0% found this document useful (0 votes)
44 views

Computer Fundamental

A server is a computer or device that manages network resources like files, printers or databases. Different types of servers serve different functions. A hub is a common connection point that connects network segments and copies packets to all ports so all devices can see the traffic. Network cables like twisted pair, coaxial or fiber optic are used to connect computers to transfer data on a network. Protocols define rules for communication between computers and ensure they can talk to each other regardless of operating system or location. Common protocols are TCP, IP, HTTP and FTP. Ethernet protocols define LAN standards for 10/100/1000 Mbps networks. Token Ring is an older LAN protocol where stations are connected in a ring and permission to transmit is granted via

Uploaded by

abidullahkhan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views

Computer Fundamental

A server is a computer or device that manages network resources like files, printers or databases. Different types of servers serve different functions. A hub is a common connection point that connects network segments and copies packets to all ports so all devices can see the traffic. Network cables like twisted pair, coaxial or fiber optic are used to connect computers to transfer data on a network. Protocols define rules for communication between computers and ensure they can talk to each other regardless of operating system or location. Common protocols are TCP, IP, HTTP and FTP. Ethernet protocols define LAN standards for 10/100/1000 Mbps networks. Token Ring is an older LAN protocol where stations are connected in a ring and permission to transmit is granted via

Uploaded by

abidullahkhan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

Server

A computer or device on a network that manages network resources. There are many different types of servers. For example: File server: a computer and storage device dedicated to storing files. Any user on the network can store files on the server. Print server: a computer that manages one or more printers, and a network server is a computer that manages network traffic. Database server: a computer system that processes database queries. Servers are often dedicated, meaning that they perform no other tasks besides their server tasks. On multiprocessing operating systems, however, a single computer can execute several programs at once. A server in this case could refer to the program that is managing resources rather than the entire computer.

Hub
A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets. A passive hub serves simply as a conduit for the data, enabling it to go from one device (or segment) to another. So-called intelligent hubs include additional features that enables an administrator to monitor the traffic passing through the hub and to configure each port in the hub. Intelligent hubs are also called manageable hubs. A third type of hub, called a switching hub, actually reads the destination address of each packet and then forwards the packet to the correct port.

Network Cable
Network cable is used to connect and transfer data between computers and a network. There are different types of network cable, and the appropriate type to use will depend on the structure and topology of your network. The most commonly used types of network cable are the twisted pair, coaxial, Ethernet cross over, and fiber optic. The unshielded twisted pair (UTP) cable is used in many Ethernet networks. It has four pairs of wires that are housed inside of the lining of the cable. Each pair is twisted into several additional twists to prevent interference from other devices on the network. The structure of this type of cable increases its reliability and helps minimize network failures. Coaxial cable, or coax, is another common type of network cable. It has a copper conductor in its center and a plastic coating serves as an insulator between the center conductor and a metal shield. The cable is then covered with a coating. The coating may be think or thick the thicker coating which less pliable provides extra protection. Ethernet crossover cable is used to connect a computer network made up of two or more computers. This type of network cable eliminates the need for network switches or routers. The cable also allows the computers to be connected using their network adaptors, such as the network interface card (NIC).

What is a Protocol?
A protocol is a set of rules that governs the communications between computers on a network. In order for two computers to talk to each other, they must be speaking the same language. Many different types of network protocols and standards are required to ensure that your computer (no matter which operating system, network card, or application you are using) can communicate with another computer located on the next desk or half-way around the world. The OSI (Open Systems Interconnection) Reference Model defines seven layers of networking protocols. The complexity of these layers is beyond the scope of this tutorial; however, they can be simplified into four layers to help identify some of the protocols with which you should be familiar (see fig 1). OSI Layer Name Common Protocols 7 Application HTTP | FTP | SMTP | DNS | Telnet 6 Presentation 5 Session 4 Transport TCP | SPX 3 Network IP | IPX 2 Data Link Ethernet The TCP/IP Internet protocols, a common example, consist of: Transmission Control Protocol (TCP), which uses a set of rules to exchange messages with other Internet points at the information packet level Internet Protocol (IP), which uses a set of rules to send and receive messages at the Internet address level Additional protocols that include the Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP), each with defined sets of rules to use with corresponding programs elsewhere on the Internet There are many other Internet protocols, such as the Border Gateway Protocol (BGP) and the Dynamic Host Configuration Protocol (DHCP). The word protocol comes from the Greek protocollon, meaning a leaf of paper glued to a manuscript volume that describes the contents.

Ethernet: IEEE 802.3 Local Area Network (LAN) protocols


Ethernet protocols refer to the family of local-area network (LAN) covered by the IEEE 802.3. In the Ethernet standard, there are two modes of operation: half-duplex and full-duplex modes. In the half duplex mode, data are transmitted using the popular Carrier-Sense Multiple Access/Collision Detection (CSMA/CD) protocol on a shared medium. The main disadvantages of the half-duplex are the efficiency and distance limitation, in which the link distance is limited by the minimum MAC frame size. This restriction reduces the efficiency drastically for high-rate transmission. Therefore, the carrier extension technique is used to ensure the minimum frame size of 512 bytes in Gigabit Ethernet to achieve a reasonable link distance. Four data rates are currently defined for operation over optical fiber and twisted-pair cables: 10 Mbps - 10Base-T Ethernet (IEEE 802.3) 100 Mbps - Fast Ethernet (IEEE 802.3u)

1000 Mbps - Gigabit Ethernet (IEEE 802.3z) 10-Gigabit - 10 Gbps Ethernet (IEEE 802.3ae).

Token Ring: IEEE 802.5 LAN Protocol


Token Ring is a LAN protocol defined in the IEEE 802.5 where all stations are connected in a ring and each station can directly hear transmissions only from its immediate neighbor. Permission to transmit is granted by a message (token) that circulates around the ring. Token Ring as defined in IEEE 802.5 is originated from the IBM Token Ring LAN technologies. Both are based on the Token Passing technologies. While them differ in minor ways but generally compatible with each other.

You might also like