Skip to main content

VARIOUS DATA PASSING SCHEMES


INTRODUCTION OF VARIOUS DATA PASSING SCHEMES 


    Various type of data passing protocols are being used at transport layer but out of all these here we will study about Ethernet and token ring protocol which are most widely used protocol .understanding of these protocol is essential to understand fundamentals of network. 

Ethernet: 
Ethernet is a Protocol which makes every device capable to communicate with all other devices on the network with the help of a single cable shared by all. It basically works on two simple
principal:- 
1. At a given time only one device will transmit and rest all will be in listening of carrier.The packet will be forwarded to all but will be received only by the correct node. Rest all node will reject this packet. Once the forwarding of the packet will be finished next device will transmit and all other will be in listening. 
2. If two device starts forwarding at the same time than a collision of packet will take place and both device after sensing will stop transmission and again start transmitting one by one. 

    In 1973, at Xerox Corporation’s Palo Alto Research Center (more commonly known as PARC), 
researcher Bob Metcalfe designed and tested the first Ethernet network. While working on a way to link Xerox’s "Alto" computer to a printer, Metcalfe developed the physical method of cabling that connected devices on the Ethernet as well as the standards that governed communication on the cable. 
Ethernet has since become the most popular and most widely deployed network technology in the world. 

    The original Ethernet described communication over a single cable shared by all devices on the network. Once a device attached to this cable, it had the ability to communicate with any other attached device. This allows the network to expand to accommodate new devices without requiring any modification to those devices already on the network. 
 
How Ethernet works (for advance readers only) 
    Ethernet is a local area technology, with networks traditionally operating within a single building, connecting devices in close proximity. At most, Ethernet devices could have only a few hundred meters of cable between them, making it impractical to connect geographically dispersed locations. Modern advancements have increased these distances considerably, allowing Ethernet networks to span tens of kilometers. 

Protocols
 In networking, the term protocol refers to a set of rules that govern communications. Protocols are to computers what language is to humans. Since this article is in English, to understand it you must be able to read English. Similarly, for two devices on a network to successfully communicate, they must both understand the same protocols.

Ethernet Terminology 
Ethernet follows a simple set of rules that govern its basic operation. To better understand these rules, it is important to understand the basics of Ethernet terminology. 

Medium 
Ethernet devices attach to a common medium that provides a path along which electronic signals will travel. Historically, this medium has been coaxial copper cable, but today it is more commonly a twisted pair or fiber optic cabling. 

Segment 
We refer to a single shared medium as an Ethernet segment. 

Node 
 Devices that attach to that segment are stations or nodes.
 
Frame 
The nodes communicate in short messages called frames, which are variably sized chunks of information. Frames are analogous to sentences in human language. In English, we have rules for constructing our sentences: We know that each sentence must contain a subject and a predicate. The  Ethernet protocol specifies a set of rules for constructing frames. There maximum lengths for frames, and a set of required pieces of information that must appear in the frame. Each frame must include, for example, both a identify the recipient and the send a name identifies a particular person. No two Ethernet devices should ever have the same address. 

Ethernet Medium 
Since a signal on the Ethernet medium reaches every attached node, this is critical to identify the intended recipient of the frame. 

    For example, in the figure above, when computer B transmits to printer C, computers A and D will still receive and examine the frame. However, when a station first receives a frame, it checks the destination address to see if the frame is intended for its without even examining its contents.
     One interesting thing about Ethernet addressing is the implementation of a address. A frame with a destination address equal to the broadcast address (simply called a broadcast, for short) is intended for every node on the network, and every node will both receive and process this type of frame. 
process this type of frame. 

CSMA/CD 
The acronym CSMA/CD signifies carrier-sense multiple access with collision detection and describes how the Ethernet protocol regulates communication among nodes. While the term may seem intimidating, if we break it apart into its component concepts we will see that it describes rules very similar to those that people use in polite conversation. To help illustrate the operation of Ethernet, we will use an analogy of a dinner table conversation. Let’s represent our Ethernet segment as a dinner table, and let several people engaged in polite conversation at the table represent the nodes. The term multiple access covers what we already discussed above: When one Ethernet station transmits, all the stations on the medium hear the 
transmission, just as when one person at the table talks, everyone present is able to hear him or her. Now let's imagine that you are at the table and you have something you would like to say. At the moment, however, I am talking. Since this is a polite conversation, rather than immediately speak up and interrupt, you would wait until I finished talking before making your statement. This is the same concept described in the Ethernet protocol as carrier sense. Before a station transmits, it "listens" to the medium to determine if another station is transmitting. If the medium is quiet, the station recognizes that this is an appropriate time to transmit. 

Collision Detection 
    Carrier-sense multiple access give us a good start in regulating our conversation, but there is one scenario we still need to address. Let’s go back to our dinner table analogy and imagine that there is a momentary lull in the conversation. You and I both have something we would like to add, and we both "sense the carrier" based on the silence, so we begin speaking at approximately the same time. In Ethernet terminology, a collision occurs when we both spoke at once.

     In our conversation, we can handle this situation gracefully. We both hear the other speak at the same time we are speaking, so we can stop to give the other person a chance to go on. Ethernet  nodes also listen to the medium while they transmit to ensure that they are the only stationtransmitting at that time. If the stations hear their own transmission returning in a garbled form, as would happen if some other station had begun to transmit its own message at the same time, then they know that a collision occurred. A single Ethernet segment is sometimes called a collision domain because no two stations on the segment can transmit at the same time without causing a collision. When stations detect a collision, they cease transmission, wait a random amount of time, and attempt to transmit when they again detect silence on the medium. 
    The random pause and retry is an important part of the protocol. If two stations collide when transmitting once, then both will need to transmit again. At the next appropriate chance to transmit, both stations involved with the previous collision will have data ready to transmit. If they transmitted again at the first opportunity, they would most likely collide again and again indefinitely. Instead, the random delay makes it unlikely that any two stations will collide more than a few times in a row

Limitations of Ethernet 
A single shared cable can serve as the basis for a complete Ethernet network, which is what we discussed above. However, there are practical limits to the size of our Ethernet network in this case. A primary concern is the length of the shared cable. 

    Electrical signals propagate along a cable very quickly, but they weaken as they travel, and  electrical interference from neighboring devices (fluorescent lights, for example) can scramble the signal. A network cable must be short enough that devices at opposite ends can receive each other's signals clearly and with minimal delay. This places a distance limitation on the maximum separation between two devices (called the network diameter) on an Ethernet network. Additionally, since in 
CSMA/CD only a single device can transmit at a given time, there are practical limits to the number of devices that can coexist in a single network. Attach too many devices to one shared segment and contention for the medium will increase. Every device may have to wait an inordinately long time before getting a chance to transmit. 
    Engineers have developed a number of network devices that alleviate these difficulties. Many of these devices are not specific to Ethernet, but play roles in other network technologies as well. Repeaters The first popular Ethernet medium was a copper coaxial cable known as "thicknet." The maximum length of a thicknet cable was 500 meters. In large building or campus environments, a 500-meter cable could not always reach every network device. A repeater addresses this problem. 
Repeaters connect multiple Ethernet segments, listening to each segment and repeating the signal heard on one segment onto every other segment connected to the repeater. By running multiple cables and joining them with repeaters, you can significantly increase your network diameter. 

Segmentation 
In our dinner table analogy, we had only a few people at a table carrying out the conversation, so restricting ourselves to a single speaker at any given time was not a significant barrier to communication. But what if there were many people at the table and only one were allowed to speak at any given time? 
    In practice, we know that the analogy breaks down in circumstances such as these. With larger groups of people, it is common for several different conversations to occur simultaneously. If  only one person in a crowded room or at a banquet dinner were able to speak at any time, many people would get frustrated waiting for a chance to talk. For humans, the problem is self-correcting: Voices only carry so far, and the ear is adept at picking out a particular conversation from the surrounding noise. This makes it easy for us to have many small groups at a party converse in the 
same room; but network cables carry signals quickly and efficiently over long distances, so this natural segregation of conversations does not occur. 

