A
network consists of multiple computers connected using some type of
interface, each having more interface devices such as a NIC and or a
serial device for Point-to-Point Protocol networking. every computer is
supported by network software that provides the client functionality. So
The hardware used to transmit data across the network is called the
media. It may include fiber optic, wireless transmission or copper
cable. The standard cabling used for the purposes of this document is
10Base-T category 5 ethernet cable. So this is twisted copper cabling
which appears at the surface to look similar to TV coaxial cable. It’s
terminated on each end by a connector that looks like a telephone
connector. And It’s maximum segment length is 100 meters.
Network Categories:-
There are two types of network categories which are below:
- Server based
- Peer-to-peer
In a server based network, there are
computers set up to be primary providers of services such as mail
service or file service. The computers providing the service are called
servers and use the service are called client computers and the
computers that request.
In a peer-to-peer network, various computers on the network can act
both as servers and clients. For instance, many Microsoft Windows based
computers will allow print sharing and file. These computers can act
both as a client and a server and are also referred to as peers.Now Many
networks are combination peer-to-peer and server based networks.This
Network operating system uses to communicate on the network to other
computers. network operating system supports the applications on that
computer. Network OperatingSystem includes Windows XP, Windows NT,
Novell Netware, Unix, Linux, Dos and others.
Three Network Topologies :-
The network topology describes the method to use do the physical wiring of the network. The main ones are bus, ring, and star.
1. Bus – Both ends of the network must be terminated with a terminator. A cask connector can be used to extend it.
2. Star – All devices rotate around a central hub, which controls the
network communications, and can communicate with other hubs.This
topology Range limits are about 100 meters from the hub.3. Ring – All devices are connected from one to another, as like a ring. A data token is used to grant authorization for each computer to communicate.
No comments:
Post a Comment