What is the protocols

Assignment Help Computer Networking
Reference no: EM131513776

Question: Upgrading a Stand-alone Computer to a Networked Computer Time Required: 30 minutes Objective: Upgrade a stand-alone computer to a networked computer. Required Tools and Equipment: Lab computer (as specified in the book's lab setup instructions), a NIC, a patch cable, and a hub or switch Description: In this project, you install a NIC and connect it to an interconnecting device with a cable. This project can be done in groups or as an instructor demonstration. It's intended only to familiarize you with the hardware components needed to make a standalone computer a networked computer.

1. Install the NIC, following the steps your instructor provides. This process might involve opening the computer case or simply plugging a USB NIC into a USB slot.

2. Turn on the computer. If necessary, insert a disk containing the NIC driver and follow the instructions for installing it.

3. Using the supplied cable, plug one end into the NIC and the other end into the interconnecting device, which should be a hub or a switch.

4. Examine the indicator lights on the NIC and the hub or switch. There might be one or two lights on each port of the device, depending on its features. There's at least one indicator on the NIC and on each port of the hub or switch that's usually referred to as a "link light." The link light glows when a data connection has been made between the NIC and the hub or switch. Your instructor can supply more details about the indicator lights available on your hub or switch. List the status of indicators on the NIC and the hub or switch port into which the NIC is plugged:

5. Shut down the computer and unplug and put away the cables. The previous list of components satisfies the hardware components needed to make a stand-alone computer a networked computer. The computer must also have the necessary software to interact with network hardware and communicate with other computers on the network. Network software transforms a stand-alone OS into a network OS. It's the software that allows a word-processing program to open a document on a server or knows how to request a Web page or send an e-mail. It's also the software that communicates between the OS and network hardware. Network software can be divided into the following categories:

• Network clients and servers-Network client software requests information that's stored on another network computer or device. Network server software allows a computer to share its resources by fielding resource requests generated by network clients. Network client software can be an integral part of well-known applications, such as Web browsers and e-mail programs. A Web browser, for example, sends a request for a Web page to a Web server. Network client software can also run in the background, usually installed as a networking service. In this case, it enables programs without built-in client software to access shared network resources on other computers. For example, Client for Microsoft Networks, which is installed automatically in Windows, allows a word-processing program to open a file that's shared on another Windows computer or print to a printer attached to another Windows computer. In this setup, the server software called File and Printer Sharing for Microsoft Networks receives the request from the client and provides access to the shared file or printer.

• Protocols-When clients and servers need to send information on the network, they must pass it to network protocols, which define the rules and formats a computer must use when sending information across the network. A network protocol can be likened to a human language. Just as two people who want to communicate must speak the same language, two computers that want to communicate must use the same protocol. An example of a network protocol is TCP/IP. Network protocols do all the behind-the-scenes tasks required to make networking work and handle most of the complexity in networking; they're discussed in depth in Chapter 5.

• NIC driver-After a network protocol has formatted a message correctly, it hands the data off to the NIC driver for transmission onto the network. NIC drivers receive data from protocols and then forward this data to the physical NIC, which transmits data onto the medium. The reverse is also true. When data arrives at the NIC from the medium, the NIC hands it off to the NIC driver, which then hands it off to network protocols. Every NIC card installed in a computer must have an associated device driver installed in the OS. The device driver software manages the details of communicating with the NIC hardware to send and receive data to and from network media.

Reference no: EM131513776

Questions Cloud

Vegan combination menu elastic or inelastic : Below is a demand table of the McDonald’s new vegan combination menu item. Is the demand for McDonald’s vegan combination menu elastic or inelastic?
After-tax cost of debt : Holmes believes it could issue new bonds at par that would provide a similar yield to maturity.
How many collision domains are in this network : Building an Extended Star Topology Network Time Required: 30 minutes Objective: Use hubs and switches to build an extended star topology network.
Constant growth valuation-what is required rate of return : What is the required rate of return? What stock price is expected 1 year from now?
What is the protocols : Upgrading a Stand-alone Computer to a Networked Computer Time Required: 30 minutes Objective: Upgrade a stand-alone computer to a networked computer.
Price would you be willing to pay for share of acap stock : What price would you be willing to pay for a share of Acap stock today, if you planned to hold the stock for two years?
Prepare a plot of surface temperature : Air at 1100°Cand 1013kPa pressure flows along a flat surface at a uniform velocity of 30 m/s. Investigate the problem of cooling this surface by transpiration.
Explain kierkegaards stages of life to three to five friend : Explain Kierkegaard's stages of life to three to five friends and colleagues.Consider the ages of people who responded.
What is the stocks current value per share : The required rate of return on the stock, rs, is 15%. What is the stock's current value per share?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd