Accessing the internet, Computer Engineering

Assignment Help:

Before we can use Internet, we have to gain access to it. This access is achieved in one of numerous ways. Above all, the Internet is a collection of networks which are connected together through various protocols and hardware.

Dial-up Connection: One of the most common ways of connection to Internet is by dial up connection using a telephone line and a modem. Using these you can connect to a host machine on the Internet. Once connected telecommunications software allows you to communicate with the Internet host. When software runs it uses modem to place a telephone call to a modem that connects to a computer connected to the Internet.

The SLIP (Serial Line Internet Protocol) or PPP (Point to Point Protocol): two protocols; serial line interface protocol (SLIP) and the point-to-point protocol (PPP), allow a user to dial into the Internet. They convert normal telephone data stream into TCP/IP packets and send them to network. With these, user becomes a peer station on the Internet and has access to all of Internet's facilities.


Related Discussions:- Accessing the internet

Define service (within r/3), Define service (within R/3)? A service is...

Define service (within R/3)? A service is a process or group of processes that perform a exact system function and often give an application-programming interface for other pr

Explain telnet, Explain Telnet Telnet is a Remote Login.

Explain Telnet Telnet is a Remote Login.

Determine the features of keyboards, Determine the features of keyboards ...

Determine the features of keyboards Common features on general-purpose keyboards are cursor-control keys. Functions keys are used to enter frequently used operations in a singl

Ground substitution, Ground substitution: Here the act of performing a...

Ground substitution: Here the act of performing an instantiation is a function like there is only one possible outcome means we can write it as a function. And the notation Su

How to creating a key pair, How to Creating a Key Pair You can make a...

How to Creating a Key Pair You can make a key pair using the Strong Name tool (Sn.exe). Key pair files usually have an .snk extension. To create a key pair at the command

Enumerate about the specialised hardware, Enumerate about the Specialised h...

Enumerate about the Specialised hardware Specialised hardware such as protected memory or cryptographic memory module for storing and protecting the keys proves to be a good s

What is optical mark recognition, Optical mark recognition (OMR)  OMR ...

Optical mark recognition (OMR)  OMR technology scans a printed form and reads pre-defined positions (where specific fields have been filled in for instance ?-?or _); system re

Explain the methods of implementing interacting processes, Explain any two ...

Explain any two methods of implementing interacting processes. Two methods of implementing interacting process are given below: (i) Shared memory solution: In this scheme

Explain about the various uses of artificial intelligence, Discuss the use ...

Discuss the use of Artificial intelligence techniques in E-Commerce applications. Explain about the various uses of Artificial Intelligence in Medicine field. Justify it with pr

Explain logical shifts with example, Q. Explain Logical shifts with example...

Q. Explain Logical shifts with example? Logical shifts LOGICAL SHIFT LEFT and LOGICAL SHIFT RIGHT insert zeros to end bit position and other bits of a word are shifted left or

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd