answersLogoWhite

0


Best Answer

DECnet from Digital Equipment Corporation is a suite of protocols which may be used on large networks that integrate mainframe and minicomputer systems. It is a routable protocol. DNA - Digital Network Architecture.

User Avatar

Wiki User

15y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is DECNET?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What is a network standard or a protocol that defines how data or massages are routed form one end of network to the other?

it all depends on what topology the network is using. ARCNET AppleTalk ATM Bluetooth DECnet Ethernet FDDI Frame relay HIPPI IEEE 1394 aka FireWire, iLink IEEE 802.11 aka Wireless LAN (Wi-Fi certification) IEEE-488 Internet protocol suite IPX Myrinet OSI protocol suite QsNet RS-232 SPX System Network Architecture Token ring USB X.25 protocol suite


Why was osi model invented?

During the early years of our modern computer era, very few standards and protocols existed between various manufacturers. However, as time went on and computer technology continued to improve and become more widespread, it became apparent that standards would be necessary to ensure compatibility. This was especially true with regard to networks, and networking technology. Since the main purpose of a network is to share information, a standard that governs how this information is formatted, transmitted, received and verified would make it possible for information to be shared openly, even when dealing with dissimilar networks.This need for a standard means of implementing open communications led the ISO and ANSI to develop the seven-layer network communications model known as Open Systems Interconnect. By providing guidelines regarding the way network equipment should be manufactured and how network operating systems communicate on a network, the OSI model became the common link that allows data to be transmitted and exchanged reliably. Although it does not actually perform any functions or do any of the actual work, the OSI model defines the way things should be done by the software and hardware on a network so that communications can take place between two computers or nodes.In this way, the OSI model provides a universal set of rules that make it possible for various manufacturers and developers to create software and hardware that is compatible with each other. This makes for organized communications. As I thought about this, I related it to the freeways that connect the various states of the mainland U.S. Because all of these freeways were constructed with the same set of standards regarding the width of each lane, the proper side that a person should drive on, the speed at which they should travel, and so on, people can comfortably drive across the country in an organized and efficient manner and car manufacturers are able to design cars within these guidelines as well. On the other hand, if each state had devised its own set of rules, each differing from the other, not only would there be a lot more chaos on the roads, but also car manufacturers would have a hard time designing vehicles that would be compatible with each state's roads. To me, this illustrates the importance of the OSI model with respect to network communications. Not only is it the foundation for all network communications today, but also because it is such a fundamental part of these communications, it becomes very apparent to me that it is very important for a network technician to understand the OSI model in full detail.The OSI model is made up of the following layers: the physical, data link, network, transport, session, presentation and application. Together, these seven layers are collectively referred to as a stack. As a node receives data, each layer starting with the physical layer extracts the various portions of the packet and this process works its way up to the application layer. When data is sent, it begins at the application layer and travels down to the physical layer. The information is pushed to the next layer of the stack by means of commands called primitives. Each layer uses a peer protocol to encode the information, which ensures that the same layer on the receiving node will be able to understand the information.


What is a router?

A device that forwards data packets from one local area network (LAN) or wide area network (WAN) to another. Based on routing tables and routing protocols, routers read the network address in each transmitted frame and make a decision on how to send it based on the most expedient route (traffic load, line costs, speed, bad lines, etc.). Routers work at layer 3 in the protocol stack, whereas bridges and switches work at the layer 2. Routers are used to segment LANs in order to balance traffic within workgroups and to filter traffic for security purposes and policy management. Routers are also used at the edge of the network to connect remote offices. Multiprotocol routers support several protocols such as IP, IPX, AppleTalk and DECnet. Routers can only route a message that is transmitted by a routable protocol such as IP or IPX. Messages in non-routable protocols, such as NetBIOS and LAT, cannot be routed, but they can be transferred from LAN to LAN via a bridge. Because routers have to inspect the network address in the protocol, they do more processing and add more overhead than a bridge or switch, which both work at the data link (MAC) layer. Most routers are specialized computers that are optimized for communications; however, router functions can also be implemented by adding routing software to a file server. For example, the NetWare operating system includes routing software that can route from one subnetwork to another if each one is connected to its own network adapter (NIC) in the server. The major router vendors are Cisco Systems and Nortel Networks. Within an enterprise, routers serve as an internet backbone interconnecting all networks. This architecture strings several routers together via a high-speed LAN topology such as Fast Ethernet or Gigabit Ethernet. Within the global Internet, routers do all the packet switching in the backbones. Another approach within an enterprise is the collapsed backbone, which uses a single router with a high-speed backplane to connect the subnets, making network management simpler and improving performance. In older Novell terminology, a router is a network-layer bridge. Routers also used to be called "gateways." For more understanding of how the network layer 3 works within the protocol stack, see TCP/IP abc's. See layer 3 switch, route server, router cluster and routing protocol.


