Network, in computer science, techniques, physical connections, and computer programs used to link two or more computers. Network users are able to share files, printers, and other resources; send electronic messages; and run programs on other computers.
A network has three layers of components: application software, network software, and network hardware. Application software consists of computer programs that interface with network users and permit the sharing of information, such as files, graphics, and video, and resources, such as printers and disks. One type of application software is called client-server. Client computers send requests for information or requests to use resources to other computers, called servers, that control data and applications. Another type of application software is called peer-to-peer. In a peer-to-peer network, computers send messages and requests directly to one another without a server intermediary.
Network software consists of computer programs that establish protocols, or rules, for computers to talk to one another. These protocols are carried out by sending and receiving formatted instructions of data called packets. Protocols make logical connections between network applications, direct the movement of packets through the physical network, and minimize the possibility of collisions between packets sent at the same time.
Network hardware is made up of the physical components that connect computers. Two important components are the transmission media that carry the computer’s signals, typically on wires or fiber-optic cables, and the network adapter, which accesses the physical media that link computers, receives packets from network software, and transmits instructions and requests to other computers. Transmitted information is in the form of binary digits, or bits (1s and 0s), which the computer’s electronic circuitry can process.
Network Connections
A network has two types of connections: physical connections that let computers directly transmit and receive signals and logical, or virtual, connections that allow computer applications, such as word processors, to exchange information. Physical connections are defined by the medium used to carry the signal, the geometric arrangement of the computers (topology), and the method used to share information. Logical connections are created by network protocols and allow data sharing between applications on different types of computers, such as an Apple Macintosh and an International Business Machines Corporation (IBM) personal computer (PC), in a network. Some logical connections use client-server application software and are primarily for file and printer sharing. The Transmission Control Protocol/Internet Protocol (TCP/IP) suite, originally developed by the United States Department of Defense, is the set of logical connections used by the Internet, the worldwide consortium of computer networks. TCP/IP, based on peer-to-peer application software, creates a connection between any two computers.
Media
The medium used to transmit information limits the speed of the network, the effective distance between computers, and the network topology. Copper wires and coaxial cable provide transmission speeds of a few thousand bits per second for long distances and about 100 million bits per second (Mbps) for short distances. Optical fibers carry 100 million to 1 billion bits of information per second over long distances.
Topology
Common topologies used to arrange computers in a network are point-to-point, bus, star, and ring. Point-to-point topology is the simplest, consisting of two connected computers. The bus topology is composed of a single link connected to many computers. All computers on this common connection receive all signals transmitted by any attached computer. The star topology connects many computers to a common hub computer. This hub can be passive, repeating any input to all computers similar to the bus topology, or it can be active, selectively switching inputs to specific destination computers. The ring topology uses multiple links to form a circle of computers. Each link carries information in one direction. Information moves around the ring in sequence from its source to its destination (see Computer Architecture).
Local area networks (LANs), which connect computers separated by short distances, such as in an office or a university campus, commonly use bus, star, or ring topologies. Wide area networks (WANs), which connect distant equipment across the country or internationally, often use special leased telephone lines as point-to-point links.
Sharing Information
When computers share physical connections to transmit information packets, a set of Media Access Control (MAC) protocols are used to allow information to flow smoothly through the network. An efficient MAC protocol ensures that the transmission medium is not idle if computers have information to transmit. It also prevents collisions due to simultaneous transmission that would waste media capacity. MAC protocols also allow different computers fair access to the medium.
One type of MAC is Ethernet, which is used by bus or star network topologies. An Ethernet-linked computer first checks if the shared medium is in use. If not, the computer transmits. Since two computers can both sense an idle medium and send packets at the same time, transmitting computers continue to monitor the shared connection and stop transmitting information if a collision occurs. Ethernet can transmit information at a rate of 10 Mbps.
Computers also can use Token Ring MAC protocols, which pass a special message called a token through the network. This token gives the computer permission to send a packet of information through the network. If a computer receives the token, it sends a packet, or, if it has no packet to send, it passes the token to the next computer. Since there is only one token in the network, only one computer can transmit information at a time.
Network Operation and Management
Network management and system administration are critical for a complex system of interconnected computers and resources to remain operating. A network manager is the person or team of people responsible for configuring the network so that it runs efficiently. For example, the network manager might need to connect computers that communicate frequently to reduce interference with other computers. The system administrator is the person or team of people responsible for configuring the computer and its software to use the network. For example, the system administrator may install network software and configure a server’s file system so client computers can access shared files.
Networks are subject to hacking, or illegal access, so shared files and resources must be protected. A network intruder could eavesdrop on packets being sent across a network or send fictitious messages. For sensitive information, data encryption (scrambling data using mathematical equations) renders captured packets unreadable to an intruder. Most servers also use authentication schemes to ensure that a request to read or write files or to use resources is from a legitimate client and not from an intruder (see Computer Security).
Future Technologies and Trends
The wide use of notebook and other portable computers drives advances in wireless networks. Wireless networks use either infrared or radio-frequency transmissions to link these mobile computers to networks. Infrared wireless LANs work only within a room, while wireless LANs based on radio-frequency transmissions can penetrate most walls. Wireless LANs have capacities from less than 1 Mbps to 8 Mbps and operate at distances up to a few hundred meters. Wireless communication for WANS use cellular telephone networks, satellite transmissions, or dedicated equipment to provide regional or global coverage, but they have transmission rates of only 2000 to 19,000 bits per second.
New networks must also meet the growing demand for faster transmission speeds, especially for sound and video applications. One recently developed network, called an Asynchronous Transfer Mode (ATM) network, has speeds of up to 625 Mbps and can be used by either LANs or WANs.
In February 1996 Fujitsu Ltd., Nippon Telephone and Telegraph Corporation, and a team of researchers from AT&T succeeded in transmitting information through an optical fiber at a rate of 1 trillion bits per second-the equivalent of transmitting 300 years of newspapers in a single second. This was accomplished by simultaneously sending different wavelengths of light, each carrying separate information, through the optical fiber. If it can be integrated into a network, this new technology will make it easy, inexpensive, and incredibly fast to send information, such as video and memory-sensitive three-dimensional images.
Другие работы по теме:
World War Two Essay Research Paper German
World War Two Essay, Research Paper German naval leaders generally remained confident in the Enigma system throughout the war. Nevertheless, the security of their codes and ciphers was periodically brought into question by those fighting on the warfronts. From the conning tower perspective, Allied naval and air power seemed increasingly overwhelming.
The Computer Age Essay Research Paper Ben
The Computer Age Essay, Research Paper Ben Purdue 8/24/01 It is my prediction that the biggest issue we will face in the coming century not only as a nation but also as a planet is finding a blind between security of protected information and freedom of information. I say this because as a computer security consultant I understand the need for security of important information, however I as a programmer I understand such issues as the battle for open source code and freedom of information as a hole.
Computer Sec In Biz Essay Research Paper
Computer Security in Business Prepared by: Prepared for: It is 1994, a Russian hacker named Vladimir Levin and a group of accomplices are siting at a desk of a computer office somewhere in St. Petersburg. There, Levin electronically transfers $11 million from Citibank’s New York-based mainframes to Finland, Israel, and California.
Links 2000 Essay Research Paper OK Now
Links 2000 Essay, Research Paper O.K. Now you have an account what do you do now? You need to setup Web folders in My Network Places. Not in Network neighborhood. This is only in WinME.If you are not using WinME you might not have this option. In that case you need to download & install Internet Explorer 5.5 from microsofts website here.After you install IE 5.5 come back here.
Social Security 2 Essay Research Paper Social
Social Security 2 Essay, Research Paper Social security is very essential for most of today s older Americans. Since it was begun, it has been a sort of protection for retired workers, and for disabled workers. Social Security allows people to live independently and still have their dignity. There are about 150 million workers protected by Social security and more then 44 million people receive Social Security benefits.
Land Mines Essay Research Paper Land mines
Land Mines Essay, Research Paper Land mines greatly contribute to the danger of international security because they are used as military weapons. Because land mines have caused great destruction there has been an effort from international and non-governmental organizations to ban mines and clear areas infected with them.
Ipv4 Vs Ipv6 Essay Research Paper Evan
Ipv4 Vs. Ipv6 Essay, Research Paper Evan Gilden 2/12/01 CIT/TCT 120 Ipv4 vs. Ipv6 Ipv4 is short Internet Protocol Version 4, the same goes for Ipv6. Most of todays internet uses Ipv4 witch is almost 20 years old. There has been one magor problem with Ipv4, it is running out of IP addresses (IP addresses are a unique identifirer for a computer on the internet).
Information Security Essay Research Paper Emerging Opportunities
Information Security Essay, Research Paper Emerging Opportunities and The Internet – Information Security by Margaret Headley “Using encryption on the Internet is the equivalent of arranging an armoured car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.” Gene Spafford, computer security researcher, Purdue University.
Information Technlogy And Hack Essay Research Paper
Hacking has become a major issue in today s world of technology. Even software giant Microsoft has been affected. Recently hackers broke into Microsoft s computer system. The hacker or hackers created new accounts so that they could gain access to parts of the software giant s computer network. Some accounts were being created that did not match or normal audit logs, Mr.
Network Debate Essay Research Paper It was
Network Debate Essay, Research Paper It was a brutal race. They interrupted our daily scheduled shows with boisterous promises they could never fulfill. They invaded our towns and cities with their advertisements; their faces defaced our buses and benches. And still, no one has emerged as the clean victor.
Nervous System Adaptation Essay Research Paper Nervous
Nervous System Adaptation Essay, Research Paper Nervous System Adaptation plays a significant role in exercise development as seen by mental imagery, cross education, and coactivation. The body must establish and modify it?s own neural network before it can strengthen. A weight lifter can improve his workouts by understanding the fundamentals of NSA.
Social Security Essay Research Paper Social securityThe
Social Security Essay, Research Paper Social security The issue I am addressing today is what to do about social security. There is going to be a large problem with our social security in years to come. Both Al Gore and Bush
Why Aol Sux Essay Research Paper why
Why Aol Sux Essay, Research Paper why aol sux America Online is the largest Internet provider in the world, but it didn’t become one without a fight. Originally a closed-in, proprietary online service, it was pried open by the public’s fascination with the global network. For all of the company’s past glory, it is now little more than a big communications company.
Internet PC
’s: Next Wave Or Nonsense? Essay, Research Paper Internet PC’s: Next Wave or Nonsense? Call them what you will: Internet appliances. Network terminals. The whole
Internet Security Basics Essay Research Paper The
Internet Security Basics Essay, Research Paper The introduction of the Internet into today?s business world has been both exciting and terrifying at the same time. What was once a matter of internal security controls and training has now become a complex process with numerous unknown variables and problems.
Social Security Essay Research Paper Will Social
Social Security Essay, Research Paper Will Social Security be here in the future Social Security is a system that was set up in 1935 after the Great depression to help people get through tough times. “Social Security is now used by nearly 44 million Americans”(policy). Only people who payed into social security are eligible to collect when they retire.
Myths Essay Research Paper Is Information Technology
Myths Essay, Research Paper Is Information Technology a good thing? With the invention of the silicon chip, fiber optic cable and satellite communications the information superhighway is real. This global network of computers makes it possible to move massive amounts of information virtually anyplace.
Pbs Essay Research Paper PROCESS BASED SECURITY
Pbs Essay, Research Paper PROCESS BASED SECURITY, WHAT IS IT AND HOW IT WILL CHANGE YOUR COMPUTER?S LIFE This note is for the purpose of explaining a new way to implement operating system security called process-based security. First, an explanation of traditional operating system security is given. Next, an explanation of process-based security is given.
Mobile Alerts Essay Research Paper Mobile Alerts
Mobile Alerts Essay, Research Paper Mobile Alerts – Concept Paper. What is Mobile Alert? Mobile Alert is the text message (SMS) sent to a mobile phone as a result of occurrence of an event for which the mobile user has registered the request for getting the notification.
Examination Of The Threat Of Internet Security
Essay, Research Paper EXAMINATION OF THE THREAT OF INTERNET SECURITY The threat of Internet security is an issue of growing concern. In the last decade, the number of computers in use has exploded. For quite some time now, computers have been a crucial element in how we entertain and educate ourselves, and most importantly, how we do business.
The Old Man And The See Essay
, Research Paper THE HISTORY OF INTERNET In the beginning of the 1970`s in USA was an older military network called ARPANET converted to Internetvork wish was a network between networks. Accept a few Universities
Network Essay Research Paper Introducing LeakTest
Network Essay, Research Paper Introducing LeakTest – v1.0 This site has been most well-known for its FREE ShieldsUP! Internet security test. Crucial as it is to protect yourself from malicious hackers outside, those bad guys represent only half of the threat. The Internet has proven to be an extremely fertile transportation medium for all manner of nasty Trojan horse programs, rapidly proliferating viruses, and privacy invading commercial spyware.
Firewalls Essay Research Paper The term firewall
Firewalls Essay, Research Paper The term firewall has seen limited use since the late 1980s to describe a device to block unwanted network traffic while allowing other traffic to pass. The first published description of a “modern” firewall including use of that name was in ‘Practical Unix Security’ written in 1990 and published in 1991.
International Relations Realism Essay Research Paper In
International Relations: Realism Essay, Research Paper In the discipline of International Relations realism, which developed as a reaction to idealism during the Cold War, has become the dominant school of thought . Realism makes power the currency of international politics. Realist argue that by accumulating power states can ensure the security of the population within the state.
Home Computer Network Essay Research Paper Have
Home Computer Network Essay, Research Paper Have you ever needed to have more than one home computer for you and your family? Do you have two or more computers, but need to copy and/or share files and/or programs between them, but you don t know how? Do all of your computers need Internet access, but you don t want to have a phone line installed for each of them? Well, you can do all of this.
Computer Privacy Essay Research Paper Computer Privacy
Computer Privacy Essay, Research Paper Computer Privacy Issues An issue of concern at is Computer privacy. Computer privacy techniques have been developed to protect single computers and network-linked computer systems from accidental or intentional harm. The main reason for protecting these computers is to keep them from physical loss of data, deception of computer users and the deliberate invasion of databases by unauthorized individuals.
Internet Essay Research Paper Unfortunately there
Internet Essay, Research Paper Unfortunately, there’s a lot to worry about. There are security risks that affect Web servers, the local area networks that host Web sites, and even innocent users of Web browsers.
Vpn Essay Research Paper A company must
Vpn Essay, Research Paper A company must evaluate a variety of things when making networking decisions, especially when embarking on an expansion that would include
Token Vs Ethernet Essay Research Paper Well
Token Vs Ethernet Essay, Research Paper Well, now I feel confused about this whole situation. I started taking classes part time at BU about five years ago. I took two networking classes, Network hardware and Network management. I didn?t transfer my credits to um because the technology had changed so fast, and I wanted to learn the newest technology.