Growth of lan technology, Computer Network Security

GROWTH OF LAN TECHNOLOGY

The production of shared communication channels (LANs) started in 1960s and early 1970.

The basic idea behind was to reduce the number of connections by sharing connection among several computers. Every LAN consists of a single shared phase. The computers give turns using the phase. First one computer needs the medium to send its data over the communication channel then second and son on. But sharing a single medium over big distances is not efficient, due to the long time taken.

 

LAN technologies reduce expenses by reducing no. of connections. But attached computers compete for need of shared connections. The local interaction consists of LAN exclusively. But the long distance interaction is point-to-point exclusively.

 

Posted Date: 7/30/2012 6:43:37 AM | Location : United States







Related Discussions:- Growth of lan technology, Assignment Help, Ask Question on Growth of lan technology, Get Answer, Expert's Help, Growth of lan technology Discussions

Write discussion on Growth of lan technology
Your posts are moderated
Related Questions
QUESTION (a) Briefly explain the contents of the Needs Analysis, which is step in the process of network design. (b) Describe on the three ways of improving the performan

Problem (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. The second screen capture is from the data portion of the frame.

Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page

Systems-Specific Policy (SysSP) SysSPs are codified as standards and procedures which are used when configuring or maintaining systems. Systems specific policies fall into 2 g

Question: Network diagrams combine with a set of systematic analysis procedures, serve to remedy the shortcomings of the Gantt chart. Explain the following terms used in the ne

Network diagram for a mediacal care

UDP INTERACTION  UDP follows four kinds of interaction 1-to-1: One application can interact with one application. 1-to-many: One application can interact with many

KASONet Pinging System: Project Title:                                                           "KASONet Pinging System"   Brief Overview of Project: The o

Get a copy of Metasploitable at Make">http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ Make sure to follow these directions very carefully. You will get po