Company access - computer network, Computer Networking

Company Access

Company  access is that in which  end systems are connected in connecting end  systems in a organization or educational  institution into the network.

On  corporate and  university campuses a local area network (( LAN)  is typically  used  to connect end systems through  the edge router. Ethernet technology is currently by far the most  prevalent access technology in company  networks. Ethernet operates at 10 Mbps or 100Mbps(and  now even at 1 Gbps and 10 Gbps) it  uses either twisted pair  copper wore or coaxial  cable to connect a number of end systems with each  other and  with an edge router. The  edge router is responsible  for routing packets that have destinations  outside the LAN like HFC Ethernet tuxes a shared medium so that end  users can there  the transmission rate of the LAN. More  recently shared Ethernet technology has  been  migrating toward switched Ethernet technology . Switched Ethernet  uses  multiple twisted pair Ethernet  segments connected at a switch to allow  the full transmission rate of  an Ethernet to be delivered to different  users  on the same LAN simultaneously.

 

Posted Date: 3/3/2013 11:47:32 PM | Location : United States







Related Discussions:- Company access - computer network, Assignment Help, Ask Question on Company access - computer network, Get Answer, Expert's Help, Company access - computer network Discussions

Write discussion on Company access - computer network
Your posts are moderated
Related Questions
Inside a device, every address mask is stored as a 32-bit number. When we submit a prefix and an address mask they use a changed form of dotted decimal addressing known CIDR addres

The marketing term 'ISDN modem' was formed to help sell the ISDN idea to America. There is no such thing as an analog modulator demodulator for digital ISDN. The Terminal Adapter (

compare routing algorithms with non adaptive algorithms

Explain teh term- Bits and Bitmap Many tiny dots, which are put together to make a picture. Bits are combined to make a graphic image called a bitmap. GIF and JPEG files are

What is Error Control ? Error control is both error detection and error correction. It allows the receiver to inform the sender of any frames lost or damaged in transmission an


Q. What is Aspects of Security? - Security Attack: Any action whichcompromises the security of information owned by an organization. - Security Mechanism: A mechanism th


What are NETBIOS and NETBEUI? NETBIOS is a programming interface that permits I/O requests to be sent to and received from a remote computer and it hides the networking hardwar

Question : a) Explain why pervasive computing can be termed as a "technology that disappears". b) List and briefly explain four main components of a MOTE used in Wireless