What is computer communications networks, Computer Engineering

Assignment Help:

Q. What is Computer communications networks?

Computer communications networks are the outcome of a combination of computers and telecommunication products. An interconnected group of independent computers and peripheral devices that communicate with each other for the purpose of sharing software and hardware resources is known as a computer communications network. A local-area network (LAN) is any physical network technology that operates at high speed (usually tens ofMbits per second through several Gbits per second) over short distances (up to a few thousand meters). Examples include Ethernet and proNET-10. The stations, also known as nodes, within a LAN are physically linked with each other through twisted pairs of copper wires, coaxial cables, or fiber-optic cables. A wide- area network (WAN, also known as long-haul network) is any physical network that spans large geographic distances, usually operates at slower speeds, and has significantly higher delays than a LAN. Stations within a WAN communicate with each other through standard telephone lines, dedicated telephone lines, line-of-sight microwave systems, or fiber-optic links. Public-data network (PDN) is network service offered by a common carrier, such as Telnet, Tymnet, and Dataphone Digital Services of AT&T. ARPANET (Advanced Research Projects Agency of the U.S. Department of Defense) is an example of a private communications network. CYBERNET is an example of a remote-access communications network that provides access to huge databases for their users in different countries. The Internet is a collection of networks and gateways (special- purpose dedicated computers attached to various networks routing packets of information fromone to the other), including theMilnet (military network) and NSFNET (National Science Foundation network), that function as a single, cooperative virtual network providing universal connectivity and application-level services such as the electronic mail. The Internet reaches many universities, government research labs, and military installations in several countries.


Related Discussions:- What is computer communications networks

Illustrate the execute cycle, Q. Illustrate the Execute Cycle? The fetc...

Q. Illustrate the Execute Cycle? The fetch and indirect cycles include a small, fixed sequence of micro-operations. Every one of these cycles has fixed sequence of micro-operat

Three different types of convergences, Three dissimilar types of convergenc...

Three dissimilar types of convergences are: 1.  The convergence of e-commerce and wireless technology  2.  The Convergence of E-Commerce and IP Business-Grade Messaging 3

Representation in prolog - logic programs, Representation in Prolog - Logic...

Representation in Prolog - Logic Programs: If we justimpose some additional constraints on first-order logic, so than we get to a representation language knowing as logic prog

Explain common sub expression elimination, Explain briefly Common sub ex...

Explain briefly Common sub expression elimination of the commonly used code optimization techniques. Common sub expression elimination: In given expression as "(a+b)-(

Workday versus oracle, Workday has set the stage to revolutionize the way c...

Workday has set the stage to revolutionize the way companies manage and facilitatevarious aspects of their business operationsby utilizing cutting-edge cloud-based technologies in

In how many ways the data can be passed to functions, Object Oriented Progr...

Object Oriented Programming 1. Describe that in how many ways the Data can be passed to functions? Explain with the help of one example. 2. Describe how you create class a

Access to external identifiers, Access to External Identifiers: An external...

Access to External Identifiers: An external identifier is one which is referred in one module though defined in another. You can declare an identifier to be external by including i

What is garbage collection and what is it used for, In computer science, ga...

In computer science, garbage collection (GC) is a form of automatic memory management. The garbage collector, or just collector, attempts to reclaim garbage, or memory occupied by

Determine the handles data rate of broad band isdn, Broad Band ISDN handles...

Broad Band ISDN handles data rate of about (A) 64 kbps                                      (B) 100 mbps (C) 5.4 mbps                                    (D) 2.048 mbps

Full form of ldap, LDAP stands for LDAP- Light weight Directory Access...

LDAP stands for LDAP- Light weight Directory Access Protocol.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd