Nics and network hardware, Computer Networking

NICs AND NETWORK HARDWARE:

 NIC is create for one kind of physical network. For example Ethernet interface may not be needed with token ring and similar ATM interface cannot be needed with FDDI.

 Some NICs may be used with different but same type hardware for example thin, thick and 10 Base-T Ethernet100Mbps, and 10Mbps  Ethernet.

CONNECTION BETWEEN NIC AND PHYSICAL NETWORK:

TWO ALTERNATIVES:

NIC have all circuitry and connects directly to network phase. A cable from NIC joins to additional circuitry that then attaches to the network phase.

THIN ETHERNET VERSUS 10BASE-T:

 Thin Ethernet and 10Base-T are type of Ethernet. The network method is not limited to one kind of connection.

 

 

Posted Date: 10/27/2012 8:48:06 AM | Location : United States







Related Discussions:- Nics and network hardware, Assignment Help, Ask Question on Nics and network hardware, Get Answer, Expert's Help, Nics and network hardware Discussions

Write discussion on Nics and network hardware
Your posts are moderated
Related Questions
Normal 0 false false false EN-IN X-NONE X-NONE Networks classification

WEB TECHNOLOGY 1. Explain different protocols of internet. 2. Differentiate between DHTML and HTML. 3. What do you understand by Event-driven Programming? Classify differ

To execute any algorithm, selection of a proper data structure is very crucial. A particular operation may be executed with a data structure in a smaller time but it may have a ver

Question: (a) (i) Distinguish between Physical topology and Logical topology. (ii) Explain the following statement with the help of a diagram: "A star topology can have a l

What are the IP address ranges for public and private IP address?

In this example we will see the use of parallel construct with private and firstprivate clauses. At the end of the program i and j remain undefined as these are private to thread i

Q. Modem stands for modulator - demodulator ? - Modulator are to creates an analog signal from binary data - Demodulator are to recovers the binary data from the modulated s

The entire idea of ISDN is to digitize the telephone network to allow the transmission of video, audio and text over existing telephone lines. The reason of the ISDN is to provide

The science and art of manipulating messages in order to create them secure is known as cryptography..... Two types are:- Symmetric key cryptography and Asymmetric key crypto

Reliable  data transfer  over a perfectly reliable channel rdt 1.0 First  all consider  the simplest  care in  which  the underlying  channel  perfectly reliable.  The protoco