What is computer communications networks, Computer Engineering

Assignment Help:

Q. What is Computer communications networks?

Computer communications networks are the outcome of a combination of computers and telecommunication products. An interconnected group of independent computers and peripheral devices that communicate with each other for the purpose of sharing software and hardware resources is known as a computer communications network. A local-area network (LAN) is any physical network technology that operates at high speed (usually tens ofMbits per second through several Gbits per second) over short distances (up to a few thousand meters). Examples include Ethernet and proNET-10. The stations, also known as nodes, within a LAN are physically linked with each other through twisted pairs of copper wires, coaxial cables, or fiber-optic cables. A wide- area network (WAN, also known as long-haul network) is any physical network that spans large geographic distances, usually operates at slower speeds, and has significantly higher delays than a LAN. Stations within a WAN communicate with each other through standard telephone lines, dedicated telephone lines, line-of-sight microwave systems, or fiber-optic links. Public-data network (PDN) is network service offered by a common carrier, such as Telnet, Tymnet, and Dataphone Digital Services of AT&T. ARPANET (Advanced Research Projects Agency of the U.S. Department of Defense) is an example of a private communications network. CYBERNET is an example of a remote-access communications network that provides access to huge databases for their users in different countries. The Internet is a collection of networks and gateways (special- purpose dedicated computers attached to various networks routing packets of information fromone to the other), including theMilnet (military network) and NSFNET (National Science Foundation network), that function as a single, cooperative virtual network providing universal connectivity and application-level services such as the electronic mail. The Internet reaches many universities, government research labs, and military installations in several countries.


Related Discussions:- What is computer communications networks

Diffrence between RISC and CISC architecture, Q. Diffrence between RISC and...

Q. Diffrence between RISC and CISC architecture? CISCs provide better support for high-level languages since they include high-level language constructs such as CASE, CALL etc

What are the 3 segments of the default route, What are the 3 segments of th...

What are the 3 segments of the default route, that is there in an ASP.NET MVC application? Ans)  Segment 1st - Controller Name Segment 2nd - Action Method Name Segment 3r

What is managed code and managed data, What is managed code and managed dat...

What is managed code and managed data? Managed code is code that is written to target the services of the Common Language Runtime. In order to target these services, the code m

Give some examples of malicious data, Give some examples of malicious data....

Give some examples of malicious data.  In May 2002, the Norton Anti-Virus software for Windows operating systems detects about 61000 malicious programs. Some of them are named

What is the vertical organizational structure, What is the Vertical Organiz...

What is the Vertical Organizational Structure? This is a traditional approach that is typified by a functional approach to work in that departments work onto tasks relevant to

Risk detection, what is meant by risk detection in software project managem...

what is meant by risk detection in software project management

Mathematical model, how to write mathematical model for circular linked lis...

how to write mathematical model for circular linked list

Centres of keycaps, A full size keyboard has distance between centres of ke...

A full size keyboard has distance between centres of keycaps (keys) like 19mm (0.75in).The keycaps have a top of nearly 0.5in (12.5in) that is shaped as a sort of dish to help you

Convert ascii code to its bcd equivalent, Convert ASCII code to its BCD equ...

Convert ASCII code to its BCD equivalent. This can be achieved by simply replacing bits in upper four bits of byte by four zeros. For illustration the ASCII '1' is 32h = 0010B. By

Shift microoperations, Shift Microoperations Shift microoperation can b...

Shift Microoperations Shift microoperation can be used for serial transfer of the data. They are used generally with arithmetic, logic and other data-processing operations. The

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd