• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Network environment.

Extracts from this document...


Network Environment LAN - Local Area Network * Collection of computers and peripherals on one site/building connected by a common electrical connection. * Can be connected together or to WAN WAN - Wide Area Network * Collection of computers or networks over a wide geographical area e.g. different sites, towns, countries * Public line - dial up network * Private/ leased line - contract, annual fee Internet Some wans that act as service providers - ISP URL - Uniform Resource Locator - address http://www.natwestseries.co.uk protocol https - Hypertext Transfer protocol secure Domain name ftp - file transfer protocol .ac - academic institution .co - single country company .com - international company .edu - educational establishment .gov - government .sch - school .Ltd - limited Ip address - 'Home Page~ Intranet Security - do not have to have access to the internet Time - can download relevant internet sites Share information What is the future of the Internet? ...read more.


This is a common topology for WAN (Wide area network) in large companies which have a mainframe computer at the Head office and computer facilities at each branch. Advantages of a Star Network * Easy to install and wire. * No disruptions to the network then connecting or removing devices. * Easy to detect faults and to remove parts. * Consistent performance even when the network is being heavily used Disadvantages of a Star Network * Requires more cable length than a linear topology. * If the hub or concentrator fails, nodes attached are disabled. * More expensive than linear bus topologies because of the cost of the concentrators. Diagram of a Star Network Bus Topology Bus Topology is a typical topology for a LAN with all he devices on the network sharing a single cable. Information can by transmitted in either direction from any PC to any other. This system works well if the channels are not too heavily loaded. ...read more.


Moreover, the logic to implement a ring network is relatively simple. Each node in the network is tasked with a straightforward job of accepting the data and sending it to the DTE attached to it, or sending it back out onto the ring to the next intermediate node. However, like all networks, the ring network suffers from some deficiencies. The primary problem is the use of a single channel to tie together all the nodes in the network. If a channel between two nodes fails, then the entire network is lost. To alleviate this problem, some vendors supply ring networks with backup channels and others provide switches that will route data around a failed node. This increases reliability in the event of channel or node failure. More recently, network suppliers have taken to producing ring networks with two rings, so that the network will still be able to function in the event of channel failure. Advantages of ring topology * Growth of system has minimal impact on performance. * All stations have equal access. Disadvantages of ring topology * Most expensive topology. * Failure of one computer may impact others. * Complex. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    However, all this data can actually be protection from the potential hacker, using encryption. With encryption data can be sent safely without anyone hacking into system and using it to their benefit. Companies such as Teign and Tow would use this as part of their internet security to ensure that any data they send is sent safe.

  2. Designing Switched LAN Internetworks.

    ATM provides scalable bandwidth that spans both LANs and WANs. It also promises Quality of Service (QoS) guarantees-bandwidth on demand-that can map into and support higher-level protocol infrastructures for emerging multimedia applications and provide a common, multiservice network infrastructure. ATM switches are one of the key components of ATM technology.

  1. Local area networks (LANs).

    Another important node on a network is the hub, also known as a wiring hub or concentrator. These devices centralize the network's wiring, making it easier to manage. All devices are connected via point-to-point link to the hub allowing multiple nodes to share the same connection to the network.

  2. Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues ...

    Situations can occur where data transmission takes place over a public, non-secure facility and thus has to be secured. Preventing line tapping can be done by inspecting wires that carry data (especially terminal wires and telephone lines used for modems)

  1. Computer Networks.

    The Technology Colleges Trust Intranet is an example of a private WAN, which has many technology colleges subscribed to it. Colleges can contribute and access data on this WAN. Joint Academic Network (JANET) is another example of a private WAN, set up by the universities.

  2. Produce a report for the Managing Director of Animal World Magazine outlining different ways ...

    it needs more cables to connect to every single computer and back to hub o A single point failure (hub) can stops the entire network from communicating and sharing resources o The network starts to get slow as more nodes are added.

  1. The Use of Big IP in Gamer.TV.

    They also host their own Website and maintain it whilst monitoring their parent company's Website and a few minor companies along with it. They direct and produce a game review program, that is aired once a week on a Wednesday, this basically gives true gamers an insight into new games and cheats that are available.

  2. implementation of an ITC system

    Only the persons sending and receiving the information have the key and this makes it unreadable to anyone except the intended recipient.) I have suggested a real time database development, in which they can all work on a database, and save it to the same location, or save a local copy and merge it at a later time.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work