Premium Essay

Networking Concepts and Applications

In:

Submitted By dangermouse2112
Words 689
Pages 3
Networking Concepts and Applications

Week 1 Homework : Questions

Question 7: How do local area networks (LANs) differ from metropolitan area networks (MANs), wide area networks (WANs), and backbone networks (BNs)?

One of the key differences between different network types is their geographical scope. A local area network, or LAN, is made up of a smaller group of computers linked together and located in the same small area such as a room, a floor or a building. A backbone network, or BN, is a larger network which connects multiple LANs, WANs, MANs or other BNs together and can range from a few hundred feet to miles in size. Metropolitan area networks, or MANs, normally range in size from a few miles up to thirty miles and LANs and BNs from different areas to each other as well as to WANs. Wide area networks, or WANs, can be hundreds or thousands of miles in size and connect MANs and BNs across these distances.

Question 14: Explain how a message is transmitted from one computer to another using layers.

The message is first created at the application layer using a software application. This software translates the message based on the protocol being used to transfer the message and places the necessary information along with the message into a Protocol Data Unit (PDU) which is also known as a ‘packet’. This packet is then passed on to the Transport Layer.
The transport layer, using its own Transmission Control Protocol, or TCP, takes the packet from the application layer and places it in a TCP packet along with whatever additional data the TCP segment requires, and passes it along to the Network Layer.
The Network Layer, as with the previous layers, has its own protocols. In this case we’ll use the Internet Protocol, or IP. IP determines the next destination as the message is routed through the network, places the TCP packet inside an IP packet along

Similar Documents

Premium Essay

Course Descriptions

...the structure of writing and techniques for writing clearly, precisely and persuasively. Prerequisite or Corequisite: TB133 Strategies for the Technical Professional or equivalent GE127 College Mathematics I | A 4 credit hour Mathematics course This course will include, but is not limited to, the following concepts: quadratic, polynomial and radical equations, linear functions and their graphs, systems of linear equations, functions and their properties and triangles and trigonometric functions. Activities will include solving problems and using appropriate technological tools. Prerequisite: GE184 Problem Solving or TB184 Problem Solving or GE150 Survey of the Sciences or equivalent; Prerequisite or Corequisite: TB133 Strategies for the Technical Professional or equivalent GE184 Problem Solving | A 4 credit hour Science course This course introduces students to problem solving techniques and helps them apply the tools of critical reading, analytical thinking and mathematics to help solve problems in practical applications. GE192 College Mathematics II | A 4 credit hour Mathematics course This course will include, but is not limited to, the following concepts: exponential and logarithmic equations and functions, graphs of trigonometric functions, trigonometric equations, polar coordinates, oblique triangles, vectors and sequences. Prerequisite: GE127 College Mathematics I or equivalent GE217 Composition II | A 4 credit hour Humanities course This course focuses...

Words: 1186 - Pages: 5

Premium Essay

Social Networking

...Our updated Terms of Use will become effective on May 25, 2012. Find out more. Social networking service From Wikipedia, the free encyclopedia Jump to: navigation, search This article is about the type of service. For the concept of relationships between people, see Social network. For a list of services, see List of social networking websites. A social networking service is an online service, platform, or site that focuses on facilitating the building of social networks or social relations among people who, for example, share interests, activities, backgrounds, or real-life connections. A social network service consists of a representation of each user (often a profile), his/her social links, and a variety of additional services. Most social network services are web-based and provide means for users to interact over the Internet, such as e-mail and instant messaging. Online community services are sometimes considered as a social network service, though in a broader sense, social network service usually means an individual-centered service whereas online community services are group-centered. Social networking sites allow users to share ideas, activities, events, and interests within their individual networks. The main types of social networking services are those that contain category places (such as former school year or classmates), means to connect with friends (usually with self-description pages), and a recommendation system linked to trust. Popular methods now combine...

Words: 4293 - Pages: 18

Free Essay

Mesh Network

...A wireless mesh network is any wireless network where data is transmitted using mesh networking. That is, where nodes don't just send and receive data, but also serve as a relay for other nodes and each node collaborates in propagating data on the network. A wireless mesh network can be thought of as a collection of nodes where each mesh node is also a router. Compare this to a WiFi access point where service can be provided only within reach of the signal and when it is turned off, the connection is gone. Mesh nodes work differently by rerouting data to another hop which it is connected to, bypassing the empty area where a node might be off. Techopedia explains Wireless Mesh Network (WMN) The concept of mesh networking can be applied to both physical and wireless networking, but it's much more commmon for wireless networks given the cabling costs that would be required to implement as a physical topology. A key difference here is that mesh nodes work in a cooperative gain scheme where the more nodes that are active, the greater the bandwidth available Consider this analogy in traditional networking: when cars (data) coming from a wide road comes to a small bridge they all have to slow down to wait in line. To increase the number of cars going through, you need to make a bigger bridge (add bandwidth) which is then wasted in times of less traffic. In mesh networking, imagine people coming to a river, where in order to continue each person drops a rock to make a foot...

Words: 1896 - Pages: 8

Premium Essay

The Survey and Future Evolution of Green Computing

...green computing is becoming increasingly important in IT systems, it presents challenging problems to system designers. Designers need to take into account energy consumption during the phase of system design and to find solutions to reduce it. Green computing involves all aspects of IT systems, such as chips, system architectures, compilers, operating systems, communication networks and application services, and so on[1]. Further, these aspects are interdependent and complicated. As a result, building lowcost and low-power-consumption systems is a challenging and important activity. Such a new computing paradigm introduces new technical challenges to system designers. In light of today’s requirements for green computing, we present latest research efforts that attempt to deal with them and indicate still open issues. We thus discuss the connotation of green computing and sketch our view on the next generation of IT systems for green computing. We further identify key issues relevant to green computing and evaluate different approaches to these problems. The scope of this survey covers basic concept as well as techniques and methods in support of green computing. The remainder of this paper is organized as follows. In section 2, we introduce the connotation of green computing. In section 3, we look deeper into some key issues relevant to green computing and some real solutions are shown as well. Finally, section 4 points out...

Words: 2936 - Pages: 12

Free Essay

Graph Colouring

...Koinsber bridge, in 1735. This problem lead to the concept of Eulerian Graph. Euler studied the problem of Koinsberg bridge and constructed a structure to solve the problem called Eulerian graph. In 1840, A.F Mobius gave the idea of complete graph and bipartite graph and Kuratowski proved that they are planar by means of recreational problems. The concept of tree, (a connected graph without cycles [1]) was implemented by Gustav Kirchhoff in 1845, and he employed graph theoretical ideas in the calculation of currents in electrical networks or circuits. In 1852, Thomas Gutherie found the famous four color problem. Then in 1856, Thomas. P. Kirkman and William R.Hamilton studied cycles on polyhydra and invented the concept called Hamiltonian graph by studying trips that visited certain sites exactly once. In 1913, H.Dudeney mentioned a puzzle problem. Eventhough the four color problem was invented it was solved only after a century by Kenneth Appel and Wolfgang Haken. This time is considered as the birth of Graph Theory. Graph theoretical concepts are widely used to study and model various applications, in different areas. They include, study of molecules, construction of bonds in chemistry and the study of atoms. Similarly, graph theory is used in sociology for example to measure actor prestige or to explore diffusion mechanisms. Graph theory is used in biology and conservation efforts where a vertex represents regions where certain species exist and the edges represent...

Words: 476 - Pages: 2

Premium Essay

Test

...Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology...

