Free

Introduction to Networking - Essay Example

Comments (0) Cite this document
Summary
Every station is linked to a medium, which is the chief signaling system. Stations using this architecture do not have any central controller.
In…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.3% of users find it useful
Introduction to Networking
Read TextPreview

Extract of sample "Introduction to Networking"

Introduction to Networking Introduction to Networking Ethernet presentation In the presentation of Ethernet, each computer, also known as a station, operates independently from other stations (Zacker, 2001). Every station is linked to a medium, which is the chief signaling system. Stations using this architecture do not have any central controller.
Source: http://compnetworking.about.com/od/homenetworking/ig/Home-Network-Diagrams/Hub-Switch-Network-Diagram.htm
In the diagram shown, the computers 1-3 do not depend on any of the stations for connection. All the three computers receive Ethernet signals serially, and each station has to be connected to the Ethernet switch or hub in order to receive connection. Without the stations being connected to the Ethernet switch, there would be no connection (Zacker, 2001).
Token Ring Presentation
In this architecture, the stations are joined in a ring topology. A token is usually used in preventing any collisions, which might be present (Beasley, 2008). In the passing of data, each work station passes information to the following workstation until data resumes to the source. In this architecture, there must be a server.

Source: http://computinglecturenotes.wordpress.com/2008/01/20/session-7-networks/
The diagram shows a Token Ring topology, where the local work group and the client are connected in a ring. The diagram below shows a token, which prevents collisions.
Source: http://computinglecturenotes.wordpress.com/2008/01/20/session-7-networks/
Fiber Distributed Data Interface (FDDI) Presentation
Just like Token Ring architecture, FDDI uses tokens to control collisions. The difference comes in the number of rings used in the FDDI architecture (Day, 2007). The FDDI uses dual rings. The dual rings consist of a secondary as well as a primary ring. The primary ring transmits data while secondary ring remains idle during operation. Traffic on the dual rings flows on counter directions (Beasley, 2008). The following illustration shows FDDI architecture with all stations functioning.
Source: https://www.google.co.ke/search?q=fddi+topology&hl=sw&prmd
Incase, one station does not function properly, the station adjacent to the failed station loops back as shown below.
Source: http://www.google.co.ke/imgres?imgurl=http://penguin.dcs.bbk.ac.uk/academic/networks
In the diagrams, (a) is functioning with no failed station while (b) is functioning with a failed station.
Apple Talk
The Apple Talk architecture provides internetworking of computers and other outer devices using Local Talk media and also allows access to network services like printers and file servers (Day, 2007). The Apple Talk architecture has well defined interfaces in between layers. Zones, networks, sockets and nodes form the basic components of an Apple Talk network. This presented in the illustration below.
Source: http://www.pulsewan.com/data101/apple_talk_basics.htm
Asynchronous Transfer Mode (ATM)
This architecture consists of data packets and switches, which transfer data using fixed length 53 byte cells (Day, 2007). A patch is usually setup with the establishment of ATM circuits. The patch remains until the connection is completed. ATM aggregators run networks, which consolidate information traffic from several feeders (Beasley, 2008). The illustration below shows ATM network.
Source: http://howtonetworks.net/asynchronous-transfer-mode
References
Beasley, J. (2008). Networking. London: Prentice Hall.
Day, J. (2007). Patterns in Network Architecture: A return to Fundamentals. New York: Cengage Publishers.
Zacker, C. (2001). Networking: the complete reference. New York: McGraw-Hill. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Introduction to Networking Essay Example | Topics and Well Written Essays - 500 words - 9”, n.d.)
Introduction to Networking Essay Example | Topics and Well Written Essays - 500 words - 9. Retrieved from https://studentshare.org/miscellaneous/1596911-introduction-to-networking
(Introduction to Networking Essay Example | Topics and Well Written Essays - 500 Words - 9)
Introduction to Networking Essay Example | Topics and Well Written Essays - 500 Words - 9. https://studentshare.org/miscellaneous/1596911-introduction-to-networking.
“Introduction to Networking Essay Example | Topics and Well Written Essays - 500 Words - 9”, n.d. https://studentshare.org/miscellaneous/1596911-introduction-to-networking.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Introduction to Networking

Networking

...? of Institute] of Discipline] ‘NetworkingINTRODUCTION The growing technological advancements have transformed the planet Earth into a fast pace planet I which tasks are getting executed at very rapid rates. The increasing usability of the technologically advanced devices has been the main reason for their popularity and excessive use. Communication was never easier and more timely than today. The current research mentions one of the technologies that have assisted in the ease of communication. The concept is narrated with respect to a specific small scale business environment that would get benefitted by introduction and implementation of the technology. The co-owner of the small scale...
13 Pages(3250 words)Assignment

Introduction to Social Networking Web Sites

...? Social Networking Social networking has become widely popular over the past decade and extremely popular over the past five years. Thereare many contributing factors that play a role in the growth of social networking. Social networking sites were designed for just about anyone looking to communicate through an online network. Many of the sites are user friendly and available at no charge. Since the sites have shown huge popularity, many businesses are able to use the sites as a form of advertising. Reasons like this are why companies such as Google have invested over 1 billion dollars for a site named You Tube. To further explore a social network it is important to review what a social network is. A social network as defined... by an...
2 Pages(500 words)Essay

Introduction to Social Networking and the Impact on College Life

...?Outline: Introduction to Social Networking and the Impact on College Life Thesis ment - Social media websites have been thus affecting school and college students’ grades because students end up spending more time on websites rather than studying. Pros and Cons of Social Networking Websites – a) productivity b) popularity among peers c) communication with classmates d) extracurricular activities Making good use of social network websites – counter argument Conclusion Name 30 November 2012 The social network is a wonderful place to be for every individual in the world today because it provides updates from near and dear ones, assists in communicating with people living far away in remote areas of the world and also helps people... to...
7 Pages(1750 words)Research Paper

Networking

...?NETWORKING Networking Affiliation Describe the features of telecommunications networks, including key networking technologies. Cover the Open Systems Interconnection (OSI) model, including each logical layer. Telecommunication networks provide the mechanism to support the electronic transmission of data over geographically dispersed locations. Additionally, these networks can be used to transfer any kind of data such as voice telephone calls, text, videos or images. A telecommunication network consists of a variety of components and features that collectively work to support this communication process. Some of the major...
3 Pages(750 words)Essay

Introduction to Networking

... for catching arguments are generic and do not facilitate any resolution of errors (Cabral, Sacramento, & Marques, 2007). In addition, in Microsoft.NET programming, exceptions are not being managed efficiently, as an effective use of an error handling tool can rectify issues to an extent. References Cabral, B., Sacramento, P., & Marques, P. (2007). Hidden truth behind .NETs exception handling today. IET Software, 1(6), 233-250. Microsoft .net.(2007). Network Dictionary, , 309-309. Miller, G. (2003). .NET vs. J2EE. Communications of the ACM, 46(6), 64-67.... Paper Microsoft.Net The Microsoft.Net framework is considered as a software component that can be integrated with Windows operating systems, as it provides added features by pre-coded...
2 Pages(500 words)Essay

Introduction to Networking

...Question Describe the layers of the OSI mode O.S.I model: O.S.I is acronym for Open System Interconnect that consists of number of standardized protocols which are grouped together for the working of a network of computers. It consists of number of layers which provide a guideline for how the entire traffic of data should be processed in an organized manner. The components layers are as following: Physical Layer: This is the bottom most layer and is associated with the establishment of physical links between devices and ensuring creation of synchronization between the sending and receiving node. It provides route for transmission of data between the nodes. This layer is used for direct control of data with the hardware...
3 Pages(750 words)Essay

Introduction to Networking

...Introduction to Networking Introduction to Networking Ethernet refers to a physical and data connection layer technology for LocalArea Networks (LANs). It was invented by Robert Metcalfe. When Ethernet was first deployed in the 1980s, it supported a maximum data rate of 10 Mbps. However, the rate increased to 100 Mbps and today Gigabit Ethernet technology extends maximum performance up to 1000 Mbps. Higher level network protocols such as Internet Protocol (IP) use Ethernet as a transmission medium. The run length of personal Ethernet cables is limited to 100 meters; however, Ethernet networks can be extended easily using...
1 Pages(250 words)Essay

Introduction to Networking

...Introduction to Networking Introduction to Networking Function of Protocols Protocols in a network play a vital function in communication. The function of protocols in a network is to facilitate the exchange of information between network devices or computers through using certain standards. The protocols usually use certain formats, which the network devices can understand in order to allow the exchange of information (Liang, 2011). The protocols usually work in one or several layers of the OSI model. How each Protocol Works in One or More Layers of the OSI Model Bluetooth Protocols The Bluetooth...
3 Pages(750 words)Essay

Introduction to Networking

...Introduction to Networking Introduction to Networking Needs assessment is essential in a computer network; it helps in identifying the areas that need to be changed in a computer network. Therefore, through needs assessment, it becomes easier to know the vulnerabilities that a computer system may face. There are several methods used to conduct needs assessment. Each of these methods used has its own strengths and weaknesses (Singh, 2005). Apart from Adventure works questionnaire, the other method that can be used to conduct the needs assessment of a computer network includes system analysis. This method emphasizes on the...
2 Pages(500 words)Essay

Introduction to Networking

...Introduction to Networking Introduction to Networking This week I learnt about the difference between connectionless and connection-oriented protocols. Connectionless protocol does not need a session connection between the receiver and sender (Karris, 2004). The sender starts sending packets known as datagram to the destination. This service does not require the reliability of the connection-oriented approach, but it is essential for periodic burst transfers. Connectionless networks provide minimal services compared to connection-oriented networks. On the other hand, the connection-oriented protocol needs a session connection be...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Introduction to Networking for FREE!

Contact Us