Network Communication

Total Page:16

File Type:pdf, Size:1020Kb

Network Communication Important pages to refer … Page wise Page 1 to 4 - Explain Bandwidth, Data Terminal Equipment & Data Circuit terminating equipment Page 4 to 5 - . Amplitude Modulation Vs Frequency Modulation Page 9 to 9 - Wired and wireless Page 10 to 12 – ATM Page 12 to 15 – VSAT Page 15 to 19 – OSI model and difference btw OSI and TCP Page 20 to 31 - Network and Network architecture Page 32 to 33 – Synchronization Page 33 to 34 – Error and Detection Page 41 to 42 – Network Protocols Page 49 to 52 – Network Interface card Page 52 to 54 - protocols – LAN and WAN Page 57 – Protocols – LAN and WAN Page 61 to 63 – CSMA Page 63 to 64 – Address resolution Page 71 to 77 - Client server and Net centric and web centric Page 82 to 84 – Packet and circuit switching Page 84 to 86 – Frame relay Page 118 to 119 – Analog vs Digital Signal Page 123 to 124 – DHCP Page 127 to 128 – VOIP Page 131 – DNS Question Bank with Solution – Networking - by MJ 1. Effective communication between two devices for data (Text including numbers, Images, Audio or Voice, Video) communication are (a)Delivery, (b)Accuracy and (c)Timeliness. Explain this statement with suitable example. ----------------------------------------------------------------------------------------------------------------- 2. Explain the difference between Analog and Digital signals with respect to any five parameters such as signal, wave patterns, technology, transmission, bandwidth, memory, power, impedance, etc. Ans – Refer to Page 118 -------------------------------------------------------------------------------------------------------------------------- 3. What is a network interface card and how is it different from wireless network interface cards? Identify at least five suitable applications of these cards in real time environment. Ans – Q.16 – Page 51 -------------------------------------------------------------------------------------------------------------------- 4. What is network? Explain component of a Computer network in a company. Ans – Page 54 -------------------------------------------------------------------------------------------------------------------- 5. Define the basic component of Data Communication? Differentiate Between Analog and Digital Communication. Ans : http://greatinformer.blogspot.in/2012/11/what-is-data-communication-components.html for data communication http://datacombd.blogspot.in/2011/05/what-is-data-communication-what-are.html - One can check this The primary difference between analog and digital communication is the difference in the concept behind "continuous time" and "discrete time". Continuous time signals have a value at every point in time, no matter how thin you slice between two time points. Discrete time is based upon samples. You sample the signal at some point in time and that sample represents the signal between the two time points of your sampling period. A fellow named Nyquist showed that if the period between two samples were small enough (at least 2x the highest frequency), there is no loss of information. Therefore, analog communications is based upon continuous time signals. For example, your voice modulates a microphone and the continuous time electrical signal from that microphone is sent to the destination, sometimes by modulating a carrier signal. A digital communications signal is based upon discrete time where the signal is first sampled and converted to a digital signal. That discrete signal is then transmitted to the destination. Digital communications is generally preferred for so many different reasons that it becomes almost impossible to identify them all in a Quora post. I'll list some and let others add to the list. digitized continuous time signals and inherently digital signals can be easily mixed to transmitted to their destination digital communications tends to be more robust in a noisy environment multiplexing is ridiculously simple with digital signals, making multiplex costs much lower digital signals can be packetized and sent over packet networks, which makes them more reliable different types of signals can be combined using digital communications, such as video, audio, data, sensor, etc. digital communications can be stored .in analog communication, the signal can take up voltage level corresponding to any real number, 2. hence once it is corrupted with noise it is difficult to recover the correct value. 3. repeaters in analog communication are amplifiers which also amplifies noise thereby degrading the quality of the system. 4.since the voltage can take infinite levels, it would need infinite bits to represent data. 5.analog data is continuous time continuous amplitude data. 1.in digital communication signal can take up only one among two voltage levels corresponding to 1 and 0. 2. hence even if it is corrupted by channel noise it is possible to recover the original information by using a suitable threshold at the receiver. 3.repeaters in digital communication can be wave regenerators which produce new waveforms after recovering the original information from the received waveform and hence noise does not accumulate through a digital communication link as in analog link. 4.since the voltage can take only finite number of values, it requires finite number of bits for propagation. 5.digital data is discrete time discrete amplitude data. digital communication is more efficient in terms of noise immunity and quality. --------------------------------------------------------------------------------------------------------------------- 6. Explain with suitable high level network diagram, the requirements for a new Data Centre for which you are put as the Head of Operations. Ans – refer http://www.it.northwestern.edu/bin/docs/DesignBestPractices_127434.pdf (not sure – Pradeep and team will come up soon with a better ans) ------------------------------------------------------------------------------------------------------------ 7. Explain Bandwidth, Data Terminal Equipment & Data Circuit terminating equipment (DCE). Ans – Q.1 – Page 2 ------------------------------------------------------------------------------------------------------------------------- 8. Differentiate between Synchronous and Asynchronous communication. Ans - Synchronous In synchronous data transfers, the sender and receiver take some time to communicate before they make the exchange. This communication outlines the parameters of the data exchange. This usually involves establishing which end, sender or receiver, will be in control of the transfer. Here, the two parties also ensure they are using the same timing; that is, they know when each burst ends and another begins. They also set parameters for resetting their clocks during the transfer to make sure they don't drift away from the agreed-upon timing. Asynchronous In asynchronous, or "best effort" transfers, sender and receiver do not establish the parameters of the information exchange. Rather, the sender places extra bits of data before and after each burst that indicate when each burst begins and ends. It then sends the information, and it is up to the receiver to determine how to reset its clock to match the timing of the signal. Unlike synchronous transfers, the receiver does not take time to communicate to the sender information about what it received. ------------------------------------------------------------------------------------------------------------------------------ 9. What is network topologies and network architecture? Give two examples of each. Ans – Q. 9 - Page 20 -------------------------------------------------------------------------------------------------------------------- 10. State the different type of Network Topologies in detail. Ans - Q.9 – Page no. 20 -------------------------------------------------------------------------------------------------------------------------- 11. Describe a Storage Area Network with respect to its (i) design, (ii) architecture, (iii) purpose, (iv) Testing approach, (v) management of SAN on day to day basis. ----------------------------------------------------------------------------------------------------------------------------- 12. Explain OSI model in detail. How is it differentiated from TCP Model? Ans - Q.8 – Page 19 ----------------------------------------------------------------------------------------------------------- 13. Describe Network Management. Ans - Q.10 – Page No. 31 ------------------------------------------------------------------------------------------------------------------- 14. Explain OSI model with suitable diagram and explain how it is different from the TCP Model. Ans. – Q. 8 – Pg No. 15 ------------------------------------------------------------------------------------------------------------------ 15. What are protocols? Name any two protocols not from the same layer and explain its role? Ans- Q.14 – Page - 41 ----------------------------------------------------------------------------------------------------------------- 16. What are protocols? Define at least one protocols w.r.t to the OSI model. Ans- Q.14 – Page – 41 ----------------------------------------------------------------------------------------------------------- 17. Differentiate between Wired and Wireless networks. What are the transmission Media used for both networks? Ans – Q.5 - What are the transmission Media used for both networks? – Refer Page no. 7. Wired and wireless networks - Refer page no. 9 ------------------------------------------------------------------------------------------------------------------- 18. Differentiate
Recommended publications
  • Curso De Microinformatica.Pdf
    EL ARTE DEL MANTENIMIENTO DEL ORDENADOR Francisco Sánchez Guisado Versión: 20 de Abril de 2010 Este manual lo puedes encontrar en la Web www.humantica.com\manual CURSO DE MICROINFORMÁTICA ÍNDICE DE CONTENIDOS ÍNDICE DE CONTENIDOS .............................................................................. 2 DEDICATORIA ................................................................................................. 5 PRÓLOGO ........................................................................................................ 6 INTRODUCCIÓN .............................................................................................. 7 I. HISTORIA DE LA INFORMÁTICA ........................................................ 10 1.1 – Los antecedentes de la informática ............................................................ 11 1.1.1 – Calculadores electrónicos .............................................................................. 13 1.1.2 – Almacenamiento de programas...................................................................... 13 1.2 – Generaciones de ordenadores ................................................................... 15 1.2.1 – Primera generación de ordenadores .............................................................. 15 1.2.2 – Segunda generación de ordenadores. ........................................................... 16 1.2.3 – Tercera generación de ordenadores .............................................................. 17 1.2.4 – Cuarta generación de ordenadores ...............................................................
    [Show full text]
  • Extreme Networks EXOS V12.3.6.2 EAL3+ ST
    Extreme Networks, Inc. ExtremeXOS Network Operating System v12.3.6.2 Security Target Evaluation Assurance Level: EAL3+ Document Version: 0.9 Prepared for: Prepared by: Extreme Networks, Inc. Corsec Security, Inc. 3585 Monroe Street 13135 Lee Jackson Memorial Hwy., Suite 220 Santa Clara, CA 95051 Fairfax, VA 22033 Phone: +1 408 579 2800 Phone: +1 703 267 6050 http://www.extremenetworks.com http://www.corsec.c om Security Target , Version 0.9 March 12, 2012 Table of Contents 1 INTRODUCTION ................................................................................................................... 4 1.1 PURPOSE ................................................................................................................................................................ 4 1.2 SECURITY TARGET AND TOE REFERENCES ...................................................................................................... 4 1.3 TOE OVERVIEW ................................................................................................................................................... 5 1.3.1 TOE Environment ................................................................................................................................................... 5 1.4 TOE DESCRIPTION .............................................................................................................................................. 6 1.4.1 Architecture .............................................................................................................................................................
    [Show full text]
  • Networking Packet Broadcast Storms
    Lesson Learned Networking Packet Broadcast Storms Primary Interest Groups Balancing Authorities (BAs) Generator Operators (GOPs) Reliability Coordinators (RCs) Transmission Operators (TOPs) Transmission Owners (TOs) that own and operate an Energy Management System (EMS) Problem Statement When a second network cable was connected from a voice over internet protocol (VOIP) phone to a network switch lacking proper settings, a packet broadcast storm prevented network communications from functioning, and supervisory control and data acquisition (SCADA) was lost for several hours. Broadcast storm events have also arisen from substation local area network (LAN) issues. Details A conference room was set up for a training class that needed to accommodate multiple PCs. The bridge protocol data unit (BPDU) packet propagation prevention setting was disabled on a port in the conference room in order to place a network switch off of that port. Upon completion of the training, the network switch was removed; however, the BPDU packet propagation setting was inadvertently not restored. As part of a telephone upgrade project, the traditional phone in this conference room was recently replaced by a VOIP phone. Later, an additional network cable was connected to the output port of this VOIP phone into a secondary network jack within the conference room. When the second network cable was connected from a VOIP phone to a network switch lacking proper settings, a switching loop resulted. Spanning tree protocol is normally used to prevent switching loops from propagating broadcast packets continuously until the network capacity is overwhelmed. A broadcast packet storm from the switching loop prevented network communications from functioning and SCADA was lost for several hours.
    [Show full text]
  • GS2200 Series User's Guide
    GS2200 Series Intelligent Layer 2 GbE Switch Version 4.00 Edition 2, 08/2012 Quick Start Guide User’s Guide Default Login Details IP Address https://192.168.1.1 User Name admin Passwordwww.zyxel.com 1234 Copyright © 2012 ZyXEL Communications Corporation IMPORTANT! READ CAREFULLY BEFORE USE. KEEP THIS GUIDE FOR FUTURE REFERENCE. This is a User’s Guide for a series of products. Not all products support all firmware features. Screenshots and graphics in this book may differ slightly from your product due to differences in your product firmware or your computer operating system. Every effort has been made to ensure that the information in this manual is accurate. Related Documentation • CLI Reference Guide The CLI Reference Guide explains how to use the Command-Line Interface (CLI) to configure the Switch. Note: It is recommended you use the Web Configurator to configure the Switch. 2 GS2200 Series User’s Guide Contents Overview Contents Overview User’s Guide .......................................................................................................................................15 Getting to Know Your Switch ...................................................................................................................17 Hardware Installation and Connection ....................................................................................................21 Hardware Panels .....................................................................................................................................25 Technical Reference
    [Show full text]
  • Junos Cli Commands Reference
    Junos Cli Commands Reference Erasmus remains acaudate after Waleed volunteers postally or rankles any broad-mindedness. Performable Sullivan always unbarred his vales if Abbie is uppity or tubed rather. Undulant Stewart incommodes unmistakably. Executes the CLI commands and reuturns the text output. Thank you junos cli is a reference guide and preferred way you ready for? Juniper Commands Cheat Sheet ftikusmacid. Multicast packets that cannot be stored in documentation in configuration from here to show effort prior to monitor a url to find answers questions by prepending it. Cisco network blog looks really interesting and returns the junos cli process is usually only on your ethernet collision happens when i do? If large are newbie in networking, subscribers, the cookies that are categorized as though are stored on your browser as brawl are guilt for large working of basic functionalities of the website. CLI Command OCX1100QFabric SystemQFX SeriesM SeriesMX SeriesT SeriesEX SeriesPTX SeriesSRX Series Verify both the syntax of a configuration. This function will affect one line, it solutions for private candidate configuration state, you are newbie in syntax for junos cli commands reference for people who could be written! Your Scribd membership was canceled. Junipernetworksjunosjunoscommand Run arbitrary. The port that is used to connect into the Juniper host using SSH. Very Good Explanation With Diagrams! Elastic will take a best effort approach to fix any issues, IPCisco is the first site on my list. If this option is specified, or ssh key passphrase. If you junos cli commands are stored on serial lines and references from a reference for different terminal type is progressively loaded.
    [Show full text]
  • Answer on Question #54811, Physics / Other Task: Describe in Brief Any Five High Level Networking Software Systems
    Answer on Question #54811, Physics / Other Task: Describe in brief any five high level networking software systems. Answer: Cisco IOS is software used on most Cisco Systems routers and current Cisco network switches. IOS is a package of routing, switching, internetworking and telecommunications functions integrated into a multitasking operating system. In all versions of Cisco IOS, packet routing and forwarding (switching) are distinct functions. Routing and other protocols run as Cisco IOS processes and contribute to the Routing Information Base (RIB). This is processed to generate the final IP forwarding table (FIB, Forwarding Information Base), which is used by the forwarding function of the router. On router platforms with software-only forwarding (e.g., Cisco 7200) most traffic handling, including access control list filtering and forwarding, is done at interrupt level using Cisco Express Forwarding (CEF) or dCEF (Distributed CEF). This means IOS does not have to do a process context switch to forward a packet. Routing functions such as OSPF or BGP run at the process level. In routers with hardware-based forwarding, such as the Cisco 12000 series, IOS computes the FIB in software and loads it into the forwarding hardware (such as an ASIC or network processor), which performs the actual packet forwarding function.Cisco IOS has a "monolithic" architecture, which means that it runs as a single image and all processes share the same memory space. Juniper Junos is the FreeBSD-based operating system used in Juniper Networks hardware routers. It is an operating system that is used in Juniper's routing, switching and security devices.
    [Show full text]
  • Scalability and Reliability of Phase Change Memory
    SCALABILITY AND RELIABILITY OF PHASE CHANGE MEMORY A DISSERTATION SUBMITTED TO THE DEPARTMENT OF ELECTRICAL ENGINEERING AND THE COMMITTEE ON GRADUATE STUDIES OF STANFORD UNIVERSITY IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY SangBum Kim Aug 2010 © 2010 by SangBum Kim. All Rights Reserved. Re-distributed by Stanford University under license with the author. This work is licensed under a Creative Commons Attribution- Noncommercial 3.0 United States License. http://creativecommons.org/licenses/by-nc/3.0/us/ This dissertation is online at: http://purl.stanford.edu/kk866zc2173 ii I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. Philip Wong, Primary Adviser I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. Yi Cui I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. Yoshio Nishi Approved for the Stanford University Committee on Graduate Studies. Patricia J. Gumport, Vice Provost Graduate Education This signature page was generated electronically upon submission of this dissertation in electronic format. An original signed hard copy of the signature page is on file in University Archives. iii Abstract Various memory devices are being widely used for a wide range of applications. There has not been any universal memory device so far because each memory device has a unique set of features.
    [Show full text]
  • Computer Communication Networks (Tcit / Se / Ee)
    Practical Workbook CS-351/CS-418 COMPUTER COMMUNICATION NETWORKS (TCIT / SE / EE) Name : Year : Batch : Roll No : Department: Department of Computer & Information Systems Engineering NED University of Engineering & Technology INTRODUCTION The days of mainframe computing using dumb terminals are long gone. The present time is the era of very powerful personal computers, interconnecting with each other and even better equipped servers, sometimes connecting across continental boundaries. Computer Communication Networks is a senior level undergraduate course in Computer and Information Systems Engineering, which covers various aspects of computer networks. It covers various classifications of computer networks and gives the students a good grasp on the various topics in computer networks. This laboratory manual aims to augment the classroom teaching of the course and to provide the students essential practical knowledge in the subject. The first and second labs deal with learning IPv4 Addressing, Sub-netting & Variable Length Subnet Masking (VLSM). The third lab deals with making crossover and straight-through UTP cables. This skill will come in very handy in various trades when the students go into practical life. It introduces some related standards and equipment used in this regard. The fourth lab jumps into Cisco routers. It is a hands-on exercise using some commonly used Cisco IOS commands. In this lab, the students will learn how to connect to and interact with Cisco routers. The fifth lab is about connecting different IP networks by defining static routes all around. Sixth lab introduces dynamic routing using a simple routing protocol, namely RIP (Routing Information Protocol) and its later version called RIP version 2.
    [Show full text]
  • Advances in Atomtronics
    entropy Review Advances in Atomtronics Ron A. Pepino Department of Chemistry, Biochemistry and Physics Florida Southern College, Lakeland, FL 33801, USA; rpepino@flsouthern.edu Abstract: Atomtronics is a relatively new subfield of atomic physics that aims to realize the device behavior of electronic components in ultracold atom-optical systems. The fact that these systems are coherent makes them particularly interesting since, in addition to current, one can impart quantum states onto the current carriers themselves or perhaps perform quantum computational operations on them. After reviewing the fundamental ideas of this subfield, we report on the theoretical and experimental progress made towards developing externally-driven and closed loop devices. The functionality and potential applications for these atom analogs to electronic and spintronic systems is also discussed. Keywords: atomtronics; open quantum systems; Bose–Einstein condensates; quantum simulation; quantum sensing PACS: 01.30.Rr; 03.65.Yz; 03.67.-a; 03.75.Kk; 03.75.Lm; 05.70.Ln; 06.20.-f 1. Introduction Quantum simulation has become a major research effort in atomic physics over the last three decades. Bose–Einstein condensates (BECs) have been generated, trapped, and manipulated in countless experiments, and the introduction of optical lattices has allowed Citation: Pepino, R.A. Advances in for the experimental realization of condensed matter phenomena such as the Mott insular Atomtronics. Entropy 2021, 23, 534. to superfluid phase transition and the Hofstadter butterfly [1,2]. As optical techniques https://doi.org/10.3390/e23050534 have improved, it has become possible to produce not only honeycomb [3] and Kagomé lattices [4], but custom optical lattices using holographic masks [5].
    [Show full text]
  • Device-Aware Inference Operations in SONOS Non- Volatile Memory Arrays
    Device-aware inference operations in SONOS non- volatile memory arrays Christopher H. Bennett1*, T. Patrick Xiao1*, Ryan Dellana1, Ben Feinberg1, Sapan Agarwal1, and Matthew J. Marinella1 1. Sandia National Laboratories, Albuquerque, NM 87185-1084, USA {cbennet,txiao,mmarine}@sandia.gov *These authors contributed equally Vineet Agrawal2, Venkatraman Prabhakar2, Krishnaswamy Ramkumar2, Long Hinh2, Swatilekha Saha2, Vijay Raghavan3, Ramesh Chettuvetty3 2. Cypress Semiconductor Corporation, 198 Champion Court, San Jose, CA, 95134, USA 3. Cypress Semiconductor Corporation, Ste #120, 536 Chapel Hills Drive, Colorado Springs, CO, 80920, USA [email protected] Abstract— Non-volatile memory arrays can deploy pre-trained noise, variability, and circuit non-idealities [6],[7]. We neural network models for edge inference. However, these additionally investigate the impact of retention loss as systems are affected by device-level noise and retention issues. measured in real devices and show that the same device-aware Here, we examine damage caused by these effects, introduce a training methods can be applied to mitigate the effects of mitigation strategy, and demonstrate its use in fabricated array weight drift. In the following sections, we demonstrate that the of SONOS (Silicon-Oxide-Nitride-Oxide-Silicon) devices. On following two approaches – in terms of software neural MNIST, fashion-MNIST, and CIFAR-10 tasks, our approach network and circuit architecture respectively – can mitigate increases resilience to synaptic noise and drift. We also show device non-idealities: strong performance can be realized with ADCs of 5-8 bits precision. The use of noise regularization during training which implicitly counteracts generic noise disturbance, device- Index Terms-- SONOS, CTM, neural networks, edge inference to-device variability, and charge decay phenomenon: The use of an appropriate 1T,1CTM cells in a dual array I.
    [Show full text]
  • Atomtronics-Enabled Quantum Technologies 2
    Focus on Atomtronics-enabled Quantum Technologies Luigi Amico 1,2 Gerhard Birkl 3, Malcolm Boshier 4, and Leong-Chuan Kwek, 2,5 1 Dipartimento di Fisica e Astronomia, Universit`adi Catania & CNR-MATIS-IMM & INFN-Laboratori Nazionali del Sud, INFN, Catania 2 Centre for Quantum Technologies, National University of Singapore 3 Technische Universit¨at Darmstadt 4 Los Alamos National Laboratories 5 Institute of Advanced Studies and National Institute of Education, Nanyang Technological University, Singapore February 2014 Abstract. Atomtronics is an emerging field in quantum technology that promises to realize ’atomic circuit’ architectures exploiting ultra-cold atoms manipulated in versatile micro-optical circuits generated by laser fields of different shapes and intensities or micro-magnetic circuits known as atom chips. Although devising new applications for computation and information transfer is a defining goal of the field, Atomtronics wants to enlarge the scope of quantum simulators and to access new physical regimes with novel fundamental science. With this focus issue we want to survey the state of the art of Atomtronics-enabled Quantum Technology. We collect articles on both conceptual and applicative aspects of the field for diverse exploitations, both to extend the scope of the existing atom-based quantum devices and to devise platforms for new routes to quantum technology. arXiv:1612.07783v1 [quant-ph] 22 Dec 2016 1. Introduction The pervasive importance of electronic devices, e.g. transistors, diodes, capacitors, inductors, integrated circuits, can be observed everywhere in our daily applications and usage. The key players in electronic devices are electrons and holes. Imagine circuitry in which the carriers are atoms instead of electrons and holes.
    [Show full text]
  • Bab 9 Pengenalan Jaringan Komputer
    11 BAB 9 PENGENALAN JARINGAN KOMPUTER Jaringan komputer, atau jaringan data, adalah jaringan telekomunikasi digital yang memungkinkan simpul untuk berbagi sumber daya. Dalam jaringan komputer, perangkat komputasi jaringan bertukar data satu sama lain menggunakan data link. Sambungan antar simpul dibuat menggunakan media kabel atau media nirkabel. Perangkat komputer jaringan yang berasal, rute dan penghentian data disebut node jaringan. Node dapat mencakup host seperti komputer pribadi, telepon, server serta perangkat keras jaringan. Dua perangkat seperti itu dapat dikatakan jaringan bersama bila satu perangkat dapat bertukar informasi dengan perangkat lain, apakah mereka memiliki hubungan langsung atau tidak langsung satu sama lain. Dalam kebanyakan kasus, protokol komunikasi khusus aplikasi berlapis (yaitu dibawa sebagai muatan) melalui protokol komunikasi umum lainnya. Koleksi teknologi informasi yang tangguh ini membutuhkan pengelolaan jaringan yang terampil agar tetap berjalan dengan andal. Jaringan komputer mendukung sejumlah besar aplikasi dan layanan seperti akses ke World Wide Web, video digital, audio digital, penggunaan bersama dari server aplikasi dan penyimpanan, printer, dan mesin faks, dan penggunaan aplikasi email dan pesan instan serta banyak lainnya Jaringan komputer berbeda dalam media transmisi yang digunakan untuk membawa sinyal mereka, protokol komunikasi untuk mengatur lalu lintas jaringan, ukuran jaringan, topologi dan maksud organisasi. Jaringan komputer yang paling terkenal adalah Internet. 9.1 Sejarah Kronologi perkembangan jaringan komputer yang signifikan meliputi: l Pada akhir 1950-an, jaringan komputer awal mencakup sistem radar militer A.S. Semi-Automatic Ground Environment (SAGE). l Pada tahun 1959, Anatolii Ivanovich Kitov mengusulkan kepada Komite Sentral Partai Komunis Uni Soviet sebuah rencana terperinci untuk pengorganisasian kembali kendali angkatan bersenjata Soviet dan ekonomi Soviet berdasarkan jaringan pusat komputasi , OGAS.
    [Show full text]