Growth of lan technology, Computer Network Security


The production of shared communication channels (LANs) started in 1960s and early 1970.

The basic idea behind was to reduce the number of connections by sharing connection among several computers. Every LAN consists of a single shared phase. The computers give turns using the phase. First one computer needs the medium to send its data over the communication channel then second and son on. But sharing a single medium over big distances is not efficient, due to the long time taken.


LAN technologies reduce expenses by reducing no. of connections. But attached computers compete for need of shared connections. The local interaction consists of LAN exclusively. But the long distance interaction is point-to-point exclusively.


Posted Date: 7/30/2012 6:43:37 AM | Location : United States

Related Discussions:- Growth of lan technology, Assignment Help, Ask Question on Growth of lan technology, Get Answer, Expert's Help, Growth of lan technology Discussions

Write discussion on Growth of lan technology
Your posts are moderated
Related Questions
You have been asked to setup a remote temperature sensing system for an electric furnace. The system consists of a sensor unit which feeds an analogue signal to a PCM encoder. The

Question: (a) African governments are slowly shifting to more transparent ICT regulations. However, but limited spectrum availability remains a key barrier to sustaining lon

Risk Determination For purpose of relative risk assessment, risk equals probability of vulnerability occurrence TIMES value MINUS percentage risk already controlled PLUS an elem

what are the participant of marketing channal?

ADDRESS RESOLUTION WITH CLOSED-FORM COMPUTATION For networks use reliable addressing, it is possible to select an address that creates closed-form address resolution possible.

IP DATAGRAM Various options can be included to IP header, e.g., source route, record route and timestamp. Header with no function has H. LEN field value 5; data starts immedia

Application Gateways / firewall The application level firewall is installed on a dedicated computer; also called as a proxy server. These servers can store the recently accessed

Question: (a) Besides privacy, what other security functions does Pretty Good Privacy (PGP) provides? (b) What is the Post Office Protocol (POP) used for? Why is it impo

Hardware, Software, and Network Asset Identification What information attributes to track is dependent on: •    Requires of organization/risk management efforts •    Management

I need a help on how to write good assignment on the above topic