What are the access methods used in lan, Computer Networking

Assignment Help:

What are the Access methods used in LAN:

i. Switched access: It is used in LANs which are assigned around CBXs. Electronic switching is techniques are used to provide access.

ii. Multipleaccess: In multiple access schemes like CSMA, whenever a station gets ready for transmission, it first listens to bus to see if there is any ongoing transmission. If there is one, new transmission isn't initiated until bus becomes free.  This makes sure that an ongoing transmission isn't corrupted by a new transmission.

iii. Token passing access: In this scheme, a token packet is introduced to network. This packet continues to circulate through network as long as no user accepts it. When a user works to transmit he waits for token packet to reach him and accepts token, this acceptance removes token packet from the network.

 


Related Discussions:- What are the access methods used in lan

Two commands that save the running-config to a tftp server, Name the two co...

Name the two commands that save the running-config to a TFTP server Ans)  Two commands are:- a) copy running tftp  b) write network

Hardware sharing - fundamentals of networks , Hardware Sharing  ne...

Hardware Sharing  network  facilitate the  sharing  devices. For  example  instead of giving  each of 10 employees in  department  of the internet  on modern society is har

Little spider, #question.what can we do with a spider when it red?.

#question.what can we do with a spider when it red?.

Primary function - computer network, Primary Function Core network ty...

Primary Function Core network typically providing  the followings functionality 1.Aggregation : the  highest  level  of aggregation  in a service  provider  networks. The

What are the data units at dissimilar layers of the tcp / ip, What are the ...

What are the data units at dissimilar layers of the TCP / IP protocol suite? The data unit formed at the application layer is called a message, at the transport layer the data

Determine about the complete and proper security, Determine about the Compl...

Determine about the Complete and proper security Complete and proper security configuration and administration is indeed a complex issue. One should think carefully about the

Which decision called socket base, IP plus port (IP on layer 3 and port on ...

IP plus port (IP on layer 3 and port on Layer 4 - In Encapsulation, socket base decision on Network Layer -Layer 3)

How is computer networks used in financial services, Q. How is computer net...

Q. How is computer networks used in Financial services? Financial services:   Today's financial services are totally depended on networks. Application includes credit history

What is cryptography, The science and art of manipulating messages in order...

The science and art of manipulating messages in order to create them secure is known as cryptography..... Two types are:- Symmetric key cryptography and Asymmetric key crypto

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd