INTRODUCTION to network architecture &topologies In the present time where technology is playing a major role in every sector it is important to communicate and transfer data and information among various locations within seconds. Computer Networking is an architecture which works on exchange of data and information between computers. In respect to transfer of data a physical connection is demanded by means of cables, wireless modems among computers and most commonly used platform of computer network is internet. Data is transformed, directed and terminated through various network nodes of computer devices. These nodes commonly are device like server, hubs, repeaters and routers. When two or more systems share and exchange information they are said to be inter-connected. There are various rules for transfer of data among systems known and network protocols which define data formats and rules in which information can be exchanged. The most widely used protocol is TCP/IP (Chiang, 2008). TASK 1: UNDERSTANDING OF LAN TECHNOLOGIES LAN or local area network could be stated as kind of computer network in which computers are inter-connected in a way by which information could be exchange, inter-communication and resource sharing can be implemented. In simple terms it is a network which allows multiple users to access the same resources of a system, regardless of physical location of user or computer resources. The primary usage of LAN architecture is implemented in small area like school, office or college. In LAN computer network architecture, each user can receive and send data addressed to it (Trulove, 2005).Various types of LAN topologies are available and are shared below: STAR TOPOLOGY: In this type of topology, every computer or system is straightly connected to a custom centralized node. The central station was also known as Star Coupler carries two point-to-point links, in which one does work for transmission and one is used for receiving. The basic features of star network include, Firstly it is quite expensive to be implemented. Secondly the speed is quite fast as every node has its particular cable. Thirdly if a cable gets busted then only a single computer gets affected. The whole architecture is completely dependent on central device. It the most general network topology (Local area network(LAN), 2013). BUS TOPOLOGY: In this type of LAN topology, we design a long centralized cable which looks like a bus is utilized to inter-connect the entire computer or the nodes altogether. Every computer carries a short cable which is inter-joined to the central cable or we can say links to the bus. The salient features of LAN are: Firstly its implementation is very cheap since lesser amount of cables is required. Secondly it is fairly slow as all computers utilize the same cable for transfer and reception of information and data. There can be interruption if the central cable gets damaged (Chia UPTO50% Avail The Benefit Today! To View this & another 50000+ free Enter Email Submit
TOPIC : Does mass surveillance really protect us from crime / terrorism? As a part of reflective essay, I have tried to reflect upon the major discussion in the debate which focused upon the effectiveness of mass surveillance in contemporary environment. sMass surveillance involves the practices
INTRODUCTION Information and communication technology is pro version of information technology which plays crucial role in communication and the integration of telecommunication such as telephone line and wireless signals (Schreurs, Quan-Haase and Martin, 2017). It is widely used in education and
Chapter 1: Introduction 1.1 Background to Research Topic Supply chain management refers to the management of the flow of data, finances and goods in relation to a service or product, from procuring raw materials to the delivery of commodities at final place or destination (Dutta and et al.,
INTRODUCTION Digital technology play important role in business success. Therefore, Morrison consider customer relationship software implementation in it. In this regard, desired results will be develop successfully to cope up with different strategies and techniques. As per implementation of
Literature Review In today era people are focusing on making use of more and more technology. According to Zeytonli and et.al., (2013) as per recent study it is identified that consumer behaviour of people get changed and now they are visiting websites before purchasing any dearer item. It can be
Introduction GCSE (General Certificate of Secondary Education) is an international academic qualification programme held by Commonwealth countries under educational programmes. In UK, it is generally used for wide range of subjects in the secondary education for pupils. It was introduced in the
Introduction Computing is a goal oriented process of using the operations of computers for performing some calculations. User utilizes various computer technologies for completing some sorts of tasks. It involves designing, developing, processing, structuring and managing of hardware and software
Chapter 1: Introduction 1.1 Background of the study A significant development in Information technology has brought several revolutions in many industries. Hence, the benefit of same has also being gather by mobile gaming industry. Herein, it is examined that in today's scenario mobile gaming
Introduction to Information Technology The information technology (IT) can be simply defined as the program that are used in conserving , manipulating, applying queries, as well as transmit the data regarding solving the work issues of any enterprise or business(Tallon and Pinsonneault, 2011). IT
Introduction to IT Virtualisation IT Virtualisation refers to the developing a virtual version of systems rather than actual which includes operating system, server, storage devices, network systems, etc. With the help of virtualisation, companies can run number of operating systems or other