Professional Documents
Culture Documents
Definition Of Networking
Networking is the practice of linking two or more computing devices together for the purpose of sharing data and are built with a mix of computer hardware and computer software.
Bridge
Connects 2 networks of same technology extended LAN Filters/forwards/floods based on MAC Link layer - frames
Bridge
Switch
Connects 2+ networks packetpacket-switched network Reduces collisions Switch
C I SC O SYS TE M S
C I SC O SYS TE M S
Router
CISCOS YS TEMS
TYPES OF NETWORKS
LAN LOCAL AREA NETWORK IS A SMALL GEOGRAPHICAL AREA SUCH AS OUR COLLEGE. MAN METROPOLITAN AREA NETWORK IS A NETWORK OVER A LARGER GEOGRAPHICAL AREA SUCH AS A CITY. WAN WIDE AREA NETWORK IS A NETWORK USED OVER AN EXTREMELY LARGE GEOGRAPHICAL AREA SUCH AS ALL THE CONTINENTS.
Technologies:
Ethernet 10 Mbps, 100Mbps Token Ring 16 Mbps FDDI 100 Mbps
Ethernet
Developed in 1976 by Xerox PARC (Palo Alto Research Center) in cooperation with DEC and Intel Is a fast and reliable network solution One of the most widely implemented LAN standards Can support data rates in the range of 10Mbps10Mbps- 10 Gbps Used with a bus or star topology
Source:http://burks.brighton.ac.uk/burks/pcinfo/hardware/ethernet/fddi.htm
LAN
Runs a 100 Mbps LAN
DC
Runs a 1Gbps LAN
TOPOLOGIES IN NETWORKING
NETWORKS ARE BROKEN INTO VARIOUS TOPOLOGIES. THREE MAIN TOPOLOGIES ARE AS FOLLOWS: yBUS TOPOLOGY ySTAR TOPOLOGY yRING TOPOLOGY
Bus Topology
BUS TOPOLOGY ALLOWS INFORMATION TO BE DIRECTED FROM ONE COMPUTER TO THE OTHER. LOTS OF BINARY COLLISION THOUGH.
Star Topology
STAR TOPOLOGY IS THE MOST COMMON TYPE USED. ALL COMPUTERS ARE ATTACHED TO A HUB. LESS COLLISIONS AND MOST EFFICIENT.
Ring Topology
RING TOPOLOGY- USES A TOKEN TO PASS INFORMATION FROM 1 COMPUTER TO THE OTHER. A TOKEN IS ATTACHED TO THE MESSAGE BY THE SENDER TO IDENTIFY WHICH COMPUTER SHOULD RECEIVE THE MESSAGE. AS THE MESSAGE MOVES AROUND THE RING, EACH COMPUTER EXAMINES THE TOKEN. IF THE COMPUTER IDENTIFIES THE TOKEN AS ITS OWN, THEN IT WILL PROCESS THE INFORMATION.
A DISADVANTAGE OF A TOKEN RING IS IF ONE COMPUTER IS BROKEN OR DOWN, THE MESSAGE CANNOT BE PASSED TO THE OTHER COMPUTERS.
Protocol
Set of rules that allow peering entities to communicate. Example: 2 friends talking on the phone. Peering entities or peers: user application programs, file transfer services, e-mail services, etc. eProtocol layers: reduce design complexity. Main idea: each layer uses the services from lower layer and provide services to upper layer. Higher layer shielded from the implementation details of lower layers. Interface between layers must be clearly defined: services provided to upper layer.
H.R DEPTT.WORKS
CHECKING ,TAKING CARE OF ATTENDANCE &OVER-TIME OF &OVEREMPLOYES SALARY MAINTENANCE EMP.s SAFETY MEASURES
GRATUITY
RESOURCES
BOOKS : Andrew S. Tanenbaum Uyless Black WEBSITES : http://en.wikipedia.org http://www.cisco.com http://www.networktutorial s.info/