SlideShare a Scribd company logo
1 of 18
KINDS OF NETWORKS

Peer-to-Peer Networks

In a peer-to-peer network, there are no dedicated servers, and there is
no hierarchy among the computers. All the computers are equal and
therefore are known as peers. Each computer functions as both a client
and a server.

And there is no administrator responsible for the entire network. The user
at each computer determines what data on that computer is shared on
the network. Below figure shows a peer-to-peer network in which each
computer functions as both a client and a server.




Computers in a peer-to-peer network are called peers. In a peer-to-peer
network, all computers are considered equal; they all have the same
abilities to use the resources available on the network. Each computer can
function both as a client and a server. Computers are not dedicated to
function as servers. They use the network to share resources among the
independent peers. The computer whose applications are required by the
other networked computers functions as a server. The other computers
function as clients. Therefore, a dedicated administrator is not assigned
for network management.

A peer-to-peer network is a small group of people using a network. Peer-
to-peer networks members usually perform similar tasks, which
necessitates the sharing of resources. The peer-to-peer networks support
10 computers. The users in a peer-to-peer network are located in the
same geographical area. Operating systems, such as Microsoft Windows
98 or Microsoft Windows XP, can be used to set up a peer-to-peer
network. Additional software is not required because peer-to-peer
networking is built into the systems.

Another important point of peer-to-peer networks is that the users of
each computer plan and control the security of their resources. The users
determine the resources on their computers, which can be shared on the
network. The shared network resources, such as disk space, printers or
faxes, can be used by anyone who has access to the network. This is
possible only if the shared network resources are not password protected.
Peer-to-peer networks have weak and intrusive security because a central
server is not used to administer and secure the network. In addition,
some users may not implement security.

A peer-to-peer network does not support a central login process. This
implies that a user who logs on to one peer can access any shared
network resource, which is not controlled by a specific password. Peer-to-
peer networks are relatively simple. Because each computer functions as
a client and a server, there is no need for a powerful central server or for
the other components required for a high-capacity network. Peer-to-peer
networks can be less expensive than server-based networks.

Peer-to-peer networks are simple and inexpensive to install and maintain.
The cost of implementing peer-to-peer networks is low because a central
server is not used to administer the network. In addition, the components
for a high-capacity network are not required in a peer-to-peer network.

In a peer-to-peer network, the users handle administration. This means
that all the users need to be trained in how to share files, folders, and
printers. In a peer-to-peer network, suddenly shutting down your
computer can cause one of your colleagues to be unable to print.

Peer-to-peer networks are appropriate for environments where all the
users are located in the same geographical area and the network security
is not an important factor. In addition, these networks are useful when
the network expansion is limited.

Advantages of a peer-to-peer network:

      Less initial expense - No need for a dedicated server.
      Setup - An operating system (such as Windows XP) already in place
      may only need to be reconfigured for peer-to-peer operations.

Disadvantages of a peer-to-peer network:

      Decentralized - No Centralized server.
      Security - Does not provide the security available on a peer-to-peer
      network.
Server Based Networks

A dedicated server is one that functions only as a server and is not used
as a client or workstation. Server based networks (see below Figure) have
become the standard models for networking.




In a server-based network, clients rely on the services that the server
provides, such as file storing and printing. Client computers are generally
less powerful than server computers.

A server-based network using network operating system is that the
networks are organized into domains. A domain is a collection of networks
and clients that share security information. Domain security and logon
permissions are controlled by special servers called domain controllers.
Users cannot access the resources of servers in a domain until a domain
controller has authenticated them.

In server-based networks, a network administrator centrally manages the
resource security. The administrator defines and manages user access to
network resources.

Another beneficial of server-based networks is central file storage.
Server-based networks provide easy backup of critical data. Data backup
is another useful characteristic of server based networks.

Server based networks can support a larger number of users than peer-
to-peer networks. To support a large number of users, server-based
networks use monitoring and network management tools. Servers must
perform varied and complex tasks. (See below figure)
Security is often the primary reason for choosing a server-based approach
to networking. In a server-based environment, one administrator who
sets the policy and applies it to every user on the network can manage
security. (see below figure)




Advantages of a client/server network

     Centralized - Resources and data security are controlled through the
     server.
     Security - More security then Peer-to-peer network.
     Flexibility - New technology can be easily integrated into system.
     Interoperability - All components (client /server) work together.
     Accessibility - Server can be accessed remotely and across multiple
     platforms.
Disadvantages of a client/server network

       Expense - Requires initial investment in dedicated server.
       Maintenance - Large networks will require a staff to ensure efficient
       operation.
       Dependence - When server goes down, operations will cease across
       the network.



A LAN is a network with two or more computers connected to each other in a single location

Wired Local Area Network (LAN)

It is the simplest type of network in which computers are connected to
each other by cables.




Each of the computers on the LAN is also called a node .

A LAN is characterized by three primary attributes:

       Topology

The topology is the pattern used to connect the computers together. With
a bus topology, a network cable connects each computer to the next one,
forming a chain. With a star topology, each of the computers is connected
to a central nexus called a hub/Switch. A ring topology is essentially a bus
network with the two ends joined together. (You will see more about
network topologies in Chapter 6)

       Medium
Four basic types of media are used in local-area networks; coaxial cable,
twisted-pair wires, fiber-optic cable, And wireless.

Each medium has its advantages and disadvantages relative to cost,
speed, and expandability. Coaxial cables provide high speed and low error
rates. Twisted-pair wires are cheaper than coaxial cables, can sustain the
speeds common to most personal computers, and are easy to install.
Fiber-optic cable is the medium of choice for high-speed local-area
networks. Wireless local-area networks have the advantage of
expandability. (You will see more about network medium in Chapter 5.2)

      Protocols

The topology and the medium used on a particular network are specified
by the protocol. (You will see more about protocol in Chapter 8).

LAN computer networks that usually cover a limited range, say, within the
boundary of a building. A LAN computer network is two or more
computers that communicate with each other through some medium.

The primary usage of local-area networks (LANs) is the sharing of
hardware, software, or information, such as data files, multimedia files, or
electronic mail. Resource sharing provided by local-area networks
improves efficiency and reduces overhead.

There are a number of ways in which nodes can communicate over a
network. The simplest is to establish a dedicated link between the
transmitting and receiving stations. This technique is known as circuit
switching. A better way of communicating is to use a technique known as
packet switching, in which a dedicated path is not reserved between the
source and the destination. Data are wrapped up in a packet and
launched into the network. In this way, a node only has exclusive access
to the medium while it is sending a packet. During its inactive period,
other nodes can transmit. A typical packet is divided into preamble,
address, control, data, and error-check fields.

The computers in a LAN are connected by using cables. This method
cannot be used to connect computers that are in different locations, for
example, in buildings across a town or city. Therefore, a LAN is not
suitable for large businesses with offices in several locations.

Wireless Local Area Network

The term wireless networking refers to technology that enables two or
more computers to communicate using standard network protocols, but
without network cabling.
Peer-to-peer wireless network consists of a number of computers each
equipped with a wireless networking interface card. Each computer can
communicate directly with all of the other wireless enabled computers.
They can share files and printers this way, but may not be able to access
wired LAN resources, unless one of the computers acts as a bridge to the
wired LAN using special software.




A wireless network can also use an access point, or base station. In this
type of network the access point acts like a hub, providing connectivity for
the wireless computers. It can connect the wireless LAN to a wired LAN,
allowing wireless computer access to LAN resources, such as file servers
or existing Internet Connectivity.

There are two types of access points:

      Hardware access points (HAP)

Hardware access points offer complete support of most wireless features,
but check your requirements carefully.




      Software Access Points
Software Access Points which run on a computer equipped with a wireless
network interface card as used in peer-to-peer wireless network. The
software routers that can be used as a basic Software Access Point, and
include features not commonly found in hardware solutions.




Connected wireless LAN to wired LAN

To do this you will need some sort of bridge between the wireless and
wired network. This can be accomplished either with a hardware access
point or a software access point.

Hardware access points are available with various types of network
interfaces, such as Ethernet or Token Ring, but typically require extra
hardware to be purchased if you're networking requirements change. If
networking requirements go beyond just interconnecting a wired network
to a small wireless network, a software access point may be the best
solution.

A software access point does not limit the type or number of network
interfaces you use. It may also allow considerable flexibility in providing
access to different network types, such as different types of Ethernet,
Wireless and Token Ring networks. Such connections are only limited by
the number of slots or interfaces in the computer used for this task.
Further to this the software access point may include significant additional
features such as shared Internet access, web caching or content filtering,
providing significant benefits to users and administrators.

Wireless networking offers a cost-effective solution to users with difficult
physical installations such as campuses, hospitals or businesses with
more than one location in immediate proximity but separated by public
thoroughfare.

This type of installation requires two access points. Each access point acts
as a bridge or router connecting its own LAN to the wireless connection.
The wireless connection allows the two access points to communicate with
each other, and therefore interconnect the two LAN's.




Wireless network range

Each access point has a finite range within which a wireless connection
can be maintained between the client computer and the access point. The
actual distance varies depending upon the environment; manufacturers
typically state both indoor and outdoor ranges to give a reasonable
indication of reliable performance. Also it should be noted that when
operating at the limits of range the performance may drop, as the quality
of connection deteriorates and the system compensates.

Typical indoor ranges are 150-300 feet, but can be shorter if the building
construction interferes with radio transmissions. Longer ranges are
possible, but performance will degrade with distance. Outdoor ranges are
quoted up to 1000 feet, but again this depends upon the environment.

There are ways to extend the basic operating range of Wireless
communications, by using more than a single access point or using a
wireless relay /extension point. Multiple access points can be connected to
a wired LAN, or sometimes even to a second wireless LAN if the access
point supports this.

In most cases, separate access points are interconnected via a wired LAN,
providing wireless connectivity in specific areas such as offices or rooms,
but connected to a main wired LAN for access to network resources, such
as file servers.
If a single area is too large to be covered by a single access point, then
multiple access points or extension points can be used. Note that an
"extension point" is not defined in the wireless standard, but have been
developed by some manufacturers.

When using multiple access points, each access point wireless area should
overlap its neighbors. This provides a seamless area for users to move
around in using a feature called "roaming.” See Roaming for further
information.

Some manufacturers produce extension points, which act as wireless
relays, extending the range of a single access point. Multiple extension
points can be strung together to provide wireless access to far away
locations from the central access point.
Roaming

A wireless computer can "roam" from one access point to another, with
the software and hardware maintaining a steady network connection by
monitoring the signal strength from in-range access points and locking on
to the one with the best quality.

Usually this is completely transparent to the user; they are not aware that
a different access point is being used from area to area. Some access
point configurations require security authentication when swapping access
points, usually in the form of a password dialog box.

Access points are required to have overlapping wireless areas to achieve
this as can be seen in the following diagram.
A user can move from Area 1 to Area 2 transparently. The Wireless
networking hardware automatically swaps to the Access Point with the
best signal.

Sharing an internet connection in wireless network

To share an Internet connection across a LAN you need two things:

     an Internet sharing hardware device or software program
     a LAN

If your LAN is wireless. You need hardware or software access point and a
wireless LAN. Any computer equipped with a wireless network card
running suitable Internet sharing software can be used as a software
access point. A number of vendors offer hardware access points.




A hardware access point may provide Internet Sharing capabilities to
Wired LAN computers, but does not usually provide much flexibility
beyond very simple configurations.




If an existing wired LAN already has an Internet connection, then the
hardware access points simply connect to LAN and allow wireless
computers to access the existing Internet connection in the same way as
wired LAN computers.
Wireless Network security

Wireless communications obviously provide potential security issues, as
an intruder does not need physical access to the traditional wired network
in order to gain access to data communications. However, 802.11 wireless
communications cannot be received much less decoded by simple
scanners, short wave receivers etc. This has led to the common
misconception that wireless communications cannot be eavesdropped at
all. However, eavesdropping is possible using specialist equipment.

To protect against any potential security issues, 802.11 wireless
communications have a function called WEP (Wired Equivalent Privacy), a
form of encryption which provides privacy comparable to that of a
traditional wired network. If the wireless network has information that
should be secure then WEP should be used, ensuring the data is protected
at traditional wired network levels.

IEEE 802.11

Wireless networking hardware requires the use of underlying technology
that deals with radio frequencies as well as data transmission. The most
widely used standard is 802.11 produced by the Institute of Electrical and
Electronic Engineers (IEEE). This is a standard defining all aspects of
Radio Frequency Wireless networking.

Also it should be noted that traditional Virtual Private Networking (VPN)
techniques will work over wireless networks in the same way as
traditional wired networks.
Wide Area Network (WAN)

A wide area network (WAN) is a telecommunications network, usually
used for connecting computers, that spans a wide geographical area.
WANs can by used to connect cities, states, or even countries.

An example of a WAN connection would be a company with two offices in
distant cities, each with its own LAN and connected by a leased telephone
line. This type of WAN is illustrated in below figure. Each end of the
leased line is connected to a router and the routers are connected to
individual LANs. Any computer on either of the LANs can communicate
with any one of the other computers at the other end of the WAN link or
with a computer on its own LAN.




