Free Essay

Network Technology

In:

Submitted By austinlove
Words 1379
Pages 6
A network switch is a small hardware device that joins multiple computers together within one local area network (LAN). Ethernet switch devices were commonly used on home networks before home routers became popular; broadband routers integrate Ethernet switches directly into the unit as one of their many functions. High-performance network switches are still widely used in corporate networks and data centers. Advantages Switches have increased available network bandwidth. There is reduced workload on individual computers. Increased network performance. There are fewer packet collisions. And some disadvantages are: They are significantly more expensive. Network problems can be difficult to trace through a switch.
Broadcast traffic. Below is a diagram showing how switchg/hub are interconnected in a network

A hub is a device for connecting machines into a network. It is a non-intelligent connection but tends to be very cheap. It allows all machines to send packets to every machine connected and wait for the required machine to reply. This causes delays as all the ports are used for every transmission. A network switch is the more recent method. This has intelligence and remembers which machines are connected to each port, so it passes any transmission straight to the correct port. This reduces collisions on the network when it is busy and is therefore much faster. It is more expensive, although nowadays there is very little difference in price.
A repeater connects two segments of your network cable. It retimes and regenerates the signals to proper amplitudes and sends them to the other segments. When talking about, Ethernet topology, you are probably talking about using a hub as a repeater. Repeaters require a small amount of time to regenerate the signal. This can cause a propagation delay, which can affect network communication when there are several repeaters in a row. Many network architectures limit the number of repeaters that can be used in a row. Repeaters work only at the physical layer of the OSI network model. Some advantages of repeater are :simple to connet ,cost effective, ability to strengthen signal. And its disadvantage are : Repeaters provide no method for isolating traffic generated on one cable segment from traffic generated by the other cable segment, Repeaters provide no method for isolating traffic generated on one cable segment from traffic generated by the other cable segment, When network uses a repeater to connect cable segment A to segment B whether or not there is a station in segment B that is the destination of the signal.

A bridge device filters data traffic at a network boundary. Bridges reduce the amount of traffic on a LAN by dividing it into two segments.
Bridges operate at the data link layer (Layer 2) of the OSI model. Bridges inspect incoming traffic and decide whether to forward or discard it. An Ethernet bridge, for example, inspects each incoming Ethernet frame - including the source and destination MAC addresses, and sometimes the frame size - in making individual forwarding decisions.
Bridges serve a similar function as switches that also operate at Layer 2. Traditional bridges, though, support one network boundary, whereas switches usually offer four or more hardware ports. Switches are sometimes called "multi-port bridges" for this reason. A bridge is a device to join two network segments. The advantage is it's cheap, easy, doesn't require routing to work. The disadvantages are it doesn't support routing (so both networks form one large broadcast domain and see each others traffic), and most bridges don't support any kind of traffic filtering. Bridges aren't much used any more on physical LANS, but are important on virtual LANS and in wireless. Those bridges are much "smarter" than the old physical ones, and the ability to manage an entire virtual LAN as a single network is important. These virtual bridges can calculate and choose the shortest path for data, prevent network loops, and other useful stuff.

