Company access - computer network, Computer Networking

Company Access

Company  access is that in which  end systems are connected in connecting end  systems in a organization or educational  institution into the network.

On  corporate and  university campuses a local area network (( LAN)  is typically  used  to connect end systems through  the edge router. Ethernet technology is currently by far the most  prevalent access technology in company  networks. Ethernet operates at 10 Mbps or 100Mbps(and  now even at 1 Gbps and 10 Gbps) it  uses either twisted pair  copper wore or coaxial  cable to connect a number of end systems with each  other and  with an edge router. The  edge router is responsible  for routing packets that have destinations  outside the LAN like HFC Ethernet tuxes a shared medium so that end  users can there  the transmission rate of the LAN. More  recently shared Ethernet technology has  been  migrating toward switched Ethernet technology . Switched Ethernet  uses  multiple twisted pair Ethernet  segments connected at a switch to allow  the full transmission rate of  an Ethernet to be delivered to different  users  on the same LAN simultaneously.

 

Posted Date: 3/3/2013 11:47:32 PM | Location : United States







Related Discussions:- Company access - computer network, Assignment Help, Ask Question on Company access - computer network, Get Answer, Expert's Help, Company access - computer network Discussions

Write discussion on Company access - computer network
Your posts are moderated
Related Questions
Computer Networks A computer  networks  can be defined as set of computer that  interact  among  the individual  computers sharing  resources or information. Reference models

#questionWrite a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b. The area under a curve between two poi

State how the different IP-QoS needs for controling traffic, data and voice applications can be supported in your technology choice from Q7. Describe the specific IP-QoS schemes -


Calculate the Network Address, the broadcast address and the host range, for the following host address i. 192.168.180.94/27 ii. 172.23.8.19 /21 iii. 147.252.238.20 255.255.240.0 b

Difference between Authentication and Deauthentication Authentication: Used to establish the self of stations to each other. Deauthentication: This service is appealed whene

Recognize the command to disable CDP on an interface Ans) Router(config-if)# no cdp enable


Question: (a) Explain how a Token Ring networks allows sharing of bandwidth (access control). (b) (i) CSMA/CD is not appropriate for wireless communication. Explain wh

Determine the working of LAN within a corporate network It should be very clear right from the beginning that a firewall is not simply for protecting a corporate network from u