Saturday, May 30, 2009

Understsnding FDDI topology

FDDI stands for Fiber Distributed Data Interface. The FDDI standard is ANSI X3T9.5 . The FDDI topology is ring with two counter rotating rings for reliability with no hubs. Cable type is fiber-optic. Connectors are specialized. The media access method is token passing. Multiple tokens may be used by the system. The maximum length is 100 kilometers. The maximum number of nodes on the network is 500. Speed is 100 Mbps. FDDI is normally used as a backbone to link other networks. A typical FDDI network can include servers, concentrators, and links to other networks. CDDI is a copper version of FDDI which uses category 5 cable. Obviously the distance is more limited than FDDI.

Devices called concentrators provide functions similar to hubs. Most concentrators use dual attachment station network cards but single attachment concentrators may be used to attach more workstations to the network.

FDDI token passing allows multiple frames to circulate around the ring at the same time. Priority levels of a data frame and token can be set to allow servers to send more data frames. Time sensitive data may also be given higher priority. The second ring in a FDDI network is a method of adjusting when there are breaks in the cable. The primary ring is normally used, but if the nearest downstream neighbor stops responding the data is sent on the secondary ring in attempt to reach the computer. Therefore a break in the cable will result in the secondary ring being used. There are two network cards which are:

1. Dual attachment stations (DAS) used for servers and concentrators are attached to both rings.
2. Single Attachment stations (SAS) attached to one ring and used to attach workstations to concentrators.
A router or switch can link an FDDI network to a local area network (LAN). Normally FDDI is used to link LANs together since it covers long distances.

Wednesday, May 27, 2009

Deal on business loans

Today you see a lot of people whose business is deeply suffered by recession and now they are in great need of financial support from some external sources.For availing these financial support the only option to them is to contact some banks or organization that can provide financial aid to them.But as all we very well known that these banks have a very tedious process of issuing business loans.But now here is the solution of your problem at ezunsecured.com,because they provide you their financial help without any personal guarantee,that means they can sanctioned you loan upto $400,000 without any guarantee.

If you need amount much larger than this then also you can apply here and with some easy documentation your application is approved.But generally many people are in need of small business loans for recovering their business needs,hence this is the right place for your business loans.If you are worried about your past bad credit personal history then also they can issue easy unsecured loans within 7 days of your application.If you want more proof on how this company helped other people in recovering their business then you can watch the success stories of the people that already taken benefit from them.For availing all these facilities you had to just sign up with them,and once you sign up a prosper and secure future is waiting for you.

Friday, February 27, 2009

Destination and Next Hop Addresses

What is the relationship between the destination address in a datagram header and the address of the next hop to which the datagram is forwarded?The Destination IP address field in a datagram contains the address of the Ultimate destination.When a router receives a datagram,the router extracts the destination address D,and uses it to compute the address of the next router to which datagram should be sent,N.Although the datagram is sent directly to address N,the header in the datagram retains destination address D.All routes are computed using IP address.After computing the address of a next hop,N,IP software uses the address binding to translate N to an equivalent hardware address for transmission.

Sunday, February 22, 2009

Physical Network Connection With Routers

The basic hardware component used to connect heterogeneous networks is a Router.Physically,routers resembles bridges that means each router is a special purpose hardware system dedicated to the task of interconnecting networks.Like a bridge,a contains a processor and memory as well as a separate I/O interface for each network to which it connects.The network treats a connection to a router, the same as the connection to any other computer.

The most important that you have to kept in your mind about router is that it is not only used to connect two similar technology,it can also be used to connect two different types of network technology. Router can connect two LAN's,a LAN and a WAN,or two WAN's.Furthermore,when a router connects two network in the same general category,the networks do not need to use the same technology.For ex:- A router can connect an Ethernet LAN to a frame relay network.Thus,each cloud represents an arbitrary network technology.On summarizing this whole,we can say that a router is a special purpose system dedicated to the task of interconnecting networks.A router can interconnect networks that use different technologies,including different media,physical addressing schemes or frame formats.


You can also visit my other blogs:
Operating System Concepts
Technomedia
Enter into world of Technology

Saturday, February 21, 2009

Goal of Internet

The main goal of internetworking is to provide a universal service across heterogeneous networks.To provide universal service among all computers on an internet,routers must agree to forward information from a source on one network to the specified destination on the other network.The task is complex because as all we know that different frame formats and different addressing schemes are used by different networks.Hence,to overcome this problem protocol software is needed on computers and routers to make universal service possible.The main task of these internet protocols is to overcome the differences in frame formats and physical addresses to make communication possible among networks that use different technologies.
For knowing more about protocols for internetworking you can visit:
http://networkingconcepts4u.blogspot.com/2009/02/protocol-for-internetworking.html

Friday, February 20, 2009

Internet Architecture


With the help of routers it is possible for an organization to choose network technologies appropriate for each need,and to use routers to connect all networks into a single network.As all we know that router is used exactly two connections but commercial routers can connect more than two networks.Thus,a single router could connect any number of networks.However,an organization seldom uses single router to connect all of its networks.There are two main reasons behind it:

1.As all we know that router must forwarded each packet,the processor in given router is insufficient to handle the traffic passing among an arbitrary number of networks.

2.The second reason behind this is redundancy,because redundancy improves reliability.To avoid a single point of failure,protocol software continuously monitors internet connection,and instructs the routers to send traffic long alternative paths when a network or router fails.

Thus,when planning an internet,an organization must choose a design that meet's the organization's need for reliability,capacity and cost.In particular,the exact details of internet topology often depends on the bandwidth of the physical networks,the expected traffic,the organization's reliability requirements,and the cost and performance of available router hardware.

Thursday, February 19, 2009

Connection between a NIC and a network

The type of connection used between a NIC and a network depends on that network technology.In some technologies,the NIC contains most of the necessary hardware,and attaches directly to the network medium using a single cable or optical fiber.In many other technologies,the NIC does not contain all the electronic circuitry needed to attach directly to the network.Instead,the cable from a NIC attaches to an additional electronic component that then attaches to the network.Surprisingly,the exact details of the connection between a NIC and a network are not determined by the technology that means a given network technology can support multiple wiring schemes.Let take the example of Ethernet technology in which technology i.e Ethernet remains same while the wiring scheme changes.Wiring scheme can be Thick Ethernet Wiring,Thin Ethernet Wiring and Twisted pair Ethernet Wiring.