LAN, MAN and WAN Student Name University Network Telecommunication Professor Name October 21, 2013 LAN, MAN and WAN Computer networking is simply the communication between two or more computers that allow them to share information and hardware resources. This is really one of the most important contributions to the information age since personal computers were invented. The connection and communication of just two computers exchanging data and devices is the most fundamental
Words: 1265 - Pages: 6
IEEE Std 802-2001® (Revision of IEEE Std 802-1990™) IEEE Standards 802® IEEE Standard for Local and Metropolitan Area Networks: Overview and Architecture IEEE Computer Society Sponsored by the LAN/MAN Standards Committee Published by The Institute of Electrical and Electronics Engineers, Inc. 3 Park Avenue, New York, NY 10016-5997, USA 7 February 2002 Print: SH94947 PDF: SS94947 IEEE Std 802®-2001 (R2007) (Revision of IEEE Std 802-1990) IEEE Standard for Local and Metropolitan
Words: 19863 - Pages: 80
NETWORKING Victor P. Mangulabnan Director, Professional Services Division FYI… Ø 1 DAY TRAINING (Informal) Ø BREAK – Lunch Ø Mobile Phone – Off or Silent Mode Ø Raise a hand if there’s a question Ø Introduce yourself NETWORKING Group of Computers connected together by cables or some other medium. Is a connection of two or more components that gives people the ability to share software, peripheral devices, communicate with each other and share processing power. IS ALL ABOUT
Words: 2163 - Pages: 9
incrementing bandwidth requisites of LANs; the ever evolving technology of LAN wire is hardly the “telephone wire” that the majority think of it as. Below is a chart showing the LANs growth in capacity LAN | Bandwidth | Ethernet | 10 Mb/s | FDDI | 100 Mb/s | Fast Ethernet | 100 Mb/s | ATM | 55, 155 Mb/s | Gigabit Ethernet | 1,000 Mb/s (1 gigabit/s) | 10 Gigabit Ethernet | 10 Gb/s | But still, even with all the efforts that copper cabling manufactures have made to stay relevant
Words: 335 - Pages: 2
2.1.1 Network History The history of computer networking is complex. It has involved many people from all over the world over the past 35 years. Presented here is a simplified view of how the Internet evolved. The processes of invention and commercialization are far more complicated, but it is helpful to look at the fundamental development. In the 1940s computers were large electromechanical devices that were prone to failure. In 1947 the invention of a semiconductor transistor opened
Words: 2656 - Pages: 11
------------------------------------------------- OSI model From Wikipedia, the free encyclopedia OSI model | 7. Application Layer | NNTP · SIP · SSI · DNS · FTP · Gopher · HTTP · NFS · NTP · SMPP · SMTP ·DHCP · SNMP · Telnet · Netconf ·(more) | 6. Presentation Layer | MIME · XDR · TLS · SSL | 5. Session Layer | Named Pipes · NetBIOS · SAP · L2TP ·PPTP | 4. Transport Layer | TCP · UDP · SCTP · DCCP · SPX | 3. Network Layer | IP (IPv4, IPv6) · ICMP · IPsec · IGMP ·IPX · AppleTalk
Words: 3915 - Pages: 16
QUESTION 1 Peer-to-peer also known as decentralized network A peer-to-peer network is quite small, simple and less expensive network structure that connects about 10 computers. All computers have both client and server functionality. This means all can send and receive at the same time. There is no central server on this type of a network. All computers on this network have the same capability to use the resources such as hardware, software and data files available on the network. This network
Words: 1677 - Pages: 7
users.”). 2 For network protocols, identify which of following core protocols are in use and expand around them: a. Layer 1 and 2: what network interfaces are involved? Example of network interfaces are Ethernet, FDDI, ATM, Frame-Relay, T1 etc. b. Layer 3: It’s important to first determine which network protocol suite(s) is/are used in the network(example of network protocol suites are TCP/IP, Appletalk, IPX/SPX etc). The core protocol
Words: 376 - Pages: 2
error correction technique should be used for a certain transmission exchange. Reason being, different applications have different policies around how to handle bit errors, in order to not violate their desired usage of the protocol. Take for example FDDI (Fiber Distributed Data Interface) the high-speed ring network which is used as the network backbone for wide area networks because of its high bandwidth support. The local area network specification requires a very rigid bit error probability of about
Words: 511 - Pages: 3
The ATM reference model, which has two forms - one for the user-to-network interface (UNI) and the other for the network-to-node interface (NNI), is divided into three layers: the ATM adaptation layer (AAL), the ATM layer, and the physical layer. The AAL interfaces the higher layer protocols to the ATM Layer, which relays ATM cells both from the upper layers to the ATM Layer and vice versa. When relaying information received from the higher layers, the AAL segments the data into ATM cells. When relaying
Words: 506 - Pages: 3