    Ethernet networks faced congestion problems as they increased in size. If a large number of stations connected to the same segment and each generated a sizable amount of traffic, many stations may attempt to transmit whenever there was an opportunity. Under these circumstances, collisions would become more frequent and could begin to choke out successful transmissions, which could take inordinately large amounts of time to complete. One way to reduce congestion would be to split a single segment into multiple segments, thus creating multiple collision domains. This solution creates a different problem, as now these now separate segments are not able to share information with each other. 

Bridges 
To alleviate problems with segmentation, Ethernet networks implemented bridges. Bridges connect two or more network segments, increasing the network diameter as a repeater does, but bridges also help regulate traffic. They can send and receive transmissions just like any other node, but they do not function the same as a normal node. The bridge does not originate any traffic of its own; like a repeater, it only echoes what it hears from other stations. (That last statement is not entirely accurate: Bridges do create a special Ethernet frame that allows them to communicate with other bridges, but that is outside the scope of this article.) 

An Ethernet Connecting Two Segments 

Remember how the multiple access and shared medium of Ethernet meant that every station on the wire received every transmission, whether it was the intended recipient or not? Bridges make use of this feature to relay traffic between segments. In the figure above, the bridge connects segments 1 and 2. If station A or B were to transmit, the bridge would also receive the transmission on segment 1. How should the bridge respond to this traffic? It could automatically transmit the frame onto segment 2, like a repeater, but that would not relieve congestion, as the network would behave like one long segment. 

    One goal of the bridge is to reduce unnecessary traffic on both segments. It does this by examining the destination address of the frame before deciding how to handle it. If the destination address is that of station A or B, then there is no need for the frame to appear on segment 2. In thiscase, the bridge does nothing. We can say that the bridge filters or drops the frame. If the destination address is that of station C or D, or if it is the broadcast address, then the bridge will transmit, or forward the frame on to segment 2. By forwarding packets, the bridge allows any of the four devices in the figure to communicate. Additionally, by filtering packets when appropriate, the bridge makes it possible for station A to transmit to station B at the same time that station C transmits to station D, allowing two conversations to occur simultaneously! 

    Switches are the modern counterparts of bridges, functionally equivalent but offering a dedicated segment for every node on the network 

Routers: Logical Segmentation 
Bridges can reduce congestion by allowing multiple conversations to occur on different segments simultaneously, but they have their limits in segmenting traffic as well. 
    An important characteristic of bridges is that they forward Ethernet broadcasts to all connected segments. This behavior is necessary, as Ethernet broadcasts are destined for every node on the network, but it can pose problems for bridged networks that grow too large. When a large number of stations broadcast on a bridged network, congestion can be as bad as if all those devices were on a single segment. 
    Routers are advanced networking components that can divide a single network into two logically separate networks. While Ethernet broadcasts cross bridges in their search to find every node on the network, they do not cross routers, because the router forms a logical boundary for the network. 

    Routers operate based on protocols that are independent of the specific networking technology, like Ethernet or token ring (we'll discuss token ring later). This allows routers to easily interconnect various network technologies, both local and wide area, and has led to their widespread deployment in connecting devices around the world as part of the global Internet. 

Switched Ethernet 
Modern Ethernet implementations often look nothing like their historical counterparts. Where long runs of coaxial cable provided attachments for multiple stations in legacy Ethernet, modern Ethernet networks use twisted pair wiring or fiber optics to connect stations in a radial pattern. Where legacy Ethernet networks transmitted data at 10 megabits per second (Mbps), modern networks can operate at 100 or even 1,000 Mbps!


    Perhaps the most striking advancement in contemporary Ethernet networks is the use of switched Ethernet. Switched networks replace the shared medium of legacy Ethernet with a dedicated segment for each station. These segments connect to a switch, which acts much like an Ethernet bridge, but can connect many of these single station segments. Some switches today can support hundreds of dedicated segments. Since the only devices on the segments are the switch and the end station, the switch picks up every transmission before it reaches another node. The switch then forwards the frame over the appropriate segment, just like a bridge, but since any segment contains only a single node, the frame only reaches the intended recipient. This allows many conversations to occur simultaneously on a switched network. 

