Example bus network , ethernet, Computer Network Security

Ethernet is a commonly used LAN technology. It was discovered at EXROX PARC(Palo Alto Research Center) in 1970s.Xerox, Intel and Digital described it in a standard so it is also known DIX standard. The standard is now started by IEEE in which 802.3 standard of IEEE describe formats, voltages of cable length etc.

 The Ethernet needs bus topology. It needs a single coaxial cable. To which multiple devices connect. One Ethernet cable is sometimes known a segment. This segment is fixed to 500 meters in length. The minimum distance between connections is 3 meters.

ETHERNET SPEEDS:

 The Ethernet speed was approximately 3Mbps, and the current standard is 10Mbps the fast Ethernet performs at 100Mbps. There are also gigabits Ethernet state now.

 

ENCODING USED IN ETHERNET:

 The encoding needed in Ethernet is Manchester encoding. It uses signal modifies to encode data. e.g. A modification from positive voltage to 0 encodes as given in the figure below:

 

 

1866_Bus Network,Ethernet.png

Posted Date: 7/30/2012 6:56:43 AM | Location : United States







Related Discussions:- Example bus network , ethernet, Assignment Help, Ask Question on Example bus network , ethernet, Get Answer, Expert's Help, Example bus network , ethernet Discussions

Write discussion on Example bus network , ethernet
Your posts are moderated
Related Questions
The first and foremost need of  any business is a role to perform for its client base, and for the spammer this will typically be the role of advertising products which, due to the

(a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certificate

(a) Describe DES encryption with a block diagram and brief steps. (b) How does triple DES improve security. What is the effective key length of triple DES? How can 3DES be compa

QUESTION 1 Risk analysis helps companies prioritize their risks and shows management the amount of money that should be applied to protecting against those risks in a sensib


Gateways They transfer packets among network machines that have different protocols (e.g. between a WAN and a LAN). They access a packet formatted for one protocol and change

Question (a) Draw a typical hybrid star-ring topology paying attention to how the clients and switching hubs are connected. (b) State 3 main differences between a router

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

(a) Explain the importance of the Euler Totient function in Cryptography. Calculate Euler Totient function value, φ(1280). (b) Explain the role of the Authentication Server (

Question: (a) Draw the waveform for an asynchronous transmission with the following specifications: Character "H", one even parity bit, one start bit, one stop bit, and a b