Related questions

What is the Mac address used for?

The address for a device as it is identified at the Media Access Control (MAC) layer in the Ethernet networkarchitecture. The MAC address is usually stored in ROM on the network adapter card and is unique.When reaching another host on your own network, or when accessing a router on your network to reach another network, The IP address (4 numbers separate by dots) is converted to the MAC address of the host or router on your network. When the message or packet(S) are sent out, the device with that destination MAC address recognizes that it was meant to receive the message and accepts it. Any other device on the network that can see the transmission is expected to ignore it.An exception is a device or router that is configured to be "promiscuous". Such a machine will also accept and process all transmissions even if meant for another device. This is often used for network monitoring/logging, maintenance, and problem resolution.Although the MAC address is hard coded into the network interface or device, in almost all cases it can be changed. An example for this is when an ethernet network is used with the DECnet protocol. DECnet can be used instead of or togetherwith TCP/IP (or Netware or NetBEUI). The DECnet protocol requires that the MAC address be changed to incorporate the DECnet address as part of the MA address.A MAC address is the serial number of a network card - or other equipment that connects to a network, usually an Ethernet network. In an Ethernet network, the MAC address is used as source and destination address, to know who is communicating with whom. For example, a switch uses the MAC address to forward a frame (a pieces of data) to the correct computer.


What is a network standard or a protocol that defines how data or massages are routed form one end of network to the other?

it all depends on what topology the network is using. ARCNET AppleTalk ATM Bluetooth DECnet Ethernet FDDI Frame relay HIPPI IEEE 1394 aka FireWire, iLink IEEE 802.11 aka Wireless LAN (Wi-Fi certification) IEEE-488 Internet protocol suite IPX Myrinet OSI protocol suite QsNet RS-232 SPX System Network Architecture Token ring USB X.25 protocol suite


When was the standardized for Email?

(interpreted as "when was the format user@domain standardized for email?)I'd say, over a number of years. RFC 822, which specifies this format on the Internet, was published in 1982. But people were already using email on other networks such asBitnet, DECNET, AOL etc. which used different syntax. For some time there were gateways between the different networks, akin to containers being moved from rail to road to ship, and strange addresses like Timbl%VXCRNA.CERN@CERNVAX.Bitnet used to specify the final destination.By the late 1990's I think everyone pretty much had moved to Internet email. The standards are still evolving as people add features - MIME (for attachments) was added in 1992 andsubsequently refined. Other features such as S/MIME (encryption) and delivery verification were added later.


How are osi and iso related to each other?

ISO is the International Standards Organization, part of the United Nations.OSI (Open System Interface) is a networking standard, developed by ISO.ISO is the International Standards Organization, part of the United Nations.OSI (Open System Interface) is a networking standard, developed by ISO.ISO is the International Standards Organization, part of the United Nations.OSI (Open System Interface) is a networking standard, developed by ISO.ISO is the International Standards Organization, part of the United Nations.OSI (Open System Interface) is a networking standard, developed by ISO.


What is clustered system operating system?

A clustered system is two or more computers that share access to each other's disk storage or to a separate storage system(s). This can include satellite systems without any hard drive storage that boot and run completely using another machines hard drive. Clusters may be connected using special high speed channels such as Fiber to support the hard drive traffic. They may also use LAN connections for data transfers. Various LAN protocols are available TCPI/IP such as NFS (network file system), and SMB/CIFS (Server Message Block/Common Internet File System) often interchangeably called NetBIOS, Lan Manager and Samba. Other clustering methods include proprietary clustering protocols, Decnet, LAT, and NetBEUIClustering (means gather together) allows two or more system to shear storage closely linked via a local area network .Provide high reliability ( Its work never stopped).Asymmetric Cluster (at least two servers: One is on a standby mode while the other is monitoring the other one. If one stops other will work).Symmetric Cluster (all work with one: The work together and monitor each other).


Who is the true BIG DATA?

The Big data the man the myth the legend. He is the greates indian sports player of all time. He has so much swagger, that he always has to eat outside so the roof won't blow out. He dunks on people just by looking at him. He has unmatched indian swagger and whatever he wears is immediately stylish. Whatever he touches immediatley receives wi-fi. It is pronoced the Big Data! with emphasis to the starting B and ending A. The Big Data is faster than half the track stars at his school and stronger than most football players. In fact, football became a wimpy sport after the Big Data said so. "Truth never lies"-Big data. "All fottball requires is decnet athleticism, and a dos of 45, x9 X the qaudrangle of fb9 divided by stupidity and qudrupled by mormanism squared by the root of dumbness."- The Big Data. Those are some true to life qoutes that everyone should know from the Big Data. Those qoutes are the key to success in life. According to the Big Data, LeBron's brain cells are equivelant to a microorganism such as plasmodium flaciperum when it comes to three-point shooting. According to the Big Data and a significant amount of research, LeBron has the nureo frontal lobes of an elephant which hold all he knows about floping so he will never forget. The Big Data is a legend of true class and knows everything to succeeding as a future tech support, doctor, NBA player, or 7 11 owner. The Big Data is the greatest specimen to ever walk the face of the universe. (which is possible if done by the Big Data).


How do clustered system differ from multiprocessor?

A multiprocessing system is a single computer with 2 or more CPUs (Central Processing Unit) and some have as many as 32 or more CPUs. They all have controlled access to and share the same disks, memory, and other hardware on the machine. The different processors can each run separate tasks or a single task can be split among several CPUs to accomplish a task in less time. Multiprocessing systems require a special operating system software that manages what programs use what CPU(s) and have access to which parts of memory and any other hardware, resolving conflicts and security issues and maintaining the integrity of each running program. Some multiprocessing systems even support using different operating systems by assigning specific CPUs and memory to each operating system. A clustered system is two or more computers that share access to each other's disk storage or to a separate storage system(s). This can include satellite systems without any hard drive storage that boot and run completely using another machines hard drive. Clusters may be connected using special high speed channels such as Fiber to support the hard drive traffic. They may also use LAN connections for data transfers. Various LAN protocols are available TCPI/IP such as NFS (network file system), and SMB/CIFS (Server Message Block/Common Internet File System) often interchangeably called NetBIOS, Lan Manager and Samba. Other clustering methods include proprietary clustering protocols, Decnet, LAT, and NetBEUI Following are the differences between the two: - Multiprocessors are tied together and in clustered system individual systems are tied together. - LAN networking is used in Clustered system, in Multiprocessing system LAN etc is not required. - The aim is high availability in clustered system whereas in multiprocessing it is time saving. - The processors share common system clock and common data structures.


How do clustered system differ from multiprocessor systems?

A multiprocessing system is a single computer with 2 or more CPUs (Central Processing Unit) and some have as many as 32 or more CPUs. They all have controlled access to and share the same disks, memory, and other hardware on the machine. The different processors can each run separate tasks or a single task can be split among several CPUs to accomplish a task in less time. Multiprocessing systems require a special operating system software that manages what programs use what CPU(s) and have access to which parts of memory and any other hardware, resolving conflicts and security issues and maintaining the integrity of each running program. Some multiprocessing systems even support using different operating systems by assigning specific CPUs and memory to each operating system. A clustered system is two or more computers that share access to each other's disk storage or to a separate storage system(s). This can include satellite systems without any hard drive storage that boot and run completely using another machines hard drive. Clusters may be connected using special high speed channels such as Fiber to support the hard drive traffic. They may also use LAN connections for data transfers. Various LAN protocols are available TCPI/IP such as NFS (network file system), and SMB/CIFS (Server Message Block/Common internet File System) often interchangeably called NetBIOS, Lan Manager and Samba. Other clustering methods include proprietary clustering protocols, Decnet, LAT, and NetBEUI Following are the differences between the two: - Multiprocessors are tied together and in clustered system individual systems are tied together. - LAN networking is used in Clustered system, in Multiprocessing system LAN etc is not required. - The aim is high availability in clustered system whereas in multiprocessing it is time saving. - The processors share common system clock and common data structures.


Why was osi model invented?

During the early years of our modern computer era, very few standards and protocols existed between various manufacturers. However, as time went on and computer technology continued to improve and become more widespread, it became apparent that standards would be necessary to ensure compatibility. This was especially true with regard to networks, and networking technology. Since the main purpose of a network is to share information, a standard that governs how this information is formatted, transmitted, received and verified would make it possible for information to be shared openly, even when dealing with dissimilar networks.This need for a standard means of implementing open communications led the ISO and ANSI to develop the seven-layer network communications model known as Open Systems Interconnect. By providing guidelines regarding the way network equipment should be manufactured and how network operating systems communicate on a network, the OSI model became the common link that allows data to be transmitted and exchanged reliably. Although it does not actually perform any functions or do any of the actual work, the OSI model defines the way things should be done by the software and hardware on a network so that communications can take place between two computers or nodes.In this way, the OSI model provides a universal set of rules that make it possible for various manufacturers and developers to create software and hardware that is compatible with each other. This makes for organized communications. As I thought about this, I related it to the freeways that connect the various states of the mainland U.S. Because all of these freeways were constructed with the same set of standards regarding the width of each lane, the proper side that a person should drive on, the speed at which they should travel, and so on, people can comfortably drive across the country in an organized and efficient manner and car manufacturers are able to design cars within these guidelines as well. On the other hand, if each state had devised its own set of rules, each differing from the other, not only would there be a lot more chaos on the roads, but also car manufacturers would have a hard time designing vehicles that would be compatible with each state's roads. To me, this illustrates the importance of the OSI model with respect to network communications. Not only is it the foundation for all network communications today, but also because it is such a fundamental part of these communications, it becomes very apparent to me that it is very important for a network technician to understand the OSI model in full detail.The OSI model is made up of the following layers: the physical, data link, network, transport, session, presentation and application. Together, these seven layers are collectively referred to as a stack. As a node receives data, each layer starting with the physical layer extracts the various portions of the packet and this process works its way up to the application layer. When data is sent, it begins at the application layer and travels down to the physical layer. The information is pushed to the next layer of the stack by means of commands called primitives. Each layer uses a peer protocol to encode the information, which ensures that the same layer on the receiving node will be able to understand the information.


What is a router?

A device that forwards data packets from one local area network (LAN) or wide area network (WAN) to another. Based on routing tables and routing protocols, routers read the network address in each transmitted frame and make a decision on how to send it based on the most expedient route (traffic load, line costs, speed, bad lines, etc.). Routers work at layer 3 in the protocol stack, whereas bridges and switches work at the layer 2. Routers are used to segment LANs in order to balance traffic within workgroups and to filter traffic for security purposes and policy management. Routers are also used at the edge of the network to connect remote offices. Multiprotocol routers support several protocols such as IP, IPX, AppleTalk and DECnet. Routers can only route a message that is transmitted by a routable protocol such as IP or IPX. Messages in non-routable protocols, such as NetBIOS and LAT, cannot be routed, but they can be transferred from LAN to LAN via a bridge. Because routers have to inspect the network address in the protocol, they do more processing and add more overhead than a bridge or switch, which both work at the data link (MAC) layer. Most routers are specialized computers that are optimized for communications; however, router functions can also be implemented by adding routing software to a file server. For example, the NetWare operating system includes routing software that can route from one subnetwork to another if each one is connected to its own network adapter (NIC) in the server. The major router vendors are Cisco Systems and Nortel Networks. Within an enterprise, routers serve as an internet backbone interconnecting all networks. This architecture strings several routers together via a high-speed LAN topology such as Fast Ethernet or Gigabit Ethernet. Within the global Internet, routers do all the packet switching in the backbones. Another approach within an enterprise is the collapsed backbone, which uses a single router with a high-speed backplane to connect the subnets, making network management simpler and improving performance. In older Novell terminology, a router is a network-layer bridge. Routers also used to be called "gateways." For more understanding of how the network layer 3 works within the protocol stack, see TCP/IP abc's. See layer 3 switch, route server, router cluster and routing protocol.