Full-duplex Ethernet 
Ethernet switching gave rise to advancement, full-duplex Ethernet. Full-duplex is a data communications term that refers to the ability to send and receive data at the same time. 
    Legacy Ethernet is half-duplex, meaning information can move in only one direction at a time. In a totally switched network, nodes only communicate with the switch and never directly with each other. Switched networks also employ either twisted pair or fiber optic cabling, both of which use separate conductors for sending and receiving data. In this type of environment, Ethernet stations can forgo the collision detection process and transmit at will, since they are the only potential devices that can access the medium. This allows end stations to transmit to the switch at the same time that the switch transmits to them, achieving a collision-free environment. 

Ethernet or 802.3? 
You may have heard the term 802.3 used in place of or in conjunction with the term Ethernet. "Ethernet" originally referred to a networking implementation standardized by Digital, Intel and Xerox. (For this reason, it is also known as the DIX standard.)

    In February 1980, the Institute of Electrical and Electronics Engineers, or IEEE (pronounced "I triple E"), created a committee to standardize network technologies. The IEEE titled this the 802 working group, named after the year and month of its formation. Subcommittees of the 802 working group separately addressed different aspects of networking. The IEEE distinguished each subcommittee by numbering it 802.X, with X representing a unique number for each subcommittee. The 802.3 group standardized the operation of a CSMA/CD network that was functionally equivalent to the DIX Ethernet. 
    Ethernet and 802.3 differ slightly in their terminology and the data format for their frames, but are in most respects identical. Today, the term Ethernet refers generically to both the DIX Ethernet implementation and the IEEE 802.3 standard. 
    Ethernet- The standard local area network (LAN) access method. A reference to "LAN," "LAN connection" or "network card" automatically implies Ethernet. Defined by the IEEE as the 802.3 standard, Ethernet is used to connect computers in a company or home network as well as to connect a single computer to a cable modem or DSL modem for Internet access. 
    Most new computers come network ready with Ethernet built in. For machines without a network connection, Ethernet adapters can be added via USB or PC Card or by plugging an Ethernet card into a free PCI bus slot inside the case. 

Megabits Per Second: 10, 100, 1,000 and 10,000 
A 10/100 Ethernet port supports two speeds: 10 Mbps (10Base-T) and 100 Mbps (100Base-T). Computers also come with 10/100/1000 ports, which includes Gigabit Ethernet at 1 Gbps (1,000 megabits). Ethernet devices negotiate with each other and transmit at the highest speed possible. For high-speed backbones in metropolitan and wide area networks, 10 Gigabit Ethernet (10,000 megabits), the fastest Ethernet, is also used . 

Shared or Switched 
Ethernet is wired in a star configuration with a hub or switch in the middle. Hubs, which predated switches, are shared media devices. All stations attached to the hub share the total bandwidth. Switches provide each sender and receiver pair with the full bandwidth and are significantly faster than hubs .Like the client machines, Ethernet switches and hubs also support 10/100 and 10/100/1000 speeds. 

Most Ethernets Use Twisted Pairs 
Ethernet uses economical twisted pair cables and standard RJ-45 connectors). Sometimes, spare telephone wires in a building may be used, but often only at the lowest speed. To extend distances, fiber-optic cable is also used .The first versions of Ethernet used coaxial cable Ethernet 
Frames 
    Ethernet transmits variable length frames from 72 to 1518 bytes in length, each containing a header with the addresses of the source and destination stations and a trailer that contains error correction data. Higher-level protocols, such as IP and IPX, fragment long messages into the frame size required by the Ethernet network being employed.

Collision Detection 
Ethernet uses the CSMA/CD technology to broadcast each frame onto the physical medium (wire, fiber, etc.). All stations attached to the Ethernet are "listening," and the station with the matching destination address accepts the frame and checks for errors. Ethernet is a data link protocol (MAC layer protocol) and functions at layers 1 and 2 of the OSI model. 

History 
Invented by Robert Metcalfe and David Boggs at Xerox PARC in 1973, Ethernet first ran at 2.94 Mbps. Metcalfe later joined Digital where he facilitated a joint venture between Digital, Intel and Xerox to collaborate further on Ethernet. Version 1 was finalized in 1980, and products shipped in the following year. In 1983, the IEEE approved the Ethernet 802.3 standard. 

ETHERNET LIMITATIONS         Maximum                                     Maximum
Type                                                 Segment length                            Devices    
 TWISTED PAIR (star topology) 
 10Base-T                                         328 ft. (100 m)                             
 100Base-T                                       328 ft. (100 m)                             1
 1000Base-T                                     328 ft. (100 m)                             
 COAX (bus topology) 
 10Base5 "thick"                               1640 ft. (500 m)                          100 
 10Base2 "thin"                                 607 ft. (185 m)                            30 
 FIBER (star topology) 
 FOIRL .                                            6 mi. (1 km)                                
 10Base-F 1.2 mi. (2 km) 1 
 100Base-FX multimode                    1.2 mi. (2 km)                           
 100Base-FX single-mode                 6 mi. (10 km)                              1






अन्य विषय 
अन्य जानकारी

Comments

  1. I am heartily thankful to you for sharing this best knowledge. This information is helpful for everyone. So please always share this kind of knowledge. Thanks once again for sharing it. eaton vfd

    ReplyDelete

Post a Comment

Popular posts from this blog

Computer Generation/कंप्यूटर निर्माण की पीढियां

 पहली पीढ़ी कंप्यूटर (1946-1954)     इलेक्ट्रॉनिक वाल्व (वैक्यूम ट्यूब) का उपयोग करने वाले डिजिटल कंप्यूटर को पहली पीढ़ी के रूप में जाना जाता है। पहली पीढ़ी के कंप्यूटरों के कुछ उदाहरण हैं इंटरनेशनल बिजनेस मशीन की IBM-700 श्रृंखला IBM-701, IMB-709, EDVAC (इलेक्ट्रॉनिक डिस्क्रीट वेरिएबल ऑटोमैटिक कंप्यूटर), और UNIVAC (यूनिवर्सल ऑटोमैटिक कंप्यूटर)। पहली पीढ़ी के कंप्यूटर आमतौर पर सीपीयू घटकों के रूप में वैक्यूम ट्यूबों का उपयोग करते थे। वैक्यूम ट्यूबों की उच्च लागत ने मुख्य मेमोरी के लिए उनके उपयोग को रोक दिया। MIT में निर्मित बवंडर I, फेराइट कोर मेमोरी का उपयोग करने वाला पहला कंप्यूटर था। पहली पीढ़ी के कंप्यूटर प्रोग्रामिंग के लिए विधानसभा भाषा का इस्तेमाल किया। वे निश्चित-बिंदु अंकगणित का उपयोग करते थे। दूसरी पीढ़ी  कंप्यूटर (1955-1964)     दूसरी पीढ़ी के कंप्यूटरों में सीपीयू घटकों के लिए उपयोग किए जाने वाले ट्रांजिस्टर, मुख्य मेमोरी के लिए फेराइट कोर और द्वितीयक मेमोरी के लिए चुंबकीय डिस्क, ड्रम और टेप होते थे। उन्होंने प्रोग्रामिंग के लिए उच्च स्तरीय भाषा जैसे FOTRON (1956) ALGOL (19

