Вы находитесь на странице: 1из 2

Ethernet is a family of frame-based computer networking technologies for local a rea networks (LAN).

It defines a number of wiring and signaling standards for th e Physical Layer of the standard networking model as well as a common addressing format and a variety of Media Access Control procedures at the lower part of th e Data Link Layer. Ethernet is also used in wireless. To boot (as a verb; also "to boot up") a computer is to load an operating system into the computer's main memory or random access memory (RAM). Once the operati ng system is loaded (and, for example, on a PC, you see the initial Windows or M ac desktop screen), it's ready for users to run applications. Sometimes you'll s ee an instruction to "reboot" the operating system. This simply means to reload the operating system (the most familiar way to do this on PCs is pressing the Ct rl, Alt, and Delete keys at the same time).As soon as the computer is turned on, the basic input-output system (BIOS) on your system's read-only memory (ROM) ch ip is "woken up" and takes charge. BIOS is already loaded because it's built-in to the ROM chip and, unlike random access memory (RAM), ROM contents don't get e rased when the computer is turned off. A local area network (LAN) is a group of computers that are connected together i n a localized area to communicate with one another and share resources such as p rinters. Data is sent in the form of packets and to regulate the transmission of the packets, different technologies can be used. The most widely used LAN techn ology is the Ethernet and it is specified in a standard called IEEE 802.3. (Othe r types of LAN networking technologies include token ring and FDDI.) Ethernet uses a star topology in which the individual nodes (devices) are networ ked with one another via active networking equipment such as switches. The numbe r of networked devices in a LAN can range from two to several thousand. Definition: A network switch is a small hardware device that joins multiple comp uters together within one local area network (LAN). Technically, network switche s operate at layer two (Data Link Layer) of the OSI model. Network switches appear nearly identical to network hubs, but a switch generally contains more intelligence (and a slightly higher price tag) than a hub. Unlike hubs, network switches are capable of inspecting data packets as they are recei ved, determining the source and destination device of each packet, and forwardin g them appropriately. By delivering messages only to the connected device intend ed, a network switch conserves network bandwidth and offers generally better per formance than a hub. As with hubs, Ethernet implementations of network switches are the most common. Mainstream Ethernet network switches support either 10/100 Mbps Fast Ethernet or Gigabit Ethernet (10/100/1000) standards. In the Open Systems Interconnection (OSI) communications model, a switch perform s the Layer 2 or Data-link layer function. That is, it simply looks at each pack et or data unit and determines from a physical address (the "MAC address") which device a data unit is intended for and switches it out toward that device. Howe ver, in wide area networks such as the Internet, the destination address require s a look-up in a routing table by a device known as a router. Some newer switche s also perform routing functions (Layer 3 or the Network layer functions in OSI) and are sometimes called IP switches. A network gateway is an internetworking system capable of joining together two networks that use different base protocols. A network gateway can be implemented completely in software, completely in hardware, or as a combination of both. De pending on the types of protocols they support, network gateways can operate at any level of the OSI model.The computers that control traffic within your compan y's network or at your local Internet service provider (ISP) are gateway nodes.

A firewall is a set of related programs, located at a network gateway server, th at protects the resources of a private network from users from other networks. ( The term also implies the security policy that is used with the programs.) An en terprise with an intranet that allows its workers access to the wider Internet i nstalls a firewall to prevent outsiders from accessing its own private data reso urces and for controlling what outside resources its own users have access to. A system designed to prevent unauthorized access to or from a private network. F irewalls can be implemented in both hardware and software, or a combination of b oth. Firewalls are frequently used to prevent unauthorized Internet users from a ccessing private networks connected to the Internet, especially intranets. All m essages entering or leaving the intranet pass through the firewall, which examin es each message and blocks those that do not meet the specified security criteri a.

Вам также может понравиться