3. Network Protocols
Ethernet
• Most widely used for LAN networks, in
particular S___ and b__ topologies.
•
The computer checks if the network cable is
clear and has no d___ and then will send data.
4. Network Protocols
Ethernet
• Most widely used for LAN networks, in
particular star and bus topologies.
•
The computer checks if the network cable is
clear and has no data and then will send data.
6. Network Protocols
IBM token-ring
The _______ computer sends a
token in the ring which travels
from one computer to another.
When a computer wants to send a
message, it waits for an empty
token.
7. Network Protocols
IBM token-ring
-The controlling computer sends a
token in the ring which travels
from one computer to another.
-When a computer wants to send a
message, it waits for an empty
token.
8. Network Protocols
IBM token-ring
-The controlling computer sends a
token in the ring which travels
from one computer to another.
-When a computer wants to send a
message, it waits for an empty
token.
9. Network Protocols
IBM token-ring
-When a computer finds an E_____
token, it fills it with the address of
the destination station along with a
message.
-The token then goes around the
ring until it reaches the
C________ that the message
came from.
10. Network Protocols
IBM token-ring
When a computer finds an empty
token, it fills it with the address of
the destination station along with a
message.
The token then goes around the
ring until it reaches the Computer
that the message came from.
11. Network Architecture
Peer to Peer Architecture
-tasks are distributed evenly amongst peers, no
central infrastruture.
-computers connect with each other in a
workgroup to share files, printers and internet.
Client/Server Architecture
-tasks are distributed between the server and
clients. The server provides the resource for
clients on request. This is commonly used by
companies.