WANs are often used by larger corporations or organizations to facilitate
the exchange of data and in a wide variety of industries, corporations with
facilities at multiple locations have embraced WANs. Increasingly,
however, even small businesses are utilizing WANs as a way of increasing
their communications capabilities.

Although WANs serve a purpose similar to that of local area networks
(LANs), WANs are structured and operated quite differently. The user of a
WAN usually does not own the communications lines that connect the
remote computer systems; instead, the user subscribes to a service
through a telecommunications provider. Unlike LANs, WANs typically do
not link individual computers, but rather are used to link LANs. WANs also
transmit data at slower speeds than LANs.

WANs have existed for decades, but new technologies, services, and
applications have developed over the years to dramatically increase their
efficacy for business. WANs were originally developed for digital leased-
line services carrying only voice, rather than data. As such, they
connected the private branch exchanges (PBXs) of remote offices of the
same company. WANs are still used for voice services, but today they are
used more frequently for data and image transmission (such as video
conferencing). These added applications have spurred significant growth
in WAN usage, primarily because of the surge in LAN connections to the
wider networks.

WANs are either point-to-point, involving a direct connection between two
sites, or operate across packet-switched networks, in which data is
transmitted in packets over shared circuits. Point-to-point WAN service
may involve either analog dial-up lines, in which a modem is used to
connect the computer to the telephone line, or dedicated leased digital
telephone lines, also known as "private lines." Analog lines, which may be
either part of a public-switched telephone network or leased lines, are
suitable for batch data transmissions, such as congruent order entry and
point-of-sale transactions. Dedicated digital phone lines permit
uninterrupted, secure data transmission at fixed costs.

Point-to-point WAN service providers include both local telephone
companies and long distance carriers. Packet-switched network services
are typically chosen by organizations which have low volumes of data or
numerous sites, for which multiple dedicated lines would be too
expensive.

Depending on the service, WANs can be used for almost any data sharing
purpose for which LANs can be used. Slower transmission speeds,
however, may make some applications less practical for WANs. The most
basic uses of WANs are for electronic mail and file transfer, but WANs can
also permit users at remote sites to access and enter data on a central
site's database, such as instantaneously updating accounting records.

New types of network-based software that facilitate productivity and
production tracking, such as groupware and work-flow automation
software, can also be used over WANs. Using groupware, workers at
dispersed locations can more easily collaborate on projects. WANs also
give remote offices access to a central office's other data communications
services, including the Internet.



Wireless Fidelity Wi-Fi
A typical Wi-Fi setup contains one or more Access Points (APs) and one or
more clients. An AP broadcasts its SSID (Service Set Identifier, "Network
name") via packets that are called beacons, which are usually broadcast
every 100 ms. The beacons are transmitted at 1 Mbit/s, and are of
relatively short duration and therefore do not have a significant effect on
performance. Since 1 Mbit/s is the lowest rate of Wi-Fi it assures that the
client who receives the beacon can communicate at least 1 Mbit/s. Based
on the settings (e.g. the SSID), the client may decide whether to connect
to an AP. If two APs of the same SSID are in range of the client, the client
firmware might use signal strength to decide which of the two APs to
make a connection to.

The Wi-Fi standard leaves connection criteria and roaming totally open to
the client. This is a strength of Wi-Fi, but also means that one wireless
adapter may perform substantially better than the other. Since Wi-Fi
transmits in the air, it has the same properties as a non-switched
ethernet network.

Wi-Fi Devices

Wireless Access Point (WAP)

A wireless access point (AP) connects a group of wireless stations to an
adjacent wired local area network (LAN). An access point is similar to an
ethernet hub or switch, but instead of relaying LAN data only to other LAN
stations, an access point can relay wireless data to all other compatible
wireless devices as well as to a single (usually) connected LAN device, in
most cases an ethernet hub or switch, allowing wireless devices to
communicate with any other device on the LAN.

Wireless Routers

A wireless router integrates a wireless access point with an IP router and
an ethernetswitch . The integrated switch connects the integrated access
point and the integrated ethernet router internally, and allows for external
wired ethernet LAN devices to be connected as well as a (usually) single
WAN device such as cable modem or DSL modem . A wireless router
advantageously allows all three devices (mainly the access point and
router) to be configured through one central configuration utility, usually
through an integrated web server .

Wireless Ethernet Bridge

A wireless Ethernet bridge connects a wired network to a wireless
network. This is different from an access point in the sense that an access
point connects wireless devices to a wired network at the data-link layer .
Two wireless bridges may be used to connect two wired networks over a
wireless link, useful in situations where a wired connection may be
unavailable, such as between two separate homes.

Advantages of Wi-Fi

     Allows LANs to be deployed without cabling, typically reducing the costs of
     network deployment and expansion. Spaces where cables cannot be run,
     such as outdoor areas and historical buildings, can host wireless LANs.

     Wi-Fi silicon pricing continues to come down, making Wi-Fi a very
     economical networking option and driving inclusion of Wi-Fi in an ever-
     widening array of devices.

     Wi-Fi products are widely available in the market. Different brands of
     access points and client network interfaces are interoperable at a basic
     level of service. Products designated as Wi-Fi CERTIFIED by the Wi-Fi
     Alliance are interoperable and include WPA2 security.

     Wi-Fi networks support roaming, in which a mobile client station such as a
     laptop computer can move from one access point to another as the user
     moves around a building or area.

     Wi-Fi networks support roaming, in which a mobile client station such as a
     laptop computer can move from one access point to another as the user
     moves around a building or area.

     Wi-Fi is a global set of standards. Unlike cellular carriers, the same Wi-Fi
     client works in different countries around the world.

Disadvantages of Wi-Fi

     Wi-Fi can be interrupted by other devices, notably 2.4 GHz cordless
     phones and microwave ovens.

     Power consumption is fairly high compared to some other standards,
     making battery life and heat a concern.

     The most common wireless encryption standard, Wired Equivalent Privacy
     or WEP, has been shown to be breakable even when correctly configured.

     Wi-Fi Access Points typically default to an open ( encryption -free) mode.
     Novice users benefit from a zero configuration device that works out of
     the box but might not intend to provide open wireless access to their LAN.

     Wi-Fi networks have limited range. A typical Wi-Fi home router using
     802.11b or 802.11g with a stock antenna might have a range of 45 m
     (150 ft) indoors and 90 m (300 ft) outdoors. Range also varies with
     frequency band, as Wi-Fi is no exception to the physics of radio wave
     propagation. Wi-Fi in the 2.4 GHz frequency block has better range than
     Wi-Fi in the 5 GHz frequency block, and less range than the oldest Wi-Fi
(and pre-Wi-Fi) 900 MHz block. Outdoor range with improved antennas
can be several kilometres or more with line-of-sight.

Wi-Fi networks can be monitored and used to read and copy data
(including personal information) transmitted over the network when no
encryption such as VPN is used.

More Related Content

What's hot

DBMS & Data Models - In Introduction
DBMS & Data Models - In IntroductionDBMS & Data Models - In Introduction
DBMS & Data Models - In IntroductionRajeev Srivastava
 
Technical Note on DBMS
Technical Note on DBMSTechnical Note on DBMS
Technical Note on DBMSKr Shrishant
 
Kskv kutch university DBMS unit 1 basic concepts, data,information,database,...
Kskv kutch university DBMS unit 1  basic concepts, data,information,database,...Kskv kutch university DBMS unit 1  basic concepts, data,information,database,...
Kskv kutch university DBMS unit 1 basic concepts, data,information,database,...Dipen Parmar
 
Dbms classification according to data models
Dbms classification according to data modelsDbms classification according to data models
Dbms classification according to data modelsABDUL KHALIQ
 
Dbms Concepts
Dbms ConceptsDbms Concepts
Dbms Conceptsadukkas
 
data abstraction in DBMS
data abstraction in DBMSdata abstraction in DBMS
data abstraction in DBMSBHARATH KUMAR
 
Week 3 Classification of Database Management Systems & Data Modeling
Week 3 Classification of Database Management Systems & Data ModelingWeek 3 Classification of Database Management Systems & Data Modeling
Week 3 Classification of Database Management Systems & Data Modelingoudesign
 
Introduction to Database Management Systems (DBMS)
Introduction to Database Management Systems (DBMS)Introduction to Database Management Systems (DBMS)
Introduction to Database Management Systems (DBMS)Vijayananda Ratnam Ch
 
Introduction to Database Management System
Introduction to Database Management SystemIntroduction to Database Management System
Introduction to Database Management SystemAmiya9439793168
 
Adbms 28 components of distributed database system
Adbms 28 components of distributed database systemAdbms 28 components of distributed database system
Adbms 28 components of distributed database systemVaibhav Khanna
 
Database introduction
Database introductionDatabase introduction
Database introductionHarry Potter
 
Database management system presentation
Database management system presentationDatabase management system presentation
Database management system presentationsameerraaj
 
DBMS languages/ Types of SQL Commands
DBMS languages/ Types of SQL CommandsDBMS languages/ Types of SQL Commands
DBMS languages/ Types of SQL CommandsBHARATH KUMAR
 
Lecture 01 introduction to database
Lecture 01 introduction to databaseLecture 01 introduction to database
Lecture 01 introduction to databaseemailharmeet
 
Complete dbms notes
Complete dbms notesComplete dbms notes
Complete dbms notesTanya Makkar
 

What's hot (20)

DBMS & Data Models - In Introduction
DBMS & Data Models - In IntroductionDBMS & Data Models - In Introduction
DBMS & Data Models - In Introduction
 
Technical Note on DBMS
Technical Note on DBMSTechnical Note on DBMS
Technical Note on DBMS
 
Kskv kutch university DBMS unit 1 basic concepts, data,information,database,...
Kskv kutch university DBMS unit 1  basic concepts, data,information,database,...Kskv kutch university DBMS unit 1  basic concepts, data,information,database,...
Kskv kutch university DBMS unit 1 basic concepts, data,information,database,...
 
Dbms classification according to data models
Dbms classification according to data modelsDbms classification according to data models
Dbms classification according to data models
 
Data Models
Data ModelsData Models
Data Models
 
Dbms Concepts
Dbms ConceptsDbms Concepts
Dbms Concepts
 
data abstraction in DBMS
data abstraction in DBMSdata abstraction in DBMS
data abstraction in DBMS
 
Week 3 Classification of Database Management Systems & Data Modeling
Week 3 Classification of Database Management Systems & Data ModelingWeek 3 Classification of Database Management Systems & Data Modeling
Week 3 Classification of Database Management Systems & Data Modeling
 
Types of databases
Types of databases   Types of databases
Types of databases
 
Introduction to Database Management Systems (DBMS)
Introduction to Database Management Systems (DBMS)Introduction to Database Management Systems (DBMS)
Introduction to Database Management Systems (DBMS)
 
Introduction to Database Management System
Introduction to Database Management SystemIntroduction to Database Management System
Introduction to Database Management System
 
RDBMS.ppt
RDBMS.pptRDBMS.ppt
RDBMS.ppt
 
Adbms 28 components of distributed database system
Adbms 28 components of distributed database systemAdbms 28 components of distributed database system
Adbms 28 components of distributed database system
 
Database introduction
Database introductionDatabase introduction
Database introduction
 
Database management system presentation
Database management system presentationDatabase management system presentation
Database management system presentation
 
DBMS languages/ Types of SQL Commands
DBMS languages/ Types of SQL CommandsDBMS languages/ Types of SQL Commands
DBMS languages/ Types of SQL Commands
 
DBMS
DBMS DBMS
DBMS
 
Lecture 01 introduction to database
Lecture 01 introduction to databaseLecture 01 introduction to database
Lecture 01 introduction to database
 
DBMS - RAID
DBMS - RAIDDBMS - RAID
DBMS - RAID
 
Complete dbms notes
Complete dbms notesComplete dbms notes
Complete dbms notes
 

Viewers also liked

The explorer and the monkeys
The explorer and the monkeysThe explorer and the monkeys
The explorer and the monkeysneusmembradocasado
 
Co-creating Global Natural History Networks
Co-creating Global Natural History NetworksCo-creating Global Natural History Networks
Co-creating Global Natural History NetworksBoris Jacob
 
Chapter1 "World challenges place of the city", Smart City Summer course, AUST...
Chapter1 "World challenges place of the city", Smart City Summer course, AUST...Chapter1 "World challenges place of the city", Smart City Summer course, AUST...
Chapter1 "World challenges place of the city", Smart City Summer course, AUST...Isam Shahrour
 
Map history-networks-shorter
Map history-networks-shorterMap history-networks-shorter
Map history-networks-shorterMason Porter
 
Patterns effektiv einsetzen
Patterns effektiv einsetzenPatterns effektiv einsetzen
Patterns effektiv einsetzenMatthias Bohlen
 

Viewers also liked (7)

The explorer and the monkeys
The explorer and the monkeysThe explorer and the monkeys
The explorer and the monkeys
 
What’s up there
What’s up thereWhat’s up there
What’s up there
 
Co-creating Global Natural History Networks
Co-creating Global Natural History NetworksCo-creating Global Natural History Networks
Co-creating Global Natural History Networks
 
Chapter1 "World challenges place of the city", Smart City Summer course, AUST...
Chapter1 "World challenges place of the city", Smart City Summer course, AUST...Chapter1 "World challenges place of the city", Smart City Summer course, AUST...
Chapter1 "World challenges place of the city", Smart City Summer course, AUST...
 
Map history-networks-shorter
Map history-networks-shorterMap history-networks-shorter
Map history-networks-shorter
 
Patterns effektiv einsetzen
Patterns effektiv einsetzenPatterns effektiv einsetzen
Patterns effektiv einsetzen
 
NEU Pressedienst_TZS_SC 02.pdf
NEU Pressedienst_TZS_SC 02.pdfNEU Pressedienst_TZS_SC 02.pdf
NEU Pressedienst_TZS_SC 02.pdf
 

Similar to Kinds of networks

unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfshubhangisonawane6
 
Network archetecture
Network archetectureNetwork archetecture
Network archetectureshah fahad
 
Networking basics
Networking basicsNetworking basics
Networking basicsSahil Showkat
 
Computer networking
Computer networkingComputer networking
Computer networkingtdsparks3
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 
Chapter 1 - Introduction to the basic concepts of networks.ppt
Chapter 1 - Introduction to the basic concepts of networks.pptChapter 1 - Introduction to the basic concepts of networks.ppt
Chapter 1 - Introduction to the basic concepts of networks.pptssuser3acfba
 
Networking tutorials introduction to networking
Networking tutorials   introduction to networkingNetworking tutorials   introduction to networking
Networking tutorials introduction to networkingVinod Jadhav
 
L4Network Architecture.pptx
L4Network Architecture.pptxL4Network Architecture.pptx
L4Network Architecture.pptxGarimaJain745610
 
Assignment 1,computer networks-317
Assignment 1,computer networks-317Assignment 1,computer networks-317
Assignment 1,computer networks-317Khondoker Sadia
 
Lesson 2-Introduction to Network.pptx
Lesson 2-Introduction to Network.pptxLesson 2-Introduction to Network.pptx
Lesson 2-Introduction to Network.pptxMonarGAngeles
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networksSagar Gor
 
Computer software part 3
Computer software part 3Computer software part 3
Computer software part 3Dr Pardeep Poriya
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer NetworksPankaj Gautam
 
Networking Concepts
Networking ConceptsNetworking Concepts
Networking ConceptsVarun Chauhan
 
CN L1 — копия.ppt
CN L1 — копия.pptCN L1 — копия.ppt
CN L1 — копия.pptAssemNazirova2
 

Similar to Kinds of networks (20)

unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
 
Network archetecture
Network archetectureNetwork archetecture
Network archetecture
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Network administration Book
Network administration BookNetwork administration Book
Network administration Book
 
Chapter 1 - Introduction to the basic concepts of networks.ppt
Chapter 1 - Introduction to the basic concepts of networks.pptChapter 1 - Introduction to the basic concepts of networks.ppt
Chapter 1 - Introduction to the basic concepts of networks.ppt
 
Sem 1 Ch 5
Sem 1 Ch 5Sem 1 Ch 5
Sem 1 Ch 5
 
Networking types
Networking typesNetworking types
Networking types
 
Rkp internet part i
Rkp internet part iRkp internet part i
Rkp internet part i
 
Networking tutorials introduction to networking
Networking tutorials   introduction to networkingNetworking tutorials   introduction to networking
Networking tutorials introduction to networking
 
L4Network Architecture.pptx
L4Network Architecture.pptxL4Network Architecture.pptx
L4Network Architecture.pptx
 
Assignment 1,computer networks-317
Assignment 1,computer networks-317Assignment 1,computer networks-317
Assignment 1,computer networks-317
 
Lesson 2-Introduction to Network.pptx
Lesson 2-Introduction to Network.pptxLesson 2-Introduction to Network.pptx
Lesson 2-Introduction to Network.pptx
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networks
 
Computer software part 3
Computer software part 3Computer software part 3
Computer software part 3
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
 
Networking Concepts
Networking ConceptsNetworking Concepts
Networking Concepts
 
CN L1 — копия.ppt
CN L1 — копия.pptCN L1 — копия.ppt
CN L1 — копия.ppt
 

More from Ismail Mukiibi

Quality of service
Quality of serviceQuality of service
Quality of serviceIsmail Mukiibi
 
IP/MAC Address Translation
IP/MAC Address TranslationIP/MAC Address Translation
IP/MAC Address TranslationIsmail Mukiibi
 
Traffic Characterization
Traffic CharacterizationTraffic Characterization
Traffic CharacterizationIsmail Mukiibi
 
PHP POWERPOINT SLIDES
PHP POWERPOINT SLIDESPHP POWERPOINT SLIDES
PHP POWERPOINT SLIDESIsmail Mukiibi
 
Microprocessor application (Introduction)
Microprocessor application (Introduction)Microprocessor application (Introduction)
Microprocessor application (Introduction)Ismail Mukiibi
 
Advanced computer architecture lesson 1 and 2
Advanced computer architecture lesson 1 and 2Advanced computer architecture lesson 1 and 2
Advanced computer architecture lesson 1 and 2Ismail Mukiibi
 
Advanced computer architect lesson 3 and 4
Advanced computer architect lesson 3 and 4Advanced computer architect lesson 3 and 4
Advanced computer architect lesson 3 and 4Ismail Mukiibi
 
Advanced computer architecture lesson 5 and 6
Advanced computer architecture lesson 5 and 6Advanced computer architecture lesson 5 and 6
Advanced computer architecture lesson 5 and 6Ismail Mukiibi
 
Pc hardware course work
Pc hardware course workPc hardware course work
Pc hardware course workIsmail Mukiibi
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)Ismail Mukiibi
 
Why building collapse in kampala
Why building collapse in kampalaWhy building collapse in kampala
Why building collapse in kampalaIsmail Mukiibi
 

More from Ismail Mukiibi (12)

Quality of service
Quality of serviceQuality of service
Quality of service
 
IP/MAC Address Translation
IP/MAC Address TranslationIP/MAC Address Translation
IP/MAC Address Translation
 
Traffic Characterization
Traffic CharacterizationTraffic Characterization
Traffic Characterization
 
PHP POWERPOINT SLIDES
PHP POWERPOINT SLIDESPHP POWERPOINT SLIDES
PHP POWERPOINT SLIDES
 
Html notes
Html notesHtml notes
Html notes
 
Microprocessor application (Introduction)
Microprocessor application (Introduction)Microprocessor application (Introduction)
Microprocessor application (Introduction)
 
Advanced computer architecture lesson 1 and 2
Advanced computer architecture lesson 1 and 2Advanced computer architecture lesson 1 and 2
Advanced computer architecture lesson 1 and 2
 
Advanced computer architect lesson 3 and 4
Advanced computer architect lesson 3 and 4Advanced computer architect lesson 3 and 4
Advanced computer architect lesson 3 and 4
 
Advanced computer architecture lesson 5 and 6
Advanced computer architecture lesson 5 and 6Advanced computer architecture lesson 5 and 6
Advanced computer architecture lesson 5 and 6
 
Pc hardware course work
Pc hardware course workPc hardware course work
Pc hardware course work
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
 
Why building collapse in kampala
Why building collapse in kampalaWhy building collapse in kampala
Why building collapse in kampala
 

Recently uploaded

Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vĂĄzquez
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Kinds of networks

  • 1. KINDS OF NETWORKS Peer-to-Peer Networks In a peer-to-peer network, there are no dedicated servers, and there is no hierarchy among the computers. All the computers are equal and therefore are known as peers. Each computer functions as both a client and a server. And there is no administrator responsible for the entire network. The user at each computer determines what data on that computer is shared on the network. Below figure shows a peer-to-peer network in which each computer functions as both a client and a server. Computers in a peer-to-peer network are called peers. In a peer-to-peer network, all computers are considered equal; they all have the same abilities to use the resources available on the network. Each computer can function both as a client and a server. Computers are not dedicated to function as servers. They use the network to share resources among the independent peers. The computer whose applications are required by the other networked computers functions as a server. The other computers function as clients. Therefore, a dedicated administrator is not assigned for network management. A peer-to-peer network is a small group of people using a network. Peer- to-peer networks members usually perform similar tasks, which necessitates the sharing of resources. The peer-to-peer networks support 10 computers. The users in a peer-to-peer network are located in the same geographical area. Operating systems, such as Microsoft Windows 98 or Microsoft Windows XP, can be used to set up a peer-to-peer
  • 2. network. Additional software is not required because peer-to-peer networking is built into the systems. Another important point of peer-to-peer networks is that the users of each computer plan and control the security of their resources. The users determine the resources on their computers, which can be shared on the network. The shared network resources, such as disk space, printers or faxes, can be used by anyone who has access to the network. This is possible only if the shared network resources are not password protected. Peer-to-peer networks have weak and intrusive security because a central server is not used to administer and secure the network. In addition, some users may not implement security. A peer-to-peer network does not support a central login process. This implies that a user who logs on to one peer can access any shared network resource, which is not controlled by a specific password. Peer-to- peer networks are relatively simple. Because each computer functions as a client and a server, there is no need for a powerful central server or for the other components required for a high-capacity network. Peer-to-peer networks can be less expensive than server-based networks. Peer-to-peer networks are simple and inexpensive to install and maintain. The cost of implementing peer-to-peer networks is low because a central server is not used to administer the network. In addition, the components for a high-capacity network are not required in a peer-to-peer network. In a peer-to-peer network, the users handle administration. This means that all the users need to be trained in how to share files, folders, and printers. In a peer-to-peer network, suddenly shutting down your computer can cause one of your colleagues to be unable to print. Peer-to-peer networks are appropriate for environments where all the users are located in the same geographical area and the network security is not an important factor. In addition, these networks are useful when the network expansion is limited. Advantages of a peer-to-peer network: Less initial expense - No need for a dedicated server. Setup - An operating system (such as Windows XP) already in place may only need to be reconfigured for peer-to-peer operations. Disadvantages of a peer-to-peer network: Decentralized - No Centralized server. Security - Does not provide the security available on a peer-to-peer network.
  • 3. Server Based Networks A dedicated server is one that functions only as a server and is not used as a client or workstation. Server based networks (see below Figure) have become the standard models for networking. In a server-based network, clients rely on the services that the server provides, such as file storing and printing. Client computers are generally less powerful than server computers. A server-based network using network operating system is that the networks are organized into domains. A domain is a collection of networks and clients that share security information. Domain security and logon permissions are controlled by special servers called domain controllers. Users cannot access the resources of servers in a domain until a domain controller has authenticated them. In server-based networks, a network administrator centrally manages the resource security. The administrator defines and manages user access to network resources. Another beneficial of server-based networks is central file storage. Server-based networks provide easy backup of critical data. Data backup is another useful characteristic of server based networks. Server based networks can support a larger number of users than peer- to-peer networks. To support a large number of users, server-based networks use monitoring and network management tools. Servers must perform varied and complex tasks. (See below figure)
  • 4. Security is often the primary reason for choosing a server-based approach to networking. In a server-based environment, one administrator who sets the policy and applies it to every user on the network can manage security. (see below figure) Advantages of a client/server network Centralized - Resources and data security are controlled through the server. Security - More security then Peer-to-peer network. Flexibility - New technology can be easily integrated into system. Interoperability - All components (client /server) work together. Accessibility - Server can be accessed remotely and across multiple platforms.
  • 5. Disadvantages of a client/server network Expense - Requires initial investment in dedicated server. Maintenance - Large networks will require a staff to ensure efficient operation. Dependence - When server goes down, operations will cease across the network. A LAN is a network with two or more computers connected to each other in a single location Wired Local Area Network (LAN) It is the simplest type of network in which computers are connected to each other by cables. Each of the computers on the LAN is also called a node . A LAN is characterized by three primary attributes: Topology The topology is the pattern used to connect the computers together. With a bus topology, a network cable connects each computer to the next one, forming a chain. With a star topology, each of the computers is connected to a central nexus called a hub/Switch. A ring topology is essentially a bus network with the two ends joined together. (You will see more about network topologies in Chapter 6) Medium
  • 6. Four basic types of media are used in local-area networks; coaxial cable, twisted-pair wires, fiber-optic cable, And wireless. Each medium has its advantages and disadvantages relative to cost, speed, and expandability. Coaxial cables provide high speed and low error rates. Twisted-pair wires are cheaper than coaxial cables, can sustain the speeds common to most personal computers, and are easy to install. Fiber-optic cable is the medium of choice for high-speed local-area networks. Wireless local-area networks have the advantage of expandability. (You will see more about network medium in Chapter 5.2) Protocols The topology and the medium used on a particular network are specified by the protocol. (You will see more about protocol in Chapter 8). LAN computer networks that usually cover a limited range, say, within the boundary of a building. A LAN computer network is two or more computers that communicate with each other through some medium. The primary usage of local-area networks (LANs) is the sharing of hardware, software, or information, such as data files, multimedia files, or electronic mail. Resource sharing provided by local-area networks improves efficiency and reduces overhead. There are a number of ways in which nodes can communicate over a network. The simplest is to establish a dedicated link between the transmitting and receiving stations. This technique is known as circuit switching. A better way of communicating is to use a technique known as packet switching, in which a dedicated path is not reserved between the source and the destination. Data are wrapped up in a packet and launched into the network. In this way, a node only has exclusive access to the medium while it is sending a packet. During its inactive period, other nodes can transmit. A typical packet is divided into preamble, address, control, data, and error-check fields. The computers in a LAN are connected by using cables. This method cannot be used to connect computers that are in different locations, for example, in buildings across a town or city. Therefore, a LAN is not suitable for large businesses with offices in several locations. Wireless Local Area Network The term wireless networking refers to technology that enables two or more computers to communicate using standard network protocols, but without network cabling.
  • 7. Peer-to-peer wireless network consists of a number of computers each equipped with a wireless networking interface card. Each computer can communicate directly with all of the other wireless enabled computers. They can share files and printers this way, but may not be able to access wired LAN resources, unless one of the computers acts as a bridge to the wired LAN using special software. A wireless network can also use an access point, or base station. In this type of network the access point acts like a hub, providing connectivity for the wireless computers. It can connect the wireless LAN to a wired LAN, allowing wireless computer access to LAN resources, such as file servers or existing Internet Connectivity. There are two types of access points: Hardware access points (HAP) Hardware access points offer complete support of most wireless features, but check your requirements carefully. Software Access Points
  • 8. Software Access Points which run on a computer equipped with a wireless network interface card as used in peer-to-peer wireless network. The software routers that can be used as a basic Software Access Point, and include features not commonly found in hardware solutions. Connected wireless LAN to wired LAN To do this you will need some sort of bridge between the wireless and wired network. This can be accomplished either with a hardware access point or a software access point. Hardware access points are available with various types of network interfaces, such as Ethernet or Token Ring, but typically require extra hardware to be purchased if you're networking requirements change. If networking requirements go beyond just interconnecting a wired network to a small wireless network, a software access point may be the best solution. A software access point does not limit the type or number of network interfaces you use. It may also allow considerable flexibility in providing access to different network types, such as different types of Ethernet, Wireless and Token Ring networks. Such connections are only limited by the number of slots or interfaces in the computer used for this task. Further to this the software access point may include significant additional features such as shared Internet access, web caching or content filtering, providing significant benefits to users and administrators. Wireless networking offers a cost-effective solution to users with difficult physical installations such as campuses, hospitals or businesses with more than one location in immediate proximity but separated by public thoroughfare. This type of installation requires two access points. Each access point acts as a bridge or router connecting its own LAN to the wireless connection.
  • 9. The wireless connection allows the two access points to communicate with each other, and therefore interconnect the two LAN's. Wireless network range Each access point has a finite range within which a wireless connection can be maintained between the client computer and the access point. The actual distance varies depending upon the environment; manufacturers typically state both indoor and outdoor ranges to give a reasonable indication of reliable performance. Also it should be noted that when operating at the limits of range the performance may drop, as the quality of connection deteriorates and the system compensates. Typical indoor ranges are 150-300 feet, but can be shorter if the building construction interferes with radio transmissions. Longer ranges are possible, but performance will degrade with distance. Outdoor ranges are quoted up to 1000 feet, but again this depends upon the environment. There are ways to extend the basic operating range of Wireless communications, by using more than a single access point or using a wireless relay /extension point. Multiple access points can be connected to a wired LAN, or sometimes even to a second wireless LAN if the access point supports this. In most cases, separate access points are interconnected via a wired LAN, providing wireless connectivity in specific areas such as offices or rooms, but connected to a main wired LAN for access to network resources, such as file servers.
  • 10. If a single area is too large to be covered by a single access point, then multiple access points or extension points can be used. Note that an "extension point" is not defined in the wireless standard, but have been developed by some manufacturers. When using multiple access points, each access point wireless area should overlap its neighbors. This provides a seamless area for users to move around in using a feature called "roaming.” See Roaming for further information. Some manufacturers produce extension points, which act as wireless relays, extending the range of a single access point. Multiple extension points can be strung together to provide wireless access to far away locations from the central access point.
  • 11. Roaming A wireless computer can "roam" from one access point to another, with the software and hardware maintaining a steady network connection by monitoring the signal strength from in-range access points and locking on to the one with the best quality. Usually this is completely transparent to the user; they are not aware that a different access point is being used from area to area. Some access point configurations require security authentication when swapping access points, usually in the form of a password dialog box. Access points are required to have overlapping wireless areas to achieve this as can be seen in the following diagram.
  • 12. A user can move from Area 1 to Area 2 transparently. The Wireless networking hardware automatically swaps to the Access Point with the best signal. Sharing an internet connection in wireless network To share an Internet connection across a LAN you need two things: an Internet sharing hardware device or software program a LAN If your LAN is wireless. You need hardware or software access point and a wireless LAN. Any computer equipped with a wireless network card running suitable Internet sharing software can be used as a software access point. A number of vendors offer hardware access points. A hardware access point may provide Internet Sharing capabilities to Wired LAN computers, but does not usually provide much flexibility beyond very simple configurations. If an existing wired LAN already has an Internet connection, then the hardware access points simply connect to LAN and allow wireless computers to access the existing Internet connection in the same way as wired LAN computers.
  • 13. Wireless Network security Wireless communications obviously provide potential security issues, as an intruder does not need physical access to the traditional wired network in order to gain access to data communications. However, 802.11 wireless communications cannot be received much less decoded by simple scanners, short wave receivers etc. This has led to the common misconception that wireless communications cannot be eavesdropped at all. However, eavesdropping is possible using specialist equipment. To protect against any potential security issues, 802.11 wireless communications have a function called WEP (Wired Equivalent Privacy), a form of encryption which provides privacy comparable to that of a traditional wired network. If the wireless network has information that should be secure then WEP should be used, ensuring the data is protected at traditional wired network levels. IEEE 802.11 Wireless networking hardware requires the use of underlying technology that deals with radio frequencies as well as data transmission. The most widely used standard is 802.11 produced by the Institute of Electrical and Electronic Engineers (IEEE). This is a standard defining all aspects of Radio Frequency Wireless networking. Also it should be noted that traditional Virtual Private Networking (VPN) techniques will work over wireless networks in the same way as traditional wired networks.
  • 14. Wide Area Network (WAN) A wide area network (WAN) is a telecommunications network, usually used for connecting computers, that spans a wide geographical area. WANs can by used to connect cities, states, or even countries. An example of a WAN connection would be a company with two offices in distant cities, each with its own LAN and connected by a leased telephone line. This type of WAN is illustrated in below figure. Each end of the leased line is connected to a router and the routers are connected to individual LANs. Any computer on either of the LANs can communicate with any one of the other computers at the other end of the WAN link or with a computer on its own LAN. WANs are often used by larger corporations or organizations to facilitate the exchange of data and in a wide variety of industries, corporations with facilities at multiple locations have embraced WANs. Increasingly, however, even small businesses are utilizing WANs as a way of increasing their communications capabilities. Although WANs serve a purpose similar to that of local area networks (LANs), WANs are structured and operated quite differently. The user of a WAN usually does not own the communications lines that connect the remote computer systems; instead, the user subscribes to a service through a telecommunications provider. Unlike LANs, WANs typically do not link individual computers, but rather are used to link LANs. WANs also transmit data at slower speeds than LANs. WANs have existed for decades, but new technologies, services, and applications have developed over the years to dramatically increase their efficacy for business. WANs were originally developed for digital leased- line services carrying only voice, rather than data. As such, they
  • 15. connected the private branch exchanges (PBXs) of remote offices of the same company. WANs are still used for voice services, but today they are used more frequently for data and image transmission (such as video conferencing). These added applications have spurred significant growth in WAN usage, primarily because of the surge in LAN connections to the wider networks. WANs are either point-to-point, involving a direct connection between two sites, or operate across packet-switched networks, in which data is transmitted in packets over shared circuits. Point-to-point WAN service may involve either analog dial-up lines, in which a modem is used to connect the computer to the telephone line, or dedicated leased digital telephone lines, also known as "private lines." Analog lines, which may be either part of a public-switched telephone network or leased lines, are suitable for batch data transmissions, such as congruent order entry and point-of-sale transactions. Dedicated digital phone lines permit uninterrupted, secure data transmission at fixed costs. Point-to-point WAN service providers include both local telephone companies and long distance carriers. Packet-switched network services are typically chosen by organizations which have low volumes of data or numerous sites, for which multiple dedicated lines would be too expensive. Depending on the service, WANs can be used for almost any data sharing purpose for which LANs can be used. Slower transmission speeds, however, may make some applications less practical for WANs. The most basic uses of WANs are for electronic mail and file transfer, but WANs can also permit users at remote sites to access and enter data on a central site's database, such as instantaneously updating accounting records. New types of network-based software that facilitate productivity and production tracking, such as groupware and work-flow automation software, can also be used over WANs. Using groupware, workers at dispersed locations can more easily collaborate on projects. WANs also give remote offices access to a central office's other data communications services, including the Internet. Wireless Fidelity Wi-Fi
  • 16. A typical Wi-Fi setup contains one or more Access Points (APs) and one or more clients. An AP broadcasts its SSID (Service Set Identifier, "Network name") via packets that are called beacons, which are usually broadcast every 100 ms. The beacons are transmitted at 1 Mbit/s, and are of relatively short duration and therefore do not have a significant effect on performance. Since 1 Mbit/s is the lowest rate of Wi-Fi it assures that the client who receives the beacon can communicate at least 1 Mbit/s. Based on the settings (e.g. the SSID), the client may decide whether to connect to an AP. If two APs of the same SSID are in range of the client, the client firmware might use signal strength to decide which of the two APs to make a connection to. The Wi-Fi standard leaves connection criteria and roaming totally open to the client. This is a strength of Wi-Fi, but also means that one wireless adapter may perform substantially better than the other. Since Wi-Fi transmits in the air, it has the same properties as a non-switched ethernet network. Wi-Fi Devices Wireless Access Point (WAP) A wireless access point (AP) connects a group of wireless stations to an adjacent wired local area network (LAN). An access point is similar to an ethernet hub or switch, but instead of relaying LAN data only to other LAN stations, an access point can relay wireless data to all other compatible wireless devices as well as to a single (usually) connected LAN device, in most cases an ethernet hub or switch, allowing wireless devices to communicate with any other device on the LAN. Wireless Routers A wireless router integrates a wireless access point with an IP router and an ethernetswitch . The integrated switch connects the integrated access point and the integrated ethernet router internally, and allows for external wired ethernet LAN devices to be connected as well as a (usually) single WAN device such as cable modem or DSL modem . A wireless router advantageously allows all three devices (mainly the access point and router) to be configured through one central configuration utility, usually through an integrated web server . Wireless Ethernet Bridge A wireless Ethernet bridge connects a wired network to a wireless network. This is different from an access point in the sense that an access point connects wireless devices to a wired network at the data-link layer . Two wireless bridges may be used to connect two wired networks over a
  • 17. wireless link, useful in situations where a wired connection may be unavailable, such as between two separate homes. Advantages of Wi-Fi Allows LANs to be deployed without cabling, typically reducing the costs of network deployment and expansion. Spaces where cables cannot be run, such as outdoor areas and historical buildings, can host wireless LANs. Wi-Fi silicon pricing continues to come down, making Wi-Fi a very economical networking option and driving inclusion of Wi-Fi in an ever- widening array of devices. Wi-Fi products are widely available in the market. Different brands of access points and client network interfaces are interoperable at a basic level of service. Products designated as Wi-Fi CERTIFIED by the Wi-Fi Alliance are interoperable and include WPA2 security. Wi-Fi networks support roaming, in which a mobile client station such as a laptop computer can move from one access point to another as the user moves around a building or area. Wi-Fi networks support roaming, in which a mobile client station such as a laptop computer can move from one access point to another as the user moves around a building or area. Wi-Fi is a global set of standards. Unlike cellular carriers, the same Wi-Fi client works in different countries around the world. Disadvantages of Wi-Fi Wi-Fi can be interrupted by other devices, notably 2.4 GHz cordless phones and microwave ovens. Power consumption is fairly high compared to some other standards, making battery life and heat a concern. The most common wireless encryption standard, Wired Equivalent Privacy or WEP, has been shown to be breakable even when correctly configured. Wi-Fi Access Points typically default to an open ( encryption -free) mode. Novice users benefit from a zero configuration device that works out of the box but might not intend to provide open wireless access to their LAN. Wi-Fi networks have limited range. A typical Wi-Fi home router using 802.11b or 802.11g with a stock antenna might have a range of 45 m (150 ft) indoors and 90 m (300 ft) outdoors. Range also varies with frequency band, as Wi-Fi is no exception to the physics of radio wave propagation. Wi-Fi in the 2.4 GHz frequency block has better range than Wi-Fi in the 5 GHz frequency block, and less range than the oldest Wi-Fi
  • 18. (and pre-Wi-Fi) 900 MHz block. Outdoor range with improved antennas can be several kilometres or more with line-of-sight. Wi-Fi networks can be monitored and used to read and copy data (including personal information) transmitted over the network when no encryption such as VPN is used.