answersLogoWhite

0


Best Answer

to access your lan There are a number of different well known access methods: * CSMA/CD * Token passing * Slotted ring The most commont being CSMA/CD (Carrier Sense Multiple Access with Collision Detection) used in the Ethernet LAN environment.

User Avatar

Wiki User

15y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Explain the functioning of the main LAN access control methods?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Explain methods of controlling access in management of a local area computer network LAN?

EXPLAIN THE METHODS OF CONTROLLING THE PURCHASE OF MANUFACTURED PRODUCTS AND SERVICES


Why collision is an issue in a random access protocol?

In random access methods, there is no access control (as there is in controlled access methods) and there is no predefined channels (as in channelization). Each station can transmit when it desires. This liberty may create collision.


Can a method be static and synchronized?

Yes. In Java methods can be static and synchronized. Static methods access other static members in the class. Static in case of inheritance are treated as non - static. Synchronized methods are those which have dedicated thread attached to it and no other can access until currrent thread leaves the control from it.


What are the different data access methods?

Random Access & Sequential Access


What are methods of computer security?

Access Control Systems. Authentication. Multi-factor authentication Authorization. Firewalls and Internet Security. Intrusion prevention system. Intrusion detection system.


What type of access control is determined by configuring an access control list or ACL?

Discretionary Access Control


What mean encapsulation?

To encapsulate means to place in a capsule, or container, or more generally within some sort of sealed enclosure.Java ProgrammingEncapsulation concerns the hiding of data in a class and making them available only through its methods. In this way the chance of making accidental mistakes in changing values is minimized. Java allows you to control access to classes, methods, and fields via so-called access specifiers. The access to classes, constructors, methods and fields are regulated using access modifiers i.e. a class can control what information or data can be accessible by other classes. To take advantage of encapsulation, you should minimize access whenever possible.


What does encapsulating mean?

To encapsulate means to place in a capsule, or container, or more generally within some sort of sealed enclosure.Java ProgrammingEncapsulation concerns the hiding of data in a class and making them available only through its methods. In this way the chance of making accidental mistakes in changing values is minimized. Java allows you to control access to classes, methods, and fields via so-called access specifiers. The access to classes, constructors, methods and fields are regulated using access modifiers i.e. a class can control what information or data can be accessible by other classes. To take advantage of encapsulation, you should minimize access whenever possible.


What are the threats without access control?

Without an access control system, thieves could break into your building easier and steal your property or hurt the people in the building. If a criminal knows your building has weak security, it will be a much more likely target than a building that has a strong security system. One of the best methods of building security is biometric access control. Biometric access control systems use finger print scanners to restrict access to the building or certain areas of the building so only those approved can enter.


What is a software control?

"Access control" means that you control who has access to certain things - so an access control software is software that helps you achieve that.


How can you control the access to a system?

You can control the access to a system by buying or downloading certain programs. An example of a program that gives you the ability to control the access to a system is Network Access Control.


How do you access the static variable and static methods of a class?

In java we access static variables and static methods without creating objects. i.e.,we can access directly by using classname we can also access static variables and static methods by using objects which are created by using class where the static variables and static methods are available