Different Types Of Network
|
|
|
- Clarence Benjamin Chambers
- 10 years ago
- Views:
Transcription
1 Different Types Of Network A computer network is formed when a group of computers are connected or linked together. Networks are usually set up to allow users to communicate electronically, share data, share peripherals and provide security and up to date information. Computers that are not networked together are called stand-alone computers. There are many different types of networks. Local Area Network (LAN) A Local Area Network is a network of computers that are all situated close together for example in a room or building. Since the distance between computers is relatively small wire cables are frequently used to connect the computers together. LANs are usually set up to allow users to share data, communicate and share expensive peripherals. A fileserver is used within a LAN to store data centrally. The fileserver is a powerful computer with a large amount of internal memory (RAM), fast processor and large amount of backing storage. Each authorised user of the network can use the fileserver to save data. The network manager or administrator (the person responsible for the running of the network) has to set up a username and password for each user of the network. This allows each user to log on. Each user of the network is given a folder which only they can use to store their files. Wide Area Network (WAN) This is a network of computers connected across a distance. Telephone lines, satellites or other communication technology is required for WANs to work. Most major companies need a WAN in order to communicate with other branches either nationally or internationally. Intranet This is a network that allows a private connection access to Internet services. This usually happens within a particular company or organisation. Authorised users only are allowed to access these services and this makes the network relatively secure. It allows secure communication and the distribution of information similar to the World Wide Web. It can also allow companies to advertise on the Internet. Internet This is the most common example of a WAN. It uses telecommunications to transfer data between computers and distribute information. The World Wide Web (WWW) is a collection of information held on the Internet. The WWW is made up of millions of documents called web pages and these pages are available to any user of the Internet. The Internet can also be used to communicate via (webmail), chat rooms, mailing lists etc. Many e-commerce companies have set up websites so customers can bank, shop, pay for travel tickets etc. on-line. Advantages of using networks Sharing of peripherals (printers etc.) Sharing of storage Sharing of files Communication between computers Higher Computing Systems Networking Infosheet 5.1 Produced by S Lambert, R Simpson and HSDU for The Cityy of Edinburgh Council, 2004
2 Different Types Of Network Disadvantages of using networks The type of network used depends upon several factors, usually: Too many users can slow the network down Server crashes and data isn't available No central storage Cabling and transmission problems Transmission media This allows the transmission of the electronic signals from one computer to another. There are many different types of transmission media: Shielded Twisted Pair (STP) this is a type of copper telephone wiring in which each of the two copper wires that are twisted together are coated with an insulating coating that functions as a ground for the wires. The extra covering in shielded twisted pair wiring protects the transmission line from electromagnetic interference leaking into or out of the cable. STP cabling often is used in Ethernet networks, especially fast data rate Ethernets; Unshielded Twisted Pair (UTP) - this is a type of cable that consists of two unshielded wires twisted around each other. UTP cabling does not offer as high bandwidth or as good protection from interference, but it is cheap and easier to work with; Coaxial this is a type of wire that consists of a center wire surrounded by insulation and then a grounded shield of braided wire. The shield minimizes electrical and radio frequency interference; Fibre Optic this is technology that uses glass (or plastic) threads (fibres) to transmit data. A fibre optic cable consists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves; Leased Line this is when a dedicated phone line allows network connection. Usually leased lines are used by businesses to connect geographically distant offices. A leased line is always active and as the connection doesn't carry anybody else's communications, the quality of service is usually very good; Wireless Connection this is when no physical cabling is used. Instead signals are usually sent by infra-red communication, laser, radio waves, microwave transmission or satellite links. Higher Computing Systems Networking Infosheet 5.1 Produced by S Lambert, R Simpson and HSDU for The Cityy of Edinburgh Council, 2004
