Advantages of Linear Bus topology



1.Easy to connect a computer or peripheral to a linear bus.

2.Requires less cable length than a star topology

Disadvantages of Linear Bus

1.Entire network shuts down if there is a break in the main cable. 2.Terminators are required at both ends of the backbone cable. 3.Difficult to identify the problem if the entire network shuts down.

Advantages of Star Topology

1.Easy to install and wire.2.No disruptions to the network then connecting or removing devices. 3.Easy to detect faults and to remove parts

Disadvantages1.Requires more cable length than a linear topology. 2.If the hub or concentrator fails, nodes attached are disabled.3.More expensive than linear bus topologies

Advantages of Tree topology 1.Point-to-point wiring for individual segments.2.Supported by several hardware and software venders.

Disadvantages 1.Overall length of each segment is limited by the type of cabling used. 2.If the backbone line breaks, the entire segment goes down. 3.More difficult to configure and wire than other topologies.

 

 

What are the components of the Network: Devices, media, services?

A computer network is a group of computers that shares information across wireless or wired technology. Computer networks used to only be available for corporations but they are affordable for small businesses and individuals. Computer networking requires two computers, a protocol and the hardware to connect them.

Devices:

Router-The basic hardware needed for a computer network is a router and network cards. A router directs traffic to the different computers. A router is similar to a traffic light. It handles network traffic and sends it to the different segments of the network. Network Card-A network card is required so the computers can communicate. A network card is an integral part of a computer network because it provides the computer a way to send and retrieve data. Server-A server is a part of the network. It is a machine with massive storage capabilities and faster processing, so multiple users can save and use resources. Client-The term "client" is given to the multiple user computers on the network. The client logs into the network on the server and is given permissions to use resources on the network. Client computers are normally slower and require permissions on the network, which separates them from server computers. Protocol-A protocol is the communication method used by the computer network. The protocol packages the information sent by the sender computer and delivers it to the recipient.

Media refers to cable:Cable is the medium through which information usually moves from one network device to another. There are several types of cable which are commonly used with LANs. In some cases, a network will utilize only one type of cable, other networks will use a variety of cable types.The type of cable chosen for a network is related to the network's topology, protocol, and size. Understanding the characteristics of different types of cable and how they relate to other aspects of a network is necessary for the development of a successful network.

In computer networking, a network service is an application running at the network application layer and above, that provides data storage, manipulation, presentation, communication or other capability which is often implemented using a client-server or peer-to-peer architecture based on application layer network protocols. Each service is usually provided by a server component running on one or more computers (often a dedicated server computer offering multiple services) and accessed via a network by client components running on other devices. However, the client and server components can both be run on the same machine. Clients and servers will often have a user interface, and sometimes other hardware associated with them.

What are Information Security threats? Cryptography

Modern technology and society’s constant connection to the Internet allows more creativity in business than ever before – including the black market. Cybercriminals are carefully discovering new ways to tap the most sensitive networks in the world. Protecting business data is a growing challenge. Information security, sometimes shortened toInfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical).Governments, military, corporations, financial institutions, hospitals and private businesses amass a great deal of confidential information about their employees, customers, products, research and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers. Information security threats come in many different forms. Some of the most common threats today are software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion. Most people have experienced software attacks of some sort. Viruses, worms, phishing attacks, and Trojan horses are a few common examples of software attacks. The theft of intellectual property has also been an extensive issue for many businesses in the IT field. Cryptography is devoted to keeping data and communications secure. It is a field at the core of information and communication technologies and combines mathematics, physics, computer science, and engineering. Individuals and organizations around the world depend on the ability to ensure data and communications systems are secure and reliable. Information security allows users to access services, verify the identities of other users and organizations, and authenticate the origin and integrity of software and other data.


Дата добавления: 2018-06-01; просмотров: 469; Мы поможем в написании вашей работы!

Поделиться с друзьями:






Мы поможем в написании ваших работ!