Premium Essay

Computer Networking

In: Computers and Technology

Submitted By shahrukh
Words 1521
Pages 7
Term paper of computer networking (Design wireless network) x.y.z.

Abstract: this document tells us about wireless network and various techniques to design a computer wireless network
Keywords—wireless networks, connecting devices, switches, hubs.

[pic]
Campus network
A campus network is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area. The networking equipments (switches, routers) and transmission media (optical fiber, copper plant, Cat5 cabling etc) are almost entirely owned (by the campus tenant / owner: an enterprise, university, government etc).
In the case of a university campus-based campus network, the network is likely to link a variety of campus buildings including; academic departments, the university library and student residence halls.
[pic]
| |
| |

Introduction
A computer network allows sharing of resources and information among devices connected to the network. The Advanced Research Projects Agency (ARPA) funded the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defence. It was the first operational computer network in the world. Development of the network began in 1969, based on designs developed during the 1960s. For a history see ARPANET, the first network
.
Purpose • Facilitating communications. Using a network, people can communicate efficiently and easily via e-mail, instant messaging, chat rooms, telephony, video telephone calls, and videoconferencing. • Sharing hardware. In a networked environment, each computer on a network can access and use hardware on the network. Suppose several personal computers on a network each require the use of a laser printer. If the personal computers and a laser printer are connected to a network, each user

Similar Documents

Premium Essay

Computer Networking

... of Technology Introduction to Computer Networking Prof. Teodora Bakardjieva 1 1.0 Introduction The purpose of the networking guidelines are as follows:  to assist students in understanding the benefits of networking  to help students place in context their current stage of networking development in their school.  to assist students in planning the next stage of network development in their school.  to provide standard networking ‘models’ and best practice to students that will assist students in their network planning. This document includes information under the following main headings:  Introduction to Networking  Advantages of Networking  Types of Networks  Models of networking appropriate to students  NCTE recommendation to students  Some relevant terms. 1.1. Basic of Networking A computer network consists of a collection of computers, printers and other equipment that is connected together so that they can communicate with each other. Fig 1 gives an example of a network in a school comprising of a local area network or LAN connecting computers with each other, the internet, and various servers. 2 File and Print Server CD or Multimedia Servers Access to: Internet content & learning resources, Scoilnet etc Email communication Users computers Cache, Proxy, Filtering, Firewall Server Modem or Router School ‘Local Area Network’ (LAN) Other users, computers Fig 1: Representation of Network in...

Words: 4611 - Pages: 19

Premium Essay

Computer Networking

...Republic of the Philippines OCCIDENTAL MINDORO STATE COLLEGE Rizal Street, San Jose, Occidental Mindoro Website: www.omsc.edu.ph Email address: omsc_9747@yahoo.com Telefax No.: (043) 491-1460 COLLEGE OFARTS, SCIENCES AND TECHNOLOGY VISION: OCCIDENTAL MINDORO STATE COLLEGE is envisioned to be an agent of change for the development of the total person responsive to the challenges of globalization. MISSION: To train and develop a new breed of highly competitive, innovative, resourceful and values-oriented graduate through quality instruction, relevant research, community based extension and sustainable production. Department Goal: The Information Technology shall provide its students with the necessary knowledge, values and skills through research – basedendeavor in order to prepare them to meet the demands and challenges of the time. Program: BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Program Objectives: The BS Information technology program includes the study of the utilization of both hardware and software technologies involving planning, installing, customizing, operating, managing and administering, and maintaining information technology infrastructure that provides computing solutions to address the needs of an organization. The program prepares graduates to address various users’ needs involving the selection, development, application, integration and management of computing technologies within an organization Course Title: Free Elective II...

Words: 1777 - Pages: 8

Premium Essay

Computer Networking

...servers and peer to peer (P2P) networks. There are many ways that computers connect and share information with each other. Computers today connect and share information by connecting to a network. There are several types of networks that computers can connect to, but the two most popular are local area networks (LAN) and wireless local area networks (WLAN). In a computer network, anything that a computer can communicate with can be connected to the network. Such as printers, fax machines, routers, and other computers. The internet was created in the mid 1960’s by the department of defense. At first this new invention called the internet was not available to the public. Like with every other new technology, the government officials were the only ones with access to the internet. In 1974 the design of the Transmission Control Program (TCP) made data and information sharing easier and more efficient. In 1982 the internet technology protocols were developed. These protocols worked together with the TCP to regulate and monitor the information sent/received over network. The first definition of the internet is described as computers connected to a set of networks (Mitchell, 2010). From here on out, the World Wide Web is the most sophisticated way to send and receive electronic mail, find information on any topic, and access web pages from any computer. A computer network is used to connect two or more computers together so they can share data between them. Networks are built with...

Words: 1649 - Pages: 7

Premium Essay

Computer Networking

...COMPUTER NETWORKING SIXTH EDITION A Top-Down Approach James F. Kurose University of Massachusetts, Amherst Keith W. Ross Polytechnic Institute of NYU Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Vice President and Editorial Director, ECS: Marcia Horton Editor in Chief: Michael Hirsch Editorial Assistant: Emma Snider Vice President Marketing: Patrice Jones Marketing Manager: Yez Alayan Marketing Coordinator: Kathryn Ferranti Vice President and Director of Production: Vince O’Brien Managing Editor: Jeff Holcomb Senior Production Project Manager: Marilyn Lloyd Manufacturing Manager: Nick Sklitsis Operations Specialist: Lisa McDowell Art Director, Cover: Anthony Gemmellaro Art Coordinator: Janet Theurer/ Theurer Briggs Design Art Studio: Patrice Rossi Calkin/ Rossi Illustration and Design Cover Designer: Liz Harasymcuk Text Designer: Joyce Cosentino Wells Cover Image: ©Fancy/Alamy Media Editor: Dan Sandin Full-Service Vendor: PreMediaGlobal Senior Project Manager: Andrea Stefanowicz Printer/Binder: Edwards Brothers Cover Printer: Lehigh-Phoenix Color This book was composed in Quark. Basal font is Times. Display font is Berkeley. Copyright © 2013, 2010, 2008, 2005, 2003 by Pearson Education, Inc., publishing as Addison-Wesley. All rights reserved. Manufactured in the United States of...

Words: 69922 - Pages: 280

Premium Essay

Computer Networking

...there are several different internet service providers that offer a variety of connection speeds. The two most commonly used networks are client servers and peer to peer (P2P) networks. There are many ways that computers connect and share information with each other. Computers today connect and share information by connecting to a network. There are several types of networks that computers can connect to, but the two most popular are local area networks (LAN) and wireless local area networks (WLAN). In a computer network, anything that a computer can communicate with can be connected to the network. Such as printers, fax machines, routers, and other computers. The internet was created in the mid 1960’s by the department of defense. At first this new invention called the internet was not available to the public. Like with every other new technology, the government officials were the only ones with access to the internet. In 1974 the design of the Transmission Control Program (TCP) made data and information sharing easier and more efficient. In 1982 the internet technology protocols were developed. These protocols worked together with the TCP to regulate and monitor the information sent/received over network. The first definition of the internet is described as computers connected to a set of networks (Mitchell, 2010). From here on out, the World Wide Web is the most sophisticated way to send and receive electronic mail, find information on any topic, and access web pages from...

Words: 277 - Pages: 2

Premium Essay

Computer Networking

...Hassan Qamar CTNS Professor: Rik N. Chapter 21 KT bitmap a bunch of bits in rows and columns. Calibration The process of checking and correcting the graduations of an instrument or device such as an inkjet printer. default printer The designated printer to which Windows prints unless another printer is selected Devices and Printers window a window used in Windows 7 to manage and uninstall printers. direct thermal printer a type of thermal printer that burns dots onto special coated paper as was done by older fax machines. duplex printer a printer that is able to print on both sides of the paper. duplexing assembly Used in a duplex printer, a duplexing assembly contains several rollers, turns the paper around, and draws it back through the print process to print on the back of the paper. elevated command prompt window a Windows command prompt window that allows commands that require administrative privileges. Enhanced Parallel Port (EPP) a type of parallel port that transmits data in both directions. Extended Capabilities Port (ECP) a type of parallel port that is faster than an EPP port. extension magnet brush a long-handled brush made of nylon fibers that are charged with static electricity to pick up stray toner inside a printer. fuser assembly a component in laser printing that uses heat and pressure to fuse the toner to paper. GDI (Graphics Device Interface) a component of Windows that uses a less-sophisticated...

Words: 1170 - Pages: 5

Free Essay

Computer Networking

...1. You have just begun working as a networking consultant with MTI Technologies Inc. One of your first tasks is to help troubleshoot a small Ethernet network at a tax preparation office. The backbone of this network consists of six hubs connected in a bus fashion. Three of the hubs service workgroups of 10 workstations each. One of the hubs services two file servers and two shared printers. In anticipation of tax season and a heavier workload, the organization recently upgraded its network from 10BaseT to100BaseT. However, they have not seen any of the performance increases they expected. Before even visiting the firm, what can you suggest as reasons for the less than optimal performance? If one of the NICs is not capable of 100BASE-TX the entire network will operate on 10BASE-T even if all of the hubs and other NICs are capable of negotiating 100BASE-TX. If there are a large number of transceivers trying to talk at once on a hub-based network they will jam up as packet switched traffic is inherently bursty. There's a limit to the number of repeaters that can be installed between any two hosts on a hub network. There is no such limitation for switches, which is what I would recommend for the company. 10BASE-T allows for 4 repeaters between hosts, but 100BASE-TX allows for only two and only under very strict circumstances. If my initial assessment of the topology is correct, each case involves no less than 3 hubs: one for the workstation group, one for the backbone bus itself...

Words: 298 - Pages: 2

Premium Essay

It 230 Computer Networking

...Network Design: XYZ School System Network Design: XYZ School System IT 230 Computer Networking Executive Summary {complete during Week Nine} Write 3-4 paragraphs describing the goals of the network design project, assumptions, pros and cons of the proposed solutions, and project constraints. Cabling Specifications 1. The following specification represents the minimum requirements for the installation of cabling and equipment data cabling in any offices or labs to be constructed or modified for the XYZ School System. 2. Minimum Cabling Requirements a. The Data Cabling and termination shall be in accordance with wiring configurations as per ANSI/TIA/EIA-568-B standards b. All cabling runs must be uninterrupted and without splices c. Where cabling is to be enclosed in a solid wall, the cables should be installed within a conduit for a additions or reconfigurations 3. General Specifications a. Data cable (CAT-6 UTP) i. Terminating method: CAT-6 socket 1. Green/White (1) 2. Green (2) 3. Orange/White (3) 4. Blue (4) 5. Blue/White (5) 6. Orange (6) 7. Brown/White (7) 8. Brown (8) ii. Each data point should have all 4pairs assigned and terminated as per ANSI/TIA/EIA-568-B standards b. Cables Labeling i. Data plates 1. On each face plate a unique number will be used to indicate the data’s location of cable termination on the patch panel 2. The data ports will be marked with orange labeling for each data connection ii. Wiring labels 1. Each cable will be sequentially numbered...

Words: 6096 - Pages: 25

Free Essay

Computer Networking Assignment 1

...Unit 1 Assignment Dan SItkowski 1. Cell phones uses both voice and data networks. It uses data to get information and to also be allowed to access the internet. It also uses voice when you make a call. 2. Land phones use both networks. It uses data for caller ID and to send the information to find out where the call will be going. It also uses voice to transmit back and forth so that you can have a convocation. 3. SMS/Text messaging uses data networks. It only uses data networks because you are sending a message to another person. And in that message you can have files attached to the message as well. 4. Fax machines uses a data network. It uses this network because you put a document or photo threw the machine and it takes the image of that and creates a file. It then takes that file and sends it to another location. Then that location opens and prints or views the file. 5. Pagers use only data networks. It only uses data networks because when you send a file containing only text and then send it to a pager. The pager then takes that file and opens it showing the text for that person to read. 6. VOIP (voice over IP) uses data networks. VOIP uses data networks only because It uses the internet to talk to people instead of the traditional voice network. This allows someone to bypass the phone company. It works by taking the conversation and converts it to a file that is sent to the other location where it is opened. The problem with this is that if the...

Words: 307 - Pages: 2

Premium Essay

Computer Networking

...Chad Nash Advantages and Disadvantages of Windows XP Windows XP was introduced as a significant upgrade to Windows 98 and Windows Millennium. After Microsoft brought out MS-DOS in the 1980's it developed its futuristic operating system - Windows. Newer versions of this OS were developed over the years, including the out bringing of Windows NT (New Technology) which was aimed at business users and computer servers. After numerous incarnations of the Windows operating system, including Windows 95, 98 and the much criticized Windows Millennium, the XP system was released October 25, 2001.Windows XP has much in common with the singularities and also engineering of Windows 2000. In fundamentals XP was created to"bridge the two architectures (NT and Windows 9x--or DOS) into a single common operating system." Windows 2000 was based on Windows NT technology; as far as Millennium (ME) was created from Windows 9x technology. The NT operating system was much more honorable than the other versions before the o of Windows and accordingly Microsoft decided to choose this technology as the infrastructer for XP. XP was put out in two basic versions - The home and the professional version. The basic inequality between the two versions is that the up to speed version places more significance on security. It also has the efficiency to encrypt files and data and has support for multiprocessor systems. ( Lanyon P.) Windows XP was developed to on the problems and inconsistencies in the ME system...

Words: 1682 - Pages: 7

Free Essay

Computer Networking

...Communication Networks Sharam Hekmat PragSoft Corporation www.pragsoft.com Contents Contents Preface 1. Introduction 1.1. Network Components 1.2. Network Types 1.3. The OSI Model 1.3.1. The Physical Layer 1.3.2. The Data Link Layer 1.3.3. The Network Layer 1.3.4. The Transport Layer 1.3.5. The Session Layer 1.3.6. The Presentation Layer 1.3.7. The Application Layer 1.4. Protocol Notations 1.4.1. Service Primitives 1.4.2. Sequence Diagrams 1.4.3. State Transition Diagrams 1.5. Standards 1.6. Further Reading 1.7. Summary 1.8. Exercises 2. The Physical Layer 2.1. Equipment 2.1.1. Equipment Types 2.1.2. Connection Types 2.2. Transmission 2.2.1. Signal Types 2.2.2. Modulation 2.2.3. Digitization 2.2.4. Synchronization 2.2.5. Transmission Media 2.3. Multiplexing 2.3.1. Space Division Multiplexing (SDM) vi Communication Networks 6 10 1 2 2 4 7 7 8 9 9 10 10 11 11 12 12 13 14 15 16 18 19 19 19 20 20 21 22 23 24 27 28 Copyright © 2005 PragSoft 2.3.2. Frequency Division Multiplexing (FDM) 2.3.3. Time Division Multiplexing (TDM) 2.3.4. Concentration 2.4. Physical Layer Standards 2.4.1. RS-232 2.4.2. CCITT X.21 2.5. Further Reading 2.6. Summary 2.7. Exercises 3. The Data Link Layer 3.1 Link Protocol Types 3.1.1. Synchronous Protocols 3.1.2. Asynchronous Protocols 3.1.3. Master-Slave Protocols 3.1.4. Peer-to-Peer Protocols 3.2. Link Protocol Functions 3.2.1. Acknowledgments 3.2.2. Timers 3.2.3. Error Checking 3.2.4. Retransmission 3.2.5. Flow Control 3.3. Sliding Window...

Words: 60074 - Pages: 241

Free Essay

Abc Business

...CBC80001-FS1 A Complete System for Business Communications from Verizon and Cisco A Cisco Smart Business Communications System from Verizon offers everything you need for more secure voice and data networking. Start Your Business the Right Way Whether you are starting up or branching out, the Cisco Smart Business Communications System gives you an affordable, all-in-one solution. Built-in voice, messaging, and mobility features let you stay in touch with local, regional, and overseas suppliers easily and cost-effectively. Wired and wireless data networking supports all your business operations and data needs, enabling you to start your business as a paperless office. Simple, Secure, Complete The Cisco Smart Business Communications System is a complete solution that replaces your traditional telephone system. It also gives you highly secure Internet capabilities with a data network and wireless connectivity to support powerful business applications. Best of all, it’s easy to use. And when you are ready to add new users and new capabilities, the system can easily accommodate changes and upgrades. Hardware to Connect Phones and Computers At the heart of the solution is an intelligent IP network. Cisco offers a suite of proven, industry-leading products for wired and wireless voice and data communications. An all-in-one system combines connections to the public telephone network and the Internet with integrated network security, ports to plug in Cisco Unified IP phones and...

