Network concept pdf




















Bluetooth c. Ethernet Network Card [C]. The ……. Are the certain sets of rules that determine how data should be transferred over the network.

Protocols b. Network cards c. Both [A]. Nodes b. PC [A]. Network b. Information c. Resources Sharing [A]. Is a device that connects wireless communication devices to form a wireless network. WAN b. Mr Hemant has set up his office with 50 computers. He wants to connect computers and peripheral device within his office building with wires. Which type of network will you suggest him to use? Which type of network architecture is the most suitable, when a few number of computers having similar power and capacity are to be networked together.

Arpita wants to attach her computer to a network so that it can participate in network communication. Which card will you suggest her to use. Raman wants to send a few photographs and songs to on of his friends by interconnecting mobile phone using short range wireless connection. Which technology would be the most suitable for her.

WAP:- Wireless Access Point is a device that connects wireless communication devices to from a wireless network. Bluetooth:- Bluetooth is a wireless technology used to interconnect mobile phones, computers, Printers using short-range wireless connection for more information visit. Server:- A Server is a computer that provides services to clients and controls access to hardware, software and other resources. Node:- The computer in a network can communicate with each other as well as work independently.

Answer:- A computer network can be defined as a group of computers and other peripheral devices that are linked together for the purpose of sharing data and hardware resources. Answer:- 1. Efficient use of storage media 2.

Preserving information. Definition LAN is a computer network that connects computers in small areas. WAN is a network that covers a broad area using private or public network transports. Data transfer rates LAN offers high data transfer rates. WAN has lower data transfer rates due to congestion. Speed mbps mbps. Bandwidth High bandwidth is available for transmission. Low bandwidth available for transmission.

Data Transmission Error Experiences fewer data transmission errors. Experiences more data transmission errors. Cost Set-up costs are low as the devices required to set up the networks are cheap. Set-up costs are high, especially in remote locations where set-up is not done. However, WANs using public networks are cheap.

Maintenance costs Maintenance costs are low as the area coverage is small. Maintenance costs are high as the area coverage is world-wide. Congestion Less congestion More congestion. Answer:- Networking Security means protecting data and resources from any unauthorized access. It is the most important aspect in computer networking. Only authorized persons can access or modify data. Consider the following points that may happen in any organization. Answer:- It is a network , where several computers.

Called clients or workstations are connected to the main computer called the server. Unknown 20 April at Unknown 17 June at Unknown 27 August at Unknown 2 September at Unknown 5 October at Unknown 7 May at Unknown 9 May at Unknown 13 June at Unknown 11 July at Unknown 20 July at Unknown 30 April at Unknown 8 July at Unknown 12 July at Unknown 18 September at Unknown 11 May at Unknown 8 June at Unknown 10 December at Unknown 12 May at Unknown 27 May at Unknown 17 August at Unknown 30 May at Unknown 24 March at The IEEE Protocols enable communication between two or more end devices.

A protocol is a set of predefined rules that specifies standards for a particular stage or all stages of the communication. Both models divide the entire communication process into logical layers. Further, they explain how the protocols work in each layer to enable the communication process. A networking device works between the end devices. It controls and forwards the flow of data. Based on the functionalities, a networking device can be categorized into three types; forwarding device, connecting device, and securing device.

A forwarding device forwards the data. This device usually has multiple ports which are used to connect more than two end devices in a single network. Hub, bridge, and Ethernet switch provide this functionality.

A connecting device connects two or more different types of media and protocols. If two end devices are located in different logical networks or connected through the different types of media, they need a connecting device to exchange the data.

Router and Multilayer switch provides this functionality. A securing device secures the data from unauthorized access. When a data packet arrives in it, based on pre-defined rules it performs security checks and takes the forwarding decision. Common devices which provide this functionality are the Firewall and NAT.

After learning the essential components of the network, this should be your next topic. Computer networks are mainly categorized based on the geographical location, access types, and relationship between end devices. Based on allowing users to access network resources, the network is classified into three types; Intranet, Extranet, and the Internet.

An Intranet is a private network. In this network, external users are not allowed to access the network resources. An Extranet is also a private network. But in this network, after proper authorization, external users are allowed to access a small portion of the network. The Internet is the public network. Any user can connect with this network.

In peer to peer network, all end devices have equal rights. We do not accept any kind of Guest Post. Except Guest post submission, for any other query such as adverting opportunity, product advertisement, feedback, suggestion, error reporting and technical issue or simply just say to hello mail us ComputerNetworkingNotes gmail.



0コメント

  • 1000 / 1000