Company access - computer network, Computer Networking

Company Access

Company  access is that in which  end systems are connected in connecting end  systems in a organization or educational  institution into the network.

On  corporate and  university campuses a local area network (( LAN)  is typically  used  to connect end systems through  the edge router. Ethernet technology is currently by far the most  prevalent access technology in company  networks. Ethernet operates at 10 Mbps or 100Mbps(and  now even at 1 Gbps and 10 Gbps) it  uses either twisted pair  copper wore or coaxial  cable to connect a number of end systems with each  other and  with an edge router. The  edge router is responsible  for routing packets that have destinations  outside the LAN like HFC Ethernet tuxes a shared medium so that end  users can there  the transmission rate of the LAN. More  recently shared Ethernet technology has  been  migrating toward switched Ethernet technology . Switched Ethernet  uses  multiple twisted pair Ethernet  segments connected at a switch to allow  the full transmission rate of  an Ethernet to be delivered to different  users  on the same LAN simultaneously.

 

Posted Date: 3/3/2013 11:47:32 PM | Location : United States







Related Discussions:- Company access - computer network, Assignment Help, Ask Question on Company access - computer network, Get Answer, Expert's Help, Company access - computer network Discussions

Write discussion on Company access - computer network
Your posts are moderated
Related Questions
Determine the command mode necessary to enter the extended ping command Ans) Router#

Geo stationary satellite The satellite which is known as earth-orbiting satellite is called geo stationary satellite. The geo stationary satellite is placed directly over the e

You are requested to design a secure home or small scale network (Fig. 1) to satisfy the key concepts underlying computer and network security: confidentiality, integrity, availabi

What are reasons behind using layered protocols  Reasons for using layered protocols, using them leads to breaking up design problem into smaller more manageable pieces and lay

Bridge A bridge  operation sin both  physical  and data link  layer of OSI model. At physical  layer  it works  like  repeater as it regenerates the  signal  and performs  int

Write an HTML program segment that contains hypertext links from one document to another.

In slotted Aloha system, it has been measured that 70% of slots are occupied by frames (i.e. the remaining slots are empty).  a)  How many frames need to be transmitted, on aver

What is piggybacked ACK The protocol will be incorrect. Suppose that 3-bit sequence numbers we are using. Consider following situation: A just send frame 7. B gets frame


Q. Show the IP Address Representation? IP Addressing IP Address Representation Binary notation - IP address is displayed as 32 bits Dotted-decimal notation -