31 December 2015

How to send Bit Commands Networking

User1 when the computer is using the user computer 2 (file server), the network must take the file from the hard disk on the server, move it... thumbnail 1 summary
User1 when the computer is using the user computer 2 (file server), the network must take the file from the hard disk on the server, move it over the network, and sends it to a word processor on the user computer 1. Before transmitting the contents of files over a network, the file server must read the file from a floppy disk , Subsequently, the file server must transmit bits over the network.

Whenever the flow of electricity running through the wires, you can put a device at the end of the cable in order to feel something else on the electricity flow. Something that can be felt is the voltmeter. Bye electric voltage is electricity that flows through the cable. In networking, to send bits, the sender can change the electrical voltage at one level to indicate a binary 0, and the other to indicate a binary 1.

For example, to transmit bits, the NIC in the computer User 2 send some electrical signals through wires. The appliance is at the other end of the cable into the PC NIC User 1 this case further interpret the arrival of electrical signals. In order to work, both NICs must meet the standard transmission equipment. For example, imagine if the NIC User 2 sends an electrical signal a + 5 volts to transmit a binary 0 and +10 volts to transmit a binary 1, then the network will not work because User 1 is not going to know what is in User 2 sent to him.

Transmission physical bits can be much more complicated than these examples, but the basic idea remains the same, placing the delivery of electrical devices on the cable, which is interpreted as a binary number by a device at the other end of the cable. The term encoding refers to the process of taking a binary value and produces an electrical signal that is appropriate to be able to transmit bits over the network. Ecoding rules that are used to transmit the data specified by the standard networking.

Once Sent Bit A Time Package


Even if you read an example of a particular networking standard for transmitting the bits, some other standards in need before the two computers can communicate well. For example, imagine if User 2 can transmit the contents of a file successfully, but some data is lost, as are shown in Figure below.

Bit Commands Networking
Bit Commands Networking


In normal operation, the devices - devices in the network to send bits in groups, commonly called a packet. For example, User 2 sends the first part of the file performance first package, the next part of the file in the next package, and so on. Package is just a bunch of bits, combined for the transmission network. You can imagine the package as a package - a package store a few bits to you when bits - the bits sent over the network. Why network using packet ?? It's like if you work at a company selling widgets, you need to send one million widgets to a customer. Are you going to put it all in one box ?? Probably not. You will bring partly in one box, and partly to another box, until you've put all the widgets in several boxes. You will be sent a box - the box is the same place, and you may even send all the boxes on the same day. However, it will be easier to send the package - the package if the size of the box - the box more easily managed.

Similarly, instead of sending the entire contents of a file that may be billions - billions of bits in length if all tell the computer sends data in packets so that data transmission a little easier to handle. In fact, one of the reasons require a networking standard package form was as error recovery, you will learn in the next section.

What You Should Do When Bit Experiencing In Conflict


Now imagine if a second package that are shown in Figure 3.2 there is an error. If the second NIC is assumed that the +5 volt binary 0 and +10 volts is 1, what happens if the mains voltage is 15 volts? Or 7.5 volts? Of course, the power supply voltage will disrupt the NIC.

How did the error happen? Indeed, something simple person who is running the vacuum cleaner near the cable can cause changes in the electrical tension when electricity travels through wires. This phenomenon is called electrical interference. Formally, the electrical interference is the effect of a change in the electrical signal in because presence of several adjacent electrical signals. You all have seen or heard of electrical interference, such as when a television picture you slightly blurred, while the sound of AM radio you can not be heard when you're driving down the cable - high voltage power line, or when you hear a humming stereo sound from you when you was turn on the blender in your kitchen.

A good command for networking


The solution to the problem of transmission error usually occurs in the software on two computers with networking standard today. To rediscover the packet error, the computer software must agree to use the same networking protocol, a protocol that provides a method to identify two to recover from the error.

The protocol is a kind of a standard, in fact in some ways, protocols and standards are the same thing, but the term simple protocol that may be used to determine the lost data.

Error Recovery is a process that not only inform the general appearance of errors in the transmission paker, but also the demand to transmit packets back to the package well received. Rather than sending all the bits in the file at the same time, the use of the package enables to restore by simply sending another portion of the file.

29 December 2015

A good command for networking

Standard network depending on many standards to be able to do something useful. Before before discussing further standard, it is useful to c... thumbnail 1 summary
Standard network depending on many standards to be able to do something useful. Before before discussing further standard, it is useful to consider some networking standards. The next section discusses some basic - basic about how the data transmission between computers, how and why a set of bits has an error during transmission. But before, you should understand some of the terms in particular, bits and bytes.

Roadway through for a Bit To Get Byte


Two people communicate when one person says something and the others listen. If you would consider it, two people need to understand the same language, to communicate with people who spoke had to say a series of words. Word - the word itself is sound in combination. From a perspective, two people communicate in the same language, but at the other end of the spectrum, you may think that they communicate by making a series of sound.

A good command for networking

Likewise, computers can communicate to each other using the network, but with some perspective. For example, I'm using Microsoft Word to write the text in this article. When I send a file to my editor at cisco press, he used the same program to open the file and edit my files. So, can you imagine that our computers speak the same language. In this case, we understand both computer files in Word format with Microsoft, which is a word processor.

Relatively easy to imagine a file that consists of text on this article. However, at the same time, it is only a file set Byte each byte consists of 8 bits. It was a bit like when where you put the file folder in a file cabinet. You may be thinking that you just do something to save a file in the cabinet. From a different perspective, if the folder consists of plated - the sheet. Likewise, when the computer stores the files on the disk drive, the computer actually also save a file. However, from a different perspective, the computer also stores the bits that make up the file.

Computer file consists of a collection of binary digits. Humans typically use decimal numbering for example, 0, 1, 2, 3, .... 9, with ten unique digits. Binary only uses two digits: 0 and 1. This is because the computer hardware, at the most basic level, it can save one of the two electrical states in its memory, and it symbolizes a binary 0 or 1. Hence the phrase binary digit is composed of five parts if the spoken word, (at least in English), also because it is often too used, then condense the terms of bits.

see more : Build a Network: It Starts with Planning

To talk premises other people, you use the language, but it is actually the sound you produce a lot of small sounds. The sound is a combination of sound and then compose words and sentences performance language of your choice. Likewise, the computer might have a Word document or any other file on the computer useful. However, the contents of the file is only a small set of information, called bits. The bits of information are combined to make up part - part owned a computer in memory. (Meanwhile, the term refers to a series Byte 8 bit on most computers.)

When computers are communicating, the application needs to send something to an application on another computer. For example, when you see the web page, in which there are contents that consist of a single file or in more. Applications need to transfer the contents of a file to another computer. To that end, the computer sends a series of bits to another computer as a file is simply a series of bits.

Build a Network: It Starts with Planning

Face this reality: without good planning, everything that involves a lot of people would be fatal. There is even a popular proverb about the... thumbnail 1 summary
Face this reality: without good planning, everything that involves a lot of people would be fatal. There is even a popular proverb about the importance of planning, such as "those who fail to plan, plan mean failure."
The network can not operate unless all networking vendors follow the same plan or standards. Networking standards define the rules to be followed by anyone who makes networking products, including cables, hardware, and software. When you follow those standards, the product should be run simultaneously.
This paper outlines some of the most popular standards and explain the miraculous advantages in the use of standards for networking.

Comply with the rules (Rule)

Anyone who has ever spent time teenagers and I think most people who read this article at least once a teenager knows that the time was a time of rebellion. Rather than comply with the rules, sometimes they just think that rules are made to violated! In some cases, breaking the rules may be allowed, however often, as it is known by the parents, a policy to create and customize self-regulation can be realized after thinking even in teenagers.

Standards are rules that make life much easier. For example, Look at the outlet located at the nearest wall. If you live in the United States, you may see an electrical outlet with three holes - two holes for teeth with a flattened metal, and a tooth for a round hole. Teeth are flattened parallel to one another. If you go to the store and buy a lamp, you hope that the lamp is equipped with a power cord, and you hope one end of the cable fits into the outlet. That is one example of popular standards. If you go to the store and buy a toaster, can opener, and a stereo, you expect the seller to adjust the working standard outlet in your country.

However, if the link between the story with networking? standard tends to limit one particular thing, such as a contact form and connectors used by the electrical outlet and power cord. Other standards may adjust the amount of juice (voltage) flowing through the outlet, whether it is AC or DC, whether that equipment, and so on. All standards are important and must be followed to prevent the explosion of the lamp. In short, it does not mean that just because you can turn on the lights, then all important standards used. Likewise, Networking has a standard physical details so that you can install the cable. However, network devices must also support other standards so that the network is working properly.

Rule, School for Networking

Some standards still required even though a simple network, this will show images below standard in the use of Networking.
Build a Network: It Starts with Planning
Both PC has installed NIC, and each card has a container into which a cable can be connected. NIC aalah computer cards that enable computers to send and receive data over the physical network. The word behind the acronym NIC (network interface card) is quite reasonable because the NIC is a computer card that provides the interface between the computer and the network.

Standard networking sets some type of connector. Connector cable is a physical endpoint, with a certain size and shape. For example, an electric power plug at the end of the electrically charged wires may have two flat-edged teeth and one tooth tipped round. With a networking cable, plug the cable end is not known, but the connector. Connectors hold the wire inside the cable. Standard connector also ensures that the connector according to the NIC interface.

So, two computers must implement the same standard about how the networking software on each computer ordered another computer about what she wanted to do.