Premium Essay

Network Standards and Protocols Pg 99

In: Computers and Technology

Submitted By grundy83
Words 390
Pages 2
Network Standards and Protocols
June 29, 2013

Homework:
Respond to multiple choice questions 1. A 2. B 3. D 4. C 5. C 6. D 7. B 8. C 9. D 10. D 11. C 12. D 13. B 14. C 15. A 16. D 17. D 18. D 19. A 20. B
Define Key table
1.Computer Network is any combinations of many components that work together so that many different devices can communicate.
2. Computer Networking is the gerund form of the term computer network.
3. Application is a function of any kind of computer or electronic device.
4. Email is electronic mail in which user can type text or attach files.
5. Voice call is a modern term for telephone call.
6. Video frame is a grid of pixel location a chosen width by height that contains the lights/ color to be shown in a video.
7. Web server is software that stores web pages and web objects, listens for request for those pages and send the content of the pages/objects to clients.
8. web browser is software controlled directly by a user that request web pages from a web server and after receiving a page display the web in a window.
9. web address is the text that indentifies details about one object in a network so that a client can request that object from a server.
10. Protocol is a set of rules that different devices or software must follow so that the network works correctly.
11. HTTP is the protocol by web browsers and web servers to define the format of URLs and the messages used to exchange web objects.
12. enterprise network is network owned and operated by a company with that company being somewhat larger than a typical company 1000 employee.
13. link is a generic term for any network cable or wireless communication path between two devices over which bits can be transmitted.
14. node is any networking device that sets on the end of links for the purpose of…...

Similar Documents

Free Essay

Network Standards

...Standards 802.11B, 802.11A, 802.11g and 802.11n differ from each other in multiple ways. The main difference between these would be the frequency of the wavelengths. Where wireless A runs around 5/5.8GHz B and G will run at around 2.4 GHz. Then there is wireless N which is a dual band system and will run both 2.4 and 5 GHz. Wireless N will also be able to use a MIMO or multiple input multiple outputs, this allows 4 signals where before only 1 signal was actually possible. The other difference would be the overall range of signal; this depends on the IEEE standard. The approximate range for A is around 390 feet while G and B will be around 460 feet total. N will offer the most distance in terms of range which as an approximate 820 feet range. These are the outdoor ranges, the indoor ranges for A and B is about 115 feet G is 125 and N again is the furthest at about 230 feet. Another difference between them would be speeds these would flux but N will offer the faster Data rate overall. A and G will be around 54Mb/ps while B is only limited to 11 Mb/ps. N is capable of up to 300 Mb/ps. I think they do benefit in a lot of positive ways. The standards promote wireless technologies because it basically allows venders to create these devices in which will work together by having an overall interface. Overall if this wasn’t the case there is really no telling what would happen in the business world. If there were no standards that were maintained by an organization such as IEEE......

Words: 357 - Pages: 2

Free Essay

Wireless Network Standards

...The 802.11B was an amendment to the original 802.11 standard released in because the original did not have fast enough speeds to be sufficient to support the needs that the technology required. 802.11B added speeds of 5.5 and 11 Mbps. The 802.11B standard also supports wireless devices that are up to 115 meters or 375 feet apart. If the distance is exceeded or as it grows farther apart the standard states that the signal lower its transfer speed instead of completely dropping its signal if it falls out of range.   The 802.11A standard specifies a maximum of 54 Mbps and also supports 48, 36, 24, 18, 12, 9, and 6 Mbps transmissions. The standard has devices that are generally no more than 100 ft. apart.   The 802.11G standard was developed as a “best of both worlds”, type of standard in an attempt to keep the highly stable standard features of the 802.11b standard but include the higher transfer rates of the 802.11A standard. This standard operates on the ISM band and not the U-NII band so it can reach farther with its signal but the band is highly crowded. The 802.11N standard was being established doffing the writhing of the text book and was projected to be able to transfer 100 Mbps to 500 Mbps depending on which proposal was approved. I found that available technology on wireless N technology is capable of 270 Mbps on a particular website putting it to the test. I feel that standards are beneficial to wireless networking and do not limit new technology. They allow......

