Computer Essay

3676 words - 15 pages

Networks using a Star topology require a central point for the devices to connect. Originally this device was called a concentrator since it consolidated the cable runs from all network devices. The basic form of concentrator is the hub.
As shown in Figure; the hub is a hardware device that contains multiple, independent ports that match the cable type of the network. Most common hubs interconnect Category 3 or 5 twisted-pair cable with RJ-45 ends, although Coax BNC and Fiber Optic BNC hubs also exist. The hub is considered the least common denominator in device concentrators. Hubs offer an inexpensive option for transporting data between devices, but hubs don't offer any form of ...view middle of the document...

The maximum segment length for a UTP cable on an Ethernet network is 100 meters. A segment is defined as the distance between two communicating computers. However, because the hub also functions as a repeater, each of the cables connecting a computer to a hub port can be up to 100 meters long, allowing a segment length of up to 200 meters when one hub is inserted in the network.
Multistation Access Unit

A Multistation Access Unit (MAU) is a special type of hub used for token ring networks. The word "hub" is used most often in relation to Ethernet networks, and MAU only refers to token ring networks. On the outside, the MAU looks like a hub. It connects to multiple network devices, each with a separate cable.
Unlike a hub that uses a logical bus topology over a physical star, the MAU uses a logical ring topology over a physical star.

When the MAU detects a problem with a connection, the ring will beacon. Because it uses a physical star topology, the MAU can easily detect which port the problem exists on and close the port, or "wrap" it. The MAU does actively regenerate signals as it transmits data around the ring.


Switches are a special type of hub that offers an additional layer of intelligence to basic, physical-layer repeater hubs. A switch must be able to read the MAC address of each frame it receives. This information allows switches to repeat incoming data frames only to the computer or computers to which a frame is addressed. This speeds up the network and reduces congestion.

Switches operate at both the physical layer and the data link layer of the OSI Model.

A bridge is used to join two network segments together, it allows computers on either segment to access resources on the other. They can also be used to divide large networks into smaller segments. Bridges have all the features of repeaters, but can have more nodes, and since the network is divided, there is fewer computers competing for resources on each segment thus improving network performance.

Bridges can also connect networks that run at different speeds, different topologies, or different protocols. But they cannot, join an Ethernet segment with a Token Ring segment, because these use different networking standards. Bridges operate at both the Physical Layer and the MAC sublayer of the Data Link layer. Bridges read the MAC header of each frame to determine on which side of the bridge the destination device is located, the bridge then repeats the transmission to the segment where the device is located.

Routers Are networking devices used to extend or segment networks by forwarding packets from one logical network to another. Routers are most often used in large internetworks that use the TCP/IP protocol suite and for connecting TCP/IP hosts and local area networks (LANs) to the Internet using dedicated leased lines.

Routers work at the network layer (layer 3) of the Open Systems Interconnection (OSI) reference model for...

Other assignments on Computer

Computer Organization Essay

1348 words - 6 pages Computer Organization The dictionary definition of the term “organizing” is “to put together into an orderly, functional, structured whole”. Therefore, this term applies to Computer Organization because it tries “to put together into an orderly, functional, structured whole” the main components of computers and the way computers are organized. Modern computer technology requires professionals of every computing specialty to understand both

Computer Program Essay

349 words - 2 pages COMPUTER PROGRAM/CODE Oxford Dictionary: A series of coded software instructions to control the operation of a computer or other machine. Webster’s Dictionary: A sequence of instructions that a computer can interpret and execute; "the program required several hundred lines of code". A program is an intermediate language that helps the user and the machine communicate. The user gives instructions to the machine through the program

Computer Info

1079 words - 5 pages "The Beauty and Joy of Computing: Computer Science for Everyone", Constructionism 2012, Athens. About the development of CS 10, Berkeley's new CS breadth course for non-majors. Why Structure and Interpretation of Computer Programs matters In 2011, to celebrate the 150th anniversary of MIT, the Boston Globe made a list of the most important MIT innovations, and they asked me to explain the importance of SICP. This is what I sent them

Computer Shopper

729 words - 3 pages Computer Shopper The computers and note book I found were really exactly for the professions I was looking for. The four professions I chose were engineer, teacher, graphic designer and also a lawyer and separated on which one will get the desk top and which one will get the laptops based on their job and the requirement needs. I went to Best buy and asked them to help me find two desktops and also two laptops based on the professions they

Computer Fraud

1221 words - 5 pages -collar criminal that Romney defines in those terms: “Fraud perpetrators look just like you and me.” (Romney, 2012, p.126). Furthermore, Gary Foster is known for being legally blind. After more than 10 years as a high executive, Foster has mastered the bank information and was able to conduct his scheme by simply manipulating and altering computer input. This input type of fraud combined with simple processor schemes result in transferring money


