Growth of lan technology, Computer Network Security

GROWTH OF LAN TECHNOLOGY

The production of shared communication channels (LANs) started in 1960s and early 1970.

The basic idea behind was to reduce the number of connections by sharing connection among several computers. Every LAN consists of a single shared phase. The computers give turns using the phase. First one computer needs the medium to send its data over the communication channel then second and son on. But sharing a single medium over big distances is not efficient, due to the long time taken.

 

LAN technologies reduce expenses by reducing no. of connections. But attached computers compete for need of shared connections. The local interaction consists of LAN exclusively. But the long distance interaction is point-to-point exclusively.

 

Posted Date: 7/30/2012 6:43:37 AM | Location : United States







Related Discussions:- Growth of lan technology, Assignment Help, Ask Question on Growth of lan technology, Get Answer, Expert's Help, Growth of lan technology Discussions

Write discussion on Growth of lan technology
Your posts are moderated
Related Questions
Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

What do you understand by the term encryption? Also describe the public key cryptography Encryption: Encryption is a method of converting plain text into cipher text. Using thi

Symmetric Encryption This encryption method makes use of same “secret key” to encipher and decipher the message and it is termed as private key encryption. This type of encrypti

Question: (a) What is the major problem with public key encryption when compared to symmetric key encryption? (b) Consider the following protocol for communication between t

QUESTION (a) Consider the following digital bit stream 01001100 is to be encoded in: i. NRZ-I ii. Pseudoternary iii. Manchester iv. Differential Manchester Show th

Example 3: Logic bombs In the year 2000, Timothy Lloyd was found responsible of causing $10 million and $12 million of damage to Omega Engineering, an American company specializ

Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page

QUESTION a) Compare and contrast between static and dynamic routing. b) What are the merits (five merits) and limitations (3 limitations) of using Open Shortest Path First

Question 1: (a) Differentiate between symmetric and asymmetric encryption system. (b) Describe how a digital signature is created. (c) Explain briefly what SSL (secure so