Words: 305 - Pages: 2

Free Essay

Implementation and Evaluation of Wireless Mesh Networks on Manet Routing Protocols

...Implementation and Evaluation of Wireless Mesh Networks on MANET Routing Protocols Shashi Bhushan1,Anil Saroliya2 ,Vijander Singh3 Research Scholar, Computer Science, Amity University, Jaipur, India 1 Assistant Professor, Computer Science, Amity University, Jaipur, India 2 Senior Lecturer, Computer Science, Amity University, Jaipur, India 3 Abstract—Wireless Mesh Network (WMN) is a kind of network which is made up of Mesh router and Mesh clients where Mesh router having lesser mobility and form the heart of WMNs. In this paper, Wireless Mesh Network over MANET implemented using routing protocols such as AODV, DSR. In this work NS-2.34 simulator is used for simulations. Various measurements and calculations were figure out in this work like throughput, Average end-end delay, PDR, NRL and Routing packets in Random way point mobility model. WMN have features such as self configuration, self healing and low cost of equipment. This work specifically aims to study the performance of routing protocols in a wireless mesh network, where static mesh routers and mobile clients participate together to implement networks functionality such as routing and packet forwarding in different mobility scenarios Keywords- Ad hoc Network, Routing Protocols, Wireless Mesh Network, Performance, Throughput, PDR, NRL and Routing packets in Random way point mobility model, Simulation on Network simulator NS-2, AODV,DSR , Routing Overhead. I. INTRODUCTION A Mobile Ad-hoc network (MANET) is an......

Words: 4335 - Pages: 18

Premium Essay

Protocols

...VENDOR HAD ITS OWN STANDARDS AND PROTOCOLS? A. WIRELESS DEVICES WOULD HAVE DIFFICULTY COMMUNICATING. WHAT IS OKAY WITH ONE VENDOR MAY NOT BE OKAY WITH ANOTHER VENDOR. PRICES OF DEVICES AND CONNECTIONS WOULD ALSO CHANGE. 3.1.2 – GIVE AN EXAMPLE OF A MODEL THAT IS USED TO VISUALIZE SOMETHING THAT IS DIFFICULT TO OBSERVE OR PERCEIVE. A. CONNECTIONS REQUIRING ROUTER EQUIPMENT – HUBS, SWITCHES AND ROUTERS. 3.1.3 – WHAT ARE THE DIFFERENT LAYERS YOU THINK WOULD BE NECESSARY FOR COMMUNICATION TO BE MAPPED TO A MODEL? A. APPLICATION LAYER, PRESENTATION LAYER, SESSION LAYER, TRANSPORT LAYER, DATA LINK LAYER AND PHYSICAL LAYER. 3.1.4 – WHAT WILL HAPPEN IF A MODEL IS TOO GENERAL? TOO GRANULAR? A. THE MODEL WOULD NOT BE FLEXIBLE IF TOO GENERAL; IF TOO GRANULAR, A LOAD IMBALANCE WOULD OCCUR. 3.1 REVIEW – 1. WHY WOULD A 3-LAYER MODEL OF COMMUNICATION THAT HAS THE LAYERS PHYSICAL, NETWORK AND APPLICATIONS BE INSUFFICIENT TO ADEQUATELY DESCRIBE NETWORK COMMUNICATIONS? A. THE 7-LAYER COMMUNICATION MODEL WAS TESTED AND SUCCESSFULLY PROVEN TO WORK. IF A LAYER IS MISSING THE MODEL WILL NOT WORK PROPERLY. 2. WHAT IS THE HISTORY OF THE OSI REFERENCE MODEL? A. TO SERVE AS THE FOUNDATION OF THE ESTABLISHED WIDELY ADOPTED SUITE OF PROTOCOLS THAT ARE USED BY INTERNATIONAL INTERNETWORKS. 3. WHAT IS THE HISTORY OF THE TCP/IP MODEL? A. BOTH DEVELOPED TOGETHER (INTERNET AND TCP/IP) AND PROVIDED THE STANDARD FOR IMPLEMENTING THE INTERNET AND CONTINUES TO ENVOLVE MEETING STANDARDS BY THE......

