• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Local area networks (LANs).

Extracts from this document...


DEFINITION The concept of local area networks (LANs) is not new. It represents a logical development of computer technology. With the advent of microcomputers in the 1980s many office workers began bringing their own disks into work, compromising data integrity. They also began keeping their own databases, which companies did not like. The answer was to create a computer network. A computer network is a group of computers connected together enabling users to share resources and communicate with each other. Resources can be hardware, software, or data. Without a network, each employee might require a dedicated printer connected to his workstation or individual copies of application software loaded on his workstation. A network will also allow dissimilar computers to communicate and share resources. This means that an IBM PC can communicate with an Apple Macintosh with ease. There are three general types of networks: Local Area Networks (LANs), Metropolitan Area Networks (MANs), and Wide Area Networks (WANs). They are described or classified by the area of coverage and by the method of information exchange. A LAN encompasses two or more computers connected by one or more types of medium (usually wire) located within close proximity of each other. This distance is generally limited to 2 kilometers. ...read more.


Servers are identified by the service they provide. A disk server might contain several CDs or Hard Drives with applications to be shared across the network. A file server usually stores files and folders and provides the core services of a network. In order for any workstation to be able to connect to a network it will need an access point. This is normally known as a Network Interface Card (NIC). NICs provide signal and protocol conversion between network adapters and the transmission media. Signal conversion is accomplished by the Media Attachment Unit (MAU), while protocol conversion is the job of the Host Access Unit (HAU). NICs can support a variety of modes, including Ethernet, Token Ring, fiber optics, and wireless networks. A workstation can also connect remotely via a public switched telephone network using a Modulator/Demodulator (Modem). These can be either internal or external, although they are more commonly found to be internal. Modems must always operate in pairs. A second modem must be connected to the distant end of the communications link to demodulate the signal. They must also operate under the same protocol. Repeaters allow a network to extend to distances not normally allowable by using cabling alone. Signals sent through cables are affected by noise and will degenerate in proportion to the length of the cable. ...read more.


Network software came along in 1984 with IBM's Network Basic Input/Output System (NETBIOS). This was the first rationalization of a PC networking software creating a point-to-point communication between computers. Of course, each computer needed it's own operating system. Enter MS-DOS. With the release of Microsoft's MS-DOS 3.1 in late 1984, the concept of accessing files on a remote server, simultaneously with other users became a possibility. This, of course, led to the creation of a network operating system, necessary to use any network. Novell Netware, one of the most portable network operating systems, was the first to take advantage of the new technology. What protocols are used in a network is very important in selecting a network operating system. The most commonly used protocols are TCP/IP and IPX/SPX. Microsoft, of course, has it's own protocol, NETBeui, but this is a non-routable protocol so it can only be used in LANs and not MANs or WANs. Today, the most commonly used network operating systems are Windows NT and 2000, as well as Sun Microsystems Solaris 8. There are advantages and disadvantages to each, but they are too extensive to go into detail. For the purpose of this paper we will consider them equal. Well, now we have all necessary hardware and software, so putting together a network should be easy as pie, right? Right... Fernando A. Castro 1 IS315 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Formal Specification, Verification, and Automatic Test Generation of ATM Routing Protocol: PNNI

    The Flooding procedures are the necessary extensions to the database synchronization protocol in order to keep all routing information within a single peer group current. The Database Synchronization protocol is started with the event AddPort, which is generated when the first link between two neighboring nodes running the Hello protocol enters the state, Two Way Inside.

  2. The Use of Big IP in Gamer.TV.

    is running at the moment but with the new one it would be just sitting there not actually being used and if the working one went down then a piece of software such as Big IP could then automatically change it over.

  1. Building Local Area Networks

    * Length of appropriate cable for connecting the Server to the Wireless Access Point. (Purchasing a ready-made cable, no need for RJ45's and necessary tools) Design: Each of the laptops will be wireless enabled with the barcode readers attached, then the employees will be able to go about their daily tasks from anywhere in the warehouse.

  2. Produce a report for the Managing Director of Animal World Magazine outlining different ways ...

    o The performance of the network slows down with more users o Network stops working when adding a new machine o Limited number of devices can be attached Details of Bus Topology Topology Cable Connector Hardware Software Protocol Single Point Failure Bus Coaxial BNC Terminator C/S Ethernet Damaged Wire Ethernet

  1. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    preserve the data, making sure that many copies are saved and store in more than one office, as one office could completely diminish as a result of an earthquake for example. Explain the operation and use of an encryption technique in ensuring security of transmitted information - M3 - Task

  2. Download services

    Programmers who release the freeware often want to "give something to the community", but also want credit for their software and to retain control of its in future development. Sometime when programmers decide to stop developing a freeware product, they might give the source code to another programmer or release the product's source code to the public.

  1. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, ...

    433 Guardian, Newspaper article: Identity theft fears [Online] 4 February 2009] HYPERLINK "http://www.guardian.co.uk/technology/2008/nov/27/identity-theft-biometric-unisys" http://www.guardian.co.uk/technology/2008/nov/27/identity-theft-biometric-unisys IAN J., LLOYD., 2008, Information Technology Law: fifth edition: London: pg. 221, 249. LexisNexis 2008, Government Publication [online] [2 February 2009] HYPERLINK "http://www.lexisnexis.com/uk/legal/results/docview/docview.do?docLinkInd=true&risb=21_T5601459635&format=GNBFULL&sort=BOOLEAN&startDocNo=1&resultsUrlKey=29_T5601459642&cisb=22_T5601459641&treeMax=true&treeWidth=0&csi=274768&docNo=1" http://www.lexisnexis.com/uk/legal/results/docview/docview.do?docLinkInd=true&risb=21_T5601459635&format=GNBFULL&sort=BOOLEAN&startDocNo=1&resultsUrlKey=29_T5601459642&cisb=22_T5601459641&treeMax=true&treeWidth=0&csi=274768&docNo=1 LexisNexis 2008, Journal Article [online] [2 February 2009] HYPERLINK "http://www.lexisnexis.com:80/uk/legal/results/docview/docview.do?docLinkInd=true&risb=21_T5726099904&format=GNBFULL&sort=PUBLISHED-DATE,D,H,$PSEUDOLOSK,A,H&startDocNo=1&resultsUrlKey=29_T5726099907&cisb=22_T5726099906&treeMax=true&treeWidth=0&csi=280320&docNo=1" http://www.lexisnexis.com:80/uk/legal/results/docview/docview.do?docLinkInd=true&risb=21_T5726099904&format=GNBFULL&sort=PUBLISHED-DATE,D,H,$PSEUDOLOSK,A,H&startDocNo=1&resultsUrlKey=29_T5726099907&cisb=22_T5726099906&treeMax=true&treeWidth=0&csi=280320&docNo=1 LexisNexis

  2. ICT Implementation

    has been placed on the quantity field, which means the user can only enter values between 1 and 24. The validation is working as the user has entered a quantity value above 24 and an error message has appeared. Another validation placed on the Item Stock table is the re-order level.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work