Words: 874 - Pages: 4

Premium Essay

Wireless Technology

...Wireless LAN is a networking technology that allows the connection of computers without any wires and cables, mostly using radio and infrared frequency (RF) technology. It's called LAN because the range targets within an office, a building, a store, a small campus, or just a house. The description of a WLAN is a mobile data communication connectivity system installed and configured as an alternative in some cases for traditional LAN. The WLAN equipment is capable of receiving and sending data over an adequate range. In the United States, the WLAN business is increasing in areas like the airports, health-care, warehousing and manufactures. Several research companies are predicting a healthy increase in WLAN business market in the coming years. The WLAN provides advantages over traditional LAN technology such as buried cables in the ground, hidden cables behind walls, and long cable runs measured in feet or miles. Without restrictions, the new technology infrastructure can easily be installed and ready to be used. Current growth concerning network communication technology in the enterprise communication environment has resulted in widespread deployment of numerous products that cover only a small part of the total mobile and WLAN infrastructure required. The WLAN industry has experienced phenomenal increase over the past ten years. The U.S. wireless industry posted revenue of $40 billion in 1999, according to the Cellular Telecommunications Industry Association...

Words: 263 - Pages: 2

Premium Essay

Boonny

...in daily inventories and lateral transfers. • Operated 4K, 6K, and 10K forklifts. • Used automated logistical systems to accurately track inbound and outbound cargo and goods. OIF (Operation Iraqi Freedom) (2008 – 2009) Class I NCOIC/MHE Operator • Managed 894th QM CO Class I site distributing supplies to Field Operating Bases (FOBs) across Iraq utilizing heavy trucks as prime movers • Safely operated MHE to download over 35,000 crates of subsistence. • Supervised 35 KBR personnel and subcontract workers by ensuring the completion of daily inventory inspections. Jabil Circuit (2006 – 2008) Lead Test Operator (IBM)/MHE Operator • Assisted engineers in proper testing of equipment such as IBM printers, computers and cash registers. • Coordinated and executed the safe movement of cargo within the company’s warehouse. Simpson Dura Vent (2001 – 2005) Heavy machine Operator/Material Handler • Maintained and operated Insulation Pipe Machine and ensuring all pipes were manufactured correctly. • Distributed materials and supplies by electric forklifts as needed by all production lines to run efficiently. United States Army Reserve (2000 – Present) Petroleum Supply Specialist/MHE Operator • Served as Fuel Services Specialist for over 10 years. • Trained on safe fuel-handling procedures with petroleum products. •...

Words: 302 - Pages: 2

Free Essay

Kulder

...full-duplex mode. Baud transmission is the number of signaling elements that occur each second. At slower speeds, only 1 bit of information is encoded in each electrical change. When saying 1500 baud, it means that 1500 bits are transmitted each second, this is also shown as 1500bps. Communication protocols can also describe the syntax, semantics, and synchronization of analog and digital communications. Communications protocols are implemented in hardware and software. There are thousands of communications protocols that are used everywhere in analog and digital communications. Computer networks cannot exist without them. With KFF, being that the Home Office or Headquarters is located in La Jolla, there is a T3 dedicated line that connects HQ with Del Mar and Encinitas locations. These lines are usually rented at a monthly or yearly rate to connect geographically separate offices for private voice and or data networking. It is also very costly averaging over $3000 USD per month, so most don’t lease these lines. They are also reserved circuits that operate over either copper or fiber optics cables. One of the protocols that should be implemented is the Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP is the set of rules for communication on which most major networks, such as the Internet, are based. TCP/IP has become standard for transmitting data over the Internet and all operating systems such as Microsoft Windows, Mac OS and Linux. All...

Words: 838 - Pages: 4