Example bus network , ethernet, Computer Network Security

Ethernet is a commonly used LAN technology. It was discovered at EXROX PARC(Palo Alto Research Center) in 1970s.Xerox, Intel and Digital described it in a standard so it is also known DIX standard. The standard is now started by IEEE in which 802.3 standard of IEEE describe formats, voltages of cable length etc.

 The Ethernet needs bus topology. It needs a single coaxial cable. To which multiple devices connect. One Ethernet cable is sometimes known a segment. This segment is fixed to 500 meters in length. The minimum distance between connections is 3 meters.

ETHERNET SPEEDS:

 The Ethernet speed was approximately 3Mbps, and the current standard is 10Mbps the fast Ethernet performs at 100Mbps. There are also gigabits Ethernet state now.

 

ENCODING USED IN ETHERNET:

 The encoding needed in Ethernet is Manchester encoding. It uses signal modifies to encode data. e.g. A modification from positive voltage to 0 encodes as given in the figure below:

 

 

1866_Bus Network,Ethernet.png

Posted Date: 7/30/2012 6:56:43 AM | Location : United States







Related Discussions:- Example bus network , ethernet, Assignment Help, Ask Question on Example bus network , ethernet, Get Answer, Expert's Help, Example bus network , ethernet Discussions

Write discussion on Example bus network , ethernet
Your posts are moderated
Related Questions
Problem 1 . Show various features of a 1G network Total three features for each feature of 1G Problem 2. Describe how a cellular network works with functional block diagram

Question: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

Maximum Transmission Unit  (MTU) Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Uni

You are hired as a consultant to help design a digital library in which books are scanned and stored digitally and made available to users of the World Wide Web. Assume that the li


Discuss the risks of having a single root user

"Using the CNSS Model, examine each of the cells and write a brief statement on how you would address the components respesented in that cell"

MB Enterprise Systems Ltd based in Mauritius is a company specialized in application development with Europe as the main customer base. The company has implemented CMMI and has rec

Application-Based IDS Application-based IDS (AppIDS) is an advanced version of HIDS. It examines application for abnormal events. The ability to view encrypted data is the uniqu

Problem 1 Solve the following Caesar cipher by showing your working: EM KIUM EM AIE EM KWVYCMZML Problem 2 Compare and contrast between block and stream ciphers, listin