Explain the access methods used in lans, Computer Engineering

Assignment Help:

Explain the access methods used in LANs.

Access methods utilized in LAN:

i. Switched access: this is used in LANs which are assigned around CBXs.

Electronic switching is ways are used to give access.

ii. Multiple accesses: In multiple access schemes as CSMA, when a station finds ready for transmission, this first listens to the bus to notice if there is any ongoing transmission. The new transmission is not initiated till the bus becomes free, if there is one. It ensures that an ongoing transmission is not corrupted through a new transmission.

iii. Token passing access: In this type of scheme, a token packet is initiated to the network. This packet carries on circulating through the network providing no user accepts this. Whenever a user works to transmit the waits for the token packet for reaching him and accepts the token, such acceptance eliminates the token packet by the network.


Related Discussions:- Explain the access methods used in lans

Read after write and write after write - data hazards, RAW  and WAW - Data ...

RAW  and WAW - Data hazards: RAW (read after write) - j tries to read a source before i writes it, hence j wrongly gets the old value .This is the most usual type of

What is a linker program, What is a linker program? Ans. links the prog...

What is a linker program? Ans. links the program with other programs required for its execution is called a linker program.

How to call a wml script from a wml page, WML & WML Script 1. How to ca...

WML & WML Script 1. How to call a WML Script from a WML Page? 2. Write a brief note on WML Script Operators and Expressions. 3. Write brief notes on WML Script Statements

Can an rc circuit be used as clock source for 8085, Yes, it can be used, if...

Yes, it can be used, if an accurate clock frequency is not needed. Also, the component cost is low contrast to LC or Crystal.

Demonstrate arc consistency, Demonstrate Arc consistency: To demonstra...

Demonstrate Arc consistency: To demonstrate the worth of performing an arc-consistency check before starting a serarch for a solution, we'll use an example from Barbara Smith'

Convert the following binary numbers into octal, Q. Convert the following B...

Q. Convert the following BINARY numbers into OCTAL, double check by converting the result OCTAL to BINARY. a) 111.111 b) 10110111 c) 0.11111

Challenges in changing information technology, Q: Challenges and Prospects ...

Q: Challenges and Prospects in Changing Information Technology? There is no doubt that information technology has made significant progress during the past two decades. Modern

What are invisible components, They are light weight components that do no ...

They are light weight components that do no painting, but can take space in the GUI. This is mainly used for layout management.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd