Unit 4 Research Project 1: Chapter 5 Mind Maps
Component Physical Function Logical Function
CPU Operates operations that lead to making a PC work. Mastermind of the computer
NIC Furnishes a PC with a physical connection to the PC system.
Cables and Connectors Coaxial Cable, UTP, RJ45 Interfaces the PC to different things, for example, force source, Ethernet.
Local area switch ,Router ,Bridge System extension used to make an association between two different PC systems or to gap one system into two. LAN switch-gives a focal association between two or more PCs on a system. Switch advances information parcels between PC systems
OS ,Microsoft Windows,Linux. Operating systems, memory management is the function responsible for managing the computer's
…show more content…
Permits the PC to perform different assignments send and get email, turn upward sites, and so on
2. Important types of local area network and wide area networks technologies:
LAN Technologies How used in Data Network WAN Technologies How Used in Data Network
Ethernet Physical systems administration innovation used to convey information over the web. Point to Point Protocol =PPP For correspondence between two PCs utilizing a serial interface or a PC joined by telephone line to a server.
Logical Ring Joined in a ring or star topology and a bit-or token-passing plan is utilized as a part of request to keep the impact of information between two PCs that need to send messages in the meantime. Abnormal state Data Link Control Information is composed into a unit (called an edge) and sent over a system to a destination that confirms its effective entry likewise deals with the stream or pacing at which information is sent.
Fiber Distributed Data Interface. Measures for information transmission on fiber optic lines-can stretch out in reach up to 124 miles. Asynchronous Transfer Mode =ATM composes computerized information into 53-byte cell units and transmits them more than a physical medium utilizing advanced sign
In the transport topology, each advanced PC is joined with a primary link alluded to as the transport. Hence, as a result, each computerized PC is specifically associated with each distinctive advanced PC inside of the system.
A primary system is made up of at least two computing devices either wired or wireless points of connection; these points are “network ports.” There are usually one network hub or network switch that permits their interconnection. The most standard “wired” computer networks are known as “Ethernet.” This is made-up of UTP (unshielded twisted pair) cables, and just about all personal computers have a UTP Ethernet Network port as standard. The printer also comes with an Ethernet port, making it easily shared amongst the user of a network. Other wired channels are coaxial cable used for cable T.V, Category 6 cables used for LANs, and fiber optic cables used for high-capacity trunk lines. Most local area networks (LAN) are used in small businesses network. Wired networks are much more secure than wireless networks. The Computer Age has shifted from a traditional industry to an economy is formed on information computerization. The arrival of the computer age is associated with the Digital Revolution. Today, the internet has generated attritions from billions of people and industries worldwide it is now a global cultural
1. Which network device directs the flow of information from one node on a network to another by giving each sender/receiver pair the line's entire bandwidth?
It utilizes electromagnetic field to exchange information, for the reasons of naturally recognizing and following labels joined to
The information transmitted through telecommunication may be in writing or rather images or rather data. These communications
The most common method of transmitting information include use of bit strings. It's beyond bounds of possibility to evade errors when data is stored, recovered, operated on or transmitted. The likely source for this errors include electrical interference, noisy communication channels, human error or even equipment error and storing data for a very long time on magnetic tapes.. Important to consider therefore is ensuring liable transmission when large computer files are transmitted very fast or say when data is sent over a very long distance and to recover data that have degraded due to long storage on tapes. For a reliable transmission of data, techniques from coding theory are used. It is done in a such a way
Benjamin and Elsie, (2003) illustrate that EC provides the channel for each party to get the required information to avoid information scarcity or information overload, improves the accuracy of data entry and transmission, and realize the in-time communication.
4.A paradigm for electronic communications where a message is broken up into blocks of data of limited size which are then transmitted one
Is a high speed data transmission which only one cable can carry a large amount of data at once.
* The data which is to be exchanged can be broken into bits and sent over to receive at other end. This process is called segment.
as it might on a ring network, in which messages are passed from one node to the
Each computer in a network has a special expansion card called a network interface card.
And also it provide fault tolerance platform is capa-ble of executing messages using Message Passing Interface In order to hold fault tolerance in a Distri-buted Multithread.
Hubs are used to construct a network by connecting multiple computers in a star / hierarchical network topology, the most common form of local networks now every day. A hub is a simple device when it is sent bits of computer data from A to B, it is not to examine the purpose, instead, it sends the signal to all other computer (B, C, D ..) within the network. B will then get it, while rejecting the other nodes. This confirms that the traffic is released.