Words: 996 - Pages: 4

Free Essay

It241 Week 3 Wireless Network Standards

...802.11 standard in 1997; this was to be known as the first WLAN standard, also known as 802.11 Prime. Throughout the years these standards have been ratified and amended. The first revision was in 1999 with 802.11b, later in 1999 802.11a was amended; in 2003 802.11g was amended and 802.11n was amended in 2009. Of these four standards there are some similarities and differences. The differences between these standards are as follows: * 802.11b – 2.4 GHz ISM, uses HR-DSSS (High Rate Direct Sequence Spread Spectrum), Data rates using DSSS are 1 and 2 Mbps, HR-DSSS uses 5.5 and 11 Mbps. Backward compatible to 802.11 Legacy (Prime) DSSS only. * 802.11a – 5 GHz - UNII, uses Orthogonal Frequency Division Multiplexing (OFDM) allowing for 5 GHz RF frequency’s operating in three different frequency bands called the Unlicensed National Information Infrastructure (UNII). These frequency ranges are: * UNII – 1: 5.150 – 5.250 * UNII – 2: 5.250 – 5.350 * UNII – 3: 5.725 – 5.825 Data rates under this standard were mandatory at 6, 12, and 24 Mbps with optional support for 9, 18, 36, 48, and 54 Mbps. This standard is not backwards compatible. * 802.11g – 2.4 GHz ISM, this standard utilized Extended Rate Physical (ERP) to enhance the physical layer, by using ERP-OFDM & ERP-DSSS/CCK (Complementary Code Keying) Data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps are made available. (ERP-OFDM: 6, 12, 24 Mbps) (ERP-DSSS/CCK: 1, 2, 5.5, 11). This standard is......

Words: 484 - Pages: 2

Premium Essay

Health and Safety Unit Standards and Protocols

...POLICY NAME: Health and Safety Unit – Standards and Protocols | EFFECTIVE DATE : QM USE | POLICY MANUAL LEVEL 1 | POLICY CODE: QM USE | PRINT DATE : QM USE | | DATE PREPARED: May 30, 2014 | DATE REVIEWED : QM USE | | ISSUE STATUS: QM USE | DATE APPROVED : QM USE | | | Policy | Standards of Conduct | Purpose | The rules and regulations in these handbook pertains to the proper conduct and discipline within the health and safety unit. | Scope | These will apply to all HSU Personnel, Staff and Cadet Medical Officers | | POLICY NAME: Health and Safety Unit – Standards and Protocols | EFFECTIVE DATE : QM USE | WORK INSTRUCTIONSLEVEL 2 | POLICY CODE: QM USE | PRINT DATE : QM USE | | DATE PREPARED: May 30, 2014 | DATE REVIEWED : QM USE | | ISSUE STATUS: QM USE | DATE APPROVED : QM USE | | | HSU GENERAL ORDERS | ALL incidents of injuries shall be reported immediately, whether suspected or actual, to RTD, Academic staff or HSU personnel as soon as possible. HSU shall accomplish the proper form for documentation and attend to the needs of the injured immediately. | | No one must give any false or inaccurate information pertaining to injuries or the physical well-being of any Cadet. | | Cadets must take personal responsibility for their own health and well-being at all times, and take proper measures to ensure that they remain in good......

Words: 6333 - Pages: 26

Free Essay

Protocols

...A protocol is a set of invisible compute rules that govern how an Internet document will be transmitted onto the screen. For two computers to communicate with one another, they must be able to understand one another through the same language. In order for computers to exchange information there must be a preexisting agreement as to how the information will be structured and how the sides will send and be received. The most important that defines the common networking protocols is the OSI known as Open Systems Interconnection. Introducing the TCP and the IP are two different protocols that are often linked together. The linking of several protocols is fairly common since the functions of different protocols may be complementary so that together they carry out particular tasks that are bases of operation layers. These suits of protocols are often used with many local area networks and carries out the basic operations of the Internet. Emailing also has its own set of protocols that has a variety of both for sending and receiving mail. The most common protocol for sending mail is the SMTP that is known for as Simple Mail Transfer Protocol. Then for receiving emails, the protocol being most commonly used is the Post Office Protocol, POP for short. Both the SMTP and the POP is used for managing the transmission for delivery of mail across the Internet. Web pages that are constructed to a standard method are called Hypertext Markup Language known as HTMO. The HTMP......

Words: 413 - Pages: 2

Free Essay

Network Protocols

...The importance of communication protocols: Unless Patton Fuller Community Hospital has an agreement between the two communicating parties information may get lost or un-communicated. This agreement is called the protocol. Communications protocols usually have a number of parts, Handshake, encoding method, compressions methods, packet / frame structure, and addressing.. This is why protocols are often defined by standards bodies, but some protocols SSL can be used widely even though they are not specifically from a standards body. A protocol must be implemented to enable effective, efficient communication by using a set of rules. Protocols are also described as hardware or software components that carry out the OSI model guidelines for transferring information on a network In short - if we don't have a protocol we won't be able to communicate between different devices. Identify the protocols in your design and provide rationale for your decision Define the overall network architecture. The design of a communications system, which includes the backbones, routers, switches, wireless access points, access methods and protocols used May refer only to the access method in a LAN, such as Ethernet or Token Ring Network architecture is the design of a communications network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as data formats used in......

Words: 1950 - Pages: 8

Free Essay

Impact of Mac Layer on the Performance of Odmrp, Fisheye, Aodv and Dsr, Routing Protocols in Mobile Ad Hoc Networks

...DSR, Routing Protocols in Mobile Ad hoc Networks A. Sravani, G. Srinu, and A.Venkataramana Abstract— Mobile Ad hoc Network is an emerging area. Its standards are defined by IETF. MANET is a self generated, self organized and self handled network consisting of collection of independent nodes. MANETs Presents several desirable properties like dynamic topology, Easy of deployment and robustness, which are qualify them as an attractive topic for the research community. Providing QoS routing is a major issue in MANETs. Media Access Control layer plays crucial role in Ad hoc networks. Several routing protocols have already been proposed for MANETs. This paper describes the impact of MAC layer protocols like 802.11 and CSMA on the various routing protocols like AODV, DSR, ODMRP and Fisheye. Numbers of simulation scenarios were carried out by using Glomosim-2.03. The QoS parameters used are Throughput, Delay and PDR. Simulation results found that AODV performs better in 802.11 and CSMA, DSR and ODMRP performs better in only under 802.11. Keywords— MANET, AODV, DSR, FSR, GloMoSim, ODMRP I. INTRODUCTION Wireless communication networks are basically two types as shown in Fig.1. One is infrastructure based and other one is infrastructure less. Infrastructure based is cellular communications whereas infrastructure less is ad hoc networks. Fig.1 Classification of wireless communication networks A. Cellular Networks A Cellular Network is a wireless network......

Words: 2917 - Pages: 12

Free Essay

Protocols

...4.7 NETWORK LAYER PROTOCOLS • IP (Internet Protocol) • ICMP (Internet Control Message Protocol) • ARP (Address Resolution Protocol) • RARP (Reverse Address Resolution Protocol) 4.7.1 The IP PROTOCOL • IP represents the heart of the Internet Protocol suite • Provides the main service of the layer: data transmission in connectionless mode – datagram IP Header Format IP Header Format (Including user data, this makes an IP packet) IP Header fields: • Version - Indicates the version of IP currently used (now 4); • IP Header Length - Indicates the datagram header length in 32-bit words (value = 5); • Type-of-service - Specifies how a particular upper-layer protocol would like the current datagram to be handled. Datagrams can be assigned various levels of importance through this field; • Total length - Specifies the length of the entire IP packet, including data and header, in bytes. • Identification - Contains an integer that identifies the current datagram (sequence number). This field is used for re-assembling the datagram fragments; • Flags - A 3-bit field for fragmentation control:  000 - last fragment;  001 - not last fragment;  010 - the fragmentation not allowed. • Fragment offset - measured in double-words (offset from main datagram); • Time-to-live - Maintains a counter that gradually decrements down to zero, at which point the datagram is discarded. This keeps packets from looping endlessly; • Protocol - Indicates which......

Words: 1379 - Pages: 6

Free Essay

Internet Protocols

...INTERNET PROTOCOLS & APPLICATIONS * TCP/IP: The TCP/IP suite of protocols has become the dominant standard for internetworking. TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks. * IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol suite originally employed by Novell Corporation’s network operating system, NetWare. It delivers functions similar to those included in TCP/IP. Novell in its current releases supports the TCP/IP suite. A large installed base of NetWare networks continue to use IPX/SPX. * NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on small Windows NT networks. NetBEUI cannot be routed or used by routers to talk to each other on a large network. NetBEUI is suitable for small peer-to-peer networks, involving a few computers directly connected to each other. It can be used in conjunction with another routable protocol such as TCP/IP. This gives the network administrator the advantages of the high performance of NetBEUI within the local network and the ability to communicate beyond the LAN over TCP/IP. * AppleTalk: AppleTalk is a protocol suite to network Macintosh computers. It is composed of a comprehensive set of protocols that span the seven layers of the Open Systems Interconnection (OSI) reference model. The AppleTalk protocol was designed to run over LocalTalk, which is the Apple LAN physical topology...

