Example bus network , ethernet, Computer Network Security

Ethernet is a commonly used LAN technology. It was discovered at EXROX PARC(Palo Alto Research Center) in 1970s.Xerox, Intel and Digital described it in a standard so it is also known DIX standard. The standard is now started by IEEE in which 802.3 standard of IEEE describe formats, voltages of cable length etc.

 The Ethernet needs bus topology. It needs a single coaxial cable. To which multiple devices connect. One Ethernet cable is sometimes known a segment. This segment is fixed to 500 meters in length. The minimum distance between connections is 3 meters.

ETHERNET SPEEDS:

 The Ethernet speed was approximately 3Mbps, and the current standard is 10Mbps the fast Ethernet performs at 100Mbps. There are also gigabits Ethernet state now.

 

ENCODING USED IN ETHERNET:

 The encoding needed in Ethernet is Manchester encoding. It uses signal modifies to encode data. e.g. A modification from positive voltage to 0 encodes as given in the figure below:

 

 

1866_Bus Network,Ethernet.png

Posted Date: 7/30/2012 6:56:43 AM | Location : United States







Related Discussions:- Example bus network , ethernet, Assignment Help, Ask Question on Example bus network , ethernet, Get Answer, Expert's Help, Example bus network , ethernet Discussions

Write discussion on Example bus network , ethernet
Your posts are moderated
Related Questions
Question: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume the following: the signal level for the previous bit for NRZI was a 1

Q1 (15 marks, 5 marks each part): This question has three parts: In a short paragraph (200-300 words) explain the fundamentals of Packet Switching and how it works. In a short pa

QUESTION (In this question, you will need to use the ISO 27001:2005 and ISO 27002:2005 standards) For each of the situations below, comment on the following: 1. Mention

Problem a) Consider a 1000 Mbps Ethernet with a single Store-N-Forward switch mid-way in the path between two nodes A and B. Assume that there are no other nodes on the network

Enterprise Information Security Policy (EISP) EISP also known as security policy directly supports the mission of the organization and sets the strategic direction, scope, and t

Develop a TCP-based client-server socket program for transferring a large message. The message transmitted from the client to server is read from a large file (size is about 30000

(a) Draw the waveform for an asynchronous transmission with the given specifications: 8 data bits with value 11010001 (LSB listed first here), one parity bit (even), one star

IPV6 DATAGRAM FORMAT It is given in the figure below:

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted

Describe the process a proposed standard goes through to become an RFC