signals. Boosters also amplify the signals to the desired amplification. In the coaxial cable, metal shielding prevents the loss of the signal and avoids electromagnetic interference. However, the outer insulation is such made to prevent environmental damage and the preventions against cuts, etc. Ethernet is a part of computer networking technology for local area network which is commercially started in 1980.

It is consisted of IEE 802.3, LAN technology. In the OSI orientation arrangement, Ethernet is at the data link layer. Ethernet distributes a flow of information through packets which, are known as frames. Each frame consists of source and destination dresses and error checking data so that damaged data can be easily identified and rebroadcasted (Pidgeon, np). As we have discussed data packet on the wire is known as a frame. A frame initiates with the preamble and start frame delimiter. First advantage is that it is conceptually it is simple like it has coax cable and T adapters and no hubs, transceivers and other devices.

It is less price device. There is a high level of noise immunity. Disadvantages are Ethernet is difficult to change. Its configurations are not edited easily. If any device or cable section fails, is demolishes the entire network. Ethernet frame is also called as Ethernet link. In the frame structure, octets are distributed to make the Ethernet do its job in a right way. For example, the frame allocated seven octets to the Preamble from 10101010, preamble have the responsibility to synchronize clocks or receiver and sender.

For addresses, all adapters receive the frame on LAN at 6 byte. The frame structure type is utilized to identify the higher layer protocol. At receiver, frame is checked for error, if there is any errors present the frame dropped. The MAC Destination takes about 6 octets, MAC source takes about 6 octets, payload takes octets from the rage of 45 to 1500 and inter-frame gap takes about 12 octets. An

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network technologies and system administration Assignment”, n.d.)
Network technologies and system administration Assignment. Retrieved from https://studentshare.org/information-technology/1451528-network-technologies-and-system-administration
(Network Technologies and System Administration Assignment)
Network Technologies and System Administration Assignment. https://studentshare.org/information-technology/1451528-network-technologies-and-system-administration.
“Network Technologies and System Administration Assignment”, n.d. https://studentshare.org/information-technology/1451528-network-technologies-and-system-administration.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network technologies and system administration

Network Security

However, security has become a complex assignment for current network administration.... Professor Name ID # Date Network Security Introduction During the last few decades several technologies have been emerged throughout the whole globe and networking technology is certainly the most amazing achievement in this era.... Normally, attackers enter into a network by making use of different tools and technologies.... However these technologies as well have introduced some of the severe safety as well as confidentiality problems....
13 Pages (3250 words) Research Paper

Big Switch Network Design

The 'VLAN trunking protocol' will significantly reduce administration for the switched network.... This report "Big Switch network Design" discusses network design for Bigswitch SME.... The primary objective for the newly designed network is to minimize or prevent MAC layer attacks, Virtual LAN attacks, Spoofing attacks, securing network switches, and configuring Virtual LAN across the network....
9 Pages (2250 words) Report

Why do we distinguish between network administration and systems administration

The field of system administration is a broad term used to define the roles and responsibilities of the person who maintains and operate the IT infrastructure of the company as a whole.... hellip; The basic idea is to have a diversified IT department. In case of a large company, the different roles of such a department would comprise of a proper system administrator, network administrator, database administrator and in many cases a separate person as the head of the department (Frisch, 2001) or IT manager/director....
3 Pages (750 words) Essay

Novell's Approach to Network Operating Systems

"Microsoft has traditionally misunderstood the importance of certain middleware technologies and how important it is for them to be cross-platform in nature," says Tom Bishop.... As a result, Novell's NDS can be implemented on various operating systems but do not help to promote Novell's operating system Novell Netware, while software products of Microsoft run only in Microsoft Windows environment.... Distinguishing feature of Novell's approach to network operating systems is understanding of importance of middleware technologies, for example NDS' unparalleled cross-platform support is particularly appealing to Tivoli....
3 Pages (750 words) Essay

Network Environment Management: Managing User Accounts

The main aim of this research is to streamline the concept of the network environment and accounts management.... This paper evaluates the aspects of the user accounts management and privilege allocation so that we can have a better idea regarding the overall network and its security management.... This research is aimed to present a detailed analysis of network environment management.... In a network resource sharing are vital tasks....
9 Pages (2250 words) Research Paper

What Is VOIP and Why it Should Be Considered a Better Choice Over a PBX System

The reason behind is this that the VOIP technology has applied the ways of cost, voice security calls heavy load administration and voice without distortion benefits.... This paper "What Is VOIP and Why it Should Be Considered a Better Choice Over a PBX system" focuses on the fact that among the up-and-coming data exchanging technologies, VOIP has rapidly earned great fame in offices' telephony system.... The VOIP system is emerging as the necessity of almost all the offices....
10 Pages (2500 words) Essay

Server Security Management

he use of group policy administration is the easiest way to implement administrative policies.... hellip; While most of the server operating systems have their advantages, windows server 2008 R2 stands out as a preferable operating system for the implementation of group and user profiles with roaming profiles.... Not only does the operating system have robust security and management capabilities, but it is also easy to deploy and use as compared to UNIX....
8 Pages (2000 words) Case Study

Network Governance: Opportunities and Challenges

  Taylor (2007) provided a definition of network governance through an explanation of the British public administration experience.... The objectives of the engagement and inclusion dimensions to public administration are widely seen as an effective model of public service.... hellip; Here, information and communication technologies are interconnected with the socio-organizational and physical networks causing new hazards to grow exponentially along with productive forces....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us