Words: 2305 - Pages: 10

Free Essay

Creating a Successful Rfp (Request for Proposal) Assignment

...Advanced Topics in Networking NETW471 Week 4 (DUE) Request for Proposal Throughout this course and the Information Technology/Telecommunications arena you may or may not work in, the concept of a “RFP” will be raised. Using the Course Lecture, the Internet, your textbook, our Thread Discussions and the many Telecommunications industry magazines on this topic, create a “RFP” on the technology you have selected. Write a 2-3 page (minimum) RFP, utilizing most or all the elements of a good RFP (ex. Solicitation Planning, Vendor Selection, and Evaluating the Proposal) and describing the technology you have selected . Please include a cover page (does not count towards the 2 to 3 page minimum). Please use the course lecture this week which describes fully the different aspects of a good RFP. Please also check our Webliography which gives you a list of industry magazines that provide examples of RFPs submitted on different technologies Point Value (towards final grade)== 60 Points Submission Instructions: Click on  the “Dropbox” tab at the top of your screen and place the assignment in the “Week4:RFP” dropbasket. Grading RUBRIC for Request for Proposal (RFP) Grade Value Gradable Elements/Assessments for RFP High Value (50-60) points Research: Student’s paper was well researched and involved thoughtful and detailed analysis Identification/Use of Terms: Student clearly identified/spotted advanced networking technology concepts within the Telecommunications...

Words: 1329 - Pages: 6

Premium Essay

Mr.Cobb

...introduced it has made life very easy for the average person to accomplish tasks that before has posed as a problem. It also has many advantages such as being able to talk to people anywhere in the world at a cost of next to nothing, and purchasing of goods that is delivered straight to your doorstep.to name a few. In this essay we will be looking at Web 2.0, Social networks, and Collective intelligence, knowledge management and personal knowledge management. Web 2.0 Web 2.0 is a concept that was started in early 1999,it’s the term used to describe web sites that uses next generation technology. It is the way end users and software developers use the web. Web 2.0 can be linked to the 2004 O'Reilly Media Web 2.0 conference. Web 2.0 sites allows the user to connect and interact with other users(social networking).Web 2.0 doesn’t limit the user to only viewing of content but content that’s generated in a virtual community. Forms of Web 2.0 are Blogs, Rss, Wikis, Podcasting and social networking. Advantages: Web 2.0 has made so much more possible for companies and individuals all around the world. Focusing specifically on the business environment web 2.0 has created an online marketing industry. Companies make use of the web as advertisement medium, its cheap and gets global exposure. Anybody, anywhere can access company info, product prices etc. Web 2.0 provides users to share and gain info from different sources online, this keeps everybody updated and u get more than...

Words: 1693 - Pages: 7

Premium Essay

Facebook Dilemma

...the books are being applied practically in the real world. All six of us went through the case and discussed a lot. We got to now how the e-commerce is related with the Facebook, one of the most popular social networking sites. Question 1: What concepts in this chapter are illustrated in this case? Answer: The concepts of e-commerce and social networking are illustrated in this case. E-commerce refers to the use of the Internet and the Web to transact business. In this case, Facebook setup a website for users to create a profile and join various types of self-contained networks without paying any money. But base on its huge number of users, it offers opportunity for companies to do advertisement on the site. And Facebook also uses its resource of user information to make profit. The sellers can reach their target customers when they pay for the information and Facebook increase revenues by providing information of its users. That’s e-commerce. Figure: E-commerce Social networking sites are a type of online community. Social networking is the practice of expanding the number of one’s business or social contacts by making connections through individuals. Facebook is an example of social networking. The site includes a wide...

Words: 1893 - Pages: 8

Premium Essay

Nt 1210

...Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...

Words: 4400 - Pages: 18

Free Essay

Software

...Digital Systems Design Fault Tolerant Systems Advanced Computer Networks 3 0 3 Lab Micro Processors and Programming Languages Lab 0 3 2 Seminar - - 2 Total Credits (6 Theory + 1 Lab.) 22 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD MASTER OF TECHNOLOGY (REAL TIME SYSTEMS) I SEMESTER ADVANCED COMPUTER ARCHITECTURE UNIT I Concept of instruction format and instruction set of a computer, types of operands and operations; addressing modes; processor organization, register organization and stack organization; instruction cycle; basic details of Pentium processor and power PC processor, RISC and CISC instruction set. UNIT II Memory devices; Semiconductor and ferrite core memory, main memory, cache memory, associative memory organization; concept of virtual memory; memory organization and mapping; partitioning, demand paging, segmentation; magnetic disk organization, introduction to magnetic tape and CDROM. UNIT III IO Devices, Programmed IO, interrupt driver IO, DMA IO modules, IO addressing; IO channel, IO Processor, DOT matrix printer, ink jet printer, laser printer. Advanced concepts; Horizontal and vertical instruction format, microprogramming, microinstruction sequencing and control; instruction pipeline; parallel processing; problems in parallel processing; data hazard, control hazard. UNIT IV ILP software approach-complier techniques-static branch protection-VLIW approach-H.W...

Words: 3183 - Pages: 13

Premium Essay

Facebook

...via the Internet, anonymity can be maintained through withholding information regarding the personal background, like the name, residence and institutional affiliation of a person. The combination of disembodiment and anonymity result to a technologically-mediated environment where a new mode of identity construction emerges (Tennyson, 2008). The model of identity represented in social networking sites such as Facebook, Friendster and MySpace was criticized by Alice Marwick. Marwick argues that the finite profile options in this social networking sites are greatly too limiting than with the diverse open-ended ways that people express themselves in face-to-face contact. According to Marwick, “the rigid profile structure encourages the user to present him or herself in a way that is partly constructed by the application, not the user”. She emphasized that the type of identity performance available in Facebook may be related to the capitalist interests of the sites. The user is portrayed as a consumer rather than a citizen (Roedl, 2009). Applications in Facebook and other social networking sites encourage people to define themselves through the entertainment products they utilize such as music, movies, books, and television show. The main idea of her argument is that early...

Words: 830 - Pages: 4

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...

Words: 4400 - Pages: 18

Premium Essay

Course Syllabus Cmgt 554

...Syllabus College of Information Systems & Technology CMGT/554 Version 2 IT Infrastructure Copyright © 2010, 2009 by University of Phoenix. All rights reserved. Course Description This course focuses on the managerial level of knowledge and terminology for telecommunications and computer networks. This course covers the concepts and application of the Internet; server and storage architectures; and regulatory considerations. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Fitzgerald, J. & Dennis, A. (2009). Business data communications & networking (10th ed.). Hoboken, NJ: Wiley. Iniewski, K., McCrosky, C., & Minoli, D. (2008). Network infrastructure and architecture: Designing high-availability networks. Hoboken, NJ: Wiley-Interscience. Turban, E. & Volonino, L. (2009). Information technology for management: Improving performance in the digital economy (7th ed.). Hoboken...

Words: 2439 - Pages: 10

Premium Essay

Case Study on Marketing of Cisco Systems

...Branding and marketing are important concepts for any business. This case study will explore the Cisco marketing case study in the Kotler and Keller, 2012 Marketing Management textbook. First off, the study will explore the differences between building a brand in a business to business context versus building a brand in a consumer market. Furthermore, the study will also explore if Cisco's plan to reach out to consumers is a viable one. First off, branding in a business to business application has some notable differences over the consumer market. Cisco had to utilize some ingenious methods of branding during the marketing of its routing and networking products. Cisco's original product line was made for sale to other businesses for use in the internet connectivity market. For Cisco to develop their brand, they had to develop a totally different approach than ones utilized in the consumer market. They had to specificity market their product to the companies who were operating data centers and server farms. In this type of industry, often good brands are developed by targeting specific types of consumers and in this case it was computer scientist and information technology experts. This can be accomplished in several ways. One method is essentially setting up sales meetings with potential information technology customers. Theses meetings can be utilized to get the brand name out there and possibly show off the superiority of the networking product. Additionally, targeted advertising...

Words: 1109 - Pages: 5