Brdging between buildings, Computer Networking


 If two buildings are placed far from each other, a bridge, a pair of fiber modems and an optical fiber may be used to locate two LANs as given in the figure below.






 An optical fiber modem pair is effective to connect several computers located on separate buildings.


 There is no need to modify the wiring between the buildings when removing and installing a computer.


 The traffic on every building does not affect the other.


 It is not possible to join two sites with optical fiber because the distance may be too big. It is generally not allowed to lay an optical fiber if the land does not related to you.

 There are two basic methods to join two distant sites.




Posted Date: 10/27/2012 9:18:07 AM | Location : United States

Related Discussions:- Brdging between buildings, Assignment Help, Ask Question on Brdging between buildings, Get Answer, Expert's Help, Brdging between buildings Discussions

Write discussion on Brdging between buildings
Your posts are moderated
Related Questions
What are the Unix-based firewalls The Unix-based firewalls are considered most secured as compared to the Windows NT based ones. The firewalls bind the holes of the operating

Mesh : This is two dimensional networks.  In this all processing elements are organised in a two dimensional grid. The processor in the row i and column j are indicated by PE i .

Determine about the Tree Topology A generalization of the bus topology. The transmission medium is a branching cable with no closed loops. The tree layout begins at a point kno

Control Commands: The STAT command is used as a way for the client to confirm that the server is still responding properly. The server must simply send a positive command res

a) Used for sending e-mail. b) Uses port 25.

IEEE 802.4-Token bus Physical line or tree however logical ring. Stations know "left" as well as "right" stations. One token "passed" from station to station. Only station with

State the term - Lot of care required while programming It is a common and well-known saying that many developers of "secure systems" leave a "back door" way for themselves so

Question: (a) Explain the usage of the following parts of the IPv4 datagram format. i. VERS ii. HLEN iii. TOTAL LENGTH iv. SERVICE TYPE v. HEADER CHECKSUM (b) Na

Q. Explain about Domain Name System? -In the past, mapping of IP addresses was static using a host file -Impossible in today's dynamic environment -Domain Name System (DN

Explain the working of ISDN Stands for Integrated Services Digital Network. It is a way to move more data over existing regular phone lines. ISDN is rapidly becoming availab