Premium Essay

Ethernet, Local Talk, Token Ring

In:

Submitted By chhatwal777
Words 2787
Pages 12
Ethernet
The Ethernet protocol is by far the most widely used. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable before sending anything through the network. If the network is clear, the computer will transmit. If some other node is already transmitting on the cable, the computer will wait and try again when the line is clear. Sometimes, two computers attempt to transmit at the same instant. When this happens a collision occurs. Each computer then backs off and waits a random amount of time before attempting to retransmit. With this access method, it is normal to have collisions. However, the delay caused by collisions and retransmitting is very small and does not normally effect the speed of transmission on the network. The Ethernet protocol allows for linear bus, star, or tree topologies. Data can be transmitted over twisted pair, coaxial, or fiber optic cable at a speed of 10 Mbps. Ethernet is a physical and data link layer technology for local area networks (LANs). Ethernet was invented by engineer Robert Metcalfe. It uses wires (meaning it is not a wireless technology). The wires used for a LAN are mostly those headed by an RJ-45 jack, which is similar to the jack plugged into your telephone set, but twice as big. Some Ethernet networks use coaxial cables, but that’s rarer, and present in rather large LANs, which span over areas between buildings. Ethernet is by far the most popular LAN protocol used today. It is so popular that if you buy a network card to install on your machine, you will get an Ethernet card, unless you ask for something different, if of course that different protocol is available. Ethernet has evolved over the years. Today, you can get cheap Ethernet LAN cards with speeds up to 100 Mbps; while the fastest Ethernet reaches Gbps (1 Gbps

Similar Documents

Premium Essay

Admin

...LOCAL AREA NETWORK TECHNOLOGY Local area network technology is the technology used to make local area network to support data communication by connecting terminals, computers and printers within a small limited geographical area. Examples of LAN Technology include; Token Ring, Fibre Distributed Data Interface (FDDI) and ARCNET. Local Area Network is a data communication network connecting Terminals, Computers and Printers within a building or other geographically limited area. These devices can be connected through wired cables or wireless link. It is also a communication network for computers within a building or small group of buildings. It may be configured as; 1. A bus, a main channel to which nodes or secondary channels are connected in a branching structure. 2. A ring in which each computer is connected to two neighbouring computers to form a closed circuit. 3. A star in which each computer is linked directly to a central computer and indirectly to one another. Each of these has an advantage though a bus configuration has become the most. ETHERNET Ethernet is a standard communications protocol embedded in software and hardware devices, intended for building a local area network (LAN). It was designed by Bob Metcalfe in 1973, and through the efforts of Digital, Intel and Xerox (for which Metcalfe worked), "DIX" Ethernet became the standard model for LANs worldwide EVOLUTOIN OF ETHERNET Ethernet evolved to include higher bandwidth, improved media...

Words: 1134 - Pages: 5

Premium Essay

Dial Up

...What is a Dialup Internet Service Dialup internet service is a service that allows connectivity to the internet through a standard telephone line. By connecting the telephone line to the modem in your computer and inserting the other end into the phone jack, and configuring the computer to dial a specific number provided by your internet service provider(ISP) you are able to access the internet on your computer. Dial up internet service is provided through several ISP. The majority of internet service providers give you a set of telephone numbers either national or local that allows you to dial into a network that feeds into the internet. This allows you to receive and send email, search the World Wide Web, participate in chat rooms and plenty of other features the web has to offer. In order to get a dial up internet service a person must definitely have a computer and even more important a modem. There are different types of modems, and most of them are inexpensive to purchase. You can have an internal modem installed in a free slot of your computer, or you can have an external modem that's hooked up to the computer through cables. A telephone line is linked to the modem. The modem whether external or internal is controlled by software on the computer. With Microsoft Windows operating system that software is the Network Connection utility which allows you to connect to the internet. How? In the Network Connection utility you have to set up ISP profile so that the modem knows...

Words: 2286 - Pages: 10

Premium Essay

Term Paper

...Ethernet cards are essential parts of a network. They connect a computer to another computer or to a server by using a cable, an alternative to a wireless network. Ethernet Network – The Role of Ethernet in Computer Networks An ethernet network is a situation in which multiple computers are connected to one another and share the same Internet protocol address. An ethernet network has multiple computers on the same server. The benefit in this is that multiple networks do not need to be created. The downside to an ethernet network is that the connection of multiple computers leaves each computer open to hacking, malware, and viruses — in the event that a virus should attack one computer on the system. There are certain components necessary for an ethernet network: * Ethernet cable * Ethernet hub * Crossover cable * Router Ethernet Cable An ethernet cable is a necessary cord to connect two or more computers to the same network. Each computer must have its own ethernet cable in order to operate on the same ethernet network. Ethernet Hub An ethernet hub is a device used to string together each ethernet cable, which connects each computer on the same network. An ethernet hub contains several ethernet ports. Crossover Cable A crossover cable is a substitute for ethernet cables when one wants to connect two or more computers to the same ethernet network. Router A router is similar to an ethernet cable in that it connects two or more devices. Routers are more often used for...

Words: 9787 - Pages: 40

Premium Essay

Essay Btec Level 3 Unit 9 P2

...the types of networks available and how they relate to particular network standards and protocols LAN: This basically stands for local area network and it is also a computer network limited to a small area so it isn’t on a large geographical scale and some examples include the university, college or a home. There are some benefits for the users of LAN and it includes making it easier for the employees that are working in a company to communicate ad also share information. The most common type of LAN is the Ethernet which is known by most people. There are two types of Ethernets which are connecting an Ethernet cable to the hub and this will establish a connection and the other type of Ethernet is the wireless one which doesn’t require a cable. WAN: This stands for...

Words: 2688 - Pages: 11

Premium Essay

Wired Networking, Wireless Networking

...COVERED q  Communication Networks q  Network Types q  Classification Geographic q  Protocols and Standards q  System Requirements q  Labs & Exercises Communication & Networks BASEBAND Network is one in which the cable or other network medium can carry only a single signal at any time. vs. BROADBAND Network can carry multiple signals simultaneously, using discrete frequency for each signal. How Network Communicates ? Server Is a Computer running process that provides a service to other computers when they request it. Client Is a Computer running process that request a service from the server. Network Types Client - Server Peer to Peer Network’s Geographic PAN - Personal Area Network LAN - Local Area Network MAN - Metropolitan Area Network WAN - Wide Area Network ü  Size ü  Transmission...

Words: 2163 - Pages: 9

Premium Essay

Lab 4.1

...Austin Beecher Lab 4 4.1.1 Standards are used to make sure that everything works together error free. This will make sure that there isn't any packet errors. 4.1.2 The voltage of the transmitter only needs to be powerful enough to be detected. If the voltage was more powerful it would cause problems for the receiver. 4.1.3 Longer life span, immunity to external noise, resistants to interference, easier to install, and heat dissipation. It is used so you have a more protected and stable way of networking. 4.1.4 1) 1 mbps telephone wire voice only 2) 4mbps local talk/telephone 3) 16 mbps 10BaseT Ethernet 4) 20 mbps Token Ring 5) 100 mbps (2 pair) 100BaseT Ethernet 5e) 1000 mbps (4 pair) Gigabit Ethernet 6) 1000 Mbps Gigabit Ethernet 6a) 10000 Mbps Gigabit Ethernet 4.1.5 4.1.6 It has the wire/conductor in the middle, dielectric covers that, then a foil shield, then a braid shield, and lastly a jacket the covers all of it. 4.1.7 It will have to be a close together network system you are running. 4.1.8 Crossover cable except s1 to s2 and G to s2 that is a straight because of the distance. 4.1.9 Yes they should communicate just fine but if they do have a problem they should move the ones over 100m closer so they can use crossover cables instead. 4.1.10 Multimeter – it is used to measure electric current to make sure your cable has the correct current Tone Generator – identification for multi-channel audio systems like HD TV channels Pair...

Words: 292 - Pages: 2

Premium Essay

Computer Networks

...computer networks Table of Contents DECLARATION 2 INTRODUCTION 5 PURPOSE 5 NETWORK CRITERIA 6 Performance 6 Reliability 6 Security 6 TYPES OF NETWORK CONNECTION 6 NETWORK CLASSIFICATION 7 Connection method 7 Wired technologies 7 Wireless technologies 8 Scale 9 Personal Area Network 9 Local Area Network 9 Metropolitan Area Networks 10 Wide Area Network 10 Network Architecture 10 BASIC HARDWARE COMPONENTS 14 Network interface cards 14 Repeaters 14 Hubs 14 Bridges 15 Switches 15 Routers 15 Modem 16 CABLE STANDARD 16 Connectors and other information 16 Conductors required 17 Characteristics 17 ACCESS CONTROL METHODS 19 Token Based Access 19 Token priority 19 Carrier Sense Multiple Access with Collision Detection (CSMA/CD) 20 Collision detected procedure 20 INTRODUCTION A computer network, often simply referred to as a network, is a group of computers and devices interconnected by communications channels that facilitate communications among users and allows users to share resources. Networks may be classified according to a wide variety of characteristics. A computer network allows sharing of resources and information among interconnected devices. In the 1960s, the Advanced Research Projects Agency (ARPA) started funding the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defense. It was the first computer network in the World.  Development of the network...

Words: 5343 - Pages: 22

Free Essay

Networks / Data Communications

...covered most of the media types available for our networks Protocols that run over the top of the media and the standards they follow, the final topic here is choosing a design of a network by choosing media types and infrastructure that will best suit the needs of the business. INFRASTRUCTURE When to use hubs verses routers and switches is not always a clear-cut decision. In many cases the decision is made due to cost not necessarily best choice. For most office environments a hierarchical design with 10/100/1000 Mbps Ethernet hub/repeaters are adequate. However, there are times when high-speed transfer is worth the cost of installing switches. A good example may be in the motion picture industry where large full motion video clips are developed and edited on computer screens. Due to the size of these kinds of files and the critical nature of time in the industry full duplex switching in the LAN environment may be called for along with Gigabit Ethernet or higher = ). There is an old saying out there that was “route when you can, bridge if you must” This saying still holds true through time. However, switching has for the most part replaced most bridges today. Routing is the best means of isolating and reducing network traffic, which in the end equates to better network performance, however the speeds of the new switches can be just as effective these days. There are some cases where specific non-routable protocols must be used due to application specific requirement...

Words: 3575 - Pages: 15

Free Essay

Dude

...Learning Objectives - OSI Overview After working with the content of the OSI model overview, you should be able to: Draw a diagram showing how communication takes place between two hosts on a network and the software and hardware objects involved in that communication. Describe the role of layered architectures in networks and data communications. Differentiate between the logical and physical structure of a network. Describe the use and importance of protocols in networking. Describe what data is accessible at each layer of the OSI model during communication and the potential risks avoided based on the placement of protection mechanisms at each layer. Description - OSI Overview Welcome to the OSI model. In this learning object, we will describe each of the layers of the OSI model and its associated protocols. The seven layers of the OSI model are physical, data link, network, transport, session, presentation, and application. We start with this overview, where you will learn how the seven layers work together to provide to users a seamless integration and operation of functions across networks worldwide in a way that potentially eliminates any indication of where the computing Protocols - Application Layer The protocols associated with the application layer include: DNS (Domain Name Service): resolves domain names to IP addresses FTP (File Transfer Protocol): transfers data over a network from one computer to another HTTP (Hypertext...

Words: 9561 - Pages: 39

Premium Essay

Myself

...TP  · SMPP  · SMTP  ·DHCP  · SNMP  · Telnet  · Netconf  ·(more) | 6. Presentation Layer | MIME  · XDR  · TLS  · SSL | 5. Session Layer | Named Pipes  · NetBIOS  · SAP  · L2TP  ·PPTP | 4. Transport Layer | TCP  · UDP  · SCTP  · DCCP  · SPX | 3. Network Layer | IP (IPv4, IPv6)  · ICMP  · IPsec  · IGMP  ·IPX  · AppleTalk | 2. Data Link Layer | ATM  · SDLC  · HDLC  · ARP  · CSLIP  ·SLIP  · PLIP  · IEEE 802.3  · Frame Relay · ITU-T G.hn DLL  · PPP  · X.25 | 1. Physical Layer | EIA/TIA-232  · EIA/TIA-449  · ITU-T V-Series  · I.430  · I.431  · POTS  · PDH  ·SONET/SDH  · PON  · OTN  · DSL  ·IEEE 802.3  · IEEE 802.11  · IEEE 802.15 · IEEE 802.16  · IEEE 1394  · ITU-T G.hn PHY  · USB  · Bluetooth · Blue | This box: view · talk · edit | The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization. It is a way of sub-dividing a communications system into smaller parts called layers. A layer is a collection of similar functions that provide services to the layer above it and receives services from the layer below it. On each layer, an instance provides services to the instances at the layer above and requests service from the layer below. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that make up the contents of the path...

Words: 3915 - Pages: 16

Premium Essay

Siwess Report

...An automatic fire alarm system is an active fire protection system designed to detect the unwanted presence of fire by monitoring environmental changes associated with combustion. In general, a fire alarm system is either classified as automatic, manually activated, or both. The basic modern system consists of a dependable primary power supply, a secondary or backup power supply, any number of "initiating devices" and "notification appliances." Automatic fire alarm systems can be used to notify people of the need to evacuate in the event of a fire or other emergency, to summon emergency forces aid, and to prepare the structure and associated systems to control the spread of fire and smoke. However, the use of fire alarm system in buildings and campuses in Nigeria is not encouraging at all. FUNDAMENTAL COMPONENTS THAT MAKE UP THE FIRE ALARM SYSTEM • Fire alarm control unit (panel): A fire alarm control panel is the central control device that receives information from input devices such as smoke detectors, heat detectors, manual call points, etc. The panel then processes the information to trigger output devices which are usually bells, horns, or strobes. Panels usually have a number of loops within the range of two to 20 loops. At the present time, four or six loop panels are the most common. Each loop can have a number of devices connected to it. Each device has its own address, and so the panel knows the state of each individual device connected to it. There are three types...

Words: 14033 - Pages: 57

Premium Essay

Essay

...Computer network components consist of 2 parts - the items that are to be connected and the equipment that connects them The equipment to be networked are those components that you want to be able to communicate with each other or hardware that you want to share A network is defined as a group of interconnected computers but it really is more than that. The connected computers communicate with each other and share resources on the network. Common resources include printers, disk storage, databases and access to other networks such as the internet. The diagram below illustrates some typical components. Hardware that connects the computers and peripherals Something is needed to carry the electronic signals between your computers and whatever they connect to. You can use a wired or wireless connection. Network cable that looks like thick telephone wire can be used to carry the data packets to and from your computer. These packets can also be transmitted like radio signals from a wireless transmitter to a wireless receiver. The following devices connect the members of the network: 1. network hub 2. network switch 3. broadband modem 4. computer network router 5. router/switch 6. nic card 1. Network Hub - The hub or network hub connects computers and devices and sends messages and data from any one device to all the others. If the desktop computer wants to send data to the lapop and it sends a message to the laptop through the hub, the message will get...

Words: 1558 - Pages: 7

Premium Essay

Sql Quiz

... * Internetworking Basics * Introduction to LAN Protocols * Introduction to WAN Technologies * Bridging and Switching Basics * Routing Basics * Network Management Basics * Open System Interconnection Protocols LAN Technologies A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer users many advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications. The following articles provide information different LAN technologies: * Ethernet Technologies * Token Ring/IEEE 802.5 WAN Technologies A WAN is a data communications network that covers a relatively broad geographic area and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the...

Words: 217433 - Pages: 870

Premium Essay

Computer

...THEORY The correct answer(s): D What is the default IPX Ethernet encapsulation? A.) SNAP B.) Arpa C.) 802.2 D.) Novell-Ether E.) SAP Novell-ether is the default LAN encapsulation. Novell-ether is 802.3. The correct answer(s): A What must be true for two Routers running IGRP to communicate their routes? A.) Same autonomous system number B.) Connected using Ethernet only C.) Use composite metric D.) Configured for PPP For two routers to exchange IGRP routes they must be configured with the same autonomous system number. The correct answer(s): C The following is partial output from a routing table, identify the 2 numbers in the square brackets; '192.168.10.0 [100/1300] via 10.1.0.1, 00:00:23, Ethernet1' A.) 100 = metric, 1300 = administrative distance B.) 100 = administrative distance, 1300 = hop count C.) 100 = administrative distance, 1300 = metric D.) 100 = hop count, 1300 = metric The first number is the Administrative distance and the seconds number is the metric. In this case it is an IGRP metric. The correct answer(s): A B C Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's Routing loops can be prevented by split horizon, poison reverse and holddown times. The other two choices relate to Link State. The correct answer(s): A Which statement is true regarding full duplex? A.) Allows for transmission and receiving...

Words: 23850 - Pages: 96

Premium Essay

Data Communications and Networking by Behrouz A.Forouzan

...Don't forget to check out the Online Learning Center, www.mhhe.com/forouzan for additional resources! Instructors and students using Data Communications and Networking, Fourth Edition by Behrouz A. Forouzan will find a wide variety of resources available at the Online Learning Center, www.mhhe.comlforouzan Instructor Resources Instructors can access the following resources by contacting their McGraw-Hill Representative for a secure password. PowerPoint Slides. Contain figures, tables, highlighted points, and brief descriptions of each section. Complete Solutions Manual. Password-protected solutions to all end-of-chapter problems are provided. a Pageout. A free tool that helps you create your own course website. D Instructor Message Board. Allows you to share ideas with other instructors using the text. a o Student Resources The student resources are available to those students using the book. Once you have accessed the Online Learning Center, click on "Student Resources," then select a chapter from the drop down menu that appears. Each chapter has a wealth of materials to help you review communications and networking concepts. Included are: Chapter Summaries. Bulleted summary points provide an essential review of major ideas and concepts covered in each chapter. a Student Solutions Manual. Contains answers for odd-numbered problems. Glossary. Defines key terms presented in the book. Flashcards. Facilitate learning through practice and review. a Animated Figures...

Words: 59848 - Pages: 240