Professional Documents
Culture Documents
on Size
Computer networks can be
characterized by their sizes.
The size of a network can be
expressed in terms of the
geographic area the network
occupies and the number of
computers connected to the
network.
Networks can cover anything
from a handful of devices
within a single room to
millions of devices spread
across the entire globe.
Personal Area Network
(PAN)
A personal area network
(PAN) is a computer network
organized around an
individual person within a
single building.
A common example is a
wireless network that
connects a computer with its
peripherals. Almost every
computer has an attached
monitor, keyboard, mouse
and printer.
If there is no wireless
network, this connection
must be done with cables.
A network created by
Bluetooth is PAN. Bluetooth
is a short-range wireless
network used to connect
computer’s peripheral
components without wires
This type of network
provides a great
flexibility. For example, it
allows you to:
Send a document to the
printer in the office while
you are sitting on the
couch with your laptop.
Upload a photo from your
cell phone to your desktop
computer.
Watch movies from an
online streaming service to
your TV.
service of existing
telephone network of
the city (for example
the Ethio-telecom
network) to
interconnect its offices,
through which MAN is
created.
Wide Area Network
A wide area network
(WAN) occupies a very
large area such as an
entire country
or the entire world.
A WAN can contain
multiple smaller networks
such as LANs or MANs.
The Internet is the
best-known example of a
public WAN.
It indicates that
computers residing in
different parts of the
world are connected to
each through a MAN.
2.3.3 Types of
Network Based on
Topologies
Network topology
defines how various
computers or electronic
devices represented as
nodes are connected to
one another in the
network.
It refers to the
physical arrangement of
devices in a network.
Typical network
configurations include
bus topology, mesh
topology, star topology,
and ring topology
Bus Topology
In bus topology, there is
a long cable called bus
which acts as a
backbone for all
the nodes.
A bus topology
network connects each
computer or electronic
devised to a backbone
cable (or bus) just like a
water pipe
interconnections
It is also robust.
However, if the switch
goes down, the entire
network becomes defunct.
This is a major demerit of
this scheme.
d. Ring Topology
A ring is easy to
reconfigure and install. In
a ring, a signal normally
circulates
all the time.
A node not receiving any
signal for a long time
indicates a fault.
Therefore, fault
isolation is relatively easy
in a ring. However, if a
node in a simple ring fails,
the whole ring cannot
function.
Another demerit is that
traffic flows only in one
direction. This topology is
not used if the number of
nodes to be connected is
very high.
2.3.4 Types of Network
Based on Resource
Access and Sharing
Peer-to-Peer Network
In a Peer-to-Peer
network, each machine
(computer) is known as
peer and can participate in
the sharing of files or
resources.
No server is required in
this network, so there is
no additional cost for a
dedicated machine, but
there is also no a real
security.
A peer-to-peer network
is also called workgroup
and there is no hierarchy
among the computers.
This mean that all
computers are peers
(equals) and the
connection is created for
resource sharing and
communication purposes
only.
The number of
computers in peer-to-peer
network usually does not
exceed 10; if
the number is beyond this,
the network becomes very
difficult for
administration.
Advantages of peer-to-
peer network
Server is not required.
All computers are equal
in the network.
No additional cost is
needed for dedicated-
machine.
Disadvantages of peer-
to-peer network
Provides share level
security, i.e. it applies a
trust-based security.
Can work in small
environments only.
Client-server Network
A client-server network
involves multiple clients or
workstations, connecting
to
at least one central
server.
Most resources are
installed on the server.
When clients need access
to these resources, they
access them from the
server.
Servers often have
private user directories as
well as multiple public
directories.
In client-server
networks the clients are
allowed to function as
workstations
without sharing any
resources.
It is easier to upgrade
software applications and
files because they are
held on one single
computer.
System-wide services
can be provided through
the server software.
Security is enhanced on a
client server network
because the security is
handled by the server.
The following table
summarizes the
difference between peer-
to-peer and client
network.
2.4 Advantages and
Disadvantages of
Network\
2.4.1 Advantages of
network
There are more
advantages to a network
than disadvantages. In
fact, many companies
today would not exist
without accessing some
form of network. Below
are
the advantages of a
network.
Sharing data and
information - One of the
biggest advantages of a
network is sharing data
and information between
each of the devices on the
network.
In addition, networks
allow accessing the data
which is stored on central
computer called database
server.
For example, we use
network for sharing
documents, images,
photos, songs and videos
Communication - A
network gives all users the
ability to quickly
communicate with each
other either using
chatting or instant
messaging services such as
Skype, WhatsApp and
Viber to send files and
messages among the users,
video conferencing, e-mail,
TV and radio.
Sharing hardware –
Expensive hardware
devices connected to a
network can be shared
among all users.
Storage devices such as
Hard Disk that are shared
on a storage server, which
is also called NAS
(Network attached
storage), can store and
access vast amounts of
information.
A printer which is
attached and shared on a
server (printer server)
allows all network users to
print from one printer
according to their
privilege configured on the
server by a network
administrator.
Fax machines, Scanners,
more powerful computers,
such as super computers
that can perform complex
tasks within short period
of time than a single
computer will take to
complete.
Share software –
Different application
software and Internet-
based services can be
shared over the network
for all licensed users for
the software.
For instance, we can
share software such as
computer games and work
Internet-based services
such as e-learning.
E-learning or learning
management system in its
broadest sense is designed
to support teaching and
learning as well as
student-to-student and
student-to-teacher
instructions.
Transferring money -
Being connected to a
secure network allows a
person or business to
digitally transfer money
between banks and users.
For example, a network
could allow a company not
only to manage employees’
payroll but also to
transfer their pay to the
employee’s bank account.
2.4.2 Disadvantages of
network
Although there are many
advantages to a network
(mentioned above), there
are
some disadvantages. Below
are some disadvantages of
a network.
Virus and malware -
Networks make sharing
information between
network users easy.
Unfortunately, this also
means that viruses and
other malwares have an
easier time spreading
between computers on a
network.
Vulnerabilities - When
computer are connected on
the network, it will be
accessible remotely, with
these potential new
methods of accessing the
computer; it can introduce
new security issues or
vulnerabilities to the
computer, users and the
data on the network which
affect the organization
and the country at large.
Complex - Networks
are complex, and setting
up and managing a network
for a business or
corporation requires
someone with a lot of
experience or
certification.
Cost - Setting up,
managing and
administering a network
hardware and
software incurs cost to
the organization building a
network.
Social media effect on
youth and adults -
particularly youths,
including students, waste
their time on use of social
media and unsafe Internet
resources.
There are also many
cyber security threats
such as cyberbullying,
disinformation/
misinformation and
identity theft that you
should be aware of and
learn to develop safe use
of the Internet