Classy Writers

Classical Writers

Computer Networks

It is said that in 1990, UTP based Ethernet standard was introduced. This form of technology used 10BASE-T standard. The technology used a star topology just like nowadays switches devices. During this time, it was said that hubs used to improve the Ethernet as compared to older standards. However, hubs used to possess various drawbacks, and that is why these devices are rarely found in the market (Shinde, 2009, p.25).One of the disadvantages associated with hubs is that it operates at the physical layer of the network. Due to this reason when the hub receives an electric signal it repeats to all ports. As a result, there is wastage of bandwidth as all devices connected to the device will experience collisions.
When two or more workstations send packets at the same instance, the electrical collision occurs and ends up corrupting the signals. Broadcast and unicast frames that are sent to one or more computers at the same time are heard by all machines that are in the network(Shinde, 2009,p.44).Devices that are in the network usually implement half duplex, and this is why they do not send and receive data at same time. As a result, the form of network is said to be inefficient (Shinde, 2009, p.45).
Ethernet Bridges came to improve the performance problems with 10BESE associated hubs. These devices brought improvements such as they separated the collision domains and reduced the number of collisions in any given network. It is said that bridges increase the bandwidth by ensuring that each collision domain has its own bandwidth (Shinde , 2009, p.77)
When using the switch topology, switches normally makes every machine have its collision domain hence reducing number of collisions. Switches are also used in the implementation of VLAN technology in any given local area network. VLAN that are implemented using switches makes the network secure since it becomes easy to manage small VLANs (Shinde, 2009,p. 77).
Regarding bandwidth dependency services, the issue of TCP and UDP protocols is considered.UDP does not support retransmission, and it is connectionless. However most TCP services are bandwidth hungry, implying that they only use bandwidth when they are being used. Some of these TCP services are HTTP, FTP, Secure Shell, Telnet and Post Office Protocol (POP3).Latency in any given network can be tracked using QOS where jitter service operations are given priority (Shinde, 2009, p.66).
Recruitment LTD LAN topology is designed with various networking devices to ensure that the network operates effectively. The network is using three hierarchical models such as core layer, distribution layer and access layer. The three hierarchical model of network allocated different roles to different layers. The presence of switches shows that the LAN is also implemented using VLANs to ensure that various departments and roles are managed by different people and also making the network be easy to manage. VLAN are configured in switches and with this in place various roles of different departments of the company depend on which VLAN every sub-network is operating from (Shinde, 2009).

 

 

References

Shinde, S. (2009). Computer network. New Delhi: New Age International Ltd.

 

Place Order Now

Leave a Reply

Your email address will not be published. Required fields are marked *