Nics and network hardware, Computer Networking

Assignment Help:

NICs AND NETWORK HARDWARE:

 NIC is create for one kind of physical network. For example Ethernet interface may not be needed with token ring and similar ATM interface cannot be needed with FDDI.

 Some NICs may be used with different but same type hardware for example thin, thick and 10 Base-T Ethernet100Mbps, and 10Mbps  Ethernet.

CONNECTION BETWEEN NIC AND PHYSICAL NETWORK:

TWO ALTERNATIVES:

NIC have all circuitry and connects directly to network phase. A cable from NIC joins to additional circuitry that then attaches to the network phase.

THIN ETHERNET VERSUS 10BASE-T:

 Thin Ethernet and 10Base-T are type of Ethernet. The network method is not limited to one kind of connection.

 

 


Related Discussions:- Nics and network hardware

Create a wireless can, You are the network administrator for the City of Jo...

You are the network administrator for the City of Joshua Texas. The city government offices are located in five buildings separated by a State Highway controlled by the State of Te

Show the tcp connections, Q. Show the TCP connections? Connection estab...

Q. Show the TCP connections? Connection establishment Three-way handshake Why is two-way handshake not enough? Connection termination Four steps

Shared variable programme structures, Shared variable programme structures ...

Shared variable programme structures  In this section, we talk about some more concepts related to the shared programme. Concept of Lock Locks are used for protected a

Networking, discuss the interdependence of workstation hardware with releva...

discuss the interdependence of workstation hardware with relevant software

What is bia, Burn in Address other name is MAC address

Burn in Address other name is MAC address

Explain the process of piggybacking, Q. Explain the process of piggybacking...

Q. Explain the process of piggybacking? When a data frame arrives in its place of immediately sending a separate control frame and the receiver restrains itself and waits until

Error detection in lrc, Error Detection- 2D/LRC Adds an additional...

Error Detection- 2D/LRC Adds an additional character (instead of a bit) A block of bits is prearranged in a table The Parity Bit for every data unit is calculate

Find the main problems with access points in a wireless lan, Question: ...

Question: Wireless Access points have been known to have various security vulnerabilities that can lead to breach of Secured wired networks. IEEE 802.11 standards have identifi

What is the network time protocol, What is the Network Time Protocol? ...

What is the Network Time Protocol? A protocol that makes sures accurate local timekeeping with reference to radio and atomic clocks located on the Internet. This protocol is c

Show the drawbacks of go-back-N, Q. Show the Drawbacks of Go-back-N? D...

Q. Show the Drawbacks of Go-back-N? Drawbacks of Go-back- N - Inefficient - Every out of order received packets are discarded (receiver side is simplified) - This

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd