How is network communication realized, and how is communication realized

Updated on technology 2024-03-20
10 answers
  1. Anonymous users2024-02-07

    In ancient times, the five communication methods included: beacon communication, flying pigeon communication, post guard communication, kite communication, and bamboo tube communication along the water.

    1. Beacon fire. It is a measure of the ancient military alarm, the Tang and Song dynasties called the beacon tower, and the Ming Dynasty was generally called the chimney or pier. The beacon towers are generally about ten miles apart, and when the soldiers guarding the platform find that the enemy is coming, they immediately light the beacon fire on the platform, and the neighboring towers will follow after seeing it, so that the enemy situation can be quickly transmitted to the military center.

    2. Flying pigeons. Flying pigeon is what we call carrier pigeon, the so-called flying pigeon biography is the ancients using the characteristics of flying pigeon to know the owner and love home, coupled with the pigeon's long flight ability and amazing memory, so as to tie some important letters or information to the pigeon's legs, so that the carrier pigeon to pass each other a convenient way of communication.

    3. Postman. The postman is the person who delivered the official document in ancient times, generally known as the "postman" and "postman", that is, the modern postman.

    Once there is the word "immediately fly" on the official document, it is an 800-mile expedited document, which must be highly valued, and the post man must ride a fast horse to deliver at a speed of 400 to 800 miles a day to ensure that the urgent mail arrives at the destination safely and quickly.

    4. Kite communication.

    There are many examples of the use of kites in military history.

    At the beginning of the Han Dynasty, when Chu and Han fought, Liu Bang besieged Xiang Yu in the wall, Han Xin suggested to Liu Bang, the king of the Han Dynasty, to make a large kite with silk silk bamboo and wood, install a bamboo whistle on it, and put it over the Chu camp at night, making a whining sound, and at the same time the Han army sang Chu songs on the ground, causing the Chu army's homesickness, thereby disintegrating the morale of the Chu army and winning the war.

    5. a bamboo tube. The bamboo tube went down the river to communicate: during the period of Emperor Wen of Sui, there was a rebellion in the south, and Shi Wansui went deep into the army to suppress the bandits, and there was no courier company at that time, so he had to put the war report into the bamboo tube and go down the river.

  2. Anonymous users2024-02-06

    **, SMS, letter, fax, network QQ

  3. Anonymous users2024-02-05

    There are **, SMS, QQ, fax, letter,

  4. Anonymous users2024-02-04

    Hello, letters, SMS, **, fax, network QQ

  5. Anonymous users2024-02-03

    A communication method in which a message is transmitted in digital form or a carrier signal is modulated in digital form and then transmitted.

    Regular** and TV are both analog communications.

    After the analog signal of Naizu mode ** and TV is digitized slowly, the modulation and transmission of digital signals are carried out, which is simply called digital ** and digital TV.

    Data communication between computers is digital because the signal itself is in digital form.

    Multiplexing using time division or code division in satellite communication is also a digital communication.

  6. Anonymous users2024-02-02

    Everything is a floating cloud, think of it and understand, come to me in the first and second years of high school, and open the door to hell for you.

  7. Anonymous users2024-02-01

    Now a thing called a switch (** computer) is referenced, with it as the center in a scattered shape, through which the exchange of their respective information.

    A sends a request to B-C (Center Computer) to receive, and sends B-B to decide whether to give permission or not to the message.

    This is also possible inside a computer, where the core is the CPU, and each party is the files stored in the computer, and each file has permission settings and associated settings.

  8. Anonymous users2024-01-31

    Communication through various protocols, exchanging information on different layers, you can take a look at the book Computer Networks.

  9. Anonymous users2024-01-30

    Information transmission and exchange between people can be realized through means of communication. There are many ways to communicate, and the three most common methods include wireless communication, wired communication, and collapse-source satellite communication.

    Wireless communication refers to the communication mode of transmitting information through radio waves, including broadcasting, radio**, satellite communication and mobile communication. Broadcasting is a wireless communication method that transmits audio signals to radio waves, and the broadcast receiver converts the signals received by radio waves into sound. Radio** is a communication method that was popularized in the early 20th century, enabling voice communication between people.

    Satellite communication is a type of communication that uses satellites to transmit information, which can be used across oceans and remote areas. Mobile communication is a wireless communication method that can communicate in the state of mobile communication.

    Wired communication refers to the communication mode of information transmission using wires, potato code optical cables and other wired cables, with high speed, high reliability and less external interference. For example, ** and the Internet use wired communication methods for the transmission of information.

    Satellite communication is a communication method that uses artificial or natural satellites hovering in earth orbit to transmit information to the receiving station through radar or microwave communication between the satellite and the transmitting station. Satellite communication can communicate across every corner of the earth, and it is a communication method with great development prospects.

    In the process of the development of information technology, communication technology has been continuously upgraded, communication technology has become more and more mature, and new communication methods have been continuously developed and applied. This is very beneficial for communication and information transfer between people, and it also provides people with a more convenient and efficient way to communicate. <>

  10. Anonymous users2024-01-29

    Summary. Hello, hello, broadband access is divided into four types: ADSL, LAN, FTTH, and PON: 1. ADSL:

    Chinese name: is an asymmetric digital subscriber line loop. It uses an existing pair of copper twisted pair cables to provide users with asymmetric transmission rates for both upstream and downlink, and the upper line is low-speed transmission; The lower line is high-speed transmission.

    It is suitable for ordinary home users, small and medium-sized business users who have broadband service needs, etc.; 2. LAN: The access mode mainly adopts Ethernet technology, which serves users in the form of information community. High-speed routers are used on core nodes to provide users with FTTx+LAN broadband access.

    Basically, gigabit to the community, 100 megabit to residential buildings, and 10 trillion to users;

    Hello, hello, broadband access methods are divided into four types: adsl, lan, ftth, and pon: 1. adsl: Shenshu Chinese name:

    It is an asymmetrical digital subscriber line loop. It uses an existing pair of copper twisted pair cables to provide users with asymmetric transmission rates for both upstream and downlink, and the upper line is low-speed transmission; The lower line is high-speed transmission. It is suitable for ordinary home users and small and medium-sized business users who have broadband service needs. 2、lan:

    The access mode mainly adopts Ethernet technology to serve users in the form of information community. High-speed routers are used on core nodes to provide users with FTTx+LAN broadband access. Basically, gigabit to the community, 100 megabit to residential buildings, and 10 trillion to users;

    These two are the most common.

Related questions
6 answers2024-03-20

The interim measures taken for network communications mainly include:1Limit traffic: >>>More

6 answers2024-03-20

Hello, features of 5G network:

1. High speed. >>>More

5 answers2024-03-20

Hello dear! Glad to answer for you: Here's how:

You can know the types of addresses (variable-length masks) based on the subnet mask, and the CIDR block based on the IP address. For example, the mask is a Class C address and the mask is a 24-bit roll. The network Li Zao address is a mask, a class C variable long subnet segment, a mask of 28 bits, a network address of 0, a broadcast address of 15, calculated by yourself, I haven't used it for a long time, and I generally use a subnet mask calculator. >>>More

7 answers2024-03-20

Hello, if telecom users need to open the communication assistant service, they can open it through telecom customer service, telecom business hall and other channels. >>>More

11 answers2024-03-20

Test the speed of the Internet. 360 comes with it.