StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

A Network for Personal Use or an Organization - Essay Example

Cite this document
Summary
The paper "A Network for Personal Use or an Organization" presents the CISCO books that entail networking. This is to help them in setting up an appropriate network that is easy to configure and maintain. This will also help in reducing cases of network failure…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
A Network for Personal Use or an Organization
Read Text Preview

Extract of sample "A Network for Personal Use or an Organization"

LAN Switching Technologies affiliation Table of Contents I.Introduction 2 II.Technology and Media Access Control Method for Ethernet Networks 2 III.Basic switching concepts and the operation of Cisco switches 3 Collision Domains. 3 Broadcast Domains. 4 IV.Ways to Switch. 4 Store and Forward. 5 Cut through. 5 Fragment Free. 6 Content Addressable Memory Table (CAM Table) 6 V.Conclusion. 7 VI.References 7 I. Introduction Local Area Network Switching is usually an approach to moving over where data packets are often channeled derived from one of person personal computer to another person computer spanning a circle. This kind of circle is super easy to ascertain yet when it comes to servicing it is usually quite hard. Local Area Network Switching commonly consists of a number of principal forms of moving over, which is: Stratum 3 moving over, Stratum 3 moving over, Stratum 4 moving over and also Multi-Layer Switching. II. Technology and Media Access Control Method for Ethernet Networks There are four known types of media access control methods that are used in Ethernet; these include: Carrier Sense Multiple Access with Detection (CSMA/CD). It is a protocol for carrier transmission access in all Ethernet networks. Any device can always try to send frames at any given time by sensing that the instrument is idle and begins to send these frames immediately. In case the frames are ignored each and every device wait for a random amount of time retries sending the frames until it shall be successful. Another media access control method is Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). (Wehrle et al., 2010), said that carrier is more important for wireless networks whereby we find that Collison detection of all the alternative CSMA/CD is always very unreliable. It is a known protocol that usually operates on a Data Link Layer. With this carrier node always attempt to avoid collisions by transmitting frames only if channels are detected to be idle. It is majorly used in AppleTalk networking. Demand priority is also another common method that is used in 100BaseVG networking. Hewlett-Packard proposed it. Its primary goal was to avoid the radio frequency radiations that were always being emitted. It is less susceptible to external sources of RF interference such as other network cables (Posey et al., 2009).   Finally, we have the Token passing; this is frequently being used in Fiber Distributed Data Interface (FDDI) and Token Ring networking. It uses continuously repeating frame that is referred to as the token. It is always being transmitted onto the network by the server computer. It works on the basis that in case ant terminal would want to send the message to it must wait for an empty token. When it finds any that is empty, it fills it with all the address of the required destination station then sends the message bit by bit or all of it at the same time. So these are the major types of media access control methods that are being used in Ethernet (Posey et al., 2009).  III. Basic switching concepts and the operation of Cisco switches A network switch can be described as a device organizing gadgets that is always used to join devices together in a machine system by make use of the manifestation of bundle switching to forward and to end the gadget. A system switch is a multi-port network that connects methodologies and advanced information on the connection. The following are some of the basic switching concepts (Wehrle et al., 2010): Collision Domains. This is a segment of the technique whereby information knowledge can or may have the collision with another while being passed through repeaters. This occurs when utilizing early forms of Ethernet. With this, Collision domain device can transmit inside of this domain. Hubs and Repeaters are physical layer devices that do not understand Ethernet frames or protocols. Their primary role is to extend the distance and also to facilitate the beginning topology. It is said that all the devices that do share quick Ethernet Local Area Network that is using CSMA/CD are always the art of the same collision domain. In case a collision occurs in a collision domain, then everyone that is using that area or who are in that domain get affected. Hence, for a reliable operation to happen on a shared network, the network diameter must not exceed that of the collision domain. A switch that is always placed at the finish is called a bridge that typically acts on all the content of Ethernet frame that it receives and forwards the frames to the appropriate port on the switch. Switch are devices that break the network on multiple collision domains (Posey et al., 2009).  Broadcast Domains. This is a legitimate division of a PC system or it can likewise be characterized as a cognizant piece of a gadget framework, whereby all the centers can just accomplish each other by broadcast at the data association layer. In this sort of space, all the hubs can come to by means of telecast at the data link layer. It typically gives an abnormal state correspondence that is exceptionally dependable when contrasted with others through the essential Ethernet association. The allowed telecast destination gets the tended to and transmitted information outlines which it recognizes as hubs. Its hindrance is that, it tends to drop Web information motions in the wake of coming to the switch. A decent case of a telecast area is the Virtual Local Area Network (VLAN). To reduce the pointless movement and impacts in a telecast areas, switches typically go about as supports, whereby they get and separate all the edges from everyone joined framework segment. Housings that are headed for center points connected with the beginning section are not sent by the switch. However, the edges that are destined for a particular center point are sent just to that piece (Krishnamurthy et al., 2010). IV. Ways to Switch. Many experts have come to the realization of which both store and onward in addition to cut-through level 3 buttons their mailing possibilities in the light-weight of the stop MAC PC place regarding details parcels. With the position as soon as Covering 3 Ethernet move begins the mailing option, the layout of which regarding step of which move suffers from determine if to onward or to fall big money is the only thing of which isolates the cut-through technique. Store and Forward. Store means Local Area Network typically switch duplicate each complete casing into the switch memory supports and figures a cyclic repetition check for lapses. CRC is named a lapse blocking strategy that frequently makes use of numerical equations in light of the quantity of bits at the edge. When a CRC message is discovered, the edge will be tossed, and when the edge is free of lapse then the switch normally advances the casing out the fitting interface port (Posey et al., 2009).  In the forward segment, the sort of exchanging will dependably hold up until the edge has arrived before it advances it. It serves to spare the entire edge memory. At whatever point the casing is in the memory, the switch checks the wellspring of location, the CRC and the end of line location. At the point when there is a remote possibility then the edge is sent to the correct port. This suggests that LAN switch regularly copies everyone complete packaging into a switch memory supports figures a CRC bundlers. At the point when there is a remote possibility when the edge is free of slip, then the switch will propel the packaging out the best possible interface port (Lammle & T 2005).  Cut through. With this sort of exchanging the Local Area Network regularly switch copies into its memory simply the end MAC address that is typically being spotted at the beginning 6 bytes of the edge after the presentation. A cut-through switch lessens postpone on the ground that the change begins to forward the edge when it scrutinizes the target MAC location and it chooses to proper benevolent port. It will start sending the packaging in case the end of line area have been recognized. The cut-through switch ordinarily doesnt perform any single slip checking. The in any case, drawback, and extra incredible edges are sent to their closures of the line. Subsequently when a framework is broken into a workgroup, the likelihood of horrendous edges or accidents can be minimized henceforth making the cut-through framework a decent choice for your framework (Wehrle et al., 2010).  Fragment Free. This is a variety on cut-through exchanging that specially addresses the issue by guaranteeing that all the impact pieces are not sent. This typically holds the edge until all the 64 bytes are read from their sources. It was produced to tackle the issue that was usually being experienced with every late impact. This system usually holds the parcels in its memory until all the information segments achieve the switch (Wehrle et al., 2010).  Content Addressable Memory Table (CAM Table) The Cam table regularly separates a change from a middle point. With no CAM table all the edges got a framework switch would be resonated empty every single diverse port, much the same as an Ethernet focus point. The CAM table is advised to settle on the packaging sending decision. They are often times the center of all the layer 2 framework attacks in the area. The attack, for the most part, incorporates misusing feebleness in switch arrange for that ordinarily shows up the switch uses up space to record the lions share of all the MAC area to port mappings it learns (Posey et al., 2009).  V. Conclusion. In conclusion, when setting up any type of network either for personal use or for an organization, one is recommended to study all the CISCO books that entails networking, this is to help them in setting up appropriate network that is easy to configure and maintain. This will also help in reducing cases of network failure. At the same time the type of network one would want to use also depends with the general budget. It is known that the more expensive the network configuration budget the better the network and the cheaper the budget for configuration the slower the network. This can also assist in selecting good and secure network. VI. References Lammle, T. (2005). CCNA Cisco certified network associate study guide. San Francisco, Calif: SYBEX. International Conference on Computer Engineering and Network, In Wong, W. E., & In Zhu, T. (2014). Computer engineering and networking: Proceedings of the 2013 International Conference on Computer Engineering and Network (CENet2013). Wehrle, K., Güneş, M., & Gross, J. (2010). Modeling and tools for network simulation. Berlin: Springer. Posey, B., & Thompson, T. (2009). GFI network security and PCI compliance power tools. Burlington, MA: Syngress Pub. PAM (Conference), Krishnamurthy, A., & Plattner, B. (2010). Passive and active measurement: 11th international conference, PAM 2010, Zurich, Switzerland, April 7-9, 2010 : proceedings. Berlin: Springer. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(A Network for Personal Use or an Organization Essay Example | Topics and Well Written Essays - 1500 words, n.d.)
A Network for Personal Use or an Organization Essay Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/information-technology/1876932-lan-switching-technologies
(A Network for Personal Use or an Organization Essay Example | Topics and Well Written Essays - 1500 Words)
A Network for Personal Use or an Organization Essay Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1876932-lan-switching-technologies.
“A Network for Personal Use or an Organization Essay Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/information-technology/1876932-lan-switching-technologies.
  • Cited: 0 times

CHECK THESE SAMPLES OF A Network for Personal Use or an Organization

Network Security

He also defines a network as an interlinked system.... He also defines a network as an interlinked system.... Since the advent of computers, there have been numerous developments in the computing filed, many of which have helped improve the use of the machines.... Th InterNetworking Working Group (IWG) was given the responsibility of governing ARPANet by setting the standards for use.... The mid 1980s saw a boom in the number of personal and commercial computers which led to many companies joining the internet bandwagon....
7 Pages (1750 words) Term Paper

Vulnerabilities of Organizational Networks and the Internets

Definition and Impact of Vulnerability on an organization The Organization of Internet Safety defines security vulnerability as “security vulnerability is a flaw within a software system that can cause it to work contrary to is documented design and could be exploited to cause the system to violate its documented security policy” (Telang and Wattal, 2005, p2).... In an organization, the two major components of a computer system, hardware and software are quite vulnerable (Kizza, 2007)....
5 Pages (1250 words) Coursework

Computer Network Security System

network security is essential component as now-a-days information is computers are connected worldwide.... The data stored online and offline opens up a threat by falling trap to potential hackers who intrude into our systems or network ... The need for computer network security system raised when a couple of incidents occurred in the USA.... he advent of world wide web has complicated the computer network security as the computer network are linked worldwide and it would a daunting task to predict the assault made on your computer system....
5 Pages (1250 words) Essay

The Importance of Social Network Networks in an Organisation

It may leave a person or an organization under negative outcomes if it is used in a negative way (Li, Charlene; Bernoff, Josh, 2008)/Social Network is supported by other technologies that have influenced the lives of many people in the recent world.... However, the entire process of an organization's knowledge management has been affected positively by the change in technological advancement and recent innovations.... As we know that, Social Network possess the most dynamic transformative effects, therefore, we cannot undermine the importance of how Social Network networks such as Facebook, Twitter, YouTube, and other networks have taken the control on an organization's knowledge management process....
11 Pages (2750 words) Assignment

Personal Networks and the Personal Communication System

Therefore, the organization must modify personal networking policies as per the new platforms.... The organization is producing female products for Europe and USA clients.... The organization is facing a huge challenge both nationally and internationally.... The following case study under the title "personal Networks and the personal Communication System" is focused on the personal communication networks which refer to communicational channels of interaction between the entrepreneur and individual customers....
8 Pages (2000 words) Case Study

Building a Business Network

Irrespective of the size of the business, whether small, medium or large networking, an organization can accelerate the growth of the organization.... For example, if an organization is an infrastructure in a five-storied building with the administrative block situated on the ground floor.... This is only a simple example of the advantage of networking an organization.... This essay discusses a computer network, which is simply a system of interconnected computers....
16 Pages (4000 words) Essay

Network Operating Systems Past and Present

With these, there has been need to have computers communicating in a network.... a network operating system is a program that is executed in server machine and also able to take care of the users, facts and figures, security, groups, applications and other networking operations.... a network is basically made up of the client who requests for services and the server that will respond to the requested services.... … network operating systems in the past and presentWith the advent of information systems and computerization in many organizations, computer technologies have been seen to get more advanced every day....
9 Pages (2250 words) Essay

Computer Networks and Network Designs

The final section in this paper will focus on an example of a network design between the main office and remote site and answer arising questions on what network has been used to set up and describe any limitations that may arise due to the choice of the network.... This paper "Computer Networks and network Designs" will give an in-depth definition of these networks and where they should be best applied.... The most common network used in organizations is the LAN as it only covers a small geographical area....
12 Pages (3000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us