100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Essay

Unit 5: Managing Networks { P1 }

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
02-03-2021
Written in
2020/2021

P1 describe network technologies

Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
March 2, 2021
Number of pages
6
Written in
2020/2021
Type
Essay
Professor(s)
Unknown
Grade
A+

Subjects

Content preview

UNIT 5: MANAGING NETWORKS


P1: Describe network technologies
The network technologies are networking operating systems, networking protocols, networking
layout and networking devices. Here is a report describing the network technologies.

Networking operating systems:

Windows

Windows is an operating system that is developed by
Microsoft and was introduced on 10 th November 1983.
W3indows provides a way to uses to run software, store files
connect the internet, watch videos, use the calendar and
many more. Windows has been the most used operating
systems for laptops and PCs. It is designed for professional
purpose as well as personal computing. Windows can be
installed in multiple brand laptops or PCs such as Sony, Dell,
Samsung and HP.



Linux

Linux is an operating system created to be a version of UNIX which runs on
x86 based PC architecture. Linux has many different versions and varieties
which is put across to different hardware platforms. Linus is free to
download which makes it very popular, as many other operating systems
have to be paid for. Linux versions come in workstation or server
installations includes both networking operating systems. Linux is a
networking operating system because it is an open source operating
system that underpin for web servers, cars and phone.



Networking protocols:

SNMPv3

SNMPv3 stands for Simple Network Management Protocol v3. It is a network protocol for organizing
and collecting data about managed devices on networks for modified information to change the
device behaviour. SNMPv3 provides environment that is secure for management and protect security
goals such as masquerade and modification of information. It uses authentic protocol for USM (user-
based security model) and it is stateless protocol as it is designed with the least amount of
interactions between the manager and agent.

ICMP

ICMP (Internet Control Message Protocol) is a transport protocol that communicates data about
network connection issues to the source of transmission. It sends error messages such as source



Jessreen Sandhu

, routed failed and network location unreachable between the gateway and server to the internet.
ICMP uses data packet structure with variable-size data section and 8-byte header.

Networking Layout:

Cabling

 Cable Infrastructure is a system of cabling which provides a
complete telecommunications infrastructure. It serves a wide
range of users such as transmit data through a computer
network. The cable infrastructure is unique as the variation of
function of the cabling installation.

 Twisted pair is a type cable wire that has two conductors in a single
circuit and are twisted together to improve the electrical compatibility.
However, if a single or untwisted conductor is used it will reduce the
electromagnetic radiation. This is because a twisted pair is a part of a
balanced circuit and it reduce the noise currents induced by magnetic
fields.

 A Fibre optics alludes to the medium and the innovation related with
the transmission of data as light heartbeats along a glass or plastic
strand or fibre. Fibre optics is utilized significant distance and elite
information organizing. Fibre optics are additionally ordinarily utilized
in media transmission administrations, for example, web, TV and
phones.

 Coaxial cable structure a transmission line and restrict the
electromagnetic wave inside the link between the middle conductor
and the shield. The transmission of energy in the line happens
absolutely through the dielectric inside the link between the
transmitters.



Topologies

 Ring Topology
The ring topology can be understood and utilised with ease,
which is also one of the network topologies. The ring topology
network is utilised to transfer packages by utilising the same
wire. The ring topology system is used to send packages by
using an equal wire. This text will bear on to each PC until its
last objective is come to. Additionally, any individual who is
taking a glance at the PC will absolutely see the message,
hence will ger the system.

 Star Topology
In PC networking star topology is the least complex
topology to utilise. The star topology utilises the various


Jessreen Sandhu

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
jessykaur Staffordshire University
Follow You need to be logged in order to follow users or courses
Sold
31
Member since
4 year
Number of followers
23
Documents
36
Last sold
1 year ago

2.3

12 reviews

5
2
4
0
3
2
2
3
1
5

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions