Server Computers In A Client Server Network example essay topic

6,503 words
CP 2099-Individual Assessment Networking Report Contents The report is broken down in 30 main sections in them the following can be viewed: 1. INTRODUCTION 2. WHAT IS A NETWORK? 3. WHAT ARE THE BENEFITS FROM NETWORKING? 4.

NETWORK RELATIONSHIP TYPES 5. WIDE AREA NETWORKS (WAN) 6. LOCAL AREA NETWORKS (LAN) 7. METROPOLITAN AREA NETWORK (MAN) 8. PEER-TO-PEER NETWORK RELATIONSHIP 9. CLIENT / SERVER NETWORK RELATIONSHIP 10.

COMPARING PEER-TO-PEER AND CLIENT / SERVER 11. ADVANTAGES OF PEER-TO-PEER 12. DISADVANTAGES OF PEER-TO-PEER 13. ADVANTAGES OF CLIENT / SERVER 14.

DISADVANTAGES OF CLIENT / SERVER NETWORKS 15. NETWORK FEATURES OF CLIENT / SERVER 1 FILE SHARING 2 PRINTER SHARING 3 APPLICATION SERVICES 4 E-MAIL 16. THE INTERNET 17. NETWORK SECURITY 18. WORKSTATION HARDWARE 19. BUS TOPOLOGY 20.

STAR TOPOLOGY 21. RING TOPOLOGY 22. TREE TOPOLOGY 23. FIREWALLS 24.

DIGITAL SUBSCRIBER LINE (DSL) 25. ACCOUNT SECURITY 26. CONCLUSION 27. RECOMMENDATION 28. BIBLIOGRAPHY 29. ANNOTATED BIBLIOGRAPHY 30.

APPENDICES APPENDIX 1.1: THE SERVER APPENDIX 1.2: THE NETWORK CARD APPENDIX 1.3: THE ROUTER INTRODUCTION I have decided to research into Networking as my individual assignment for CP 2099, because I am interested in setting up networks, as I already have set up my own small network at home. I also want to find out some of the advantages and disadvantages of the different types of networks. I will research extensively in order to find the best possible network for: . A small business such as a medium sized office. A large business such as the University of Wolverhampton. And a home network WHAT IS A NETWORK?

A definition of a network is:' 'Information system implemented with a collection of interconnected nodes'Computers on a network are sometimes called 'nodes'. There are many different ways to network computers together. A group of two or more computer systems linked together. There are many types of computer networks, including: .

Local-area networks (LANs): The computers are geographically close together (that is, in the same building)... Wide-area networks (WANs): The computers are farther apart and are connected by telephone lines or radio waves. There are many possible reasons that a company might need or benefit from a network. In order to understand your particular company, you should start by exploring the following questions. You may need to ask a variety of people in the company their perspectives on these questions.

Some of the people you may need to interview include the chief executive or the owner, the chief financial officer, and the key departmental heads within the company, such as manufacturing, retail operations and so on. The range of people you interview will depend on the type of business (or at home the users); in this case it is a small and large company. Before setting up a network whether a home network or a business network you should ask questions like: . What is the function of the network (why it will be used)?

What are the Key objectives of the network or the users? Why set up a network? What is the purpose of the network? NETWORK RELATIONSHIP TYPES Networking can be a very difficult subject especially if you have not done any networking before, but even so you can still set up your own network in minuets.

There are a lot of complex aspects to networking. This report is set out to help you understand the essential aspects networking, as you progress through your understanding of networking it will become more easier. The term "network relationship" refers to two different concepts regarding how one computer makes use of another computers resources over a network. Two fundamental types of network relationships exist: . Peer-to-peer. And Client / server These two types of network relationships define the very formation of a network.

You can think of these networks as businesses for example, a peer-to-peer network is much like a company run by de centralised management philosophy, where decisions are made locally and resources are managed according to the most immediate needs. A client / server network is more like a company that works on centralised management, where decisions are made in a central location by a relatively small group of people. Situation exist where both peer-to-peer and client / server relationships are appropriate and many networks have aspects of both types within them (See Section Comparing peer-to-peer and client / server). Both types of networks require a physical network connection between the computers and the same network protocols be used, and so on.

There is no difference between the two types of network relationship at this point. The difference occurs when you spread the shared network resources around to all computers on the network or use a centralised network server (s). WIDE AREA NETWORKS (WAN) A definition of a WAN is:' Computers connected to a wide-area network are often connected through public networks, such as the telephone system. They can also be connected through leased lines or satellites.

The largest WAN in existence is the Internet'. Source: web (under definition of WAN) WANs are built to provide communication solutions for organisations or people who need to exchange digital information between two places. The main purpose of a WAN is to provide reliable, fast and safe communication between two or more places with low delays and at low prices. WANs enable an organisation to have one integral network between all its departments and offices, even if they are not all in the same environment. LOCAL AREA NETWORKS (LAN) A Local area network (LAN) is a group of computers and associated devices that share a common communications line and naturally share the resources of a single processor or server within a small geographic area. Usually, the server has applications and data storage that are shared in common by multiple computer users.

