Growth of lan technology, Computer Network Security

GROWTH OF LAN TECHNOLOGY

The production of shared communication channels (LANs) started in 1960s and early 1970.

The basic idea behind was to reduce the number of connections by sharing connection among several computers. Every LAN consists of a single shared phase. The computers give turns using the phase. First one computer needs the medium to send its data over the communication channel then second and son on. But sharing a single medium over big distances is not efficient, due to the long time taken.

 

LAN technologies reduce expenses by reducing no. of connections. But attached computers compete for need of shared connections. The local interaction consists of LAN exclusively. But the long distance interaction is point-to-point exclusively.

 

Posted Date: 7/30/2012 6:43:37 AM | Location : United States







Related Discussions:- Growth of lan technology, Assignment Help, Ask Question on Growth of lan technology, Get Answer, Expert's Help, Growth of lan technology Discussions

Write discussion on Growth of lan technology
Your posts are moderated
Related Questions
UDP DATAGRAM FORMAT: It is given in the figure below:

Elements of Cryptosystems Cryptosystems is characteristically made up of algorithms, data handling techniques, and procedures which are combined in multiple ways to ensure confi

NSTISSC SECURITY MODEL The NSTISSC Security Model provides a detailed perspective on security. While the NSTISSC model covers the 3 dimensions of information security, it removes


Question: (a) Data on four variables are stored in a file called file1.dat. The first line of the file is the variable names f, x, y and z. Give the R commands to (i) read t


QUESTION (a) Describe the difference between static routing and dynamic routing algorithms. (b) List four functions that are performed by the Cisco IOS software during b

For simplicity, each character is regarded as one data packet, which means that the data in each packet should have the max length of only 1 byte. Your own packet header (not th

QUESTION: a) Below is a capture of an Ethernet II frame which has an IPv4 packet and a segment. Provide the source MAC address in hexadecimal; the source IP address, the length

(a) Briefly explain the following security goals provided by cryptography: confidentiality, authentication, integrity and non-repudiation. (b) State Kerckhoff's Princip