What is computer communications networks, Computer Engineering

Assignment Help:

Q. What is Computer communications networks?

Computer communications networks are the outcome of a combination of computers and telecommunication products. An interconnected group of independent computers and peripheral devices that communicate with each other for the purpose of sharing software and hardware resources is known as a computer communications network. A local-area network (LAN) is any physical network technology that operates at high speed (usually tens ofMbits per second through several Gbits per second) over short distances (up to a few thousand meters). Examples include Ethernet and proNET-10. The stations, also known as nodes, within a LAN are physically linked with each other through twisted pairs of copper wires, coaxial cables, or fiber-optic cables. A wide- area network (WAN, also known as long-haul network) is any physical network that spans large geographic distances, usually operates at slower speeds, and has significantly higher delays than a LAN. Stations within a WAN communicate with each other through standard telephone lines, dedicated telephone lines, line-of-sight microwave systems, or fiber-optic links. Public-data network (PDN) is network service offered by a common carrier, such as Telnet, Tymnet, and Dataphone Digital Services of AT&T. ARPANET (Advanced Research Projects Agency of the U.S. Department of Defense) is an example of a private communications network. CYBERNET is an example of a remote-access communications network that provides access to huge databases for their users in different countries. The Internet is a collection of networks and gateways (special- purpose dedicated computers attached to various networks routing packets of information fromone to the other), including theMilnet (military network) and NSFNET (National Science Foundation network), that function as a single, cooperative virtual network providing universal connectivity and application-level services such as the electronic mail. The Internet reaches many universities, government research labs, and military installations in several countries.


Related Discussions:- What is computer communications networks

What is cursor, The illustration of the mouse on-screen. Depending on your ...

The illustration of the mouse on-screen. Depending on your settings, the cursor can be many dissimilar things.

Bit pair recoding and 2’s complement, Explain bit pair recoding with an exa...

Explain bit pair recoding with an example? Ans: Bit pair recoding halves the maximum number of summands. Group the Booth-recoded multiplier bits in pairs and see the following

Explain transformational analogy, Question 1 Why is it important that a...

Question 1 Why is it important that an expert system be able to explain why and how questions related to a problem solving session. 2 Give the architecture of an Expert syst

Eliminating data hazards - computer architecture, Eliminating data hazards:...

Eliminating data hazards: Forwarding NOTE: In the following instance, computed values are in bold, whereas Register numbers are not. Forwarding involves adding output

Advantages of mpi, Advantages of MPI: Every process has its own loc...

Advantages of MPI: Every process has its own local variables It can be used on a broader range of problems than OpenMP It runs on either distributed or shared memor

What is a disk drive, What is a disk drive? The electro mechanical mech...

What is a disk drive? The electro mechanical mechanism that spins the disk and moves the read/write heads known as disk drive.

Reading every record , You have a file having sporting goods that are sold ...

You have a file having sporting goods that are sold online. Every item record contains the item id, item name, item description, item category, item price, and the units in stock.

What is encapsulation technique, Hiding data within the class and making it...

Hiding data within the class and making it available only by the methods. This method is used to protect your class against accidental changes to fields, which might leave the clas

Reading decision trees, Reading Decision Trees: However we can justifi...

Reading Decision Trees: However we can justified by see that a link between decision tree representations and logical representations that can be exploited to make it easier t

A sorting algorithm is stable, A sorting algorithm is stable if  Preser...

A sorting algorithm is stable if  Preserves the original order of records with equivalent keys.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd