The concept of universal service, Computer Networking

The major problems with multiple networks are as given:

  • A computer attached to a given server can only interact with other computers attached to the similar network.

 

  • In the 1970s large organizations start to acquire multiple networks. Every network in the organization formed island. Employees required to select a computer appropriate for each and every task. So they required multiple screens, computers and keyboards.

UNIVERSAL SERVICES:

A interaction system that supplies universal services allows arbitrary pairs of computers to interact. Universal service is required because it increases individual productivity.

Posted Date: 7/31/2012 8:22:53 AM | Location : United States







Related Discussions:- The concept of universal service, Assignment Help, Ask Question on The concept of universal service, Get Answer, Expert's Help, The concept of universal service Discussions

Write discussion on The concept of universal service
Your posts are moderated
Related Questions
Length This is a 16 bit  field  that  defines  the total  length  of the user  datagram, header  plus data. This 16 bit  can define  a total  length  of a 0 to 65, 535 bytes.



State the Example of security audit as case study Linda narrates one of her experience about a security audit. She was performing a spot audit where she was checking certain

Q. Define V - 32 modem? - ITU-T's V.32 standard was issued in 1989 for asynchronous and full-duplex operation at 9600 bps. - Even though designed for asynchronous DTEs two

What are the Advantages of adaptive routing  (1) An adaptive routing method can improve performance, as realised by the network user. (2) An adaptive routing method can aid

What do you meant by "triple X" in Networks? The function of PAD (Packet Assembler Disassembler) is defined in a document known as X.3. The standard protocol has been explaine

What is the disadvantage of a star topology? One major drawbacks of star topology is that once the central hub or switch get damaged, the whole network becomes unusable.


Consider the site-to-site VPN scenario shown in Figure 2. Let's deploy the AH protocol on the two VPN routers so that no desktop on the two sites need to do any AH operations. Assu