Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Unit 10 Assignment 1

Unit 10: Communications Technology


Task 1
Task 1a - For this task you must describe the following. Provide a written description of for
each type below: 

Types of networks 

 LAN (Local area network) – A local area network (LAN) is a computer network that connects computers

geographic area. It connects devices within a radius of less than 1 kilometre to a


common server. Schools that set up a hub to exchange the files of one group or building
are an example of this. The two most popular technologies for local area networks are
Ethernet and Wi-Fi.

 WAN (Wide area network) – A wide area network (WAN) is a type of


telecommunications network that spans a vast geographic area and is mostly used for
computer networking. It is made up of MANs (Metropolitan Area Networks), which are
LAN-based computer networks that span a metropolitan area. The WAN connects local
area networks and metro area networks within a radius of more than 1km, which can be
accomplished via either a public or private network.

 Wireless network – A wireless network allows devices to remain connected to the


network while roaming without being attached to wires. It uses radio frequency to
connect devices to one another. You're connecting to a business's wireless network
when you connect to a Wi-Fi hotspot in a cafe, a hotel, an airport lounge, or another
public location.

1
Unit 10 Assignment 1

Network topologies  

 Star – The star topology is the most used network topology, owing to its more flexibility than

the Bus Topology. Instead of sharing a cable, you would connect your own to the HUB.
Through a cable, all devices are connected to a single hub (central hub), allowing the
rest of the devices to continue to function even if one of them fails.

 Bus – Every device is connected to a single wire that delivers data in just one direction,
which limits communication. The bus topology's network protocol is CSMA/CD, which
means that if there was an issue with the cable, the network would recognize it and stop
working within the topology.

 Ring – Each device is linked to the next, forming a ring. It employs the use of a token,
which allows the device that has the token to pass it on to anyone, granting that person
the ability to send packets. It's a one-way transmission that employs a coax cable, with
data passing via each device until it reaches its destination.

 Mesh – Each device has the ability to transmit and receive messages from other devices.
The gadgets serve as relays, relaying messages to their intended recipients. There is no
central connection point in a full mesh structure. Instead, each gadget is linked to at
least one other device, and in most cases, multiple devices. Partially connected mesh
topology: not all nodes are directly connected to one another. As a result, a partial mesh
has fewer paths for a message to go down.

 Tree – A tree topology is a form of structure in which several interconnected pieces are
grouped in the shape of a tree's branches. In a hierarchical way, all of the devices are
connected to the main one. It's a one-way communication, with the main node sending
data to the secondary nodes and the subsidiary nodes sending data to the tertiary
nodes. Tree topologies are commonly used to organize machines in a business network
or data in a database.

 Network access methods:


o CSMA/CD (Carrier Sense Multiple Access/Collision Detection) - Its job is to detect
the process and stop it from happening. When the cable is clear of traffic, any
device has equal access to it and can place data on it. When a device wishes to

2
Unit 10 Assignment 1

send data over a wire, it will "sense" the wire to see if there is already a signal on
it.

o CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) – Its job is to locate


the collision, avoid it, and redirect users to a different path. If the wire is free, a
sensor detects it. If that's the case, it sends bogus data across the line to
determine if it collides with anything else. If it doesn't collide, the gadget expects
the real data won't as well.

o Token Passing – This method use a series of bits (tokens) to grant a device
authorization to exchange information over a network. Any device that has the
token can transmit to the network, and when it is finished, it passes the token to
the next device in line.

Task 1b - Network services what are they?  


There are various types of networks services large and small that are available for
education, business, military, personal use, etc. In this task you will need to describe what
networks services do. 
 ISDN (Integrated Services Digital Network) – This is a circuit-switched phone network
technology that allows data, video, voice, and other network services to be transmitted
over digital phone lines. ISDN connections have a reputation for being faster and more
reliable than traditional connections. Data communications travel more reliably with
faster speeds and better connections.

 Packet Switch – A packet switch is a device that routes packets with a specific address
through each router on their way to their destination. The packets would be organized
into layers of addresses, allowing them to be routed exactly to their intended
destination via routers. If the package is lost, it will go around each router without
reaching its destination, causing the packet to be erased after a period.

 Multiplexed – Multiplexing refers to the process of integrating several analogue or


digital signals into a single data stream through a common media in telecommunications
and computer networking. Multiplexing is a cost-cutting strategy that maximizes the
utilization of a costly resource. Sharing many telephone calls across a single wire is a
typical example of multiplexing.

 ATM (Asynchronous Transfer Mode) – It's a type of dedicated-connection switching that


divides digital data into 53-byte cell units for transmission. It allows video, audio, and
computer data to be transmitted over the same network. ATM can transmit data at
speeds of up to 155 or 622 megabits per second.

 Broadband – Broadband is a telecommunications technology that uses many channels


of simultaneous digital transmissions to deliver high-speed Internet access. Broadband
can be delivered by coaxial, fibre optic, or twisted-pair cable over a wired connection or
wirelessly over a mobile network.

3
Unit 10 Assignment 1

 Network Operating System – It's the software that allows many computers to connect
with one another and exchange files and physical devices. Microsoft Windows and Apple
operating systems were not built for single-computer or network use in previous
versions. Network operating systems began to emerge as computer networks became
more common and were utilized more regularly.

 Network Connection Software – Multiple devices, such as computers, laptops, mobile


phones, tablets, and other systems, can connect to each other and to other networks
thanks to network connection software. The internet is a great example of a globally
connected system of servers and computers that rely on this software to keep users
connected.

Task 1c - Explain the following models and protocols and why they are necessary. 
 The OSI Model? Explain each layer. 
 The TCP/IP Model? Explain each layer. 
 Wi-Fi 
 Bluetooth 
 IrDa 
 GSM/UMTS 
 WAP, WML 
 Wireless security protocols 
 Cellular radio 
 Wireless Technologies - 802.2, 802.3, 802.5, 802.11 

Explain the following interconnection devices for networking: 


 Switches. 
 Routers. 
 Bridges. 
 Wireless access points. 
 Mobile base stations. 

Explain the following network components for networking: 


 Servers 
 Workstation 
 Network cards  
o Ethernet,  
o Wireless (Modem) 
o Token ring 

Task 2
There are many different types of network standards and protocols used in networking.
 Why are different network standards and protocols necessary? 

4
Unit 10 Assignment 1

What are the benefits of having standards and protocols? 

Task 3
Compare the OSI model and the TCP/IP Model on their relationships and differences. 
The OSI V TCP/IP Model 

You might also like