Choose Your Language
HARTRON P-15 Network communication technology | HARTRON EXAM

HARTRON EXAM THEORY PART -15 Network communication technology

Network communication technology

Nowadays the network is established by connecting terminals, equipment and computers via WEN, LAN and wireless.

The diversity of some such communication technologies is further discussed.

Ethernet

Ethernet

Internet is a LAN technology that allows computers to access the network. Ethernet is the most popular and least expensive way to transfer information through a network. It is also the easiest network to setup. It is

based on a bus topology but the Ethernet network can also be wired to the star pattern.
Ethernet works in the same way that people do while talking slowly. When Ethernet works, each computer waits

for some time before sending information through the network. When two computers are trying to send

notifications at the same time, there is a collision in the information. After some time, the computers send

the information again.
Ethernet can transfer information through the network at a speed of 10 megabits per second (Mbps). Fast

Ethernet can transfer information through the network at speeds of up to 100 megabits per second (Mbps).

Gigabit Ethernet can transfer information through the network at speeds up to 1000 megabits per second (Mbps).

Token Ring


Token rings are a type of LAN topology often found in large locations such as banks and insurance companies. A

token ring can send network information through the network at speeds of four or 16 Mbps.

Token Ring Working
Token Ring Working

The token ring works by passing a single token from computer to computer. The tokens collect and deliver

information while roaming the network. Whenever a network computer wants to send data, it can take independent

tokens under control. The computer can then transmit the data. No other computer can transmit data until the

data sender leaves the token.In this way, only one computer at a time can use the token, eliminating the

possibility of interference.

TCP / IP (Transmission Control Protocol / Internet Protocol)

TCP / IP breaks data into small packets. Internet transmission typically uses TCP / IP. When a computer sends

data over the Internet, the data is broken into small pieces or packets. Each packet contains data that

includes its destination, its address and serial information. These packets reach the destination through the

fastest route available. The devices through which they reach the target are called routers.This technique of

transmission of the package through the best available path from source to floor is called pocket switching.

Wap

WAP or Wireless Application Protocol is the open international standard for applications used in wireless

communication. Its main application is to access internet from mobile phone or PDA. The WAP browser is designed

to provide all the basic services of a computer-based web browser, but it is easy to operate within the limits

of the mobile phone. WAP is now a protocol used for mobile Internet sites in most parts of the world. These

sites are called WAP sites.

Intranet

A private network that is based on Internet protocols such as TCP / IP but is designed for information

management with a company or organization. The services it includes include document distribution, software

distribution and access to the database. It is called Intranet, it looks like the World Wide Web side and is

based on respect technology. However, it is completely the internal network of the organization and is not

properly connected to the Internet.Some intranets also provide Internet access. But such connections pass

through a firewall that keeps the internal network separate from the external web and protects it. Sometimes

the company uses extranets. Which allow consumers and suppliers to access their intranets. For example, some

banks allow their customers access to their intranet so that they can know about their accounts balance and

other services and print them out.

Firewall

Firewall

The term firewall refers to hardware and software that prevents anyone from accessing network information and

data. A major use of this is to prevent outsiders from accessing the network. Anyone in the public network can

access the Internet by taking a connection, but access to private intranets and extranets is allowed only to

Veda schemes such as employees, suppliers, vendors and customers.Companies use fireballs in their intranets and

extranets to prevent unwanted users from access.

Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this: