Example bus network , ethernet, Computer Network Security

Ethernet is a commonly used LAN technology. It was discovered at EXROX PARC(Palo Alto Research Center) in 1970s.Xerox, Intel and Digital described it in a standard so it is also known DIX standard. The standard is now started by IEEE in which 802.3 standard of IEEE describe formats, voltages of cable length etc.

 The Ethernet needs bus topology. It needs a single coaxial cable. To which multiple devices connect. One Ethernet cable is sometimes known a segment. This segment is fixed to 500 meters in length. The minimum distance between connections is 3 meters.

ETHERNET SPEEDS:

 The Ethernet speed was approximately 3Mbps, and the current standard is 10Mbps the fast Ethernet performs at 100Mbps. There are also gigabits Ethernet state now.

 

ENCODING USED IN ETHERNET:

 The encoding needed in Ethernet is Manchester encoding. It uses signal modifies to encode data. e.g. A modification from positive voltage to 0 encodes as given in the figure below:

 

 

1866_Bus Network,Ethernet.png

Posted Date: 7/30/2012 6:56:43 AM | Location : United States







Related Discussions:- Example bus network , ethernet, Assignment Help, Ask Question on Example bus network , ethernet, Get Answer, Expert's Help, Example bus network , ethernet Discussions

Write discussion on Example bus network , ethernet
Your posts are moderated
Related Questions
Question (a) Inspect the following ifconfig output of an IPv6 interface: i. What is the hidden Hardware Address of the interface on Line #1? ii. What is the hidden subn

(a) An opponent is using RSA with the public key {e=53, n=77}. You intercept the ciphertext C=10. (All values on this problem, including the ciphertext and the cleartext, are nume

What is information Information comprises the meanings and interpretations which people place upon the facts, or data. The value of information springs from the ways it can be i

Problem: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

What do you understand by the term encryption? Also describe the public key cryptography Encryption: Encryption is a method of converting plain text into cipher text. Using thi

INFORMATION SECURITY POLICY PRACTICES AND STANDARDS Management from all the communities of interest should consider policies as basis for all information security efforts. Polic

TRANSMISSION ERRORS:  Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of wh

You have been asked to design a Banking Network with two primary types of locations.  Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 s

For this assessment, students must research and analyse two different scenarios. The two scenarios must be chosen from those described below and submitted as one Microsoft PowerPoi

Broadcasting is the distribution of video and audio content to a whole audience via any audio or visual mass communications medium, but generally one using electromagnetic radiat