A local area network may serve as few as two or three users (for example, in a home network) or many as thousands of users (for example, in an University such as Wolverhampton). This unique feature on a wired LAN provides infinite bandwidth on your network by allowing a separate broadband connection (e.g. a cable modem, DSL) to be connected to each Complex Broadband Router on your network. One main local area network technologies is: . Token ring METROPOLITAN AREA NETWORK (MAN) A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN). The term is applied to the interconnection of networks in a city into a single larger network (which may then also offer efficient connection to a wide area network). It is also used to mean the interconnection of several local area networks by bridging them with backbone lines.

The latter usage is also sometimes referred to as a campus network. PEER-TO-PEER NETWORK RELATIONSHIPA peer-to-peer network relationship defines one in which computers on the network communicate with each other as equals. Each computer is responsible for making its own resources available to other computers on the network. These recourses might be files, directories, application programmes, or devices such as printers, modems, scanners, plotters or any other type of device. Each computer is also responsible for setting up and maintaining its own security for those resources. Finally each computer is responsible for accessing the network resources it needs from other peer-to-peer computers and for knowing where those resources are and what security is required to access them.

CLIENT / SERVER NETWORK RELATIONSHIPA client / server network relationship is one in which a distinction exists between the computers that make available network resources (the Server (s) ) and the computers that use the resources (the clients, or workstations). A pure client / server network is one in which all available network resources such as files, directories, applications, and shared devices are centrally managed and hosted, and then accessed by the client computers. No client computers share their resources with other client computers or with the server (s). Instead, the computers are pure consumers of these resources. The server computers in a client / server network are responsible for making available and managing appropriate shared resources, and for administrating the security of those resources. An example of a server, which can be used in a network, can be seen in Appendix 1.1: The Server.

The Wolverhampton University uses a Client / Server method as the work that students save gets transferred to the main server instead of the PC hard drive. COMPARING PEER-TO-PEER AND CLIENT / SERVER Sometimes you can get networks which have both aspects of peer-to-peer and client / server relationships. While it is definitely possible to have just one type of relationship or another, the fact is that both relationships have their place. Before we decide on setting up a network relationship using one or even both types of relationships, we have to examine the Advantages and Disadvantages of each and determine how each meets the needs of this company. ADVANTAGES OF PEER-TO-PEER There are a number of advantages to peer-to-peer networks, particularly for smaller firms as this one.

The advantages are as follows: . Use less expansive computer hardware: peer-to-peer networks are the least hardware-intensive. In a pure peer-to-peer network, the resources are distributed over many computers, so there is no need for a high-end server computer. The impact on each workstation is usually relatively minor... Easy to administer: peer-to-peer networks are, overall, easiest to set up and administer.

Because each machine performs its own administration. The effort of administrating id divided by the number of people... No NOS required: peer-to-peer networks do not require a network operating system (NOS). You can build a peer-to-peer network just using Windows 98/2000/XP/2003, on all workstations, or all Macintosh computers. All of these workstations operating system include all the features necessary to do this, you can do this with all UNIX- based computers (UNIX is much more complex and takes a lot of time to get use to)...

More Built in redundancy: if you have a small network, with 10-20 workstations and each one with some important data on it, and one fails, you still have most of your shared resources available. DISADVANTAGES OF PEER-TO-PEER There are also various drawbacks to peer-to-peer networks, particularly for lager networks, or for networks that have more complex or sophisticated requirements. The downfalls of peer-to-peer include the following: . Might hurt users performance: if some workstations have frequently used resources on them, the use of these resources across the network might adversely affect the person using the workstation... Not very secure: peer-to-peer networks are not nearly as secure as client / server networks because you cannot guarantee no mater how good the users of the network are that they will appropriately administer their machines. People may not follow good administrative practices on there own machine.

Most common desktop operating system on which one runs a peer-to-peer network, like Windows ME or the Macintosh, are not built to be secure operating systems... Hard to backup: reliability backing up all the data scattered over many workstations is difficult, and it is not wise to leave this job up to the other users of each machine... Hard to maintain version control: in a peer-to-peer, with files potentially stored on a number of different machines, it can become extremely difficult to manage different document versions. ADVANTAGES OF CLIENT / SERVER Client / server networks, offer the opportunity for centralised administration, using equipment better suited to managing and offering each resource. Client / server networks is the type that you almost always see for networks larger than 10 users, and there are quite a few good reasons for this type of network. The advantages of client / server network are as follows: .

