Nics and network hardware, Computer Networking

Assignment Help:

NICs AND NETWORK HARDWARE:

 NIC is create for one kind of physical network. For example Ethernet interface may not be needed with token ring and similar ATM interface cannot be needed with FDDI.

 Some NICs may be used with different but same type hardware for example thin, thick and 10 Base-T Ethernet100Mbps, and 10Mbps  Ethernet.

CONNECTION BETWEEN NIC AND PHYSICAL NETWORK:

TWO ALTERNATIVES:

NIC have all circuitry and connects directly to network phase. A cable from NIC joins to additional circuitry that then attaches to the network phase.

THIN ETHERNET VERSUS 10BASE-T:

 Thin Ethernet and 10Base-T are type of Ethernet. The network method is not limited to one kind of connection.

 

 


Related Discussions:- Nics and network hardware

Enumerate about the home page and hot links, Enumerate about the Home Page ...

Enumerate about the Home Page and Hot Links Home Page: The primary Web page for an individual or organisation. These pages link to other related pages. Hot Links: A co

Switching creates variable latency through the switch, DEFINITION: Latency ...

DEFINITION: Latency = Delay. Because a store and forward switch reads the entire frame before forwarding, a larger frame takes longer than a shorter frame.

What are routers, What are routers? Routers work to connect two or more...

What are routers? Routers work to connect two or more network segments. These are the most intelligent network devices that store information in its routing table like paths, h

Explain FDDI media access control, FDDI Media Access Control Unlike CSM...

FDDI Media Access Control Unlike CSMA/CD networks such like Ethernet token-passing networks are deterministic--you are able to calculate the maximum time that will pass before

What is dns, What is DNS? DNS is Domain Name System. The major f...

What is DNS? DNS is Domain Name System. The major function of this network service is to provide host names to TCP/IP address resolution.

Define the method of encryption and decryption using by ssl, Encryption/dec...

Encryption/decryption using by SSL Once a session is established, the SSL generates a session key using public-key encryption to exchange information between the client and ser

Flow control in TCP, Q. Flow control in TCP? The amount of data a s...

Q. Flow control in TCP? The amount of data a source is able to send before receiving an ACK from the destination Whether to send 1 byte of data as well as wait for ACK

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd