Professional Documents
Culture Documents
Network models
Network models are a computer architecture, implementable in either hardware
or software, meant to simulate biological populations of interconnected neurons.
These models, also known as multilayer connectionist models, process
information based on the pattern and strength of the connections among the
neuron-like units that compose them.
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
Internet Protocols
The Internet Protocol family contains TCP/IP (Transmission Control
a set of related (and among the most Protocol/Internet Protocol)
widely used network protocols. ARP (Address Resolution Protocol
DHCP (Dynamic Host Configuration
Beside Internet Protocol (IP) itself,
Protocol
higher-level protocols
DNS (Domain Name System)
like TCP, UDP, HTTP, and FTP all FTP (File Transfer Protocol
integrate with IP to provide additional HTTP (Hyper Text Transfer Protocol)
capabilities. Similarly, lower-level
Internet Protocols
like ARP and ICMP also co-exist with Wireless Network Protocols
IP. In general, higher level protocols in Thanks to Wi-Fi, Bluetooth and LTE, wireless
the IP family interact more closely networks have become commonplace.
Network protocols designed for use on
with applications like Web browsers
wireless networks must support roaming
while lower-level protocols interact
mobile devices and deal with issues such as
with network adapters and other variable data rates and network security
computer hardware. Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
a. client-server
client/server network. A computer network in which one centralized, powerful
computer (called the server) is a hub to which many less powerful personal
computers or workstations (called clients) are connected. The clients run
programs and access data that are stored on the server.
In simplest form, a server is a connection point for several clients, that will
handle their requests. A client is software that (usually) connects to
the server to perform actions. The client provide a user interface that allows
users to carry out actions.
Advantages Disadvantages
Backups and network security is controlled Specialist staff such as a network manager is
centrally needed
Users can access shared data which is If any part of the network fails a lot of
Deepa Piyathilaka
centrally controlled disruption can occur
PgD ,B.Sc. University of Colombo
IAL Information Technology
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
Advantages
Simple configuration
Computers are in same general area
No dedicated server or hierarchy
Less expensive Compared to other network models
Disadvantages
No centralized storage
Not flexible
Difficult to expand (not scalable)
Not necessarily secure
Decentralized security model
Security is maintained on each individual computer
Not practical for large installations
Usually 10 or fewer workstations
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
However, the ad hoc network is being used quite a bit in new types
of wireless engineering, although until recently it was a rather
esoteric idea. For example, a mobile ad hoc network involves mobile
devices communicating directly with one another. Another type of
ad hoc network, the vehicular ad hoc network, involves placing
communication devices in cars.
Experts point out that for small local area networks, ad hoc
networks can be cheaper to build because they don’t require as
much hardware. However, others make the point that a large
number of devices can be difficult to manage without a larger and
more concrete infrastructure. Tech leaders are looking at ways to
enable more vibrant network functionality with these peer-to-peer
networks. Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
Ad hoc networks are useful when you need to share files or other
data directly with another computer but don't have access to
a Wi-Fi network.
More than one laptop can be connected to the ad hoc network,
as long as all of the adapter cards are configured for ad-hoc
mode and connect to the same SSID (service state identifier).
The computers need to be within 100 meters of each other.
If you are the person who sets up the ad hoc network, when you
disconnect from the network, all the other users are also
disconnected. An ad hoc network is deleted when everyone on it
disconnects—which can be good or bad, depending on your
view; You can use an ad hoc wireless network to share your
computer's internet connection with another computer.
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
What is tethering?
Tethering a 3G or 4G phone means connecting the phone to another device so
that the device can use the phone's internet connection to get online. This can be
achieved by using a USB connection, and have the phone act as a replacement for
a regular modem or router.
Tethering can also be achieved using a wireless Wi-Fi connection or Bluetooth,
depending on the connectivity specifications of the equipment that is to be used.
Generally, if a device supports Wi-Fi you'll also be able to tether your phone to it
wirelessly.
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
a. wireless – Wi-Fi
b. b. ZigBee®
c. c. Bluetooth®
d. d. cellular – Global System for Mobile (GSM)
communications (3G/4G)
e. e. infrared
f. f. ethernet.
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo
IAL Information Technology
Deepa Piyathilaka
PgD ,B.Sc. University of Colombo