Private network, Computer Networking

Single company or organization owns this. They are usually LAN technologies. There can be multiple LANs in a campus or building linked together. They are sometimes known Intranet.

PRIVATE NETWORK ARCHITECTURE:

It performs autonomously from other networks. It generally adds one or few closely managed external joins. They may end access at connections.

EXTENDING PRIVATE NETWORK:

The big organizations may have multiple campuses or buildings. They can only establish cables on their own property. They can contract for leased lines from common carrier network.

Posted Date: 7/31/2012 7:42:02 AM | Location : United States







Related Discussions:- Private network, Assignment Help, Ask Question on Private network, Get Answer, Expert's Help, Private network Discussions

Write discussion on Private network
Your posts are moderated
Related Questions
Post Office  Protocols Version In computing  the post office protocol  version 3 (POP3) is an  application layer internet standard  protocols  used by  local e mail  clients

Question: (a) Distinguish between Flow Control and Congestion Control. (b) Explain clearly how a URL is resolved by a computer. (c) List one application that uses TCP

State about the Bus Topology Comments 1 - Requires less cabling than a star network 2 - If there is a central cable problem entire netwo. rk goes down 3 - Less e

What is Stateful Multi-Layer Inspection (SMLI) They are considered as the third generation of firewall technology and usually combine the facilities of the above two. They are

Parallel Balance Point In order to implement a parallel algorithm on a parallel computer, K number of processors is needed. It may be noted that the given input is assigned to

Describe networking. Networking refers to the inter connection among computers and peripherals for data communication. Networking can be done using wired cabling or by wireless

A multimeter is used to measure a sinusoidal signal and reads 2V RMS; what is the peak-to-peak voltage of the signal? A mark will be deducted if you do not quote your answer to 2 s

Deadlock Avoidance To avoid deadlocks two types of strategies are used: 1) Static prevention: It uses V and P operators and Semaphores to allocate and deallocate shared res

Challenge Handshake Authentication Protocols (CHAP) CHAP as its an implies implements  a form of authentication that  requires a challenge  and a response. A CHAP authenticator

Question Approximately what is the low frequency cut-off of the band-pass filter shown in the figure?