Professional Documents
Culture Documents
by
Eddons Munthali
15-4
Networking
• The generic term node or host refers to any
device on a network
• Data transfer rate The speed with which data
is moved from one place on a network to
another
• Data transfer rate is a key issue in computer
networks
15-5
Networking
• Computer networks have opened up an entire
frontier in the world of computing called the
client/server model
15-7
Types of Networks
Local Area Network (LAN)
Networks used to interconnect computers in a single room,
rooms within a building or buildings on one site
Usually LAN links computers within a limited geographical area
because they must be connected by a cable, which is quite
expensive.
LAN links computers, in the same area for the purpose of
sharing information.
LAN transmits data with a speed of several megabits per
second than WAN
People working in LAN get more capabilities in data processing,
work processing and other information exchange compared to
stand-alone computers.
Star topology
16
Eddons Munthali - Computer Networks
Bus Topology
In bus topology all workstations are connected to a
single communication line called bus.
There is no central node as in star topology.
Transmission from any station travels the length of the
bus in both directions and can be received by all
workstations.
The advantage of the bus topology is that
It is quite easy to set up.
If one station of the topology fails it does not affect
the entire system.
The disadvantage of bus topology is that any break in
the bus is difficult to identify.
Bus Topology
Eddons Munthali - Computer Networks 17
Ring Topology
In ring topology each station is attached nearby stations on a
point to point basis so that the entire system is in the form of a
ring.
In this topology data is transmitted in one direction only.
Thus the data packets circulate along the ring in either
clockwise or anti-clockwise direction.
The advantage of this topology is that any signal transmitted on
the network passes through all the LAN stations.
The disadvantage of ring network is that the breakdown of any
one station on the ring can disable the entire system.
Ring Topology
• Ayaz, A., & Yanartaş, M. (2020). An analysis on the unified theory of acceptance and
use of technology theory (UTAUT): Acceptance of electronic document management
system (EDMS). Computers in Human Behavior Reports, 2, 100032.
https://doi.org/10.1016/j.chbr.2020.100032
Structure of a Uniform Resource Locators
pathname
protocol
http://www.chicagosymphony.org/civicconcerts/index.htm
15-54
Internet Connections
• There are various technologies available that you can use to
connect a home computer to the Internet
– A phone modem converts computer data into an analog audio
signal for transfer over a telephone line, and then a modem at the
destination converts it back again into data
– A digital subscriber line (DSL) uses regular copper phone lines to
transfer digital data to and from the phone company’s central
office
– A cable modem uses the same line that your cable TV signals come
in on to transfer the data back and forth
15-55
Internet Connections
• Broadband A connection in which transfer speeds
are faster than 128 bits per second
– DSL connections and cable modems are broadband
connections
– The speed for downloads (getting data from the Internet
to your home computer) may not be the same as uploads
(sending data from your home computer to the Internet)
15-56
Open Systems
• Proprietary system A system that uses technologies
kept private by a particular commercial vendor
One system couldn’t communicate with another, leading to
the need for
• Interoperability The ability of software and hardware
on multiple machines and from multiple commercial
vendors to communicate
Leading to
• Open systems Systems based on a common model
of network architecture and a suite of protocols used
in its implementation
15-57
Firewalls
• Firewall A machine and its software that
serve as a special gateway to a network,
protecting it from inappropriate access
– Filters the network traffic that comes in, checking
the validity of the messages as much as possible
and perhaps denying some messages altogether
– Enforces an organization’s access control policy
15-58
Firewalls