Guided media in detail.

Guided media

  • The guided media utilizes a cable system that directs information signals along a certain path and information signals are linked through the cable scheme.
  • Media is also regarded as Bound Media. In earlier phrases, cabling is intended in a general context and is not intended to be understood as copper wire cabling alone. Cable is the medium through which data generally passes from one network device to another.

Guided media in detail


Guided media in detail

  • In the design of data-guided media, the most important concern is the data rate and distance in general, the better the data rate and distance. The data rates and distance determines a number of design factors relating to the transmission medium and signals.

Characteristics:

1.High speed.
2.Reliable.
3.Used for relatively smaller distances.

Basically the guided media is classified into the following type.



1.Fibre Optic Cable.
2.Twisted Pair Cable.
3.Coaxial Cable.

Subnetting in detail /Explaination of subnetting.

Subnetting

The approach of subnetting is the division into more than one logical subnet (subnet) of a single physical network. A network segment and a host segment is included in an IP address. Subnets are intended for assigning smaller subnetworks within the initial network by taking bits from the host portion of the IP address and using these bits. Subnetting enables the organisation, without needing to obtain an Internet Service Provider (ISP) network number, to add sub-networks. Subnetting reduces network traffic and masks the complexity of the network. Subnetting is crucial for the allocation of a single network number across many sections of a local area network.Initially Subnets were designed to resolve the IP address shortage over the Internet.

Subnetting in detail /Explaination of subnetting.



Every IP address is a subnet mask. All class types including the subnet mask known as the default subnet mask, such as Class A, Class B and Class C. The subnet mask is designed to determine the type and number of IP addresses needed for a particular local network. The default gateway is the firewall or router. The subnet mask by default is as follows:

ClassA: 255.0.0.0, ClassB: 255.255.0.0, ClassC: 255.255.255.0

The method of subnetting enables the administrator to split into smaller parts a single Class A, Class B, or Class C network number. Subnets can be subnetted to sub-subnets again.

The following benefits are to divide the network into a number of subnetworks are:

1.By limiting the number of broadcasts, it is useful to control and reduce network traffic.

2.Any organization is allowed to subscribe to its network without having to have a new network IP via an internet service provider (ISP).

3.Subnetting was so useful in solving the problem of missing Internet IP addresses.

4.Enabling the use of two or more LAN technologies in the same network together.

5.Subnets are also helpful in minimizing the size of the internet routing tables as additional network numbers are not added to the table.

6.For security reasons such as accounting and sales segment, if you want to isolate segments.


7.If you want to isolate bad segments that use most of the LAN, such as domination hosts.

Thank you so much for reading the Subnetting in detail /Explaination of subnetting.


What is Telnet and how it works in detail.

What is Telnet ?

Telnet is the user command for accessing remote computers and a TCP / IP protocol underlying it. Telnet can remotely access someone else's computer from an administrator or another user. The protocols HTTP and FTP on the Web permits you not to log in as a user of the computer, but to request specific files from remote computers. You can log on to the specific application and data on that computer with Telnet as a regular user with all the privileges you could have given. 

In other word we can say,Telnet (TN) is a  protocol and software program used to access remote computers and terminals via the Internet or a TCP / IP computer network. In 1969, Telnet was designed and standardized by the Internet Engineering Task Force (IETF) as one of the first Internet standards. 

What is Telnet and how it works in detail.
What is Telnet and how it works in detail.

The result of this application is a user invitation and a password prompt. If you accept it, like any user who uses it every day, you will be logged in. 

The program developers and anyone who needs special applications or data located on a particular host computer will most likely use Telnet. The telnet request  in linux operating system is look like this.

What is Telnet and how it works in detail.
What is Telnet and how it works in detail.

How telnets work?

Telnet gives users a two-way text-oriented, interactive communication system that uses an 8-byte virtual terminal connection. The user data is interspersed in the band with telnet control protocol (TCP) information. Telnet was often used for remote function execution on a terminal. 

By using the Telnet protocol, the user connects with the server, which means entering the command prompt for the Telnet port, using the syntax telnet. The user then performs commands on the server with the Telnet prompt by certain commands. The user terminates a Telnet command with Telnet to terminate a session and log out. 

Thank you for reading the What is Telnet and how it works in detail.
What is Telnet and how it works in detail.