Skip to main content

Types Of Connections For Networking(Cont.)

Type Of connections for Networking(Cont.)

Based on Scale, Computer networks can be classified into Local Area (LAN), Metropolitan Area Network (MAN) and Wide Area Networks (WAN).

a) Local Area Network (LAN):
LAN stands for Local Area Network and is usually privately owned. It spans short distances and connects relatively a small number of computers. It is generally used to link the devices in a single office, building or campus usually up to few kilometers in size.
The main use of LAN is to share resources and to exchange information. LAN can be distinguished from other kinds of networks by three categories: their size, transmission technology and topology.
In LANs the worst-case transmission time is bounded which means they are restricted in size. It simplifies network management and is more reliable than MAN and WAN.

b) Metropolitan Area Network (MAN):
MAN stands for Metropolitan Area Network. It spans a small city or a town and it usually covers the entire city. It can cover an area of 100 Km or so. It is owned and operated by either a private company or a service provided by a public company.
Through MAN resources can be shared through a single network as a cable TV network or it may use means to connect a number of LANs into a larger network. For example, a company can use a MAN to connect the LANs in all its offices in a city.

c) Wide Area Network (WAN):
It usually connects two or more LAN’s, generally across long geographical distances. WAN provides long-distance transmission of data, voice, image and information over large geographical areas that may comprise a country, continent or even the whole world. A WAN referred to as enterprise network is generally owned and used by a single company.
Also WANs utilizes public, leased or private communication devices and is therefore able to span an unlimited number of miles.

Comments

Popular posts from this blog

Advantages and Disadvantages of EIS Advantages of EIS Easy for upper-level executives to use, extensive computer experience is not required in operations Provides timely delivery of company summary information Information that is provided is better understood Filters data for management Improves to tracking information Offers efficiency to decision makers Disadvantages of EIS System dependent Limited functionality, by design Information overload for some managers Benefits hard to quantify High implementation costs System may become slow, large, and hard to manage Need good internal processes for data management May lead to less reliable and less secure data

Inter-Organizational Value Chain

The value chain of   a company is part of over all value chain. The over all competitive advantage of an organization is not just dependent on the quality and efficiency of the company and quality of products but also upon the that of its suppliers and wholesalers and retailers it may use. The analysis of overall supply chain is called the value system. Different parts of the value chain 1.  Supplier     2.  Firm       3.   Channel 4 .   Buyer

Big-M Method and Two-Phase Method

Big-M Method The Big-M method of handling instances with artificial  variables is the “commonsense approach”. Essentially, the notion is to make the artificial variables, through their coefficients in the objective function, so costly or unprofitable that any feasible solution to the real problem would be preferred, unless the original instance possessed no feasible solutions at all. But this means that we need to assign, in the objective function, coefficients to the artificial variables that are either very small (maximization problem) or very large (minimization problem); whatever this value,let us call it Big M . In fact, this notion is an old trick in optimization in general; we  simply associate a penalty value with variables that we do not want to be part of an ultimate solution(unless such an outcome is unavoidable). Indeed, the penalty is so costly that unless any of the  respective variables' inclusion is warranted algorithmically, such variables will never be p