Characterization of networks, Computer Networking


 There are three kinds of characterization of networks.


 It is needed for a single building.


 It is needed for a single city.


 It is needed for a country level networking and even for continents.


 Although LAN is for a local area but satellite bridge can extend LAN across longer distances. But it still could not accommodate arbitrarily several computers.

 On the other hand WAN has to be scalable to long distances and several computers.

Posted Date: 10/27/2012 9:26:16 AM | Location : United States

Your posts are moderated
Related Questions
Q. What is Data traffic? Data traffic Peak data rate : max data rate of the traffic Average data rate = (amount of data)/time Maximum Burst size: max. l

State about the communications network 1) The communications network may only accept blocks of data up to a specific size.   (2) Error control might be more effective with a

Network  Control  protocols ( NCP) The first  ARPANET  networking protocols  was named  simply the network  control protocols in 1970,and  was created by  created by  network

Questions: 1. A 5V Zener diode has a maximum power dissipation of 2W. What is the maximum current that can be safely passed through the device? 2. List three properties of a

Deadlock Avoidance To avoid deadlocks two types of strategies are used: 1) Static prevention: It uses V and P operators and Semaphores to allocate and deallocate shared res

Recognize the command to view the configuration-register value Ans) show version is the command to view the configuration-register value

Problem 1. Explain the TCP/IP Reference Model with diagram 2. Describe the following Maximum Data Rate of a Channel Signal to Noise Ratio   3. Describe the

Optimizing STP  Because there is a separate instance of the spanning tree for every active VLAN, a separate root election is conducted for each instance. If the default switch p

What is the advantage of address sharing? By using address translation instead of routing, address sharing gives an inherent security benefit. That's because host PCs on the In

Question 1 Distinguish CISC and RISC Question 2 Write a short note on Asynchronous Transfer Mode of transmission Question 3 Explain various client/server applications using Ja