1. There are many reasons for a company to network its computers, some are as follows; Share software, information with others on networks, cheaper than buying individual software and hardware for each standalone especially if the software often offers deals for amount being purchased, e-mail between network users, and flexible access from any computer on the network. 2. Two fundamental network models are peer-to-peer(P2P) or Client/Server. In a P2P network, every computer can communicate directly with every other computer, and no computer on this network has more authority than another. On a client/server network every computer acts as a client or a server. 3. There are 3 types of networks depending on how much territory they cover, they are LANs, MANs, and WAN networks. LAN networks cover a small area like one building or one office. MANs cover multiple buildings like a handful of government offices surrounding a state capital. A WAN network is one that connects two or more geographically distinct LANs and MANs. 4. A server is a computer on the network that manages shared resources. 5. A client is a computer on the network that requests resources or services from another computer on a network. 6. A NIC or Network Interface Card is the device that enables a workstation to connect to the network and communicate with other computers. 7. A NOS or Network Operating System is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions. 8. A segment is part of a network. Usually it is composed of a group of nodes that share the same communications channel for all their traffic 9. A protocol is a standard method or format for communication between network devices. Protocols ensure that data are transferred whole, in sequence, and without error from one node on the network to another. 10. A data packet is discrete unit of information sent from one node on a network to another. 11. The organization which today is known as ISO began in 1926 as the International Federation of the National Standardizing Associations (ISA). This organization focused heavily on mechanical engineering. It was disbanded in 1942 during the Second World War but was re-organized under the current name, ISO, in 1946. 12. OSI is a standard industry model used to describe how data from a piece of software moves from one computer, through a network, to another computer. All tasks involved in doing this are split up into 7 layers.
Each layer is more or less independent of the other layers in the sense that the contents of each layer, the actual design of the tasks that make up each layer, can vary but the interface between one layer and the next is fixed. This allows:
- The layers to be designed and tested separately from other layers.
- Any layer can be changed without affecting any of the other layers.
- Successful communication to take place, as long as everyone uses the OSI model - before the OSI model successful data communication between different hardware and software was practically impossible.
The seven layers are:
Layer 7 - Application Layer - Deals with setting up headers on the packets to be sent.
Layer 6 - Presentation Layer - Sets the format of the data and any encryption used.
Layer 5 - Session Layer - Defines how data transmission will be started, controlled and finished.
Layer 4 - Transport Layer - Responsible for the ordering and reassembly of packets.
Layer 3 - Network Layer - Deals with the delivery of data packets.
Layer 2 - Data Link Layer - Concerned with getting error-free connections across networks
Layer 1 - Physical Layer - Deals with the physical characteristics of the hardware such as voltages, pin assignments in plugs, etc. 13. The data link layer is responsible for providing node-to-node communication on a single, local network. To provide this service, the data link layer must perform two functions. It must provide an address mechanism that enable messages to be delivered to the correct nodes. Also, it must translate messages from upper layers into bits that the physical layer can transmit. When the data link layer receives a message to transmit, it formats the message into a data frame (packets). 14. A packet is the PDU - protocol delivery unit at layer 3 (network layer) of the networking OSI model. You may have heard them referred to as ip packets. This is the organization of your data at layer 3
A frame is the PDU of layer 2 (data link) of the OSI model.
At layer 2, packets get encapsulated into frames so that they can be transferred over different media to the end destination. Still the same data...it could be split up differently due to varying window size, but there are a few different details added into the frame header. 15. Layer 4 usually uses segments, layer 3 are packets, layer 2 are frames. Layer 4 uses either tcp (SYN and ACKS) and UDP (connectionless) with port numbers
You May Also Find These Documents Helpful
-
* NIC (network interface card): accept workstation and personal computer connect to a network on LAN typically contain a network interface card specifically designed for the LAN transmission technology.…
- 1846 Words
- 8 Pages
Powerful Essays -
3. Describe in your own words the similarities and differences between a peer-to-peer network and a client-server network. There is a big difference between peer-to-peer network and a client-server. A client-server workstation allows users to have access to most files which are stored on the server but the server itself will determine which user can access files on the network. A peer-to-peer network has no central server and its workstation shares its files with others.…
- 316 Words
- 2 Pages
Satisfactory Essays -
11. Protocol -A set of rules that different devices and/or software must follow so that the network works correctly.…
- 443 Words
- 2 Pages
Good Essays -
Protocol: A set of rules that different devices and/or software must follow so that the network works correctly.…
- 539 Words
- 3 Pages
Satisfactory Essays -
A network is a connecting system (wireline or wireless) that permits different computers to share resources.…
- 832 Words
- 4 Pages
Satisfactory Essays -
A network is a group of two or more computer systems that are linked together.…
- 492 Words
- 3 Pages
Satisfactory Essays -
Router: By the use of a router you will be inking all the computer systems to one device to provide sharing of the Internet connection. Using a router has a big advantage its firewall functionality. Mostly all routers provide this protection…
- 724 Words
- 3 Pages
Satisfactory Essays -
A network is a group of two or more computer systems linked together. The benefits of networking include more convenient file sharing and Internet connection sharing.…
- 598 Words
- 3 Pages
Satisfactory Essays -
A network is what gives the user the ability to transfer information between other computers (de Arazoza, 2015).…
- 432 Words
- 2 Pages
Satisfactory Essays -
A server in a network is a powerful computer and comprises of a server operating system for example windows 2008…
- 1870 Words
- 8 Pages
Powerful Essays -
TCP – TCP stands for “transmission control protocol” and it is the pieces that manages all movement of each data packet between computers. It establishes a connection between the computers. It also acknowledges that each packet have been…
- 443 Words
- 2 Pages
Satisfactory Essays -
A communication protocol is a set of rules that allow two or more devices to communicate, so they can send and receive…
- 1327 Words
- 6 Pages
Better Essays -
* server network interface card (NIC) – A specific tool that is put into a computer so that you may gain access to a network.…
- 4516 Words
- 19 Pages
Powerful Essays -
| |communications between them. A collection of client PC’s into a central server is |…
- 297 Words
- 2 Pages
Satisfactory Essays -
The utilization of networking hardware is used to connect different computers to a server in the case of my company it will be used to connect the different sections within our company. There are many different types of hardware to include bridges, routers, switches, and even networking cards. Our company will use routers, firewalls, and switches. With the routers and firewalls we will protected from threats to a degree by viruses, and attackers. One of the most commonly used is McAfee Antivirus which is the software that I would present to be used as security software. With the routers and firewalls, it will block any unwanted activity coming across the network. The use of the software allows the use of a security firewall that works with the internet firewall increasing our chances of not being attacked or corrupted by viruses, and hackers. It also provides anti-spyware upon the network, indicates safety of websites, and web protection detects and helps rid the network of any spyware, malware, and viruses, phishing and spam when it comes to email, and web usage. Without both networking hardware and software total security cannot exist.…
- 939 Words
- 3 Pages
Better Essays