ईथरनेट शब्दावली /Ethernet Terminology

           ईथरनेट   शब्दावली   ईथरनेट नियमों के एक सरल सेट का अनुसरण करता है जो इसके मूल संचालन को नियंत्रित करता है। इन नियमों को बेहतर ढंग से समझने के लिए, ईथरनेट शब्दावली की मूल बातें समझना महत्वपूर्ण है।  मध्यम   (Medium) ईथरनेट डिवाइस एक सामान्य माध्यम से जुड़ते हैं जो एक रास्ता प्रदान करता है जिसके साथ इलेक्ट्रॉनिक सिग्नल यात्रा करेंगे। ऐतिहासिक रूप से, यह माध्यम समाक्षीय तांबा केबल रहा है, लेकिन आज यह अधिक सामान्यतः एक मुड़ जोड़ी या फाइबर ऑप्टिक केबलिंग है।   खंड ( Segment ) हम ईथरनेट खंड के रूप में एकल साझा माध्यम का उल्लेख करते हैं। नोड डिवाइस जो उस सेगमेंट से जुड़ते हैं वे स्टेशन या नोड होते हैं। ढांचा नोड्स छोटे संदेशों में कहे जाते हैं, जिन्हें फ्रेम कहा जाता है, जो सूचनाओं के भिन्न आकार होते हैं।  फ़्रेम ( Frame )  मानव भाषा में वाक्यों के अनुरूप हैं। अंग्रेजी में, हमारे वाक्य बनाने के नियम हैं: हम जानते हैं कि प्रत्येक वाक्य में एक विषय और एक विधेय होना चाहिए। ईथरनेट प्रोटोकॉल फ्रेम के निर्माण के लिए नियमों का एक सेट निर्दिष्ट करता है। फ़्रेम के लिए अधिकतम लंबाई, और फ़्रे

मदर बोर्ड / Motherboard

Popular posts from this blog

Computer Generation/कंप्यूटर निर्माण की पीढियां

 पहली पीढ़ी कंप्यूटर (1946-1954)     इलेक्ट्रॉनिक वाल्व (वैक्यूम ट्यूब) का उपयोग करने वाले डिजिटल कंप्यूटर को पहली पीढ़ी के रूप में जाना जाता है। पहली पीढ़ी के कंप्यूटरों के कुछ उदाहरण हैं इंटरनेशनल बिजनेस मशीन की IBM-700 श्रृंखला IBM-701, IMB-709, EDVAC (इलेक्ट्रॉनिक डिस्क्रीट वेरिएबल ऑटोमैटिक कंप्यूटर), और UNIVAC (यूनिवर्सल ऑटोमैटिक कंप्यूटर)। पहली पीढ़ी के कंप्यूटर आमतौर पर सीपीयू घटकों के रूप में वैक्यूम ट्यूबों का उपयोग करते थे। वैक्यूम ट्यूबों की उच्च लागत ने मुख्य मेमोरी के लिए उनके उपयोग को रोक दिया। MIT में निर्मित बवंडर I, फेराइट कोर मेमोरी का उपयोग करने वाला पहला कंप्यूटर था। पहली पीढ़ी के कंप्यूटर प्रोग्रामिंग के लिए विधानसभा भाषा का इस्तेमाल किया। वे निश्चित-बिंदु अंकगणित का उपयोग करते थे। दूसरी पीढ़ी  कंप्यूटर (1955-1964)     दूसरी पीढ़ी के कंप्यूटरों में सीपीयू घटकों के लिए उपयोग किए जाने वाले ट्रांजिस्टर, मुख्य मेमोरी के लिए फेराइट कोर और द्वितीयक मेमोरी के लिए चुंबकीय डिस्क, ड्रम और टेप होते थे। उन्होंने प्रोग्रामिंग के लिए उच्च स्तरीय भाषा जैसे FOTRON (1956) ALGOL (19

मदर बोर्ड / Motherboard

ईथरनेट शब्दावली /Ethernet Terminology

           ईथरनेट   शब्दावली   ईथरनेट नियमों के एक सरल सेट का अनुसरण करता है जो इसके मूल संचालन को नियंत्रित करता है। इन नियमों को बेहतर ढंग से समझने के लिए, ईथरनेट शब्दावली की मूल बातें समझना महत्वपूर्ण है।  मध्यम   (Medium) ईथरनेट डिवाइस एक सामान्य माध्यम से जुड़ते हैं जो एक रास्ता प्रदान करता है जिसके साथ इलेक्ट्रॉनिक सिग्नल यात्रा करेंगे। ऐतिहासिक रूप से, यह माध्यम समाक्षीय तांबा केबल रहा है, लेकिन आज यह अधिक सामान्यतः एक मुड़ जोड़ी या फाइबर ऑप्टिक केबलिंग है।   खंड ( Segment ) हम ईथरनेट खंड के रूप में एकल साझा माध्यम का उल्लेख करते हैं। नोड डिवाइस जो उस सेगमेंट से जुड़ते हैं वे स्टेशन या नोड होते हैं। ढांचा नोड्स छोटे संदेशों में कहे जाते हैं, जिन्हें फ्रेम कहा जाता है, जो सूचनाओं के भिन्न आकार होते हैं।  फ़्रेम ( Frame )  मानव भाषा में वाक्यों के अनुरूप हैं। अंग्रेजी में, हमारे वाक्य बनाने के नियम हैं: हम जानते हैं कि प्रत्येक वाक्य में एक विषय और एक विधेय होना चाहिए। ईथरनेट प्रोटोकॉल फ्रेम के निर्माण के लिए नियमों का एक सेट निर्दिष्ट करता है। फ़्रेम के लिए अधिकतम लंबाई, और फ़्रे

Ethernet/ईथरनेट

         ईथरनेट (Ethernet)  ईथरनेट एक ऐसा प्रोटोकॉल है जो सभी डिवाइसों को सभी साझा किए गए एकल केबल की मदद से नेटवर्क पर अन्य सभी उपकरणों के साथ संचार करने में सक्षम बनाता है। यह मूल रूप से दो सरल पर काम करता है प्रधान अध्यापक:- 1. एक निश्चित समय पर केवल एक उपकरण संचारित होगा और बाकी सभी वाहक के सुनने में होंगे। पैकेट सभी को भेजा जाएगा लेकिन केवल सही नोड द्वारा प्राप्त किया जाएगा। बाकी सभी नोड इस पैकेट को अस्वीकार कर देंगे। एक बार पैकेट को अग्रेषित करने के बाद अगला उपकरण समाप्त हो जाएगा और अन्य सभी सुनने में होंगे। 2. यदि दो डिवाइस एक ही समय में अग्रेषित करना शुरू करते हैं तो पैकेट की टक्कर होगी और संवेदन के बाद दोनों उपकरण प्रसारण बंद कर देंगे और फिर से एक-एक करके प्रसारण शुरू कर देंगे।   1973 में, ज़ेरॉक्स कॉरपोरेशन के पालो ऑल्टो रिसर्च सेंटर (जिसे आमतौर पर PARC के रूप में जाना जाता है) में, शोधकर्ता बॉब मेटकाफ ने पहले ईथरनेट नेटवर्क का डिजाइन और परीक्षण किया। ज़ेरॉक्स के "ऑल्टो" कंप्यूटर को प्रिंटर से लिंक करने के तरीके पर काम करते समय, मेटकाफ ने केबल बिछाने की भौतिक विधि व

Novell netware & window NT

INTRODUCTION OF VARIOUS NETWORK OPERATING SYSTEMS AND THEIR SPECIAL FEATURES       Proper support of a local area network requires hardware, software, and miscellaneous support devices .A network operating system is the most important software component. Application programs  are also required to support users on a LAN. Support devices such as hubs, switches, routers, servers,modems, power supplies and more are also necessary other than operating system.       An operating system manages all applications and resources in a computer.       A multitasking operating system supports the execution of multiple processes at one time.       A network operating system is a large, complex program that manages the resources common on most local area networks .Besides performing standard operating system functions, a network operating system is called upon for additional functions, such as …  a) Maintain a file system of data sets , application ,user profiles ,network peripherals etc  b) Coordinat

What is Computer ? कम्प्यूटर क्या है?

WHAT IS A COMPUTER?       Computer is a device which accepts input, processes it, stores the data, if required and gives desired output as per user requirement. The term computer is used to describe a device made up of a  combination of electronic and electromechanical (part electronic and part mechanical) components. By itself, a computer has no intelligence and is referred to as hardware. In general the computer does the  following.  1. Accept user supplied data and instructions.  2. Stores large volume of information given at high speed as per the instruction given.  3. Process the information given at a high speed as per the instruction given.  4. Output the results according to user specifications 5. Transfers Data, Images, Sound and Graphics through cables at a very fast rate       In other words, we supply to the computer; the data to be processed and the instructions to  process the data with. The computer remembers both the data and the instructions, does the processing  when

Computer Basic Short Cut Key

Computer Basic Short Cut Key Ctrl+ A            Select all contents of the page Ctrl+B               Bold highlighted selection Ctrl+C               copy selected text Ctrl+V               Paste selected text Ctrl+X               Cut Selected text Ctrl+Y               Redo the last action performed Ctrl+Z             Undo Last action Delete               Delete function Shift+F10 Key Displays the shortcut Menu for the selected   item Shift+Delete      Delete the selected item permanently without placing it in the recycle Bin to display F1 Key             To Display Help F2 Key             Rename the selected   item. F3 Key             Search a folder or a file F4 Key             Display the address Bar list in my computer or Windows Explorer F5 Key             Update the Active Windows F6 Key             Cycle through the screen elements in a windows   or on the desktop F10 Key            To active the Menu Bar in the active program Ctrl­+A               Select All items Ctrl+F4

TYPES OF RAM AND ROM

TYPES OF RAM AND ROM  Common RAM Types  • SRAM       Static random access memory uses multiple transistors, typically four to six, for each memory cell  but doesn't have a capacitor in each cell. It is used primarily for cache. These types of memory are physically bulky and somewhat limited to its capacity.       In Static RAM, a form of flip-flop holds each bit of memory. A flip-flop for a memory cell takes four or six transistors along with some wiring, but never has to be refreshed. This makes static RAM significantly faster than dynamic RAM. However, because it has more parts, a static memory cell takes up a lot more space on a chip than a dynamic memory cell. Therefore, you get less memory per chip, and that makes static RAM a lot more expensive      Static RAM is fast and expensive, and dynamic RAM is less expensive and slower. Static RAM is  used to create the CPU's speed-sensitive cache, while dynamic RAM forms the larger system RAM space.  • DRAM  In the most common fo

Computer Objective Quetions 03

Computer Objective Quetions 03 Ans is at bottom 1 . The brain of a computer is (1) CPU (2) CD (3) Floppy disc (4) Megabyte  (5) None of these www.hinsoli.com 2. In computer language, one kilobyte equals (1) 1000 bytes  (2) 1024 bytes  (3) 100 bytes (4) 8 bytes (5) None of these S 3. Example of a telecommunications device is a (1) Keyboard  (2) Mouse (3) Modem (4) Printer (5) Scanner www.hinsoli.com 4. A device that copies or reproduced text and images is also called a(n) (1) Optical scanner (2) Bar code reader (3) Character device (4) Digital camera (5) Printer 5. Storage that retains its data after the power is turned off is referred to as (1) Volatile storage (2) Sequential storage (3) Direct storage (4) Non-volatile storage (5) Mobile storage 6. Which of these system input and output devices are located outside the system unit? (1) Desktop system (2) Personal digital assistants (3) Smartphone (4) Laptop computer (5) None of the above (7) . A byte is formed by a group of (1) 4 bits 2

GENERATION OF COMPUTERS

HISTORY AND GENERATION OF COMPUTERS  First Generation (1946-1954)        The digital computers using electronic valves (vacuum tubes) are known as first-generation  computers. Some examples of the first-generation computers are International Business Machine’s IBM-700 series IBM-701, IMB-709, EDVAC (Electronic Discrete Variable Automatic Computer), and UNIVAC (Universal Automatic Computer). The first generation computers usually used Vacuum tubes as CPU components. The high cost of vacuum tubes prevented their use for main memory. Whirlwind I, constructed at MIT was the first computer to use ferrite core memory. The first generation computers  used assembly language for programming. They used fixed-point arithmetic.  Second Generation (1955-1964)       The second-generation computers used transistors used for CPU components, ferrite cores for main memory, and magnetic disks, drums and tapes for secondary memory. They used high level language such as FOTRON (1956) ALGOL (1960) and COBOL