answersLogoWhite

0


Best Answer

In controlled access, the stations consult one another to find which station has the right to send. A station cannot send unless it has been authorized by other stations. There are 3 protocols

>reservation

>polling

>token passing

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Define controlled access and list three protocols in this category?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is the random access method?

Is one of the three types of Access Protocols. In this method any station has the right to access the medium with out being controlled by any station.


What is used by remote access protocols for authentication?

NTLM


Line access and avoidance of collision are the functions of?

network protocols


What concept is related to defining protocols that control access to network resources?

NAC


Can access to a computer be controlled using a password?

Yes, it can be controlled


What is the problem and its solution in multiple access transmission in networking?

that of determining who gets to talk (i.e., transmit into the channel), and when.Computer networks similarly have protocols - so-called multiple access protocols - by which nodes regulate their transmission onto the shared broadcast channel.


What Exactly Is An Access Point?

An access point is a general technology term that is used to define a physical device that provides access to a network, most often the Internet. An access point can be a DSL line, a wireless hotspot, or even another computer when placed into ad hoc network mode. Access points are important when assessing computer network security. The term is also frequently used when referring to the protocol that is used to connect to the Internet since different access points can use different protocols.


Is it true that computers have four or five buses with different speeds access methods and protocols?

Yes


What authentication protocols is able to provide the highest level of security for remote access?

EAP-TLS


What type of logical access control method allow you to define who can access an object and the type of access that they will have to that object?

Access control list


What are the two characteristics of the controlled media access method?

It is known as a deterministic access method.


What is deterministic access?

When using the controlled access method, network devices take turns, in sequence, to access the medium.