Unit 5: Assignment 1 - ADA Navigation Systems
Scenario
I have recently been employed as a senior network manager for ADA Ltd, which develops
PDA’s and Satellite Navigation Systems. The company I work for employs 150 developers
who work on Windows based machines. And the company’s network is setup as a client
server network with windows 2008 server being used as the server operating system. I am a
network manager I have been asked to mentor and manage 5 junior trainees.
Describe network technologies (P1)
What a network OS is
The network OS it’s a computer OS which was made to several things such as which was to
support the workstation, personal computer, and for other cases, it was made for back in
the day machines, which is connected through the LAN. This network OS is basically a
software that plans an operating system of some sort that is adapted to computer
networking. One which functions through a server for example and lets the server handle
the users, software’s, groups, data, security etc. Operating systems are windows, apple,
android, Linux and Unix. Linux operating systems are free to use. Windows 2000 operating
systems has multi-user use too. Windows XP has multiprocessing. Windows 8 has
multitasking.
What protocols are and what the function they serve in a networking environment
Furthermore, the protocols in use. The protocol it’s basically a bunch of rules which the final
points in a telecommunication connection utilises only when they talk with it. Common
protocols like TCP/IP, again utilises a bunch of rules to swap over text with other network
points on information packet level. All the protocols happen over transmission control
protocol/internet protocol except for domain name system.
File transfer protocol - File transfer protocol is one of many initial Internet services created
and it lets operators change a place of files on a single PC to another. If they are utilising the
file transfer protocol program, the user may login on a remote computer, look at its files and
has the option to either upload or download files that is if the remote computer lets it. It may
be any type of file it doesn’t have to be specific one, however the user only has the permission
to view the file name; no details of the file properties is involved. Various websites that give
downloadable apps use the file transfer protocol.
Hypertext Transfer Protocol - These web pages are used depending on multiple techniques
and its named hypertext mark-up language. Hypertext mark-up language is a page is
transmitted and transferred across the internet through a standard way and its named
hypertext transfer protocol. The protocol utilises transmission control protocol/internet
protocol to control and manage internet communication.
Simple mail transfer protocol - Simple mail transfer protocol its function, it transfers mail
starting from one network then onto the next network. Simple mail transport protocol is
, always utilised through the World Wide Web. Furthermore, this protocol is an application
layer protocol not a transport layer protocol. When they forward an email, they have to know
whom they are sending it too and where it is going. Furthermore, that email will begin
transferring that email to the mail server, finally it is transferred to that individual they were
sending it to.
Transmission control protocol/internet protocol - This is alpha of communications protocols,
which is utilised for connecting hosts on the Internet. Furthermore, the type of protocol
utilises loads of protocols, also it is a part of a set of protocols known as the internet protocol
suite. It is additionally incorporated with the UNIX OS and gets utilised on the network,
confirming it the standard through giving information over networks.
Domain name system (servers) – Domain name systems are the internet’s own phone book.
They continuously enable a directory of all the domain names and keep translating them to
internet protocol addresses. This is needed because even though domain names are fairly
simple for someone to remember, the computers only really get onto the pages a user went
to by using their internet protocol addresses. Although domain name systems don’t occur
over transmission control protocol/internet protocol it is still used
The different networking topologies there are
Ring topology - The Ring topology can be understood and utilised with ease, which is also
one of the network topologies. The ring topology network is utilised to transfer packages by
utilising the same wire. The ring topology system is used to send packages by using a equal
wire. This text will bear on to each PC until its last objective is come to. Additionally any
individual who is taking a glance at the PC will absolutely see the message, hence will get
the system.
(Full) Mesh topology - Mesh topology is a more complicated topology. However, it is similar
to the other ones. When utilising the topology mesh all the nodes are connected inside with
another node on the network, which means in the event that one connection with another
node doesn't work or gets separated; the packet can in any case send it to the proper
directions normally around the harmed node.
Star topology - In PC networking star topology is the least complex topology to utilise, the
star topology utilises various nodes, which are connected with a router, which then serve
the normal connection through the greater part of the connected nodes. Furthermore, the
nodes then convey the packet to each other in various directions.
(Linear) Bus topology: The Bus topology is a network technology in which stations are
specifically connected to the same linear which is a half-duplex link, which is called a bus. All
of the stations get all the network traffic and all the traffic made by each node has the same
transmission concern. Transmitting all nodes on the same bus simultaneously, they utilise
media access control like a bus master.
Tree topology: Tree topology has the attributes of a bus topology and star topology. It has a
gathering of star figured workstations, which are then connected with a straight bus
backbone link. There are normally 10 nodes in a tree topology. It can send packets to other
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller 1999b. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $26.48. You're not tied to anything after your purchase.