How can we use metropolitan area network, Computer Engineering

Assignment Help:

Q. How can we use Metropolitan Area Network?

A MAN, essentially a bigger versions of a LAN is designed to extend over an entire city. It may be single network like a cable television network, or it may be a means of connecting a number of LANs into a large network so that resources can be shared for instance, a company can use a MAN to connect LANs in all of its offices throughout a city.

A MAN generally covers an area of between 5 and 50 km diameter. Many MANs cover an area of size of a city, however in some cases MANs can be as small as a group of buildings

MAN, its communications links and equipment are usually owned by either a consortium of users or by a single network provider who sells service to the users. This level of service provided to every user should therefore be negotiated with MAN operator, and some performance guarantees are generally specified. A MAN generally acts as a high-speed network to enable sharing of regional resources (same as a large LAN). It is also often used to provide a shared connection to other networks by using a link to a WAN.


Related Discussions:- How can we use metropolitan area network

Total number of registers in a cpu, Q. Total number of registers in a CPU? ...

Q. Total number of registers in a CPU? Factors to consider when choosing total number of registers in a CPU are:  CPU can access registers faster than it can access m

Unlike ipv4 & ipv6 which field in base header not include, Unlike Ipv4, Ipv...

Unlike Ipv4, Ipv6 does not include which field in the base header? Unlike Ipv4, Ipv6 does not contain the Field for Fragmentation information into the base header.

A sorting algorithm is stable, A sorting algorithm is stable if  Preser...

A sorting algorithm is stable if  Preserves the original order of records with equivalent keys.

What are the steps involved in authentication, What are the steps involved ...

What are the steps involved in authentication? Steps in Authentication The control over the access of the resources in the repository is exercised in two steps namely Auth

Software Engineering, explanation of the difference between syntax and sema...

explanation of the difference between syntax and semantic errors

Hazard in pipeline - computer architecture, Hazard in pipeline - computer a...

Hazard in pipeline - computer architecture: A hazard in pipeline .-removing a hazard frequently need that some instructions in the pipeline to be permitted to proceed as othe

What is macro call, What is macro call? Explain. Macro call: While a...

What is macro call? Explain. Macro call: While a macro name is used along with a set of actual parameters this is replaced through a code generated from its body. Such code

#title., REPRESENTATION OF POYNOMIAL OF 2 OR MORE VARIABLES USING ARRAY

REPRESENTATION OF POYNOMIAL OF 2 OR MORE VARIABLES USING ARRAY

What is parallel computing, Parallel computing has been a topic of interes...

Parallel computing has been a topic of interest in computing society over the previous few decades. Ever-growing amount of databases and increasing complexity of new problems are

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd