Ginni has Published 1519 Articles

Explain the types of ETHERNET Cable.

Ginni

Ginni

Updated on 04-May-2021 13:54:49

1K+ Views

There are various types of ETHERNET Cables which are as follows −10Base 5The first standard defined in IEEE 802.3 is 10 Base 5. It is a Thick Ethernet or Thicknet. It is a bus topology LAN with baseband signaling. The data speed is 10 Mbps, and the maximum allowed segment ... Read More

What is Client-Server Architecture in Computer Network?

Ginni

Ginni

Updated on 04-May-2021 13:52:17

6K+ Views

In this architecture, a specific computer is known as a server, specially designated to provide various services to other computers known as clients. In simple terms, the server can be defined as a provider of services, and the client can be a requester to services. The client requests any information ... Read More

What is Computer Network Architecture?

Ginni

Ginni

Updated on 04-May-2021 13:51:15

7K+ Views

A network model represents the organization of multiple computers in a network. It describes how individual computers are interconnected in a network.The computer network architecture is as follows −Centralized Computing ArchitectureIn centralized computing architecture, one powerful computer is used to serve one or more low powered computers. In the centralized ... Read More

What is an ETHERNET in the Computer Network?

Ginni

Ginni

Updated on 04-May-2021 13:49:47

4K+ Views

Ethernet is a LAN architecture developed by XEROX and extended by DEC, IC and Xerox. It is specified by IEEE 802.3, and it defines two categories.These categories are as follows−BasebandBroadbandBaseband uses digital signals, while broadband uses analog signals. Baseband is further divided into five standard names as follows −10 Base ... Read More

What are the goals of Computer Network?

Ginni

Ginni

Updated on 04-May-2021 13:48:30

24K+ Views

The main goals of computer networks are as follows −Resource SharingThe main goal of the computer network is Resource Sharing. It is to create all the programs, data and hardware accessible to anyone on the network without considering the resource’s physical area and the client.Saving MoneyThe second goal of a ... Read More

Why do we need Computer Networks?

Ginni

Ginni

Updated on 04-May-2021 13:47:47

10K+ Views

In today’s technology-oriented world, sharing has become an integral part of businesses and other activities. This sharing can be achieved by networking. A computer network is linking two or more computers in order to share files or resources.Here, we will see why we need computer networks in more detail below ... Read More

What are the Network Security threats and attacks?

Ginni

Ginni

Updated on 04-May-2021 13:42:38

1K+ Views

There are various network security threats and attacks which are explained below−Natural DisastersEarthquakes, floods, lightning, and fire can cause several damages to computer systems. It could include other threats such as riots, wars, and terrorist attacks could be included here. Although they are human-caused threats, they are classified as disastrous.Deleting ... Read More

What is Network Security?

Ginni

Ginni

Updated on 04-May-2021 13:39:57

856 Views

The objective of the network is to send data among its users located locally or remotely. Hence, it is possible that undesired users can hack the web and prove harmful to the network or the user's health.The network administrator should follow a few essential points to provide the network with ... Read More

What is SMTP?

Ginni

Ginni

Updated on 04-May-2021 13:38:28

5K+ Views

SMTP represents Simple Mail Transfer Protocol. SMTP is a set of interaction guidelines that allow the software to transmit electronic mail over the internet, referred to as Simple Mail Transfer Protocol.The main objective of SMTP is used to set up communication rules between servers. The servers have a way of ... Read More

What is the TFTP Operation?

Ginni

Ginni

Updated on 04-May-2021 13:27:49

794 Views

TFTP operation is very simple. The client sends a read or write request at the server's UDP port 69. The server accepts the request by sharing data messages in case of the read request and sending acknowledgement in the write request. In either case, the server chooses a UDP port ... Read More

Advertisements