HARTRON EXAM THEORY PART -15 Network communication technology
Network communication technology
Nowadays the network is established by connecting terminals, equipment and computers via WEN, LAN and wireless.
The diversity of some such communication technologies is further discussed.
Ethernet
Internet is a LAN technology that allows computers to access the network. Ethernet is the most popular and least expensive way to transfer information through a network. It is also the easiest network to setup. It is
based on a bus topology but the Ethernet network can also be wired to the star pattern.
Ethernet works in the same way that people do while talking slowly. When Ethernet works, each computer waits
for some time before sending information through the network. When two computers are trying to send
notifications at the same time, there is a collision in the information. After some time, the computers send
the information again.
Ethernet can transfer information through the network at a speed of 10 megabits per second (Mbps). Fast
Ethernet can transfer information through the network at speeds of up to 100 megabits per second (Mbps).
Gigabit Ethernet can transfer information through the network at speeds up to 1000 megabits per second (Mbps).
Token Ring
Token rings are a type of LAN topology often found in large locations such as banks and insurance companies. A
token ring can send network information through the network at speeds of four or 16 Mbps.
Token Ring Working
The token ring works by passing a single token from computer to computer. The tokens collect and deliver
information while roaming the network. Whenever a network computer wants to send data, it can take independent
tokens under control. The computer can then transmit the data. No other computer can transmit data until the
data sender leaves the token.In this way, only one computer at a time can use the token, eliminating the
possibility of interference.
TCP / IP (Transmission Control Protocol / Internet Protocol)
TCP / IP breaks data into small packets. Internet transmission typically uses TCP / IP. When a computer sends
data over the Internet, the data is broken into small pieces or packets. Each packet contains data that
includes its destination, its address and serial information. These packets reach the destination through the
fastest route available. The devices through which they reach the target are called routers.This technique of
transmission of the package through the best available path from source to floor is called pocket switching.
Wap
WAP or Wireless Application Protocol is the open international standard for applications used in wireless
communication. Its main application is to access internet from mobile phone or PDA. The WAP browser is designed
to provide all the basic services of a computer-based web browser, but it is easy to operate within the limits
of the mobile phone. WAP is now a protocol used for mobile Internet sites in most parts of the world. These
sites are called WAP sites.
Intranet
A private network that is based on Internet protocols such as TCP / IP but is designed for information
management with a company or organization. The services it includes include document distribution, software
distribution and access to the database. It is called Intranet, it looks like the World Wide Web side and is
based on respect technology. However, it is completely the internal network of the organization and is not
properly connected to the Internet.Some intranets also provide Internet access. But such connections pass
through a firewall that keeps the internal network separate from the external web and protects it. Sometimes
the company uses extranets. Which allow consumers and suppliers to access their intranets. For example, some
banks allow their customers access to their intranet so that they can know about their accounts balance and
other services and print them out.
Firewall
The term firewall refers to hardware and software that prevents anyone from accessing network information and
data. A major use of this is to prevent outsiders from accessing the network. Anyone in the public network can
access the Internet by taking a connection, but access to private intranets and extranets is allowed only to
Veda schemes such as employees, suppliers, vendors and customers.Companies use fireballs in their intranets and
extranets to prevent unwanted users from access.