4
It could be A public key or B public key ,,,as a whole I
mean to say it depends on the type of encryption you used as
public key or private key encryption.
A public key
bit stuffing
• There is no dependence upon a central host as data
transmission is supported by all devices on the ring. Each
node has sufficient intelligence to control the
transmission of data from and to its own node.
• Works effectively when processing is distributed
across a site.
• Very high transmission speeds are possible.
• It is deterministic i.e. different performance
levels can be determined for different traffic levels.
• Routing between devices is simple because messages
normally travel in one direction.
• As data is in one direction it can transmit large
volumes of data
1.Very orderly network where every device has access to the
token and the opportunity to transmit .
2.Performs better than a star topology under heavy
network load .
3.Can create much larger network using Token Ring.
The Packets has to reacg From Source to destination in a
fixed time interval else the packets should be dropped.
Computer with loaded Opertaing system, a Lan card and to
connect to other system we need Hub or Swicth
ring n/w
International Data encryption Algorithm.
In ring Network, every computer or devices has two adjacent
neighbors for communication. In a ring network, all the
communication messages travel in the same directory whether
clockwise or anti clockwise. Any damage of the cable of any
cable or device can result in the breakdown of the whole
network. Ring topology now has become almost obsolete.
FDDI, SONET or Token Ring Technology can be used to
implement Ring Technology. Ring topologies can be found in
office, school or small buildings
============================================================
=STAR
In the computer networking world the most commonly used
topology in LAN is the star topology. Star topologies can
be implemented in home, offices or even in a building. All
the computers in the star topologies are connected to
central devices like hub, switch or router. The
functionality of all these devices is different. I have
covered the detail of each networking devices in the
separate portion of my website. Computers in a network are
usually connected with the hub, switch or router with the
Unshielded Twisted Pair (UTP) or Shielded Twisted Pair
Cables.
As compared to the bus topology, a star network requires
more devices & cables to complete anetwork. The failure of
each node or cable in a star network, won’t take down the
entire network
============================================================
=Tree Topology
Tree topologies are comprised of the multiple star
topologies on a bus. Tree topologies integrate multiple
star topologies together onto a bus. Only the hub devices
can connect directly with the tree bus and each Hub
functions as a root of a tree of the network devices. This
bus/star/hybrid combination supports future expandability
of the computer networks, much better than a bus or star.
These are all topologies, which mean physical arrangments
of nodes(computer, printer and etc...)
we can simply say that"speed of Flow of data on network".
Also referred to as static packet filtering. Controlling
access to a network by analyzing the incoming and outgoing
packets and letting them pass or halting them based on the
IP addresses of the source and destination. Packet filtering
is one technique, among many, for implementing security
firewalls.
TFTP User UDP Protocol and FTP uses TCP/IP Protocol
Correct me if i am wrong
FTP uses TCP/IP Protocol and is connection orientated -
this means that it uses error checking and flow control
where TFTP does not - it uses the basic UDP connectionless
protocol, so no error checking or flow control.
Ethernet and IEEE 802.3 implement a rule, known as the 5-4-3
rule, for the number of repeaters and segments on shared
access Ethernet backbones in a tree topology. The 5-4-3 rule
divides the network into two types of physical segments:
populated (user) segments, and unpopulated (link) segments.
User segments have users' systems connected to them. Link
segments are used to connect the network's repeaters
together. The rule mandates that between any two nodes on
the network, there can only be a maximum of five segments,
connected through four repeaters, or concentrators, and only
three of the five segments may contain user connections.
The Ethernet protocol requires that a signal sent out over
the LAN reach every part of the network within a specified
length of time. The 5-4-3 rule ensures this. Each repeater
that a signal goes through adds a small amount of time to
the process, so the rule is designed to minimize
transmission times of the signals.
The 5-4-3 rule -- which was created when Ethernet, 10Base5,
and 10Base2 were the only types of Ethernet network
available -- only applies to shared-access Ethernet
backbones. A switched Ethernet network should be exempt from
the 5-4-3 rule because each switch has a buffer to
temporarily store data and all nodes can access a switched
Ethernet LAN simultaneously.
they are-
1.) repeater
2.) bridges
3.) routers
4.) gateways
5.) brouters
Repeater and hub are layer 1 devices(Physical layer)
Bridge and switch are layer 2 devices(Datalink layer
Router and Layer-3 switch are layer 3 device(Network layer)
Digital Subscriber Line (dsl) allows us to transmit voice,
data, video e.t.c simultanious on the same existing
telephone lines. in short DSL allows us to use both
telephone and internet simultaniously,
service provider only provides the dsl modem as a part of
installation
DSL is 20times faster than ordinary telephone and 10 times
faster than ISDN
DSL (Digital Subscriber Line) is a set of standards for
broadband network connectivity over normal telephone lines
To get the OS name in the system we have the following ways:
1. Start> Type> sysdm.cpl
2. Right click on my computer icon on desktop> Go to
properties> there we can get the OS name
We can see OS in the system from SYSTEM PROPERTISE wizard.
Right Click on MY COMPUTER - PROPERTIES - On GENERAL tab,
we can get all information about system OS, OS version.
Hardware information, just like CPU speed, RAM size