Protocol in the network

The protocol is a rule or method of how data communications performed among several computers on a network, the rules include guidelines that apply to the ways and methods to access a network, physical topology, the types of cable and data transfer speeds. Many computer communication protocols have been developed to form a computer network. competition between computer companies such as DEC, IBM etc. The issue of standard computer network. this causes difficulty, especially if it will be inter-connections between various types of computers in a wide area. on the occasion of this post I will discuss 3 common prorokol the most frequently used is Ethernet, Local Talk and Token Ring.

  1. Ethernet 
    The Ethernet protocol is the most widely used protocol, the protocol of this type of access method called CSMA / CD (carrier sense mulptiple access / collision detection), the working system of this protocol can be described as follows: If a computer and data transmission request, then each kompputer will detect whether or not unused channels, if the network is clear, the computer will transmit the data, if there is another transmission on the cable, the computer will wait and will try to re-transmission if the network has been clean. Sometimes, two computers transmit at the same time, when this happens, each computer will be back and will wait a random chance to transmit data back. This method is known by the coalition, and will not affect the speed of transmission on the network. The Ethernet protocol allows for the network model Bus, Star, and Tree. data can be transmitted through the cable twistedpair, coaksial, or fiber optic cable at speeds of 10 Mbps.
  2. Local Talk
    Local Talk is a network protocol developed by Apple Computer, Inc.. For machine-to Macintosh computers. The method used by LocalTalk is CSMA / CA (Carrier Sense Multiple Access With Collision Avoidance). Similar to the CSMA / CA. Talk local adapters and special twisted pair cable can be used to combine multiple computers through the serial port. The Macintosh operating system allows the establishment of a peer-to-peer without the need for additional applications can be used to khusus.Protokol LocalTalk topology Bus, Star and Tree by Twisted pair cables. Lack of transmission is slow only 230 Kbps.
  3. Token Ring 
    Token protocol developed by IBM in mid-1980. Method of access through the passage of a token in a circle like a ring. In token ring, kompuer-computer connected to each lainnyaSeperti a ring. A token moves signal rotates like a circle (ring) in a network and move from a computer to the next computer, if the sojourn there was one computer that you want to transmit data, the token will transport it to where it wanted in the addressed data, token to move on to another mengoneksikan between individual computers
  4. FDDI
    Fiber Distributed Data Interface (FDDI) is a network protocol that connects between two or more networks even at great distances. Access method used by FDDI involves token. FDDI uses two physical ring topology. transmission process typically uses a single ring, but if any problems are found it will automatically use the second ring. an advantage of FDDI is the speed by using fiber optic cable at 100 Mbps
  5. ATM
    ATM stands for Asynchronous Transfer Mode (ATM) is a network protocol that transmits data at a speed of 155 Mbps or more. ATM transmits data into a single package where the other ptotokol transfer in large-size package. ATM supports a variety of media such as videos, CD-audio, and images. ATM works in a star topology model, using fiber optic cable or twisted pair cable. ATMs are generally diigunakan for connecting two or more LAN, he is also widely used by Internet Service Providers (ISPs) to increase Internet access speed

    No comments:

    Post a Comment

    Blogger Templates