464 words - 2 pages Assignment Question 1: The following items are taken from the financial statements of Planxty Ltd. for 2010: Income tax expense $ 1,000 Accounts payable 19,500 Accounts receivable 4,000 Accumulated depreciation – equipment 4,800 Bonds payable 18,000 Cash 22,000 Common shares (2,500 shares issued) 25,000 Cost of goods sold 12,000 Depreciation expense 4,800 Dividends 300 Equipment 48,000 Goodwill 7,500 Interest expense 3,500


276 words - 2 pages ITN 100 ASSIGNMENT 1 | _____________ ________ LAST NAME F NAME Chapter 2 Mini-Cases I. Deals-R-Us Brokers (Part 1) Fred's information systems department has presented him with two alternatives for developing the new tools. The first alternative will have a special tool developed in C++ that clients will download onto their computers to run. The tool will communicate with the DRUB server to select data to analyze. The

Importance Of Computer Skills

254 words - 2 pages 09/08/11 An important skill person should learn to be successful If you ask people what they think is the most important skill to be successful in the world, you will get a variety of answers, but most people will give the same reason as mine - Computer skills are the most important skills a person should have. Computers are an important tool for communication. Many young people use computer to

Intriduction Of Computer Addiction

1301 words - 6 pages Computer addiction  A disorder in which the individual turns to the Internet or plays computer games in an attempt to change moods, overcome anxiety, deal with depression, reduce isolation or loneliness, or distract themselves from overwhelming problems. The elderly, as well as children and adolescents, are particularly vulnerable because they may not realize the extent of their dependency. In many instances, individuals with

Computer For Efl

1103 words - 5 pages English Language Acquisition through Educational Computer Game for Young Learner Technology has grown into something which is really sophisticated recently. It affects almost every aspect in this world. Education is one of the aspects that cannot dodge the mass effect of technology. Recently, educators are addicted to include technology in their teaching activities. Many programs and applications have been invented to aid the

Computer Game Addiction

1134 words - 5 pages Research Paper on Computer Games Addiction The Problems Of the Younger Generation Addicted to Computer Games No one can deny the overwhelming influence of media on the present day society. It is surrounding people wherever they are, as media is the books and newspapers that people read, TV shows and movies they are watching, radio they are listening. There is almost no escape from it. Media forms people?s opinions and experiences they rely on

Similar Documents

Computer Essay

2687 words - 11 pages Federal Urdu University of Arts, Science & Technology, Islamabad Students Results, 2nd (Morning-A) Semester Spring 2010 BS (Computer Science) CSC110-2 Fundamental of Algorithms CSC120-3 Introduction to Computer Programming ELC110-1 Electromagnetism (Physics I) ELC120-2 Electronics (Physics II) HUM110-1 Islamiyat/Ethics Product Product Product Product Student ID IS/85001/Aut-09/M IS/85002/Aut-09/M IS/85003/Aut-09/M IS/85005/Aut-09

Computer Essay 505 Words

505 words - 3 pages COMPUTER ARCHITECTURE ASSIGNMENT 2 F = (x.y.z) . (x’y’) . (x’+y+z’) X Y Z F X.Y.Z X’ Y’ X’ Z’ Y X’.Y’ A’ C’+ ABC +AC’ =A’ C’+ ABC + A C’ = C’ (A’+A) + ABC = C’. (1) + ABC =C’+ ABC A’B (D’ +C’D) +B(A + A’CD) =A.B.C.D + A.B.C.D =A’.B. D (C’+C) =A’.B.D. (1) =A’.B.D =A.B.D + A.B.D =A.B (D+D) =A.B. (1) =A B =A.B + A.B =B (A+A) =B. (1) =B X’ Z’ + Y’Z’ + Y Z’ + XY =Z’(X’+Y’+1) +XY =Z’(X’+1)+XY =Z’(1)+XY

Computer Essay 2082 Words

2082 words - 9 pages International • Prof. Chong-En Bai, Tsinghua University • Steven R. Leonard, Symantec Corporation • Philip Bowring, International Herald Tribune • Alan Leong, Computer Associates • Jeffrey G. Bullwinkel, Microsoft Hong Kong Ltd • Robert D. Campbell, PricewaterhouseCoopers • Dr Shuhe (John) Li, SAP China • Michael J. Cannon-Brookes, IBM • Prof. Weisen Li, Fudan University • Dominick Cavuoto, Unisys Corporation • James D. Lin

Computer Viruses Essay

1026 words - 5 pages transactions. A computer security risk is any action that could cause loss of information to software, data, processing incompatibilities or damage to computer hardware. An intentional breach in computer security is known as a computer crime, which is slightly different from a cybercrime. A cybercrime is known as illegal acts based on the Internet and is one of the FBI's top priorities. There are several distinct categories for people that