Growth of lan technology, Computer Network Security

GROWTH OF LAN TECHNOLOGY

The production of shared communication channels (LANs) started in 1960s and early 1970.

The basic idea behind was to reduce the number of connections by sharing connection among several computers. Every LAN consists of a single shared phase. The computers give turns using the phase. First one computer needs the medium to send its data over the communication channel then second and son on. But sharing a single medium over big distances is not efficient, due to the long time taken.

 

LAN technologies reduce expenses by reducing no. of connections. But attached computers compete for need of shared connections. The local interaction consists of LAN exclusively. But the long distance interaction is point-to-point exclusively.

 

Posted Date: 7/30/2012 6:43:37 AM | Location : United States







Related Discussions:- Growth of lan technology, Assignment Help, Ask Question on Growth of lan technology, Get Answer, Expert's Help, Growth of lan technology Discussions

Write discussion on Growth of lan technology
Your posts are moderated
Related Questions
The Role of the Investigation The first phase, investigation is the most significant. What problem is the system being developed to solve? During investigation phase, objectives

Short term Scheduler function , also shown as a dispatcher runs most frequently, and creates the finest-grained decision of which program could run next. This scheduler is called

Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.

Government funding has been given to a university consortium establishing a repository of resources for school teachers. They have engaged you to develop a search facility for teac

Elements of Cryptosystems Cryptosystems is characteristically made up of algorithms, data handling techniques, and procedures which are combined in multiple ways to ensure confi

In 10 or more pages, address the following topics (be sure to use diagrams as well as references). 1) Define broadband and baseband transmission technology. 2) Describe broadban


(a) What are the different architectures for wireless networks? (b) Explain how WEP authentication and encryption works, describe the vulnerability. (c) In what ways are secu

With explain the encryption model the help of diagram. Symmetric cipher model uses the secret-key or a single-key for encryption/decryption purposes. It employs a symmetric encr

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any