Sie sind auf Seite 1von 22

INFU11

2
[Type the abstract of the document here. The abstract
is typically a short summary of the contents of the
document. Type the abstract of the document here.
The abstract is typically a short summary of the
contents of the document.]

Samantha
Govender
12015123

Introduction
Question 1
Question 2
Question 3
Question 4
Question 5
Question 6
Question 7
Question 8
Question 9
Conclusion
Bibliography

CONT
ENTS
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page

2
3
4
5-6
7
8
9
10-15
16-17
18
19
20

INTRO
DUCTI
ON

My assignment deals with theory that was learnt from lessons in class as well as
research. It portrays my knowledge in this module and my frame of reference.

QUES

QUES
TION
2

QUE
STION
3

QUES
TION
4

Methods that can be used instead of sending an email are: letters, notice boards
and meeting with colleagues and employees. The same message can be sent to
multiple recipients via word of mouth, meetings, memos and letters. These
methods are not cost effective and then allow the company to pay for the use of
letters and memos whereas emails are free and cost effective to everyone.
Emails are also fast and effective, multiple recipients can be added and its faster
and quicker. The methods of using letters, notice boards, memos and meeting do
not violate any security polocies of the company.

5.1 IP Address
5.2 IP Address
5.3 Packet

QUE
STION
5

5.4 Hosts
5.5 Internet
5.6 Voice
5.7 Transmission
5.8 Signal
5.9 Server
5.10 Switch
5.11 P2P
5.12 Bit Torrent
5.13 Mail Server
5.14 Software
5.15 Chokers

QUES
TION
6

6.1. Network Infrastructure


6.2.
6.2.1. It requires more cabling than a bus topology.
6.2.3. Its centralised nature makes the network management easier.
6.4.
6.4.2. Easy to troubleshoot and configure.
6.5
6.5.4. Mesh
6.6. Simplicity: The topology is easy to understand, establish, and navigate.
Better performance: Passing of Data Packet through unnecessary nodes is
prevented by this topology
6.7. Point to Point.

QUES
TION
7

10

11

12

13

14

15

Name:
Surname:
Student Number:

16

QUES
TION
8

Names & functions of protocols that are used on the internet

Abbreviation
SLIP

Protocol
Serial Line Internet
Protocol

PPP

Point to Point Protocol

IP

Internet Protocol

ICMP

Internet Control Message


Protocol

ARP

Address Resolution
Protocol

TCP

Transmission Control
Protocol

UDP

Unreliable Connection
Less Protocol

BOOTP

Bootstrap Protocol

Function
A form of data
encapsulation for serial
lines.
A form of serial line data
encapsulation that is an
improvement over SLIP.
Provides a mechanism to
use software to address
and manage data
packets being sent to
computers.
Provides management
and error reporting to
help manage the process
of sending data between
computers.
Enables the packaging of
IP data into Ethernet
packages.
A reliable connection
oriented protocol used to
control the management
of application level
services between
computers.
Used to control the
management of
application level services.
Used to assign an IP
address to diskless
computers and tell it
what server and file to
load which will provide it
with an operating
system.

17
DHCP

Dynamic Host
Configuration Protocol

SNMP

Simple Network
Management Protocol

RIP

Routing Information
Protocol

BGP

Border Gateway Protocol

FTP

File Transfer Protocol

TFTP

Trivial File Transfer


Protocol

SMTP

Simple Mail Transfer


Protocol

POP

Post Office Protocol

Assigning and controlling


the IP addresses of
computers on a given
network.
Used to manage all types
of network elements
based on various data
sent and received.
Used to dynamically
update router tables on
WANs or the internet.
A dynamic router
protocol to communicate
between routers on
different systems.
Allows file transfer
between two computers
with login required.
Allows files to be
transferred between two
computers with no log in
required.
Communication protocol
used by some of the
outgoing mail servers.
An incoming mail server
uses POP to receive email messages.

18

9.1. Cladding

QUES
TION
9

9.2. Bandwidth, Interference susceptibility, Maximum Segment Length.


9.3. Insulating Layer
9.4. MT-RJ
9.5. Attenuation
9.6. 802.11ac
9.7. Plenum
9.8. PVC
9.9. Plenum-rated
9.10. Fibre optic cable
9.11. Category 1
9.12. RJ-45
9.13. False
9.14. Fibre optic
9.15. Fibre optic, category 6
9.16. Crosstalk
9.17. Differential Signals

19

CONC
LUSIO
N

20

My assignment concludes with a better understanding of the section covered as


well as a wider frame of reference and clear understanding of the sections
covered.

21

Bibliography
The Independant Institute Of Education. (2014). Internet Fundamentals A.

Das könnte Ihnen auch gefallen