Access control refers to exerting control over who can interact with a resource. Often but not always, this involves an authority, who does the controlling. The resource can be a given building, group of buildings, or computer-based information system.
Access control is, in reality, an everyday phenomenon. A lock on a car door is essentially a form of access control. A PIN on an ATM system at a bank is another means of access control. The possession of access control is of prime importance when persons seek to secure important, confidential, or sensitive information and equipment.[citation needed]
Item control or electronic key management is an area within (and possibly integrated with) an access control system which concerns the managing of possession and location of small assets or physical (mechanical) keys.[citation needed]
wireless access protocol?
In random access methods, there is no access control (as there is in controlled access methods) and there is no predefined channels (as in channelization). Each station can transmit when it desires. This liberty may create collision.
In a controlled access method, the whole available bandwidth belongs to the station that is granted permission either by a central authority or by other stations. In a channelization method, the available bandwidth is divided between the stations. If a station does not have data to send the allocated channel remains idle
WAP (wireless access protocol)
Halons
LDAP (Lightweight Directory Access Protocol)
1) Wireless Application Protocol 2) Wireless Access Point 3) Wireless Access Protocol.
mac protocols are medium access protocol. mac is sublayer of data link layer in osi model.it provides addressing and medium access mechanism
IMAP (internet message access protocol)
The protocol and type of access list
PPP (point-to-point protocol).
Directory Access Protocol