Unit 5: Managing Networks (K/601/7663)
All documents for this subject (4)
Seller
Follow
jessykaur
Reviews received
Content preview
UNIT 5: MANAGING NETWORKS
P1: Describe network technologies
The network technologies are networking operating systems, networking protocols, networking
layout and networking devices. Here is a report describing the network technologies.
Networking operating systems:
Windows
Windows is an operating system that is developed by
Microsoft and was introduced on 10 th November 1983.
W3indows provides a way to uses to run software, store files
connect the internet, watch videos, use the calendar and
many more. Windows has been the most used operating
systems for laptops and PCs. It is designed for professional
purpose as well as personal computing. Windows can be
installed in multiple brand laptops or PCs such as Sony, Dell,
Samsung and HP.
Linux
Linux is an operating system created to be a version of UNIX which runs on
x86 based PC architecture. Linux has many different versions and varieties
which is put across to different hardware platforms. Linus is free to
download which makes it very popular, as many other operating systems
have to be paid for. Linux versions come in workstation or server
installations includes both networking operating systems. Linux is a
networking operating system because it is an open source operating
system that underpin for web servers, cars and phone.
Networking protocols:
SNMPv3
SNMPv3 stands for Simple Network Management Protocol v3. It is a network protocol for organizing
and collecting data about managed devices on networks for modified information to change the
device behaviour. SNMPv3 provides environment that is secure for management and protect security
goals such as masquerade and modification of information. It uses authentic protocol for USM (user-
based security model) and it is stateless protocol as it is designed with the least amount of
interactions between the manager and agent.
ICMP
ICMP (Internet Control Message Protocol) is a transport protocol that communicates data about
network connection issues to the source of transmission. It sends error messages such as source
Jessreen Sandhu
, routed failed and network location unreachable between the gateway and server to the internet.
ICMP uses data packet structure with variable-size data section and 8-byte header.
Networking Layout:
Cabling
Cable Infrastructure is a system of cabling which provides a
complete telecommunications infrastructure. It serves a wide
range of users such as transmit data through a computer
network. The cable infrastructure is unique as the variation of
function of the cabling installation.
Twisted pair is a type cable wire that has two conductors in a single
circuit and are twisted together to improve the electrical compatibility.
However, if a single or untwisted conductor is used it will reduce the
electromagnetic radiation. This is because a twisted pair is a part of a
balanced circuit and it reduce the noise currents induced by magnetic
fields.
A Fibre optics alludes to the medium and the innovation related with
the transmission of data as light heartbeats along a glass or plastic
strand or fibre. Fibre optics is utilized significant distance and elite
information organizing. Fibre optics are additionally ordinarily utilized
in media transmission administrations, for example, web, TV and
phones.
Coaxial cable structure a transmission line and restrict the
electromagnetic wave inside the link between the middle conductor
and the shield. The transmission of energy in the line happens
absolutely through the dielectric inside the link between the
transmitters.
Topologies
Ring Topology
The ring topology can be understood and utilised with ease,
which is also one of the network topologies. The ring topology
network is utilised to transfer packages by utilising the same
wire. The ring topology system is used to send packages by
using an equal wire. This text will bear on to each PC until its
last objective is come to. Additionally, any individual who is
taking a glance at the PC will absolutely see the message,
hence will ger the system.
Star Topology
In PC networking star topology is the least complex
topology to utilise. The star topology utilises the various
Jessreen Sandhu
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller jessykaur. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.72. You're not tied to anything after your purchase.