What is computer communications networks, Computer Engineering

Assignment Help:

Q. What is Computer communications networks?

Computer communications networks are the outcome of a combination of computers and telecommunication products. An interconnected group of independent computers and peripheral devices that communicate with each other for the purpose of sharing software and hardware resources is known as a computer communications network. A local-area network (LAN) is any physical network technology that operates at high speed (usually tens ofMbits per second through several Gbits per second) over short distances (up to a few thousand meters). Examples include Ethernet and proNET-10. The stations, also known as nodes, within a LAN are physically linked with each other through twisted pairs of copper wires, coaxial cables, or fiber-optic cables. A wide- area network (WAN, also known as long-haul network) is any physical network that spans large geographic distances, usually operates at slower speeds, and has significantly higher delays than a LAN. Stations within a WAN communicate with each other through standard telephone lines, dedicated telephone lines, line-of-sight microwave systems, or fiber-optic links. Public-data network (PDN) is network service offered by a common carrier, such as Telnet, Tymnet, and Dataphone Digital Services of AT&T. ARPANET (Advanced Research Projects Agency of the U.S. Department of Defense) is an example of a private communications network. CYBERNET is an example of a remote-access communications network that provides access to huge databases for their users in different countries. The Internet is a collection of networks and gateways (special- purpose dedicated computers attached to various networks routing packets of information fromone to the other), including theMilnet (military network) and NSFNET (National Science Foundation network), that function as a single, cooperative virtual network providing universal connectivity and application-level services such as the electronic mail. The Internet reaches many universities, government research labs, and military installations in several countries.


Related Discussions:- What is computer communications networks

Difference among msgbox statement and msgboxq function, MsgBox is a built i...

MsgBox is a built in VB function which shows a Message Box and MsgBoxQ is a function definite by the user.

What is monkey testing, What is Monkey testing? The monkey testing is ...

What is Monkey testing? The monkey testing is the process of testing here and there for judging the application trying to observe the accessing dissimilar functionalities is i

Identify the main enhancements brought along by tkip, Question: (a) Id...

Question: (a) Identify the four main enhancements brought along by TKIP on WPA to solve the problems in WEP. (b) The term WarDriving has been frequently used while talking

What is master clock signal in control unit, Q. What is Master Clock Signal...

Q. What is Master Clock Signal in Control Unit? The Master Clock Signal: This signal causes micro-operations to be executed in a square. In a single clock cycle either a single

Design a circuit which computes the square of a number, Design a circuit wh...

Design a circuit which computes the square of a number? This should not make use of any multiplier circuits. This should use Multiplexers and some other logic as: 1^2=0+1=1

By which analog signal combine with a carrier frequency, Analog signals can...

Analog signals can be              by combining them with a carrier frequency (A)  Carried                                      (B)  Transported (C)  Multiplexed

DBMS, Difference between Paperbase and computer base system?

Difference between Paperbase and computer base system?

Explain about instruction cycle, Q. Explain about Instruction Cycle? Th...

Q. Explain about Instruction Cycle? The instruction cycle for this provided machine comprises four cycles. Presume a 2-bit instruction cycle code (ICC). The ICC can represent t

State the scope of security policy, State the scope of security policy ...

State the scope of security policy The scope of security policy depends on aspects such as the size of the Intranet site, type of information hosted on it, and the number of u

Best method between linear and matrix addressing modes, Which of the best m...

Which of the best method between linear addressing and matrix addressing modes ? Ans: Best Method: Matrix Addressing is the suitable method, since this configuration on

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd