What is man, Computer Networking

What is MAN?

MAN - Metropolitan Area Networks.

MAN is bigger than a LAN and as its name implies, covers the area of a single city. MANs rarely extend beyond 100 KM and frequently comprise a combination of dissimilar hardware and transmission media.

The two most significant components of MANs are security and standardization. Security is vital because information is being shared among dissimilar systems. Standardization is essential to ensure reliable data communication

 

Posted Date: 8/24/2013 7:08:07 AM | Location : United States







Related Discussions:- What is man, Assignment Help, Ask Question on What is man, Get Answer, Expert's Help, What is man Discussions

Write discussion on What is man
Your posts are moderated
Related Questions
what is similarity of wifi and 3g

a)  A host is sending a HTTP request to a HTTP server. In the table below, propose a correct set of source and destination port numbers for segments sent from host to server and fr

Configure VTP Pruning on the Switches VTP pruning permits a VTP server to suppress IP broadcast traffic for particular VLANs to switches that do not have any ports in that VLAN

Connect a Router and Computer with a Console Cable Step 1 : Set up a basic physical connection. Connect the console (rollover) cable to the console port on the router. Link

What advantages does fiber optics have over other media? One main advantage of fiber optics is that is it less susceptible to electrical interference. It also supports higher ba

What is region? When hierarchical routing is used, the routers are separated into what we will call regions, with every router knowing all the details about how to route packet

Determine the Types of intranet Intranets have been broadly classified into three types based on their functionality, viz., The Bulletin Board, Database Management and

What is CRC and Checksum CRC (Cyclic redudancy check) CRC, is the most powerful of the redundancy checking methods, is based on binary division. Checksum Checksum

Tunnelling To guarantee privacy for the  organization, VPN specifies that each IP datagram destined for private  use of the  organization, must  first be  encrypted and then en

What are the key design issues of a computer Network? a. Connectivity b. Cost-effective Resource Sharing c. Support for common Services d. Performance