How can we use metropolitan area network, Computer Engineering

Assignment Help:

Q. How can we use Metropolitan Area Network?

A MAN, essentially a bigger versions of a LAN is designed to extend over an entire city. It may be single network like a cable television network, or it may be a means of connecting a number of LANs into a large network so that resources can be shared for instance, a company can use a MAN to connect LANs in all of its offices throughout a city.

A MAN generally covers an area of between 5 and 50 km diameter. Many MANs cover an area of size of a city, however in some cases MANs can be as small as a group of buildings

MAN, its communications links and equipment are usually owned by either a consortium of users or by a single network provider who sells service to the users. This level of service provided to every user should therefore be negotiated with MAN operator, and some performance guarantees are generally specified. A MAN generally acts as a high-speed network to enable sharing of regional resources (same as a large LAN). It is also often used to provide a shared connection to other networks by using a link to a WAN.


Related Discussions:- How can we use metropolitan area network

What is data link layer, Q. What is Data link layer? Data link layer: ...

Q. What is Data link layer? Data link layer: data link layer is responsible for transmitting a group of bits between adjacent nodes. Group of bits is termed as frame. Network

Define assembly, Define Assembly Assembly is a one deployable unit that...

Define Assembly Assembly is a one deployable unit that contains information about the execution of classes, structures and interfaces. it also keeps the information about itsel

Computer grphics, Advantages of DDa algorithms for line drawimg

Advantages of DDa algorithms for line drawimg

Intelligent retrieval from database, Intelligent Retrieval from Database: D...

Intelligent Retrieval from Database: Database system are large bodies of facts about some subjects, which are used to answer users queries about that subject. The design of d

Advantages and disadvantages of public-key cryptography, Advantages and Dis...

Advantages and Disadvantages of Public-key cryptography Advantages (i) Enhanced security and convenience  (ii) Electronic records may be authenticated by affixing

How will you reuse a plan, How will you reuse a plan? Reuse is an benef...

How will you reuse a plan? Reuse is an benefit of OO technology. Two aspects of reuse: Using existing things and making reusable new things It is simpler to reus

ECS, what is ecs?

what is ecs?

What are near and far pointers, These days, they're pretty much obsolete; t...

These days, they're pretty much obsolete; they're definitely system-particular. They had to do with 16-bit programming under MS-DOS and perhaps some early on versions of Windows. I

Explain the term confidentiality - firewall design policy, Explain the term...

Explain the term Confidentiality - Firewall Design Policy Whilst some corporate data is for public consumption, the vast majority of it should remain private.

Five design principles, Visibility. Controls should be clearly visible, so ...

Visibility. Controls should be clearly visible, so users can see the controls that are available to them. Visual feedback should also be clearly visible, so users can understand wh

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd