Computer Network

In: Computers and Technology

Submitted By ak2012ash
Words 3658
Pages 15
Computer Network
A computer network is a group of computers that are interconnected by electronic circuits or wireless transmissions of various designs and technologies for the purpose of exchanging data or communicating information between them or their users. Networks may be classified according to a wide variety of characteristics. This article provides a general overview of types and categories and also presents the basic components of a network.
A computer network allows sharing of resources and information among devices connected to the network. The Advanced Research Projects Agency (ARPA) funded the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defense. It was the first operational computer network in the world.[1] Development of the network began in 1969, based on designs developed during the 1960s. For a history see ARPANET, the first network.
Facilitating communications Using a network, people can communicate efficiently and easily via e-mail, instant messaging, chat rooms, telephony, video telephone calls, and videoconferencing.
Sharing hardware
In a networked environment, each computer on a network can access and use hardware on the network. Suppose several personal computers on a network each require the use of a laser printer. If the personal computers and a laser are connected to a network, the personal computers users each can access the laser printer on the network, as they need it.

Sharing files, data, and information
In a network environment, any authorized computer user can access data and information stored on other computer on the network. The capability of providing access to and storage of data and information on shared storage devices is an important feature of many networks.
Network classification
Connection method
Computer networks can be classified…...

Similar Documents

Computer Networks Finally, two detailed case studies are given: UNIX/Linux and Windows 2000. Structured Computer Organization, 4th edition This widely-read classic, now in its fourth edition, provides the ideal introduction to computer architecture. It covers the topic in an easy-to-understand way, bottom up. There is a chapter on digital logic for beginners, followed by chapters on microarchitecture, the instruction set architecture level, operating systems, assembly language, and parallel computer architectures. Operating Systems: Design and Implementation, 2nd edition This popular text on operating systems, co-authored with Albert S. Woodhull, is the only book covering both the principles of operating systems and their application to a real system. All the traditional operating systems topics are covered in detail. In addition, the principles are carefully illustrated with MINIX, a free POSIX-based UNIX-like operating system for personal computers. Each book contains a free CD-ROM containing the complete MINIX system, including all the source code. The source code is listed in an appendix to the book and explained in detail in the text. About the Author Andrew S. Tanenbaum has an S.B. degree from M.I.T. and a Ph.D. from the University of California at Berkeley. He is currently a Professor of Computer Science at the Vrije Universiteit in Amsterdam, The Netherlands, where he heads the Computer Systems Group. He is also Dean of the Advanced School for Computing and Imaging, an......

Words: 292171 - Pages: 1169

Computer Networks

...Experience the more we are strengthening our global brand every day. 1.2 Why do we have a global brand? Having a global brand allows AIESEC (1) to be more consistent and credible, (2) to attract more stakeholders and give AIESEC a clear competitive advantage; (3) to attract the right stakeholders and to set the right expectations; and (4) to align the organization to globally leverage the AIESEC Experience. Brand Experience Toolkit 1.0 – History of the AIESEC brand Brand Experience Toolkit [August 2007] 1.3 Brand Promise vs. Brand Experience: an evolution The Brand Promise introduced in 2004 was the start of the branding initiative from AIESEC International, bringing the network together to have one visual identity and synergizing messages across the network. While the earlier brand promise helped quite a bit to align the organization to be transmitting common messages, it was difficult to apply to products and also quite internally focused, not providing reasons for partners to engage with AIESEC rather than our competition. The brand promise was made up of words that we felt best described AIESEC, but there was no clear plan on how to use it in practice. Now a few years later, we see the need to evolve this further in order for it to be used in practice, including how it should be used in relation to product development and messaging—a crucial step on the path to creating a strong global brand for AIESEC. As a result, with the help of consultants......

Words: 2946 - Pages: 12

Computer Network

...Week 2 – Case Study SEC-280 11-9-2013 The first point that I will address consist on the multiple dangers that computer networks are exposed, that are in majority done by perpetrators that get access to servers of Windows and Linux to explode their vulnerabilities.. The use of these codes or malware in the form of viruses, worms, time bombs or any peculiar name this individuals use to give to their destructive toys, are a major concern to the protection of confidential information. Data so sensitive that in their majority is composing of identity, credit, and property information so well collected and compiler that is plenty for the creation of a clone of a company or a person. These identity theft atrocities are not limit to the software and information appropriation; also the attacks diminish computer performance, affecting their velocity and cause computers to crash. The CIO should possess a compendium of way’s to defend his network, and a rapid decision capability to take decisions in a short time period. Furthermore, in general terms security; as we can define “ the act of provide a sense or protection against lost, attack or harm”, can use or integrate a complete protection plan. Depending on the resources of the company the integration of a security plan that can integrate “the five pillars of security IT security operation: policy and audit management, access management, infrastructure and hardware security and incident response.” The real world presents to us a...

Words: 591 - Pages: 3

Computer Networks

...Form * No tags edit Save Cancel Bottom of Form * * Notify * RSS * Backlinks * * Source * Print * Export (PDF) Review Summary 1. What are the principal components of telecommunications networks and key networking technologies? A simple network consists of two or more connected computers. Basic network components include computers, network interfaces, a connection medium, network operating system software, and either a hub or a switch. The networking infrastructure for a large company includes the traditional telephone system, mobile cellular communication, wireless local area networks, video-conferencing systems, a corporate Web site, intranets, extranets, and an array okf local and wide area networks, including the Internet. Contemporary networks have been shaped by the rise of client/server computing, the use of packet switching, and the adoption of Transmission Control Protocol (TCP/IP) as a universal communications standard for linking disparate networks and computers, including the Internet. Protocols provide a common set of rules that enable communication among diverse components in the telecommunications network. 2. What are the main telecommunications transmission media and types of networks? The principal physical transmission media are twisted copper telephone wire, coaxial copper cable, fiber-optic cable, and wireless transmission. Twisted wire enables companies to use existing wiring for telephone systems......

Words: 783 - Pages: 4

Computer Networks networks Table of Contents DECLARATION 2 INTRODUCTION 5 PURPOSE 5 NETWORK CRITERIA 6 Performance 6 Reliability 6 Security 6 TYPES OF NETWORK CONNECTION 6 NETWORK CLASSIFICATION 7 Connection method 7 Wired technologies 7 Wireless technologies 8 Scale 9 Personal Area Network 9 Local Area Network 9 Metropolitan Area Networks 10 Wide Area Network 10 Network Architecture 10 BASIC HARDWARE COMPONENTS 14 Network interface cards 14 Repeaters 14 Hubs 14 Bridges 15 Switches 15 Routers 15 Modem 16 CABLE STANDARD 16 Connectors and other information 16 Conductors required 17 Characteristics 17 ACCESS CONTROL METHODS 19 Token Based Access 19 Token priority 19 Carrier Sense Multiple Access with Collision Detection (CSMA/CD) 20 Collision detected procedure 20 INTRODUCTION A computer network, often simply referred to as a network, is a group of computers and devices interconnected by communications channels that facilitate communications among users and allows users to share resources. Networks may be classified according to a wide variety of characteristics. A computer network allows sharing of resources and information among interconnected devices. In the 1960s, the Advanced Research Projects Agency (ARPA) started funding the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defense. It was the first computer network in the World.  Development of the......

Words: 5343 - Pages: 22

Introduction to Computer and Network Hardware:

...Best Device for Your Needs Introduction to Computer and Network Hardware: ITCO103 - 1401A – 01 IP 1 Best Device for Your Needs Many people are updating their smartphones, laptops and desktops. There are so many options to choose from brand, size and performance. This paper will discuss and compare some of today’s best bargain laptops and computers that will also offer some of today’s most updated software and features. I will also discuss two of the most popular smartphones comparing and contrasting each devices features. While shopping on the internet for the best computer system I had hundreds of choices. I decided to narrow my choices down by picking a device that had all the features I needed in a computer system, but had a reasonable price tag for a full time worker and a part time student budget. The best option for me is the Dell Inspiron 660, and the Canon PIXMA MG2220 all-n-one printer it has all the features and needs that I would need in a personal home desktop system. The price point for this desktop is around $529.00. This device can be purchased at Wal-Mart, Best Buy, and Hhgreeg making it accessible to most for in store purchase. This desktop is also available for purchase online as well from the dell website directly for the price listed above. The system software consists of OS Provided Microsoft Windows 7 Home Premium 64-bit Edition. The system setup......

Words: 1468 - Pages: 6

Computer Network

...ARP: The Address Resolution Protocol (ARP) plays a key role in the process of IP routing. ARP finds the hardware Media Access Control (MAC) address of a host from its known IP address. ARP maintains a cache called ARP table in which Link-layer addresses (MAC address) are mapped to network-layer addresses (IP address). How ARP works: The capture of local traffic from my home network is shown below. At my home network my Home PC (source) IP address is where as my default gateway (Home router) IP address is Findings from the Capture: Before a source sends a datagram to destination, it looks in its ARP table to check if there is a MAC address for the corresponding IP address of the destination. If there is no such entry in the ARP table, the source sends a Broadcast request to every single device on the subnet. Each device on the subnet compares the destination IP address to its own IP address. If the destination IP address match with the any of the device IP address in the subnet then only the matching IP address device gives a Unicast reply to the source with its MAC address. If the destination address is out of the subnet then the edge router (IP address of default gateway) will send a Unicast reply with its connected interface MAC address. The source then adds the destination MAC address to its ARP table encapsulates the datagram by adding header and trailer content, and proceeds to transfer the data....

Words: 263 - Pages: 2

Computer Network

...TRADEMARK LAW AND CYBERSPACE Paras Nath Singh M.Tech. Cyber Security Centre for Computer Science & Technology Central University of Punjab, Bathinda (Punjab). Abstract—Trademark law aids consumers who use trademarks in the marketplace to identify swiftly and without problems a product they liked or disliked in the past, distinguishing among the different competing manufacturers of a product. No one is entitled to sell or deliver commodities under the appearance that the commodities derive from someone else. The importance of consumer protection cannot be overemphasized and the average consumer standard should remain the central point of the inquiry, even under domain name litigation. Replacing the initial interest confusion doctrine is one decisive step, along with the introduction of a doctrine representing the fact that there should be no confusion at the point the sale, and this doctrine would intervene to allow for the capacity of the consumer to choose freely the products they want. Keywords: - trademarks; cyberspace; generic; domain names I. INTRODUCTION Trademarks have been used to designate the source or origin of products for years and a trademark is “any word, name, symbol, or device, or any combination thereof”1 used by a company to identify itself as the source of particular goods and distinguish its goods from those manufactured or sold by competitors. Section 2 of the Canadian Trademark Act2 considers “trademarks” as: * a mark that......

Words: 2830 - Pages: 12

Computer Network

...EENG30002/EENGM0007 Networks and Protocols - 2015 Graduates have told me that the material we're going to cover is very useful in their careers Textbook-based teaching at the request of previous students - book is available free electronically Wetherill also posts video lectures online Important to keep up with reading (200 pages) - nightmare if left until two weeks before the exam Do answer the in-class questions Visit and log in with your UoB username - initial password is: Networking28976 but please change it as soon as possible by visiting Lectures (screen activity & audio) will be recorded and uploaded to Blackboard soon afterwards. Support is provided via Assessment: EENG30002: 2-hour exam in January; EENGM0007: Lab-based coursework (10%) plus 2-hour exam in January (90%) NPP Lectures 2015 Page 2 NPP Lectures 2015 Page 3 NPP Lectures 2015 Page 4 NPP Lectures 2015 Page 5 NPP Lectures 2015 Page 6 NPP Lectures 2015 Page 7 NPP Lectures 2015 Page 8 NPP Lectures 2015 Page 9 NPP Lectures 2015 Page 10 1 Networks, Protocols and the Internet Read 1.1 (esp. 1.1.3) and 1.2 Classify applications as wireless or mobile or both. Describe the attributes of Personal Area Networks, Local Area Networks, Metropolitan Area Networks, Wide Area Networks, and the Internet. Bookmark this. (a) Q1 The book says that the iPhone is an example of… Q2 A......

Words: 1984 - Pages: 8

Evaluating the Security of Computer Networks

...Evaluating the Security of Computer Networks Security in Systems Architecture and Applications SE579 2 Table of Contents Evaluating the Security of Computer Networks I. Vulnerabilities A. Design Flaws B. Poor Security Management C. Incorrect Implementation II. Firewalls A. Packet Filtering B. Circuit Level Gateway Proxy Server C. Application Gateway III. Antivirus A. Scans IV. Intrusion Detection Systems V. Disadvantages VI. Conclusion 3 One of the major computing challenges in today’s economy is the lack of adequate security over the information computer networks, and internet applications in which business, government, and economy depend on. Businesses have become more dependent on information. The gathering, organizing, managing, finding, and analyzing of information are crucial to businesses. Computer viruses created by hackers cost businesses $55 billion in 2003. In 2011, a single instance of hacking on the Play Station cost Sony more than $170 million, while Google lost $500,000 due to hacking in 2005.(Coyne) 2003 Single instances of hacking may cost as much as $600,000 to $7m a day......

Words: 2281 - Pages: 10

Computer Networks

... | Computer Networks | By:Yaafiz Mohamed (S12425216)Zimna Ahmed (S12465436)Shahuma Abdulla (S12465351)Najudha Adam (S12465351)Sama Ali (S12465333) | | | | | Table of Contents Introduction 3 Computer and Networking. 3 Characteristics of Computer Networks. 3 Types of Computer Networks. 4  PAN (Personal Area Network) 4  LAN (Local Area Network) 5  MAN (Metropolitan Area Network) 5  WAN (Wide Area Network) 5  CAN (Campus Area Network) 5  SAN (Storage Area Network) 5 Why do we network our computers? 6 Peer-to-peer networking. 6 Computer Network Technologies 7 Conclusion: 8 Reference: 9 Introduction The purpose of the report is to survey and monitor the current state of computer network and the types of computer networks. This report is written by examining a range of recent published articles, magazine articles, and internet sites on the topic of computer networks used which are used commonly. The report is mainly about the types of computer network and their functions. Computer and Networking. A computer is a programmable machine, which is designed to sequentially and arithmetically carry out a sequence of logical operations. The particular sequence of operation allowing to solve more than one kind of problem. It responds to a specific set of instructions in a well defined manner. It can execute a pre-recorded list of instructions. Main components of computers are input, output and process. (Thakur) According to (Mitchell, What is......

Words: 1669 - Pages: 7

Computer Network

...I. Computer Dynamics Computer Dynamics is a microcomputer software development company that has a 300-computer network. The company is located in three adjacent five-story buildings in an office park, with about 100 computers in each building. The current network is a poorly designed mix of Ethernet and token ring (Ethernet in two buildings and token ring in the other). The networks in all three buildings are heavily overloaded, and the company anticipates significant growth in network traffic. There is currently no network connection among the buildings, but this is one objective in building the new network. Describe the network you would recommend and how it would be configured with the goal of building a new network that will support the company’s needs for the next 3 years with few additional investments. Be sure to include the devices and type of network circuits you would use. You will need to make some assumptions, so be sure to document your assumptions and explain why you have designed the network in this way. Because we are considering the company present needs and over the next 3 years and not adding any addition investments, I would design the network using the traditional network design process. Computer Dynamics is centrally located in three adjacent five-story buildings, however there is no network connectivity amongst the buildings, which means we have to build a backbone to connect all three LANs. Before addressing the connectivity issues amongst the......

Words: 460 - Pages: 2

Computer Networks

...  North South University  School of Business MIS 105 Introduction to the Computer  Group Presentation   Summer 2012  Presentation Date:  05‐Aug‐2012 Sunday    Venue: Classroom         Time: Normal Class time       Out of: 30    Topic: Computer networks    Scenario: You work in the mid‐level management position of a large multinational  corporation handling millions of records per month. The corporation has about 10  different concerns with around 50 branches countrywide. The corporation has recently  decided to overhaul their computer network system in order to tune up their data  communication system. You, as in charge of the project, are to design a new networking  plan that will improve the performance of their existing data communication system.    What to do:  • Prepare a Multimedia presentation (Power Point) in your group that clearly  explains your plan. If you are planning to use any software/hardware you must  be very specific with their names and the way they work along with their success  history. You are required to perform an extensive online research for this  purpose. You may assume any other parameter that has not been mentioned in  the above scenario.  • You must reference every page (in‐text referencing) of your presentation in  Harvard style. Remember, your work do not have any value without appropriate  referencing. Your presentation must include at least 6 in‐text references; at least ......

Words: 531 - Pages: 3

Network and Computers a server in a network of computers that use the Windows NT Operating System. (Domain controller) Windows NT uses the thought of a domain to manage access to a set of network resources for a group of users. (Domain controller) The person only needs to log in, to gain access to the resources connected to the domain; but could be on any number of different servers in a network. The primary domain controller (which is one server) manages the master user database for the domain. (Domain controller) Backup domain controllers are one or more servers. The primary domain controller will send copies of the database periodically to the backup domain controllers. The backup domain controllers also steps in as the primary domain controller, when the primary domain controller server fails; to help keep the balance of the work if the network is busy. “In Windows NT, a domain combines some of the advantages of a workgroup (a group of users who exchange access to each other’s resources on different computers) and a directory (a group of users who are managed centrally by an administrator).” (Domain controller) The domain concept not only lets a person to obtain access to different resources that are on different servers, but it lets one domain to be given access to another domain in a trusted relationship. In this relationship, the person only needs to log into the first domain to gain access to the second domain. (Domain controller) “In a Windows NT network, not all......

Words: 1064 - Pages: 5

Computer Network

...penting sebagai ukuran klasifikasi karena diperlukan teknik-teknik yang berbeda untuk jarak yang berbeda. Tabel berikut menggambarkan hubungan antar jarak dan prosessor yang ditempatkan pada tempat yang sama. Jarak antar prosessor 0.1 m Prosesor di tempat yang sama Papan rangkaian Jenis jaringan Data flow machine: komputer-komputer paralel, memiliki beberapa unit fungsi yang semuanya bekerja untuk program yang sama Multicomputer, sistem yang berkomunikasi dengan cara mengirim pesan-pesannya melalui bus* pendek dan sangat cepat. Local Area Network (LAN) Local Area Network (LAN) Local Area Network (LAN) Metropolitan area Network (MAN) Wide Area Network (WAN) Secara garis besar ada dua jenis teknologi transmisi: 1m 10 m 100 m 1 km 10 km 100 km Sistem Ruangan Gedung Kampus Kota Negara 3 Pengantar Teknologi Informasi Prodi Sistem Informasi UKDW Umi Proboyekti, S.Kom, MLIS 1.000 km 10.000 km mainboard. Benua Planet Wide Area Network (WAN) Internet *Jalan data elektrik yang mana bit dikirimkan dalam CPU, antar CPU dan komponen-komponen lain di Disini secara terbatas dan sederhana dijelaskan secara singkat LAN, MAN, WAN dan Internet. a. LAN: menghubungkan komputer-komputer pribadi dalam kantor perpusahaan, pabrik atau kampus: LAN dapat dibedakan dari jenis jaringan lainnya berdasarkan 3 karakteristik: ukuran, teknologi transmisi dan topologi jaringan. Topologi LAN jenis broadcast : BUS (kabel linier) Topologi LAN jenis broadcast:......

Words: 2301 - Pages: 10

Get The Gringo - 2012 | tagКосмос | The Guardians