Accessing the internet, Computer Engineering

Assignment Help:

Before we can use Internet, we have to gain access to it. This access is achieved in one of numerous ways. Above all, the Internet is a collection of networks which are connected together through various protocols and hardware.

Dial-up Connection: One of the most common ways of connection to Internet is by dial up connection using a telephone line and a modem. Using these you can connect to a host machine on the Internet. Once connected telecommunications software allows you to communicate with the Internet host. When software runs it uses modem to place a telephone call to a modem that connects to a computer connected to the Internet.

The SLIP (Serial Line Internet Protocol) or PPP (Point to Point Protocol): two protocols; serial line interface protocol (SLIP) and the point-to-point protocol (PPP), allow a user to dial into the Internet. They convert normal telephone data stream into TCP/IP packets and send them to network. With these, user becomes a peer station on the Internet and has access to all of Internet's facilities.


Related Discussions:- Accessing the internet

Average data transfer rate in floppy, Q. Average data transfer rate in flop...

Q. Average data transfer rate in floppy? A floppy is about 0.64 mm thick and is available in diameters 5.25 inch and 3.5 inch. Data are arranged in form of tracks and sectors.

What do you mean by synchronization principles, In multiprocessing several ...

In multiprocessing several processors require to communicate with one another. So synchronisation is needed between them. The correctness and performance of parallel execution reli

How codes represent data for scientific calculations?, Q. How codes represe...

Q. How codes represent data for scientific calculations? How codes are in fact used to represent data for scientific calculations? The computer is a discrete digital device

Explain in brief about compact disks, Explain in brief about Compact disks ...

Explain in brief about Compact disks (CD) These are an optical storage media that have basically taken over from floppy disk. Software is now generally supplied on a CD (in for

Common tasks to accomplish - artificial intelligence, Common Tasks to Accom...

Common Tasks to Accomplish: Once you've worried about what and why you're doing "AI", what has inspired you and how you're going to approach the job, then you just start to th

What are the rules of timescale directive, What are the Rules of Timescale ...

What are the Rules of Timescale directive Rules -  'Timescale directive, like all compiler directives, affects all modules compiled after directive,  whether  in  same  fi

What is cts and cls, What is CTS and CLS? CLS stands for common langua...

What is CTS and CLS? CLS stands for common language specification CTS stands for common type system.

Explain about microsoft access, Microsoft access name has been transformed ...

Microsoft access name has been transformed to Microsoft office access. This software incorporates relational database management system which joins GUI (graphical user interface) w

What is constrained-random verification, What is Constrained-Random Verific...

What is Constrained-Random Verification ? As ASIC and system-on-chip (SoC) designs continue to increase in size and complexity, there is an equal or greater increase in the si

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd