Professional Documents
Culture Documents
Commerce
Course Title: Introduction to Business
Information System
Dec -22, AA
Agenda:
▪ Introduction
▪ Types of Networking
▪ Network Protocols
▪ Network Topologies
▪ Privacy issue
▪ Lack of robustness
▪ Virus / malicious software
▪ Sender
▪ Receiver
▪ Data/Message
▪ Medium
▪ Protocols
better security because the file access is more vulnerable. The peers act like the server and the
Security controlled by the server, not the nodes. consumer at the same time which is why file access can’t
be handled centrally, the security is handled by the users.
more robust and can be extended as
Performance needed. As the number of nodes grows, performance decreases.
The bandwidth depends on the The full bandwidth is not allocated in advance in a peer-
Bandwidth
connection of the server to the rest of the to-peer connection. It uses the bandwidth node
distribution
network. according to the available bandwidth of each node
(peer) and then releases it when it is no longer required.
Data Commn and Networking 15
Computer Networks and Data Communications
Network Types: Based on size
▪ PAN: Personal Area Networks
o Limited to personal utilization around homes
▪ LAN: Local Area Networks
o It may encompass an office, a building or a compound/campus
▪ MAN: Metropolitan Area Networks
o It spans a large city/metropolitan
▪ WAN: Wide Area Networks
o As big as a nation wide, continental or worldwide network.