Routers are small physical devices that join multiple networks together. Technically, a router is a Layer 3 gateway device, meaning that it connects two or more networks and that the router operates at the network layer of the OSI model.
Home networks typically use a wireless or wired Internet Protocol (IP) router, IP being the most common OSI network layer protocol. An IP router such as a DSL or cable modem broadband router joins the home's local area network (LAN) to the wide-area network (WAN) of the Internet.Advantages are : Easily Shared Internet ;One of the biggest reasons for using a router is to connect multiple users to the Internet. Connecting to the Internet requires a publicly-unique IP address. As such, Internet providers typically only offer a single IP address or charge fees for large amounts of publicly routable addresses. The solution is to add a router with network address translation enabled. Connecting to the Internet through a router with NAT allows the router to use the single public IP address and a series of UDP ports to share the connection. Without NAT, connecting a large organization’s computers to the Internet becomes virtually impossible.
Security and Adaptability;Connecting an Internet modem directly to a PC exposes that PC to a host of security issues. Furthermore, expanding a direct-connection network becomes complicated without the addition of switches or a router and communicating between the individual PCs becomes difficult. Using a router as an intermediary between the “outside” network of the Internet and the “inside” network of your organization provides a scalable environment that is also, to a degree, easier to secure. A router is not a replacement for a firewall or anti-malware measures, but it’s an important first step towards a largely secure network environment.
Disadvantage: Complicated Setup;The aforementioned router requires NAT to be set up. In addition, each computer must be assigned a private IP address that is typically organized by a DHCP server. This is required for the simplest connections. Connecting to additional IP-based networks adds additional complication in the form of routing tables -- a table that describes the best route for reaching a desired network. If IP telephony or video services are to be running on the IP network, you’ll also need to consider quality of service configurations. QOS helps prioritize one type of traffic, such as voice, over others when bandwidth is limited. As additional services are added, more configuration becomes required of the router. Data Overhead; Unlike a point-to-point “layer 2” link, routers add additional IP-based headers. These headers include information such as source and destination addresses, UDP information and checksums. These headers are attached to every payload of data. Large pieces of data are typically broken into thousands of smaller headers, making this header data consume a percentage of the total available bandwidth. Additionally, the routers communicate updates on the network in order to maintain routing tables. When possible, eliminating the routed network environment will offer a nominal speed gain.

The MAUs A media access unit (MAU), also known as a multistation access unit (MAU or MSAU) is a device to attach multiple network stations in a star topology as a token ring network, internally wired to connect the stations into a logical ring. MAU contains relays to short out non-operating stations. Multiple MAUs can be connected into a larger ring through their ring in/ring out connectors.
MAU is also called a "ring in a box". The loop that used to make up the ring of the token ring is now integrated into the chip. In token ring, when a link is broken in the ring, the entire network goes down; however with an MAU, the broken circuit is immediately closed off (within 1ms) allowing stations on the ring to have their cords unplugged without disabling the entire network.Used exclusively on token ring networks, MAUs can perform the following tasks: Connect workstations in a logical ring through a physical star topology,Move the token and packets around the ring,Amplify data signals,Connect in a daisy-chained manner to expand a token ring network,Provide orderly movement of data)

A MAU

A MAU

Advanced Computer Networks (1998). Networking Solutions Guide. (1998) [Online]. Available: www.compnetworks.com/solution.htm [1999, March 1].
Aschermann, Robert (1998). MCSE Networking Essentials for Dummies. IDG Books Worldwide, Inc. Foster City, California.

Similar Documents

Free Essay

Network Technologies

...Network Topologies are in essence the way the network is laid out as it relates to the devices that are connected to it. If you could view all the devices connected to the network, the arrangement would suggest which type the network topology it falls within. The topologies can be described as either a physical or logical design in their defined layout. Network topologies are grouped in the following design categories, Mesh, Bus, Ring and Star Topologies. A mesh topology comes in two varieties, Full mesh and Partial mesh. Full mesh consists of connectivity between every node on the network, meaning each has a direct path to the other. A partial mesh topology consists of the same type of connectivity as a full mesh except you may have to cross nodes to reach another, meaning that direct connectivity may not exist. Mesh topologies rely on routing to be able to choose the correct path between the hosts. One of the largest mesh topologies is the Internet itself. While you may not have a direct connection to a web server, the routers in the path know exactly the best path to get you there. Mesh topologies are considered highly available or redundant. With multiple paths to a destination, one can fail and your connectivity will remain. This leads to mesh networks being very complex. Being complex makes them harder to troubleshoot when issues arise. Along with additional routing overhead and connections, mesh topologies tend to be the most expensive to deploy of the topologies listed...

Words: 1054 - Pages: 5

Free Essay

Topologies and Network Technology

...Topologies and Network Technology NTC/361 Monday, August 8, 2011 Thomas Krawczyk Topologies and network technology In every project, it is important to have a goal, and that goal should be the foundation on which a project team spring into action. The foundation should involve an infrastructural plan, and the usability of the components of the infrastructure. A project plan, as in any other plan, should outline the premise of the project and answer some basic questions like why a particular project is being proposed, what the project will accomplish, who will be the members of the project team and their responsibilities, and when the project will start and terminate. When it comes to a network design, the same principle of project planning applies, and a network topology is an important part of a successful network design. Network topology is the elemental organization of a network; it dictates the media that the network uses, the type of channel it accesses, the architecture of the network, and its operating speed (Tomsho, Tittel, & Johnson, 2004). A network topology deals with the physical layout of the network’s computers, cables, and many more components; a network topology also deals with how the components communicate with each other (Tomsho, et al., 2004). A network topology gives a diagrammatical picture of the network’s physical interconnections. A network topology can be discussed in its physical and logical forms; the physical form deals with the physical...

Words: 1627 - Pages: 7

Premium Essay

Zigbee Network Technology

...ZigBee network technology is used for low data rate Wireless Personal Area Networks that requires long battery life and is affordable. The ZigBee protocol refers to the entire network protocol stack. ZigBee applications run on top of ZigBee network, MAC and physical layers. A ZigBee network is capable of supporting up to 65,535 nodes. ZigBee network is used in many areas such as environmental monitoring systems, personal health care and consumer electronics. In ZigBee network the nodes can be mobile and fixed. 1.2 ZigBee Topologies The three ZigBee network device types are end device, router and coordinator. ZigBee support three kinds of topologies. These are star, tree and mesh. In all topologies the ZigBee network must contain one coordinator. The coordinator is responsible for allowing other devices to join the network, selecting transmission channels and for starting the ZigBee network. The coordinator can also route traffic and it’s the root node in tree and star topologies. ZigBee network supports single and multiple Personal Area Network (PAN). The routers only exist on tree and mesh topologies. The end devices in all ZigBee topologies can only communicate with their parent nodes; the router or coordinator. The three ZigBee topologies are described below. • Star – This is the most basic ZigBee topology. This topology usually consists of end devices and a coordinator. Routers can be part of the star topology, but they will simply function as end device and will not...

Words: 595 - Pages: 3

Premium Essay

Network Technology Concepts

...Networking Technology Concepts Capella University Abstract The purpose of my paper is to explain the concepts of networking technology and what impact these concepts have in an organization. A number of these concepts embody, but are not restricted to, improved communication, enlarged productivity, and enhanced mobility. In addition, what part does network architecture play in developing network technology? In doing thus, I will be able to justify the aim and role that standard-setting organizations play in establishing network standards and identify two standards in network technology and outline their roles. Explain the importance of the ISO (International Organization for Standardization) and show how they contribute to the advancement of the network industry. Keywords: technology, ISO, networking, architecture, concepts Networking Technology Concepts The basic concepts of networking technology are to improve communication, increase efficiency, and enhanced mobility. In addition, network architecture falls in line with these concepts because architecture is the foundation or the framework to configure networks. Improve Communications Technology is important because it expands communications in the workplace. Employees are no longer limited to using regular landline phones, couriers or snail mail. Technology has evolved tremendously whereas, you are able to start communicating electronically using computers, smartphones and other forms of electronic devices from...

Words: 617 - Pages: 3

Premium Essay

Wireless Technologies and Networks in the Work Environment

...Wireless Technologies and Networks in the Work Environment Tablets, smartphones and laptops have given workers more flexibility in how they work and learn. Contributing to that flexibility is the ability to access the Web with these devices via wireless networks. No longer do people need to be in the same room – or even in the same country to collaborate and tackle a project. Answers to questions can be given instantly via a mobile call, conference, email or text message. The need for travel is reduced, and collaborators are accessible for longer periods throughout the day. In fact, the IAAP poll also showed that 86 percent of surveyed execs think that workers will be more accessible for collaboration in the future even while on vacation (International Association of Administrative Professionals: Office of The Future 2020 Computer: Smartphones Enabling Mobile Collaboration). Wireless communication has also made it much easier for Information Technology departments to install and maintain hardware in large organizations. Previously, connecting PCs, printers and other devices to the company network required running lengths of cable throughout the facility, often requiring access to sub-floor or ceiling spaces -- and a single bad wire could trigger hours of work trying to find the defect. Wireless networking is much easier to configure, simply requiring configured repeaters placed to extend the signal throughout the office. Wireless networks are also easy to access, as long...

Words: 304 - Pages: 2

Free Essay

Network Design Proposal for Retail Technologies Corporation

...Network Design Proposal for Retail Technologies Corporation NETW410, Enterprise Network Design Team Leader: Juba Cochran Team Members: Brian Perez, Matthew Smith November 18, 2010 Table of Contents Executive Summary………………………………………………………………………….........2 Introduction……………………………………………………………….....................................3 Customer Introduction……………………………………………………………………….........4 Organizational Goals …………......5 Organizational Constraints...............................................................................................................6 Technical Goals of Existing Network..............................................................................................7 Technical Constraints of Existing Network.......………………………………………………..…8 Existing Network Design Analysis...……………………………………………………………...9 Technical Goals of New Network Design...……………………………………………………..10 Technical Constraints of New Network Design.....……………………………………………...11 New Network Design Analysis, Including Security………………………………….............12-19 Implementation Schedule……………………………………………………………….......…....20 Testing of The New Network……………………………………………………………............21 Budget............................................................................................................................................22 Detailed Summary.........................................................................................................................23 Detailed Components...

Words: 5466 - Pages: 22

Premium Essay

New Technology Research for Network Systems Administration

...My field of study is Network Systems Administrations. I am most interested in networking technology. I currently understand very little about networking, which is to say I understand the functionality but not how it works. The topic I chose was Home-linking Technology. The article I read was “Dual Band Router leverages 802.11ac wireless standard.” from the Product News Network. The article started by describing the speed of the new 802.11ac router. Equipped with the Broadcom 5 GHz WI-Fi chip, the Cloud Router 5700 can deliver speeds up to 1750 Mbps. Its predecessor, the 802.11n has vendor promised speeds of up to 600 Mbps. The Cloud Router also supports wireless HD streaming and multi-person online gaming. It allows users to monitor and control your network remotely. In addition the 5700 provides support of the IPv6 standard and is backwards compatible so the previous generation 802.11n will not become obsolete. I also learned new terminology; IEEE- Institute of Electrical and Electronics Engineers. It is listed as “the world’s largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity.” 802.11- Set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5GHz frequency bands. SPI Firewall- (Stateful Packet Inspection) is a firewall that keeps track of the state of the network connections traveling across it. WPA2- (Wi-Fi Protected Access II) is...

Words: 325 - Pages: 2

Premium Essay

Issc 340: Local Area Network Technologies

...Case Study 2 January 24, 2013 ISSC 340: Local Area Network Technologies American Military University   This document is a proposal for a full network solution to support multiple users and services at the America One Car (AOC) dealership located in Washington DC. The following will include a description of recommended internet service provider (ISP), network cable and infrastructure to include all network equipment, i.e. routers, switches, wireless access points, file and storage server, print server and email server. It also includes the proposed number of network wall drops in each office, the number of phones both VoIP and POTS, total number and type of workstations, and total number and types of printers. This will address the best solution that will meet the company needs while keeping the total cost as low as possible without hindering the network performance. First we will discuss the recommended internet access method and the minimum recommendation for you ISP. The best option for a small business with the possibility of future expansion would be to use a commercial service provider. It is recommended that you use an Ethernet internet that will provide you with a fast, reliable solution that is cost effect and easily upgradable if required. Windstream offers a dedicated Ethernet line with bandwidth speeds up to 1Gbps, having a dedicated Ethernet connection will allow for uninterrupted network access that will not be affected by other users during high traffic...

