This website uses cookies to ensure you have the best experience. Learn more

Networks / Data Communications Essay

3575 words - 15 pages

(Ms Word Version attached for better viewing and printing)

Networks / Data Communications

NTC 360

Lecture Week Three


Now that we have covered most of the media types available for our networks Protocols that run over the top of the media and the standards they follow, the final topic here is choosing a design of a network by choosing media types and infrastructure that will best suit the needs of the business.


When to use hubs verses routers and switches is not always a clear-cut decision. In many cases the decision is made due to cost not necessarily best choice. For most office environments a hierarchical design with 10/100/1000 Mbps ...view middle of the document...

Now let’s talk about routing. What does this mean, routable, not routable? Why do I care? Imagine all of the data in the world going to all of the computers in the world. None of the data would get through because of all of the traffic and anyone would be able to see anyone else’s data. To prevent this we have devices called a Routers Bridges and switches.

The Router acts as a traffic cop. It looks at the address of where the data needs to go. It looks in its little guidebook (the routing table) and sends the data on its way. It does not let data pass unless the destination is on the other side of the Router. This keeps network traffic down to a minimum. A Router can be a hardware device or software. Most operating systems today have routing software built in. If your computer has two or more NICs, the computer can act as a Router.

At the network layer as we said, each host gets an IP address. This address is obtained by the network layer of the sending machine and made part of the header information of the network layer packet. The data is then sent along the wire. Each of the hosts on that wire sees the data; if the packet does not have its address, the host ignores the data. If your network has multiple segments there is usually a Router connecting the two segments together. Finally the packet of data gets to a Router. The Router reads the address and looks in its routing table to see if it knows which path to send the data on.

This is like the clerk in the mailroom. He/she reads the information on the envelope and places the package in the proper mailbox. If the clerk does not have the recipient on the list he/she will make some inquires; do you know this person? What department does (s)he work in? Once the determination is made, the clerk will enter that information into his/her address book for the future. This address book is the routing table. That’s great, anytime mail is sent to this new person the mail clerk knows what to do with it.

Oh great, there is another problem! There are two mail clerks and each have their own address books. The other mail clerk just received mail for this new person but the clerk does not have the new person in the address book. Can you think of a solution? How about making a deal with the other mail clerk. Anytime you find out about someone new you let me know and I will do the same.

Routers can be configured to do the same thing. This is called dynamic routing. There are also standards for how this is done. Routing tables in the routers are configured differently depending on the protocol. Many of the protocols are routable.

Many times there are multiple routes to the destination. In the routing table there is a parameter that gives the cost of each path. The term cost is not in dollars and cents, it is in value of the link. Part of the header information in an IP packet is a value called, time to live. This value is used to make sure a data...

Other Papers Like Networks / Data Communications

The Seven Domains Essay

302 words - 2 pages XP and Windows Server 2003), protect an individual computer regardless of the network it’s connected to. 5. Wide Area Network (WAN) DOMAIN connects remote locations. WAN services can include dedicated Internet access and managed services for customer’s routers and firewalls. Networks, routers, and equipment require continuous monitoring and management to keep WAN service available. 6. REMOTE ACCESS DOMAIN connect remote users to the organization’s IT infrastructure. The scope of this domain is limited to remote access via the Internet and IP communications. The logical configuration of... View Full Essayaper

Fgcx Essay

512 words - 3 pages ET 271 Data Communications Chapter 7 Local Area Networks: The Basics Name: Roy Meyer 1. What is the definition of a local area network? A communications network that interconnects a variety of data-communicating devices within a small area 2. List the advantages and disadvantages of local area networks. Advantage: High transfer rate, low error rate Disadvantage: small area 3. What are the basic topologies of local area


838 words - 4 pages thousands of communications protocols that are used everywhere in analog and digital communications. Computer networks cannot exist without them. With KFF, being that the Home Office or Headquarters is located in La Jolla, there is a T3 dedicated line that connects HQ with Del Mar and Encinitas locations. These lines are usually rented at a monthly or yearly rate to connect geographically separate offices for private voice and or data networking

Business Unit 4

1014 words - 5 pages enforcement, security and intelligence agency access to communications data and lawful intercept," states the letter. It adds that further research is needed to ensure the change would not make it more difficult for police to access information about calls and emails that is "crucial to keeping us safe". The Labour Party has seized on the apparent clash. "The detail of this policy needs careful consideration," said Harriet Harman, shadow culture

Intro Networking

449 words - 2 pages new process it has been around for quite some time. A protocol is a set of rules that allows the communications between computers on the network. These rules help regulate the guidelines of speed data transfer and access method. A society based protocol would be like a motorcycle club. For example the network would be the president and the computers would be the other members. The protocol would be the Sgt of Arms as for he would be the one

Mini Case – Deal-R-Us Brokers

422 words - 2 pages be distributed to each client. When there are a large number of users, this entails considerable administrative overhead (Exforsys, 2007.). REFERENCES Jerry Fitzgerald, 2009. Business Data Communications and Networking. 10th Edition. Exforsys, 2007. Pros and Cons of Client/Server. Retrieved from Exforsys website.

Management Information System

2473 words - 10 pages Ch.6 Telecommunications, the internet and wireless technologies Components of a simple network: • NIC (Network Interface Card): to incorporate any laptop to an existing network. • NOS (Network Operating System): to share network resources & route communications on a LAN. • Hubs & switches help route traffic on a network to the right computing device. • Router: when 2 or more networks are connected to each other, it sends data transmissions

Indp Phase 22

1165 words - 5 pages a common set of telecommunication protocols – the IP family.” (Telecommunication Essentials, 251) Define the overall network architecture. The design of a KFF’s communications system, which includes the networks, routers, switches, wireless access points, access methods and protocols will be used. KFF will not limit the use of LAN architecture but will incorporate TCP/IP on the WAN. The IP handles packet forwarding across the network. It

Ntc/362 Fundamentals Of Networking Team Paper

3457 words - 14 pages the VPN router. The IT data center also host an Internet server connected to an Internet Service Provider (ISP) by a Cisco model 7609 firewalled router. This can handle X.25 protocol communications for datagram packet encapsulation between the WAN and the IBM mainframe. Two Ethernet bus topology networks are connected by a gateway. The proposal 8 is to change this to two ring topologies while using the current gateway. This will


2545 words - 11 pages including mobile voice, messaging, data and converged services to more than 60 million customers. The Vodacom brand was born in 1993, when few people had yet heard of cell phones, kicking-off with clarity of vision that it continues to sustain. From their roots in South Africa, they’ve grown their mobile operations to include networks in Tanzania, the Democratic Republic of Congo, Mozambique, and Lesotho. Vodacom has more than 7000 employees

It Challenges

2379 words - 10 pages companies are crippled by fragmented and incompatible and computer information hardware, systems that software, prevent telecommunications networks, information from flowing freely between different parts of the organization. Although Internet standards are solving some of these connectivity problems, creating data and computing platforms that span the enterprise—and, increasingly, link the enterprise to external business partners—is rarely

Related Essays

Anything Essay

463 words - 2 pages Words: 373 Pages: 2 Save Paper Report this Essay Similar Documents Data Vs Voice Networks Business Data Communications And Networking Primary Data Vs Secondary Data Data Transmission And Networking. Data Communication And Networking Data Communication And Networking Voice Vs Data Sql Quiz Annual Report 2000 Of Sears Lucent Technologies Case Lucent Bt Presentation Nt2580 Termpaper Wgu Capstone Guy Bibliography Backsourcing Authorize User Policy Nothing Nt 1310 Unit 1 Voice Vs Data. Physical Networking

Computer Networks Essay

783 words - 4 pages data at speeds ranging from 144 Kbps to more than 2 Mbps. 4G networks capable of transmission speeds that could reach 1 Gbps are starting to be rolled out. Major cellular standards include Code Division Multiple Access (CDMA), which is used primarily in the United States, and Global System for Mobile Communications (GSM), which is the standard in Europe and much of the rest of the world. Standards for wireless computer networks include

Crytographic Tunneling Essay

1193 words - 5 pages provided. The data being transmitted can be transferred by file transfer, electronic messaging, virtual terminal access or any other forms of communications (Merkow, 2005). Before the data leave the application layer, additional encryption and encapsulation is added to the data to give the data more security. Next step for the data is the presentation layer (Layer 6). In this layer, delivery and formatting of data takes place. The presentation layer

Cabling Terms Unit 1 Essay

356 words - 2 pages o Cell Phones—Data overtakes voice when it comes to cell phones but can use both. People see voice as intrusive and as a waste of time, saving it for a last resort. According to the CTIA, the number text message sent last year was up 50% on the year before. Add to that email, the multitasking nature of SMS and instant-messaging, and the other non-voice-based communications available on our phones today. o Landline phones—Landline phones use