3 Different Types Of Network Bandwidth This is the amount of data that can be transmitted in a fixed amount of time or the range of frequencies that a channel can handle. Bandwidth can be given as a transmission rate. This is usually in megabits per second (Mbps) which is 1 million bits per second. Bandwidth may also be given as a frequency and this is usually measured in kilohertz (khz). Geographical spread This is the distance that the network has to cover. Functions These are the tasks that the network has to perform. The table below defines typical factors for the different types of networks. Network Type LAN Transmission Media Coaxial cable Shielded Twisted Pair (STP) Unshielded Twisted Pair (UTP) Bandwidth Typically 10Mbps 16 Mbps up to 500 Mbps 10 Mbps up to 100 Mbps Geographical Spread Up to 500 metres 100 metres 100 metres Functions share data share peripherals communication centrally store data Fibre optic Typically 100Mbps Wireless Up to 54Mbps WAN Fibre optic Wireless Typically 100Mbps Up to 54 Mbps share data communication centrally store data Leased line Between 10Mbps and 100 Mbps Higher Computing Systems Networking Infosheet 5.1 Produced by S Lambert, R Simpson and HSDU for The Cityy of Edinburgh Council, 2004
4 Different Types Of Network Intranet Internet Fibre optic Wireless Leased line Fibre optic Wireless Leased line Typically 100Mbps Up to 54 Mbps Between 10Mbps and 100 Mbps Typically 100Mbps Up to 54 Mbps Between 10Mbps and 100 Mbps share data share peripherals shop, bank, travel etc. communication centrally store data advertise share data shop, bank, travel etc. communication centrally store data advertise Higher Computing Systems Networking Infosheet 5.1 Produced by S Lambert, R Simpson and HSDU for The Cityy of Edinburgh Council, 2004
5 Mainframes and Servers Mainframe with terminals Mainframes are very large computers which can be accessed by other computers called terminals. Mainframes are capable of supporting hundreds, or even thousands of users simultaneously. Terminals consist of usually a keyboard and monitor only and rely on the mainframe to carry out all the processing and backing storage required. Mainframes are generally used by huge organisations that have massive amounts of data to be stored and processed. These companies generally require central database management, for example, banks, insurance companies, government offices etc. Mainframes are usually kept in separate rooms due to security and their physical size. A mainframe computer s functions is not so much defined by their CPU speed as by their massive internal memory, high capacity external storage and reliability. These machines can and do run successfully for years without interruption, with repairs taking place whilst they continue to run. Terminals usually consist of just a keyboard and a monitor. The mainframe is responsible for doing all the work that the terminal needs processed. Advantages cheap to buy Disadvantages have no processing power or backing storage of their own if mainframe crashes or goes down the terminal is deemed useless Network Of Computers Most computer networks have stations that can work efficiently on their own without the aid of a mainframe. These networks usually consist of desktop computers being linked together. Servers are used to carry out various tasks across the network. There are many different types of server: File server This provides a central disk storage area for any users across the network. The file server stores users files separately. Users can then access their files from any workstation on the network; Web server This computer deals with web pages across a network. Every web server has an IP address and possibly a domain name. For example, if you enter the URL in your browser, this sends a request to the server whose domain name is yahoo.com. The server then fetches the page named index.html and sends it to your browser; Print server This computer allows the management of printing across the network. It uses a spooler to store users' files and can provide a queuing facility with prioritising if necessary; CD-ROM server This server allows all workstations across the network to obtain data from CD- ROM disks; Mail server Mail servers move and store mail over networks and across the Internet. When you send an it is sent to the server that then processes it and sends it to the recipient; Application server This server runs one or more applications that can be shared by workstations. Higher Computing Systems Networking Infosheet 5.2 Produced by S Lambert, R Simpson and HSDU for The City of Edinburgh Council, 2004
6 Peer-To-Peer and Client Server Networks Peer-to-peer This network is generally easy to set up, operate and maintain. This is a type of network which each workstation has equivalent capabilities and responsibilities. Each computer on the network has equal status. Any station can make its resources available to the rest of the stations on the network. The decision to share resources and what they are is taken by the user currently working on that station. There is no central control over resources. Usernames and passwords and access rights of shared files can be set up, but it is not a secure network. Client server This network is does not have stations with equal status. Basically a workstation is either a client or a server. A server is a computer that carries out various jobs across the network. A client is a computer that is connected to the network. A user works on this computer in order to carry out tasks on the network and access the servers. A user is allocated privileges that permit access to some of the resources on the servers and deny access to others. A user logs onto the server using a username and password. The server then authenticates (checks) that the user is authorised to use the network and sets appropriate access privileges. A network administrator or manager is usually responsible for setting up users and allocating their access rights. Network Type Advantages Disadvantages Peer-to-peer No need to pay for servers No or little network congestion due to smaller number of users Network can still function if any clients fail to work on the network No central storage of files Security across the network is poor since it is not centrally controlled Backups of network data is difficult since there is no central storage Each client on the network has equal rights Client server Backups of data stored on servers can be carried out regularly All shared files are stored on servers which means data is up to date and correct Security is controlled more easily due to the central storage of data and setting up of users access rights Servers can fail and hence stop data, applications etc. being shared across the network Servers are expensive to buy Due to the number of users network congestion is likely Higher Computing Systems - Networking Infosheet 5.3 Produced by S Lambert, R Simpson and HSDU for the City of Edinburgh Council, 2004
7 Network Topologies Networks can be arranged in different ways. The design of a network is called its topology. There are 5 main types of networking design. These are bus, star, ring, tree and mesh. How their topologies are arranged are shown below: Star Topology Tree Topology Ring Topology Bus Topology node link Mesh Topology Fully Connected Node (computers within the network) links or channels to connect nodes together Higher Computing Systems - Networking Infosheet 5.4 Produced by S Lambert, R Simpson and HSDU for The City of Edinburgh Council, 2004
8 Network Topologies Characteristics of Different Network Topologies The table below highlights some of the characteristics of different network topologies. Type Of Network Advantage Disadvantage Affect On Performance Mesh (WAN) Fault in one cable doesn t affect whole network. Data is rerouted. Lots of cabling required. Expensive. Excellent peformance. Tree (WAN) Multiple transmissions can occur at the same time. Local central nodes support cluster of outer nodes. This reduces the number of links to the central node. Lots of cabling required. Expensive. Excellent performance. Bus (LAN) Fault in one node does not affect the rest of the network. All nodes use the same line (backbone) and hence contention occurs. Instant access but high rate of data crashing. Very easy to expand. Cheap. Ring (LAN) Control system in charge of transmission. Nodes guaranteed access to transmission. Additional expense for control software and control system. Nodes may have to wait their turn to transmit data. Network rarely fails to data crashes. Star (LAN) Short path between two nodes. Fault in central node means whole network is unusable. Central node gives more robust network, but slows down communications between nodes as data always has to pass through central node. Higher Computing Systems - Networking Infosheet 5.4 Produced by S Lambert, R Simpson and HSDU for The City of Edinburgh Council, 2004
9 Network Hardware Certain hardware devices are necessary to enable a network to function properly. Network Interface Card (NIC) This is an expansion board that can be inserted into a computer so the computer can be connected to a network. Most NICs are designed for a particular type of network although some can serve multiple networks. A common NIC is an Ethernet card that allows a computer to be connected to an Ethernet network. Hub This is a common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. The function of a hub is simply to extend the distance between nodes on the network. Switch (switched hub) This device filters and forwards packets (parts of data) between LAN segments. A switch splits the network up into a number of different parts, usually to help avoid collisions within the network. These are called collision domains. A collision in one domain will have no effect on network traffic in another collision domain. Router This device forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP s network. Routers are located at gateways, the places where two or more networks connect. A router creates or maintains a table of all the available routes around the network and uses this table to determine the best route for any given packet of data. Bridge This device connects two local area networks, or two segments of the same LAN that use the same protocol (an agreed format for transmitting data between two devices), such as Ethernet. Sometimes LANs are divided up into smaller networks to reduce the traffic of data and avoid collisions. These separate networks can be connected using bridges. This enables the traffic of data to be localised to a smaller network and reduces the number of collisions. Repeater When data is send across a large distance within a network, the signal can deteriorate as the distance increases. This may cause data to be incomplete or corrupt when it arrives at the receiving node. Therefore the data is sent to an intermediate node (a repeater) which boosts the signal. Every packet that arrives at a repeater is retransmitted across the network. Higher Computing Systems Networking Infosheet 5.5 Produced by S Lambert, R Simpson and HSDU for The City of Edinmburgh Council, 2004
10 Widespread Use Of Networks The advantages of users having their computer systems networked, in particular, to the Internet, have encouraged a computer sales boom. Users can now invest and shop on-line, keep in touch with friends and relatives cheaply and frequently, enjoy multiplayer games, surf the vast resources of the Internet and so on. The main reasons for having networked computers are: simultaneous high speed Internet access using a single ISP account peripheral sharing sharing files and applications entertainment Due to user demand for on the spot information, most computer systems are now manufactured with network capabilities. It does not matter what the computer system may be, whether it be desktops, laptops, palmtops etc. The development of networks can be explained by many different factors including economic and social, however the most crucial is the technical factors that are involved. Some of the results of these technical developments are: advances in computer technology new data transmission media and techniques improved quality of networking software establishment of communications standards adoption of Internet technology. There have been many advances in computer hardware and software over the years that have allowed networking to be increasingly widespread within computer systems. Advances In Hardware Hardware prices have dropped, available network speeds have accelerated, and signal attenuation and noise problems have been addressed using low cost, high performance signal processing. The majority of computer systems have a typical system specification that can cope with most network functions. Computer systems can now process, store and deal with large amounts data very quickly. Even a low specification computer can now work as a server across a network. This is mainly due to advances in: q q q q processors (typically 2GHz and beyond) RAM (typically 1Gb and beyond) backing storage (hard disk capacity typically 40Gb) data transfer rates When networking first started only text data was processed across the network and the bandwidth didn t need to be very high. Today networks have to deal with all media types such as text, video, graphics, sound and animation. The bandwidth of a network has to be high in order to deal with this memory intense data. The table below shows three different networks and the typical bandwidth of each. Dial up Ethernet Wireless Speed 100 Kbps - 10 Mbps 10 Mbps Mbps 700 Kbps - 11 Mbps Higher Computing Systems - Networking Infosheet 5.6 Produced by S Lambert, R Simpson and HSDU for The City of Edinburgh Council, 2004
11 Widespread Use Of Networks Advances In Software Software prices have generally risen dramatically over the last 10 years. However the majority of computer systems are now equipped with system software that supports networking and have a variety of browsers installed. These items of software have improved dramatically over the years and support networking as standard. There have also been improvements in communications software and network operating systems. Typical networking software is: browsers (Internet Explorer and Netscape Communicator) These allow users to surf the Internet i.e. to locate and display Web pages. operating systems with networking functions (Windows XP, Mac OS X, UNIX) These stand alone operating systems can allow networking functions to be carried out. network operating systems (Windows Server, Mac OS X Server, Novell Netware) Typical tasks involve encryption of data, authenticating users, setting privileges and access rights etc. communications software This software controls networking cards, encodes and manages the flow of data. Although hardware and software capabilities have improved other aspects of networking need to be catered for. The need for higher bandwidth When networks were first introduced much of the information that had to be dealt with was textual or binary. Therefore the bandwidth required for file transfer was quite low. Nowadays most networks need to deal with larger non text files and so the file sizes become larger. Users really want to work with multimedia data so networks have to cope with not only text but still images, audio and video clips as well. The addition of more users on any network, for example on the Internet, causes the traffic within the network to increase substantially. Another example is if users are sending , these small packets add up quickly and require more bandwidth or the mail will be delayed. Also if the users are clients accessing servers, as on the World Wide Web, that also adds more traffic, especially if much of the traffic is graphics, video and audio. Wireless communications Wireless networks use electromagnetic airwaves, either infrared or radio to communicate information from one point to another without relying on any physical connection. Some wireless networks can be implemented using PCMCIA cards in notebook computers, PCI cards in desktop computers, or integrated within hand held computers. Adapters provide an interface between the client network operating system and the airwaves (via an antenna). In 1999, Apple sparked the wireless revolution with the introduction of AirPort, the first affordable and easy to use solution for accessing the Internet without restrictive cables. Apple s AirPort Express continues to advance wireless technology, delivering the first device to pack wireless networking, audio, printing and bridging capabilities into a single affordable, portable unit. Bluetooth is also a widely used technology to connect devices without wires. It provides short range connections between mobile devices and to the Internet via bridging devices to different networks (wired and wireless) that provide Internet capability. Wireless technologies allow more flexible use of applications and devices. With the number of mobile users continuing to increase, this flexibility is even important than ever. Higher Computing Systems - Networking Infosheet 5.6 Produced by S Lambert, R Simpson and HSDU for The City of Edinburgh Council, 2004
12 Misuse Of Networks Due to the nature of using large quantities of data across a network, it is important that this data is not abused. There are various ways that networks can be misused for illegal purposes. Breaching copyright This is when some users deliberately: o steal other people s intellectual property ; o use other people s computer based resources without their permission; o copy or use software that has not been paid for. The purposes of copyright are: to allow authors/creators of materials to control use of their work by other people; to allow creators to gain economically from their work, thereby encouraging creativity and developments which will benefit society as a whole; to give creators moral rights to be known as the author of their piece of work. Copyright is an important but confusing issue, particularly in relation to electronic and web-based material. The Internet for example is allowing more and more people to become authors and create and publish original pieces of work. It is also allowing easier and quicker exchange of information. However, this in turn has increased the opportunity for copyright breaching, either intentionally or otherwise. Hacking This is what happens when someone who breaks into someone else's computer system, bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. The end result is whatever is on the computer can viewed and sensitive data stolen without anyone knowing. Sometimes, tiny programs are 'planted' on the computer so that they can watch out for specific types of data, seize the data and then transmit the data to another computer. Planting Viruses Some network users deliberately install viruses on computer systems in the hope that they will cause havoc across a network. Viruses are developed with an intention to cause damage to computer files, or cause inconvenience or annoyance. The virus usually occupies the first few instructions of a program and starts when the user executes the program. When executed the virus runs in the first sequence and usually copies itself on the hard drive somewhere in the operating system code. The virus can then continue to run doing whatever damage it was written for. Some viruses lie dormant waiting for a trigger, some do a set of instructions each time the computer is running and these build up in time to e.g. filling up the available space on the hard drive, some will format the hard drive wiping all data. A logic bomb is a virus waiting to start executing given a certain trigger, or a failure to cancel. A computer system can catch a virus by launching an infected application or starting up your computer from a disk that has infected system files. Once a virus is in memory, it usually infects any application that is run, including network applications (if the user have write access to network folders or disks). For example, a virus may be designed to conceal itself until a predetermined date, then flash a message on all network computers. However, a properly configured network is less susceptible to viruses than a stand alone computer. Higher Computing Networking Infosheet 5.7 Produced by S Lambert for the City of Edinburgh Council, 2004
13 Misuse Of Networks There are various laws that have been passed to help prevent illegal use of networks. Computer Misuse Act Three specific computer misuses covered by the Computer Misuse Act of 1990 are: unauthorised access to computer programs or data, unauthorised access with a further criminal intent, unauthorised modification of computer material i.e. programs or data. Some of the crimes are: D deliberately planting viruses into a computer system to cause damage to program files and data; D using computer time to carry out unauthorised work; D copying computer programs; D hacking into someone s system with a view to seeing or altering the information.; D using a computer to commit various electronic frauds. Copyright Designs and Patents Act The Copyright, Designs and Patents Act of 1988, makes it illegal to: D copy software; D run pirated software; D transmit copyrighted software over a telecommunications line. Licences are bought from a software company in order to legally run software. There are limitations for multiple users and special licences have to be bought for running the software on a network. Data Protection Act The aim of the Data Protection Act 1998 is to protect the rights of the individual about whom data is obtained, stored, processed or supplied rather than those of the people or organisations who control and use personal data. The Act applies to both computerised and paper records. Data users have to notify the Office of the Information Commissioner of the information held and its uses. Across a network with many users, data users must ensure that they provide proper security. This could be done using: Secure rooms Making sure that servers containing sensitive data are under locked away in a secure area. A room that has no windows, secure doors, a burglar alarm and limited access to keys should be suitable. Usernames and passwords If an unauthorised person does break into the building and any secure area it would be useful if the network will only accept authorised users. i.e. users who are known to the system and given limited access. This can be done by giving authorised users identification names and passwords. Higher Computing Networking Infosheet 5.7 Produced by S Lambert for the City of Edinburgh Council, 2004
Networks. The two main network types are: Peer networks
Networks Networking is all about sharing information and resources. Computers connected to a network can avail of many facilities not available to standalone computers: Share a printer or a plotter among
NETWORKING TECHNOLOGIES
NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.
Chapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
Local-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help
Future Stars Grade X Manual Chapter 1 Networking and Telecommunication 1. Answer the following questions. a. What is telecommunication? Ans: The transfer of information at a far distance is known as telecommunication.
Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.
Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs
CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK
CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK DEFINTION & APPLICATIONS DEFINTION: A computer network is defined as the interconnection of two or more computers. It is done
Network Design. Yiannos Mylonas
Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which
Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.
Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:
1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
Networking. Topic 5. Contents
97 Topic 5 Networking Contents 5.1 Introduction...................................... 99 5.2 Networks....................................... 99 5.2.1 The development of networks........................
Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,
Acceptable Use Policy (AUP): Policy which provides rules governing use of district technology.
Glossary Acceptable Use Policy (AUP): Policy which provides rules governing use of district technology. Access Fees: Fee charged to user for usage of services. Application: A program written to perform
Networking Basics. Uses of a network
Networking Basics Data communications the electronic transfer of information between computers. This has become a major focus of the computer industry especially since the rapid growth of the internet.
Chapter 9 Communications and Networks
Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Explain the purpose of communications
Discovering Computers 2008. Chapter 9 Communications and Networks
Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices
ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: [email protected] Local Area Network LANs connect computers and peripheral
COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES
COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES Answers to End-of-Chapter Questions Matching g 1. router o 2. node i 3. ring l 4. hub c 5. star n 6. backbone b 7. latency
Computer Networking: A Survey
Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer
Chapter 4 Connecting to the Internet through an ISP
Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No
Introduction to Computer
PDHonline Course E175 (8 PDH) Introduction to Computer Instructor: Dale W. Callahan, Ph.D., P.E. and Lea B. Callahan, P.E. 2012 PDH Online PDH Center 5272 Meadow Estates Drive Fairfax, VA 22030-6658 Phone
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION
CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two
Networking Devices. Lesson 6
Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and
Telecommunications, Networks, and Wireless Computing
Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.
Page 1 of 7. Computer Networking
Page 1 of 7 Computer Networking 7.1 What Is Computer Networking? A computer network consists of several computers that are connected to one another using devices that allow them to communicate. Computer
Student Halls Network. Connection Guide
Student Halls Network Connection Guide Contents: Page 3 Page 4 Page 6 Page 10 Page 17 Page 18 Page 19 Page 20 Introduction Network Connection Policy Connecting to the Student Halls Network Connecting to
Introduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the
A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and
NETWORK By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: [email protected] Network A network is a group of devices (Nodes) connected by media
Chapter 1 Instructor Version
Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic
Technical Glossary from Frontier
Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to
For the purpose of setting up a home network, all you need to worry about are two major categories of components:
Access Points, Routers, and Hubs In the first lesson, you learned about the world of wireless standards -- what frequencies are used, distances involved, and other general topics. In this lesson, you learn
2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
Computer Networking. Definitions. Introduction
Computer Networking Definitions DHCP Dynamic Host Configuration Protocol It assigns IP addresses to client devices, such as desktop computers, laptops, and phones, when they are plugged into Ethernet or
Network Topologies. Network Topologies
Network Topologies LANs and WANs - Geographical coverage LANs A single geographical location, such as office building, school, etc Typically High speed and cheaper. WANs Spans more than one geographical
Glossary of Telco Terms
Glossary of Telco Terms Access Generally refers to the connection between your business and the public phone network, or between your business and another dedicated location. A large portion of your business
Introduction To Computer Networks
Introduction To Computer Networks 1. LAN s and WAN s 2. Some network and internetwork components 3. The communication process 4. Communication media 5. Topologies 6. Communication models and Standards
Chapter 12 Homework CIT 105 - J001/02/04/06. Name: Date: Course: Test:
1. Which of the following is an advantage of installing a client/server network in a business? a. decentralization of peripherals b. centralization of network security protection c. decentralization of
Local Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006
Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which
Cabling LANs and WANs
Cabling LANs and WANs CCNA 1 v3 Module 5 10/11/2005 NESCOT CATC 1 Cabling the LAN Each media has advantages and disadvantages: Cable length Cost Ease of installation Susceptibility to interference The
Using High Availability Technologies Lesson 12
Using High Availability Technologies Lesson 12 Skills Matrix Technology Skill Objective Domain Objective # Using Virtualization Configure Windows Server Hyper-V and virtual machines 1.3 What Is High Availability?
Agenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
5 Data Communication and Networking
5 Data Communication and Networking 5.1 Introduction Today computer is available in many offices and homes and therefore there is a need to share data and programs among various computers. With the advancement
Computer Networks. Computer Networks. Telecommunication Links. Connecting. Connecting via Telephone Lines ISDN
Chapter 12 Topics: Communication links LAN / WAN Internet / WWW A computer network is a set of independent computer systems interconnected by telecommunication links. CMPUT101 Introduction to Computing
Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features
Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing
Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547
Unit title: Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547 UNIT AIM AND PURPOSE Learners will gain an understanding
Computer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
DSL-2600U. User Manual V 1.0
DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS
Chapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
Overview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
Gorilla CRM System Requirements
Gorilla CRM System Requirements A Supplement to the Bill Good Marketing System Proposal Bill Good Marketing System April 2010 White Paper Bill Good, Chairman of Bill Good Marketing, Inc. 1 PREFACE This
BASICS OF DATA COMMUNICATION AND COMPUTER NETWORKING
Basics of Data Communication and Computer Networking :: 33 2 BASICS OF DATA COMMUNICATION AND COMPUTER NETWORKING 2.1 INTRODUCTION Computers are used to generate information. Generated information is not
Information Technology Services
Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT
The part of the network that connects customers to the exchange, sometimes called the local loop or the last mile.
Glossary of broadband terms 3G: Refers to the third generation of mobile phone technology following on from 2G. 3G allows for faster access to the internet and allows services including video calls and
High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF
High Speed Ethernet Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF Hubs and Switches Hubs and Switches Shared Medium Hub The total capacity in the shared medium hub configuration (figure
Region 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
Computer Network and Communication
2 Computer Network and Communication 2.1 INTRODUCTION As we all know, the advances in Information technology revolutionized almost every aspect of our life. Education, industry, banking, researches and
Hello and welcome. If you have any questions about the service, check out our fibre optic broadband support pages: www.plus.
Print out and keep safe Hello and welcome We really hope you ll enjoy using Plusnet and being part of our community. This guide will help you get your fibre optic broadband set up. It ll also show you
Component 4: Introduction to Information and Computer Science
Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking Lecture 1 This material was developed by Oregon Health & Science University, funded by the Department of Health
VIRGIN BROADBAND BROADBAND SERVICES DESCRIPTION 1 ABOUT THIS SERVICE DESCRIPTION... 3 2 HOW WILL WE NOTIFY YOU OF CHANGES TO THE AGREEMENT?.
VIRGIN BROADBAND BROADBAND SERVICES DESCRIPTION Click on the page number of the section that you are interested in 1 ABOUT THIS SERVICE DESCRIPTION... 3 2 HOW WILL WE NOTIFY YOU OF CHANGES TO THE AGREEMENT?.
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information
Data communications Think! Think!?? What makes it possible to communicate from point A to point B?? Long-Distance Transmission Media If you place a call outside the local transport area, an interchange
Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition
Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts
Introduction to computer networks and Cloud Computing
Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
ClearOS Network, Gateway, Server Quick Start Guide
ClearOS Network, Gateway, Server Quick Start Guide Welcome ClearOS is computer Operating System (OS) that provides enterprise-level network security and application services to the Small/Medium-sized Business
R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
Wired & Wireless LAN Connections
Lecture 5 Wired & Wireless LAN Connections Network Interface Card (NIC) Ethernet Wiring - Thick Ethernet - Thin Ethernet - Star (Hub) Ethernet Extending LAN - Fiber Modem - Repeater - Bridge - Switch Short
Computer Networks and Internet working
Computer Networks and Internet working By completing this module you will be able to understand and learn the following: Computer Networking, Types of Networks and network Services Different Cables used
Telecommunications, the Internet, and Wireless Technology
Chapter 6 Telecommunications, the Internet, and Wireless Technology 6.1 Copyright 2011 Pearson Education, Inc. STUDENT LEARNING OBJECTIVES What are the principal components of telecommunications networks
IST101 - Test 6 Ch 7,12 Test 6 consists of 50 questions drawn from the following:
Test 6 consists of 50 questions drawn from the following: Mercer County Community College, Computer Concepts, Test 6 Covers Chapters 7, 12, and Careers for IST101, IST102, and IST103 (all sections) 1.
DATA COMMUNICATION AND NETWORKS
DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone
Contents. Section A Networking Basics... 1. 1 Learning the Basics... 3. Section B Wired Ethernet Networking... 17
Contents Section A Networking Basics...................................... 1 1 Learning the Basics............................................. 3 Selecting a network connection........................................
Computer Networking Type A: Very Short Answer Questions
Computer Networking Type A: Very Short Answer Questions 1. Define a network. What is its need? Ans: A computer network is a system in which computers are connected to share information and resources. Computer
Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
Guide for wireless environments
Sanako Study Guide for wireless environments 1 Contents Sanako Study... 1 Guide for wireless environments... 1 What will you find in this guide?... 3 General... 3 Disclaimer... 3 Requirements in brief...
Cisco Network Performance Evaluation Using Packet Tracer
Cisco Network Performance Evaluation Using Packet Tracer doi: 10.17932/ IAU.IJEMME.m.21460604.2015.5/1.905-911 Muhammet Emin KAMİLOĞLU 1 Abstract In this study, a wide area network designed and simulated.
CMPT 165: The Internet, Part 3
CMPT 165: The Internet, Part 3 Tamara Smyth, [email protected] School of Computing Science, Simon Fraser University September 15, 2011 1 Basic Communication Technology Packet Switching (sharing a tranmission
Higher Computing Networking 1
Networking Briefly state what is meant by a computer network. What does the term topology refer to in this context? What are the ideal goals a network designer should aim for? Compare and contrast a star
What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals
What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server
Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).
1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).
Introduction to Ethernet
Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and
Planeamento e Gestão de Redes. Análise de Requisitos
Planeamento 1 Planeamento e Gestão de Redes Análise de Requisitos Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Planeamento 2 Book Top-Down Network Design, Second Edition Priscilla
C20.0001 Information Systems for Managers Fall 1999
New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in
How To Get High Speed Internet In Australia
ADSL vs Cable Cable subscribers are connected directly to high speed lines while ADSL subscribers are connected directly to medium speed lines Cable subscribers share the line connecting them to neighbourhood
NETWORK AND INTERNET SECURITY POLICY STATEMENT
TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB NETWORK AND INTERNET SECURITY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004
FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts
Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their
National Unit Specification: general information. UNIT Computing: Computer Networking Fundamentals (SCQF level 5) CODE F1KH 11 SUMMARY OUTCOMES
National Unit Specification: general information CODE F1KH 11 SUMMARY The overall aim of this Unit is to enable candidates to set-up a small computer network. Candidates will also be required to apply
Learning Objectives. Chapter 1: Networking with Microsoft Windows 2000 Server. Basic Network Concepts. Learning Objectives (continued)
Chapter 1: Networking with Microsoft Learning Objectives Plan what network model to apply to your network Compare the differences between Windows 2000 Professional, Server, Advanced Server, and Datacenter
Data Transmission. Data Communications Model. CSE 3461 / 5461: Computer Networking & Internet Technologies. Presentation B
CSE 3461 / 5461: Computer Networking & Internet Technologies Data Transmission Presentation B Kannan Srinivasan 08/30/2012 Data Communications Model Figure 1.2 Studying Assignment: 3.1-3.4, 4.1 Presentation
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Things You Must Know About Gigabit Ethernet 1. Understanding Gigabit Ethernet
Things You Must Know About Gigabit Ethernet 1. Understanding Gigabit Ethernet Today s network managers know that modern demands on a network by its users can shrink bandwidth dramatically. Faster computers,
2 Setting Up the Hardware for a Wired Ethernet Network... 13. 3 Setting Up the Software for an Ethernet Network... 21
Contents 1 Networking Basics............................................... 1 Selecting a network connection........................................ 2 Wired Ethernet network...........................................
