Example bus network , ethernet, Computer Network Security

Ethernet is a commonly used LAN technology. It was discovered at EXROX PARC(Palo Alto Research Center) in 1970s.Xerox, Intel and Digital described it in a standard so it is also known DIX standard. The standard is now started by IEEE in which 802.3 standard of IEEE describe formats, voltages of cable length etc.

 The Ethernet needs bus topology. It needs a single coaxial cable. To which multiple devices connect. One Ethernet cable is sometimes known a segment. This segment is fixed to 500 meters in length. The minimum distance between connections is 3 meters.

ETHERNET SPEEDS:

 The Ethernet speed was approximately 3Mbps, and the current standard is 10Mbps the fast Ethernet performs at 100Mbps. There are also gigabits Ethernet state now.

 

ENCODING USED IN ETHERNET:

 The encoding needed in Ethernet is Manchester encoding. It uses signal modifies to encode data. e.g. A modification from positive voltage to 0 encodes as given in the figure below:

 

 

1866_Bus Network,Ethernet.png

Posted Date: 7/30/2012 6:56:43 AM | Location : United States







Related Discussions:- Example bus network , ethernet, Assignment Help, Ask Question on Example bus network , ethernet, Get Answer, Expert's Help, Example bus network , ethernet Discussions

Write discussion on Example bus network , ethernet
Your posts are moderated
Related Questions
a) determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Assume a one-way propagati

on LAN,where are IP datagrams transported?

Q. Attacks on wireless network WSN are vulnerable to attacks which compromise the integrity of the WSN nodes by decreasing the nodes' fault tolerance capabilities, data distrib

Problem 1: Show what are the benefits of project quality management? • Customer satisfaction • Reduced cost • Increased competitiveness • Fulfilment of social and economic r

You are free to design the format and structure of the routing table kept locally by each node and exchanged among neighboring nodes. 1. Upon the activation of the program, each

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •Apply safeguards which

B-Router Hybrid devices that has the features of both routers and bridges . A bridge router or brouter is a network machine that acts as a router and as a bridge. The brout

Problem a) Give three reasons why traditional Network Design approach is less appropriate for many of today's networks? b) The network requires of users are organized into m

Confidentiality Confidentiality of information ensures that only those with sufficient privileges may access specific information. When unauthorized individuals can access inform

CSMA/CA Wireless needs collision avoid ness rather than collision checking. Transmitting computer puts very short codes to receiver. Receiver responds with short message getti