Words: 1711 - Pages: 7

Free Essay

Network Protocols

... Networking Protocols and Facts What is meant by protocol? A protocol is a special set of rules that governs the communications between computers on a network. They specify the interactions between the communicating entities like one computer to another. There is a protocol for every part that connects a network known as TCP/IP which means Transmission Control Protocol and Internet Protocol. They TCP and IP are two different protocols that preform different tasks in the networking world they are built into all major operating systems. TCP allows and enables two computers or hosts to connect and exchange data streams from one to the other guaranteeing that the delivery of data and packets being delivered come in the same order they were sent out. Utilizing the Idea of TCP being like your Mail courier dropping off your mail because he has the link and means to communicate or find your destination. Internet Protocols use a packets instead of streams, also known as datagrams, and addressing scheme. Picture the IP protocol as a post office you drop off a packet of information, without being combined with TCP it cannot be delivered. The TCP part of the protocol it the mail truck or the courier like I stated in the last paragraph. The reasons why IP cannot be a standalone software is because it deals in packets which is small bits of information with now true way of keeping it order, from going missing, and even duplicating itself. A fact of the TCP/IP protocol was that it......

Words: 365 - Pages: 2

Free Essay

It 220 Network Standards

...Lab 2 Exercise 2.1.1 If one of the five (Media, Interface, Signal, Pattern, and Timing) is missing you will not get a connection. You will not be able to share information. If Media is missing there is no way to transmit the signal. If the Interface is missing there is no way for the computer to access the media to get the connection. If the signal is missing you cannot transmit to get the connection. If the pattern is missing the device cannot communicate with any other device on the network. If the timing is missing the device’s communication would crash into other devices’ communication causing a roadblock in the system. Exercise 2.1.2 The Network interface card (NIC) allows this kind of integration. Exercise 2.1 review Network devices are routers, gateways, hubs, and switches. Peripheral devices are printers, mice, monitor, and scanners. You would limit incoming connections to keep spam out and viruses or malware out. Peer to peer network is good for small groups and businesses. They can share resources and data between nodes. They scale better and are more resilient because they do not rely exclusive on servers. Exercise 2.2.1 The startup cost for individual computers is $3600 versus a high-capacity printer for $500. The drawback to having only one printer for 30 users is backup (traffic jam) of pages to print as well as wearing it out causing repair costs. Setting priorities on what printed first. The cost for three printers –two......

Words: 1074 - Pages: 5

Premium Essay

Introductory Network Concepts, Network Standards, and the Osi Model

...Introductory Network Concepts, Network Standards, and the OSI Model 1. There are many reasons for a company to network its computers, some are as follows; Share software, information with others on networks, cheaper than buying individual software and hardware for each standalone especially if the software often offers deals for amount being purchased, e-mail between network users, and flexible access from any computer on the network. 2. Two fundamental network models are peer-to-peer(P2P) or Client/Server. In a P2P network, every computer can communicate directly with every other computer, and no computer on this network has more authority than another. On a client/server network every computer acts as a client or a server. 3. There are 3 types of networks depending on how much territory they cover, they are LANs, MANs, and WAN networks. LAN networks cover a small area like one building or one office. MANs cover multiple buildings like a handful of government offices surrounding a state capital. A WAN network is one that connects two or more geographically distinct LANs and MANs. 4. A server is a computer on the network that manages shared resources. 5. A client is a computer on the network that requests resources or services from another computer on a network. 6. A NIC or Network Interface Card is the device that enables a workstation to connect to the network and communicate with other computers. 7. A NOS or Network Operating System is......

Words: 845 - Pages: 4

Free Essay

Network and Protocols

...List two advantages of wireless networking.      1. User mobility in the workplace.      2. A cost-effective networking media for use in areas that is difficult or too costly to wire. 2. What are the three areas defined for the IEEE 802.11 standard?      1. Physical Layer (PHY)           The method of transmitting the data, which may be either RF or infrared (although infrared is rarely used.)     2. Medium Access Control (MAC)           I. The reliability of the data service.           II. Access control to the shared wireless medium.           III. Protecting the privacy of the transmitted data.     3. MAC management protocols and services           I. Authentication, association, data delivery, and privacy. 3. What is an ad hoc network?      1. In this network, the wireless clients (stations) communicate directly with each other. This means the clients have recognized the other stations in the WLAN and have established a wireless data link.      2. The fundamental topology of the WLAN is the Basic Service Set (BSS). This is also called the independent Basic Service Set, or ad hoc network. 4. What is the purpose of an Extended Service Set?      1. By adding multiple access points to the network, the range of mobility of a wireless client in the LAN is extended.      2. Definition - The use of multiple access points to extend user mobility Hand-off. 5. What are the four physical layer technologies being used in 802.11......

Words: 1687 - Pages: 7