Professional Documents
Culture Documents
Css What Are The Fire Extinguisher Colours
Css What Are The Fire Extinguisher Colours
Css What Are The Fire Extinguisher Colours
Kitchen fires
Flammable materials
Organic material like fabric, cardboard, wood, or paper
Who Might Need Carbon Dioxide Extinguishers?
Building sites
Server rooms
Commercial kitchens
Office blocks
Buildings with electrical equipment
Fact
Poor maintenance and incorrect usage of fire
extinguishers in the home are two key reasons small
house fires can spread endangering lives and causing
considerable damage to property. House fires can be
brought under control within the first few minutes of
ignition if attended to correctly with an extinguisher that
is well maintained, which can buy valuable time before
the Fire Services arrive.
How to operate a fire extinguisher
There are a number of different types of portable fire
extinguishers, each can be identified by the colour
coding and labelling. Check that the extinguisher you
intend to use is suitable for the type of fire encountered
eg a water extinguisher must never be used on any fire
involving electrical equipment.
There are four (4) basic steps for using modern portable
fire extinguishers.
The acronym PASS is used to describe these four basic
steps.
1. Pull (Pin)
Pull pin at the top of the extinguisher, breaking the
seal. When in place, the pin keeps the handle from
being pressed and accidentally operating the
extinguisher. Immediately test the extinguisher.
(Aiming away from the operator) This is to ensure
the extinguisher works and also shows the operator
how far the stream travels
2. Aim
Approach the fire standing at a safe distance. Aim
the nozzle or outlet towards the base of the fire.
3. Squeeze
Squeeze the handles together to discharge the
extinguishing agent inside. To stop discharge,
release the handles.
4. Sweep
Sweep the nozzle from side to side as you approach
the fire, directing the extinguishing agent at the base
of the flames. After an A Class fire is extinguished,
probe for smouldering hot spots that could reignite
the fuel.
Extinguisher tips
The Australian Standard 2444 (AS 2444) Portable
Fire Extinguishers and Fire Blankets selection and
location will provide comprehensive information.
Ensure everyone in the home/office knows the
location of all extinguishers and how to use them.
Only ever operate an extinguisher if safe to do so. If in
doubt, get out.
Remove the safety pin by pulling it sharply (this also
breaks the plastic seal). Test to ensure that the
extinguisher is operable immediately after removing
from the mounting bracket.
Always try to work in pairs for safety.
Carry or drag extinguisher to the scene of the fire.
In an Emergency Call Triple Zero (000)
A collaboration of Fire and Rescue NSW, NSW Rural
Fire Service, ACT Fire Brigade and ACT Rural Fire
Service
https://www.fire.nsw.gov.au/page.php?id=632
1. HDMI cable
HDMI (High definition Media Interface) is a type of computer
Using the HDMI cables, the audio and video signal can be
2. VGA cable
VGA (Video Graphics Ray) cable is another type of computer
computer system.
3. DVI cable
DVI cables are used to connect the LCD monitor and the video
card. Using this cable, the user can see high image quality
without having any disturbance. The DVI cable is mostly used
if there is any flat pin present on the cable. If the flat pin has
4. Ethernet Cable
The Ethernet cable is a type of computer network cable which
wires than phone cables. There are eight wires in the Ethernet
market.
5. PS/2 Cable
The PS/2 cable is a standard cable to connect the mouse and
cable is long enough so that the user can easily connect the
mouse and keyboard to the system and use the system. There
Blue port is for DVD player, MP3 player and pink port Is used
7. USB cables
The USB (Universal Serial Bus) cable is a standard cable used
Conclusion
Every type of computer cable has its advantages and can be
used for a different purpose. And all the computer cables are
Network components
Servers
Client
Router, switch, and PCs
Ethernet cable
Computer networks share common devices, functions, and features including servers,
clients, transmission media, shared data, shared printers and other hardware and
software resources, network interface card(NIC), local operating system(LOS), and the
network operating system (NOS).
Servers - Servers are computers that hold shared files, programs, and the network
operating system. Servers provide access to network resources to all the users of the
network. There are many different kinds of servers, and one server can provide several
functions. For example, there are file servers, print servers, mail servers,
communication servers, database servers, fax servers and web servers, to name a few.
Sometimes it is also called host computer, servers are powerful computer that store
data or application and connect to resources that are shared by the user of a network.
Clients - Clients are computers that access and use the network and shared network
resources. Client computers are basically the customers(users) of the network, as they
request and receive services from the servers. These days, it is typical for a client to be
a personal computer that the users also use for their own non-network applications.
Transmission Media - Transmission media are the facilities used to interconnect
computers in a network, such as twisted-pair wire, coaxial cable, and optical fiber cable.
Transmission media are sometimes called transmission medium channels, links or
lines.
Shared data - Shared data are data that file servers provide to clients such as data
files, printer access programs and e-mail.
Shared printers and other peripherals - Shared printers and peripherals are hardware
resources provided to the users of the network by servers. Resources provided include
data files, printers, software, or any other items used by clients on the network.
Network Interface Card - Each computer in a network has a special expansion card
called a network interface card (NIC). The NIC prepares(formats) and sends data,
receives data, and controls data flow between the computer and the network. On the
transmit side, the NIC passes frames of data on to the physical layer, which transmits
the data to the physical link. On the receiver's side, the NIC processes bits received
from the physical layer and processes the message based on its contents.
Local Operating System - A local operating system allows personal computers to
access files, print to a local printer, and have and use one or more disk and CD drives
that are located on the computer. Examples are MS-DOS, Unix, Linux, Windows 2000,
Windows 98, Windows XP etc. The network operating system is the software of the
network. It serves a similar purpose that the OS serves in a stand-alone computer
Network Operating System - The network operating system is a program that runs on
computers and servers that allows the computers to communicate over the network.
Hub - Hub is a device that splits a network connection into multiple computers. It is like
a distribution center. When a computer requests information from a network or a
specific computer, it sends the request to the hub through a cable. The hub will receive
the request and transmit it to the entire network. Each computer in the network should
then figure out whether the broadcast data is for them or not.
Switch - Switch is a telecommunication device grouped as one of computer network
components. Switch is like a Hub but built in with advanced features. It uses physical
device addresses in each incoming messages so that it can deliver the message to the
right destination or port.
Unlike a hub, switch doesn't broadcast the received message to entire network, rather
before sending it checks to which system or port should the message be sent. In other
words, switch connects the source and destination directly which increases the speed of
the network. Both switch and hub have common features: Multiple RJ-45 ports, power
supply and connection lights.
Router - When we talk about computer network components, the other device that used
to connect a LAN with an internet connection is called Router. When you have two
distinct networks (LANs) or want to share a single internet connection to multiple
computers, we use a Router. In most cases, recent routers also include a switch which
in other words can be used as a switch. You don’t need to buy both switch and router,
particularly if you are installing small business and home networks. There are two types
of Router: wired and wireless. The choice depends on your physical office/home setting,
speed and cost.
LAN Cable A local area Network cable is also known as data cable or Ethernet cable
which is a wired cable used to connect a device to the internet or to other devices like
computer, printers, etc.
See Also
https://en.wikiversity.org/wiki/Basic_computer_network_components#:~:text=Computer
%20networks%20share%20common%20devices,network%20operating%20system%20(NOS).
Yes, we're talking about "protocols" which are set of rules that help in
governing the way a particular technology will function for
communication. In other words, it can be said that the protocols are
digital languages implemented in the form of networking algorithms.
There are different networks and network protocols, user's use while
surfing.
Types of Protocols
There are various types of protocols that support a major and
compassionate role in communicating with different devices across
the network. These are:
https://www.w3schools.in/types-of-network-protocols-and-their-uses
What are the 4 layers of the TCP IP model?
BYAFROZ AHMAD
UPDATEDJUNE 1, 2022
INCCDEINTERVIEW TIPSROUTING AND SWITCHING
READ TIME10 MINS
Table Of Contents
1. What are the 4 layers of the TCP IP model in networking?
o What is TCP IP full form?
o Internet Layer
What are the functions of the Internet layer?
o Application Layer
What are the functions of the Application layer?
Listed below are some key points that aided in the advancement
of the TCP/IP model:
The Network Access layer is the first and the lowest layer of the
TCP/IP model, and it combines the functionalities of the Physical
Layer and the Data Link Layer of the OSI model.
The Network Access layer defines the mechanism for the physical
transmission of data between devices on the same network. It
defines how the data should be sent physically through a network
and maps an IP address (4 bytes or 32 bits) into a physical address
or MAC address (6 bytes or 48 bits). It includes hardware devices
that directly interact with a network medium and identify hosts by
utilizing the MAC address. This layer is mainly responsible for
transmitting frames transmitted by a point-to-point connection,
such as an ethernet cable or token ring cable.
The Internet layer is the second layer of the TCP/IP model, and it
is equivalent to the Network layer in the OSI model. Its primary
function is to provide IP Addressing and Routing. Routers are
used on this layer. The data unit is Packets, and protocols include
IP protocol, ICMP, etc.
The Transport layer is the third layer of the TCP/IP model and
matches up to the Transport layer of the OSI model. It ensures
data is delivered between applications in sequence,error-free, and
without loss or duplication.
On this layer, firewalls are used. Its data unit is the Segment, and
protocols are TCP and UDP.
Application Layer
The Application layer is the fourth layer of the TCP/IP model, and
it combines the functionalities of the Session, Presentation, and
Application Layers of the OSI model. In addition, it provides the
interface between the application and the network.
On the other side of the application, where the Web server lies,
data will follow from bottom to up, following the Network Access
Layer, the Internet layer, the Transport layer, and finally reaching
the Application layer.
How to use the TCP IP model for Troubleshooting
Conclusion
https://afrozahmad.com/blog/4-layers-of-the-tcp-ip-model/
Any device that does not need to remain at one place to carry out its
functions is a mobile device. So laptops, smartphones and personal
digital assistants are some examples of mobile devices. Due to their
portable nature, mobile devices connect to networks wirelessly. Mobile
devices typically use radio waves to communicate with other devices
and networks. Here we will discuss the protocols used to carry out
mobile communication.
Mobile communication protocols use multiplexing to send information.
Multiplexing is a method to combine multiple digital or analog signals
into one signal over the data channel. This ensures optimum utilization
of expensive resource and time. At the destination these signals are
de-multiplexed to recover individual signals.
These are the types of multiplexing options available to
communication channels −
FDM (Frequency Division Multiplexing) − Here each user is
assigned a different frequency from the complete spectrum. All
the frequencies can then simultaneously travel on the data
channel.
TDM (Time Division Multiplexing) − A single radio frequency is
divided into multiple slots and each slot is assigned to a
different user. So multiple users can be supported
simultaneously.
CDMA (Code Division Multiplexing) − Here several users
share the same frequency spectrum simultaneously. They are
differentiated by assigning unique codes to them. The receiver
has the unique key to identify the individual calls.
GSM
GSM stands for Global System for Mobile communications. GSM is
one of the most widely used digital wireless telephony system. It was
developed in Europe in 1980s and is now international standard in
Europe, Australia, Asia and Africa. Any GSM handset with a SIM
(Subscriber Identity Module) card can be used in any country that
uses this standard. Every SIM card has a unique identification
number. It has memory to store applications and data like phone
numbers, processor to carry out its functions and software to send and
receive messages
GSM technology uses TDMA (Time Division Multiple Access) to
support up to eight calls simultaneously. It also uses encryption to
make the data more secure.
The frequencies used by the international standard is 900 MHz to
1800 MHz However, GSM phones used in the US use 1900 MHz
frequency and hence are not compatible with the international system.
CDMA
CDMA stands for Code Division Multiple Access. It was first used by
the British military during World War II. After the war its use spread to
civilian areas due to high service quality. As each user gets the entire
spectrum all the time, voice quality is very high. Also, it is
automatically encrypted and hence provides high security against
signal interception and eavesdropping.
WLL
WLL stands for Wireless in Local Loop. It is a wireless local telephone
service that can be provided in homes or offices. The subscribers
connect to their local exchange instead of the central exchange
wirelessly. Using wireless link eliminates last mile or first mile
construction of network connection, thereby reducing cost and set up
time. As data is transferred over very short range, it is more secure
than wired networks.
WLL system consists of user handsets and a base station. The base
station is connected to the central exchange as well as an antenna.
The antenna transmits to and receives calls from users through
terrestrial microwave links. Each base station can support multiple
handsets depending on its capacity.
GPRS
GPRS stands for General Packet Radio Services. It is a packet based
wireless communication technology that charges users based on the
volume of data they send rather than the time duration for which they
are using the service. This is possible because GPRS sends data over
the network in packets and its throughput depends on network traffic.
As traffic increases, service quality may go down due to congestion,
hence it is logical to charge the users as per data volume transmitted.
GPRS is the mobile communication protocol used by second (2G) and
third generation (3G) of mobile telephony. It pledges a speed of 56
kbps to 114 kbps, however the actual speed may vary depending on
network load.
What Is Network Topology?
Best Guide to Types and
Diagrams
By Staff Contributor on August 15, 2019
Back to top
What’s the Most Common Type of
Network Topology?
Building a local area network (LAN) topology can be make-or-
break for your business, as you want to set up a resilient,
secure, and easy-to-maintain topology. There are several
different types of network topology and all are suitable for
different purposes, depending on the overall network size and
your objectives.
As with most things, there’s no “right” or one-size-fits-all
option. With this in mind, I’ll walk you through the most
common network topology definitions to give you a feel for
the advantages and disadvantages of each.
On the flipside, if the central hub goes down, the rest of the
network can’t function. But if the central hub is properly
managed and kept in good health, administrators shouldn’t
have too many issues.
Back to top
What Is Bus Topology?
A bus topology orients all the devices on a network along a
single cable running in a single direction from one end of the
network to the other—which is why it’s sometimes called a
“line topology” or “backbone topology.” Data flow on the
network also follows the route of the cable, moving in one
direction.
Back to top
What Is Ring Topology? Single vs.
Dual
Ring topology is where nodes are arranged in a circle (or ring).
The data can travel through the ring network in either one
direction or both directions, with each device having exactly
two neighbors.
Pros of Ring Topology
Back to top
What Is Tree Topology?
The tree topology structure gets its name from how the
central node functions as a sort of trunk for the network, with
nodes extending outward in a branch-like fashion. However,
where each node in a star topology is directly connected to
the central hub, a tree topology has a parent-child hierarchy
to how the nodes are connected. Those connected to the
central hub are connected linearly to other nodes, so two
connected nodes only share one mutual connection. Because
the tree topology structure is both extremely flexible and
scalable, it’s often used for wide area networks to support
many spread-out devices.
Pros of Tree Topology
Back to top
What Is Mesh Topology?
A mesh topology is an intricate and elaborate structure of
point-to-point connections where the nodes are
interconnected. Mesh networks can be full or partial mesh.
Partial mesh topologies are mostly interconnected, with a few
nodes with only two or three connections, while full-mesh
topologies are—surprise!—fully interconnected.
The web-like structure of mesh topologies offers two different
methods of data transmission: routing and flooding. When
data is routed, the nodes use logic to determine the shortest
distance from the source to destination, and when data is
flooded, the information is sent to all nodes within the
network without the need for routing logic.
Back to top
What Is Hybrid Topology?
Hybrid topologies combine two or more different topology
structures—the tree topology is a good example, integrating
the bus and star layouts. Hybrid structures are most
commonly found in larger companies where individual
departments have personalized network topologies adapted
to suit their needs and network usage.
Advantages of Hybrid Topology
Back to top
Which Topology Is Best for Your
Network?
No network topology is perfect, or even inherently better than
the others, so determining the right structure for your
business will depend on the needs and size of your network.
Here are the key elements to consider:
Cost
Scalability
Cable Length
Generally, the more cable involved in network topology, the
more work it’ll require to set up. The bus and star topologies
are on the simpler side of things, both being fairly lightweight,
while mesh networks are much more cable- and labor-
intensive.
Cable Type
The second point to consider is the type of cable you’ll install.
Coaxial and twisted-pair cables both use insulated copper or
copper-based wiring, while fiber-optic cables are made from
thin and pliable plastic or glass tubes. Twisted-pair cables are
cost-effective but have less bandwidth than coaxial cables.
Fiber-optic cables are high performing and can transmit data
far faster than twisted-pair or coaxial cables, but they also
tend to be far more expensive to install, because they require
additional components like optical receivers. So, as with your
choice of network topology, the wiring you select depends on
the needs of your network, including which applications you’ll
be running, the transmission distance, and desired
performance.
Cost
As I’ve mentioned, the installation cost is important to
account for, as the more complex network topologies will
require more time and funding to set up. This can be
compounded if you’re combining different elements, such as
connecting a more complex network structure via more
expensive cables (though using fiber-optic cables in a mesh
network is overdoing it, if you ask me, because of how
interconnected the topology is). Determining the right
topology for your needs, then, is a matter of striking the right
balance between installation and operating costs and the level
of performance you require from the network.
Scalability
The last element to consider is scalability. If you anticipate
your company and network expanding—or if you’d like it to
be able to—it’ll save you time and hassle down the line to use
an easily modifiable network topology. Star topologies are so
common because they allow you to add, remove, and alter
nodes with minimal disruption to the rest of the network. Ring
networks, on the other hand, have to be taken entirely offline
for any changes to be made to any of the nodes.
06.10.2016
Related Tags
Emerging Technology
Convert to PDF
Share
1. Personal Area Network (PAN)
The smallest and most basic type of network, a PAN is made up of a wireless
modem, a computer or two, phones, printers, tablets, etc., and revolves around one
person in one building. These types of networks are typically found in small
offices or residences, and are managed by one person or organization from a single
device.
We’re confident that you’ve heard of these types of networks before – LANs are
the most frequently discussed networks, one of the most common, one of the most
original and one of the simplest types of networks. LANs connect groups of
computers and low-voltage devices together across short distances (within a
building or between a group of two or three buildings in close proximity to each
other) to share information and resources. Enterprises typically manage and
maintain LANs.
Using routers, LANs can connect to wide area networks (WANs, explained below)
to rapidly and safely transfer data.
Functioning like a LAN, WLANs make use of wireless network technology, such
as Wi-Fi. Typically seen in the same types of applications as LANs, these types of
networks don’t require that devices rely on physical cables to connect to the
network.
4. Campus Area Network (CAN)
Larger than LANs, but smaller than metropolitan area networks (MANs, explained
below), these types of networks are typically seen in universities, large K-12
school districts or small businesses. They can be spread across several buildings
that are fairly close to each other so users can share resources.
These types of networks are larger than LANs but smaller than WANs – and
incorporate elements from both types of networks. MANs span an entire
geographic area (typically a town or city, but sometimes a campus). Ownership
and maintenance is handled by either a single person or company (a local council,
a large company, etc.).
This term is fairly new within the past two decades. It is used to explain a
relatively local network that is designed to provide high-speed connection in
server-to-server applications (cluster environments), storage area networks (called
“SANs” as well) and processor-to-processor applications. The computers
connected on a SAN operate as a single system at very high speeds.
These types of networks are built and owned by businesses that want to securely
connect its various locations to share computer resources.
By extending a private network across the Internet, a VPN lets its users send and
receive data as if their devices were connected to the private network – even if
they’re not. Through a virtual point-to-point connection, users can access a private
network remotely.
If you have questions about which type of network is right for your organization,
or want to learn more about Belden’s network solutions that improve uptime,
maintain security, and help improve user access, click here.
Previous PostHow Edge Data Centers Satisfy Data-Hungry Consumers
https://www.belden.com/blogs/smart-building/network-types