Words: 1522 - Pages: 7

Premium Essay

A New Patronage Network Driven by a Transfer Technology Office Sustained Per Citizens

...A new patronage network driven by a Transfer Technology Office sustained per Citizens By Jose Mariscal Definition Patronage is the support, encouragement, privilege, or financial aid that an organization or individual bestows to another. In the history of art, arts patronage refers to the support that kings or popes have provided to musicians, painters, and sculptors. It can also refer to the right of bestowing offices or church benefices, the business given to a store by a regular customer, and the guardianship of saints. The word "patron" derives from the Latin patronus, "patron," one who gives benefits to his clients (see Patronage in ancient Rome). Abstract This essay proposes a new patronage network driven by a Transfer Technology Office sustained per Citizens. Engage to generate wealth created by innovator citizens and that this wealthy be distributed to thinker citizens. Source readings: patronage history and the books The World is Flat and Open Business Models. From the Beginning of the first Organized Societies, the art, supported by patronage Were sciences. The development of the same innovations to generate this value was by wealthy people and / or political power within society (e.g. family Medici, Pope Julius II who sponsored Rafael). In other words, the benefits of this value was for people with resources and in some ways was "monopolized" the creation of innovations by the high echelons of society. Whatever its roots, it became firmly institutionalized...

Words: 954 - Pages: 4

Free Essay

Remote Network Access Technology

...WHAT IS REMOTE NETWORK ACCESS TECHNOLOGY? or REMOTE ACCESS SERVICE ( RAS ) Remote network access technology allows access to a computer or a network from a remote distance. Employees at branch or satellite offices or telecommuters, and travelling staff members may need access to the company or agency’s network and are able to do so via remote access. Users working from home get access through an Internet service provider (ISP) or Dial-up connection through desktop, notebook, or handheld computer modem over regular telephone lines. These days almost every company offers some type of remote access to accommodate employees working outside the office and others like business partners, vendors, or external technical support. Remote Access Service (RAS) allows remote clients to dial-in and connect to network as if they were locally connected in the office. VPN REMOTE ACCESS TECHNOLOGY VPN (Virtual Private Network) & Tunneling A Virtual Private Network (VPN) is a private connection over a public network such as the Internet. VPNs can save a company a lot of money because it use Internet connection rather than expensive long-distance point-to-point connections such as dial-up, ISDN, and leased lines, to allow remote networks and remote employees to connect to the corporate network. A site-to-site or LAN-to-LAN VPN as shown below is typically used for connecting branch offices of a single organization or for creating an extranet for business partners. The second main type...

Words: 1041 - Pages: 5

Free Essay

Network Technology and Service Integration

...Answers to Assessment Test 1. A. Network Control Protocol is used to help identify the Network layer protocol used in the packet. See Chapter 16 for more information. 2. B. Each field in an IPv6 address is 16 bits long. An IPv6 address is a total of 128 bits. See Chapter 15 for more information. 3. C. The port roles used within RSTP include discarding, learning, and forwarding. The difference between 802.1d and RSTP is the discarding role. See Chapter 10 for more information. 4. C. The command line console 0 places you at a prompt where you can then set your console user-mode password. See Chapter 6 for more information. 5. D. An IPv6 address is 128 bits long, whereas an IPv4 address is only 32 bits long. See Chapter 15 for more information. 6. C. Link Control Protocol in the PPP stack provides negotiation of dynamic addressing, authentication, and multilink. See Chapter 16 for more information. 7. B. The show interface command shows the line, protocol, DLCI, and LMI information of an interface. See Chapter 16 for more information. 8. A. 256 – 192 = 64, so 64 is our block size. Just count in increments of 64 to find our subnet: 64 + 64 = 128. 128 + 64 = 192. The subnet is 128, the broadcast address is 191, and the valid host range is the numbers in between, or 129–190. See Chapter 4 for more information. 9. B. The passive command, short for passive-interface, stops regular updates from being sent out an interface. However, the interface can still receive updates...

Words: 946 - Pages: 4

Premium Essay

Information Technology/Network Security Threats

...unless modified to adapt to meet the organization’s needs. The System Development Life Cycle (SDLC) the system development life cycle starts with the initiation of the system planning process, and continues through system acquisition and development, implementation, operations and maintenance, and ends with disposition of the system. Service decisions about security made in each of these phases to assure that the system is secure. The initiation phase begins with a determination of need for the system. The organization develops its initial definition of the problem that solved through automation. This followed by a preliminary concept for the basic system that needed, a preliminary definition of requirements, and feasibility and technology assessments. Also during this early phase, the organization starts to define the security requirements for the planned system. Management approval of decisions reached is important at this stage. The information developed in these early analyses used to estimate the costs for the entire life cycle of the system, including information system security. An investment analysis determine the appropriate strategy for achieving the system requirements, while taking mission needs and budget constraints into account. Expenditures for security before the system built. It is difficult to add functionality into a system after it’s built, and it is usually more cost-effective to include preventive security measures from the start rather...

Words: 1444 - Pages: 6

Free Essay

Computer Science and Information Job Growth

...Growth David Vaughn ECPI University Abstract Since the early 1980’s computer technology has been rapidly expanded and as a result has become one of the fastest growing job markets. Jobs in the computer science and information field are at an all-time high and oddly enough the number of students majoring in this field has dropped. We live in an age of electronics where just about everything we use or come in contact with has some form of computerization controlling it. As our lives come more dependent of electronics the demand for better and smarter gadgets quickly increases. This in turn opens the new career opportunities in the field of computer science. Computer Science and Information Job Growth It sounds like a science based fairly-tale, but the second that Steve Jobs and Steve Wozniak created the first Apple computer and Bill Gates started Microsoft, the computer science field has never been the same. Software and computers have grown and advanced in ways they initially never thought possible. The growth in the field of technology has sky rocketed over the past decades bringing an outstanding need for careers that need filling by enthusiastic and dedicated people. The job demand for the computer science field is only growing and shows no sign of a decrease. Computer science and information is such a broad field of employment that there are hundreds of job titles that fall under it. Network security, programmers, gaming programmers, computer technicians, software analyst...

Words: 762 - Pages: 4

Premium Essay

Technology on the Business Strategies of Multi National Corporations

...8 2. Literature Review 10 2.1 Introduction 10 2.2 The 21st Century Business Environment 10 2.3 The Notion of Technology 11 2.4 The SWOT Framework 14 3. Research Methodology 17 3.1 Introduction 17 3.2 Justification of Theoretical Approach 17 3.3 Research Paradigm 17 3.4 Research Methodology 18 3.5 Ethical considerations 21 3.6 Challenges Encountered 21 3.7 Alternative Approach 22 4. Discussion and Findings 24 4.1 Introduction 24 4.2 Case Discussion and Analysis 24 4.3 Case Findings 29 5. Conclusion 31 5.1 Key Findings and Recommendations 31 5.2 Limitations 31 5.3 Future Research Options 32 6. Appendix 33 Appendix A: References 33 Appendix B: Interview Questions 36 Appendix C: Activity Plan 37 Abstract Gone are those days when firms used to just blindly invest in technology and forget. In this era of rapidly changing market needs and increasing use of technology, it is extremely significant and almost mandatory for firms to formulate a strong socio-technical network involving both technical and non-technical artefacts and structured around the organizational business strategies in order to attain set goals. Corporations all across the world especially Multi National Corporations (MNCs) which work twenty four hours round the clock and possess some of the best brains of the world, innovatively use technology as part of their business and operational processes. Similarly, this piece of study attempts to explore the way,...

Words: 8232 - Pages: 33

Free Essay

Accenture: Problem Statement Outline

...Accenture: Problem Statement Outline Introduction As a global management consulting and outsourcing technology services company, information access and service availability has become a critical asset to the functionality and capability of the organization (Accenture, 2014). Each functional area presents a unique organizational challenge to the table. The ability to mass functional expertise and experienced professional in various market sectors comes with it set of issues related to delivering of high performance we build our claim on. This outline will identify three our most critical issues that will be associated with a problem set in order to evaluate the business impact or affect from the problem. Problem Statement #1: Guaranteeing network services availability and quality for globally expanded organization has some great challenges with the various types of technologies used in each host nation. Also, the restrictions placed on communication media within the host country. This impedes the capabilities of the technology system professionals from providing quality and timely services to the customers. Scope: Too often, the host country’s network infrastructure in a global expansion cannot handle big pipes of data, is technology is either out of date or not user-friendly (Reijers and Liman, 2005). Who does it affect? This problem affects the organization’s credibility and the competitive advantage, the stakeholders (customers, employees, partners, and...

Words: 724 - Pages: 3