Very secure: a client / server networks security comes from several things. First, because the shared resources are located in a centralised area, they can be administered at that point. Managing a number of resources is much easier if those resources are all located on one or two servers, as opposed to having administered resources across twelve or hundreds of computers. Second, usually the server is physically in a secure location, such as a lockable server closet. Physically security is an important aspect of networking security and it cannot be achieved with peer-to-peer network. Third, the operating system on which one runs a client / server network is designed to be secure.

Provided that good security and administration practices are in place, the servers cannot be easily "hacked". ... Better performance: while dedicated server computers are more expensive than standard computer workstations, they also offer considerably better performance and they are optimized to handle the needs of many users simultaneously... Centralised backup: backing up a company's critical data is much easier when it is located on a centralised server. Often, such backup jobs can be run overnight when the server is not in use and the data is static. Also centralised backups are often faster than de centralised backups...

Very reliable: while it is true more built in redundancy exists with a peer-to-peer network, it is also true a good client / server network can be more reliable, overall. Dedicated server has much more built in redundancy than standard workstations. They can handle the failure of a disk drive, power supply, or processor and continue to operate until the failed component is replaced. Also, because a dedicated server has only one relatively simple job to do, its complexity is reduced and its reliability increased. Compare this with a peer-to-peer network where actions on the part of the users can severely reduce each workstations reliability. For example, having to restart a PC with windows 2003 or a Macintosh every few days is not uncommon, whereas dedicated servers often run for months without requiring a restart or crashing.

DISADVANTAGES OF CLIENT / SERVER NETWORKS Balancing the advantages of client / server networks, you also need to realise that there are drawbacks, particularly for companies that don't have there own in house administrator, or who want to maximize the expense of the network as much as possible. The disadvantages of client / server are as follows: . Require professional administration: client / server networks usually need some level of professional administration, even for small networks. You can hire a network administrator or you can use a company that provides professional administration services, but it is important to remember that professional administration will be required... More hardware intensive: in addition to the client computers, you also need a server computer; this usually needs a pretty "beefy" computer with lots of memory and disk space. Plus you need a system operating system and the appropriate licenses this is why I have purchased the 25-client license for your business, as it will let you expand to other departments in the future.

The appropriate network for any medium / large business would be the client / server network, as you will require a lot of administration on your data. Client / server would be the best choice for your business as there will be a number of projects that people will be working on, and the data will be centralised. NETWORK FEATURES OF CLIENT / SERVER 1 File Sharing: File sharing helps the sharing of data such as word processing files, spreadsheets, or other types of files. File sharing requires a shared directory or disk drive, which many users can access over the network; along with logic needed to make sure more than one person doesn't make different conflicting changes to a file at the same time (called file locking). The reason you don't want more than one person making changes to a file at the same time is that they might both be making conflicting changes simultaneously, without ether person realising the problem.

Most software programs don't have the ability to allow multiple changes to a single file at the same time and to resolve problems that might arise (this dose not include databases as more than one person may access this type of file). Network operating systems that perform file sharing (nearly all of them) also administer the security for these shared files. This security can control, with a fine level of detail, which has access to which files and what kinds of access they have. For example, some users might have permission to view only certain shared files, while others have permission to edit or even delete certain shared files. 2 Printer Sharing: The second most important file sharing recourse in a business is probably the printer. Printer sharing enables you to reduce the number of printers you need and also enables you to offer much higher quality printers.

New printers can print off about 60 pages per minuet. Printer sharing can be done in several different ways on a network. The most common way is to use printer queues on a server. A printer queue holds print jobs until any currently running print jobs are finished and then automatically send the waiting jobs to the printer, using a printer queue is efficient for the workstations because they can quickly print to the printer queue without having to wait for the printer to process their job.

Another way to share printers on a network is to let each workstation access the printer directly (which is very simple to do), but each must wait its turn if many users are waiting for the printer at once. Networked printers that use printer queues always have a print server that handles the job of sending each print job to the printer in turn. The print server functions can be filled in a number of ways, which are outlined below: . By a file server with the printer connected directly to it... By a computer connected to the network, with the printer connected to that computer. The computer runs special print server software to perform this job...

Through the use of a built in print server on a printers Network Interface Card (NIC)... Through the use of a dedicated network print server, which is the size of a deck of playing cards that connects to the printers parallel or USB port on one end and the network on the other end. 3 Application Services: Just as you can share files on a network, you can often also share application on a network. For example, you can have a shared copy of Microsoft Office, or some other application, and keep it on the network server, from where it is also run. When a workstation wants to run the program, it loads the files from the network into its own memory, just like it would from a local disk drive, and runs the program normally. Keeping applications centralised reduces the amount of disk space needed on each workstation and makes it easier to administer the application (for instance, with some programmes you have to upgrade only the network copy, with others you also must perform a brief installation for each client.

Another advanced application service is that you can host on the network is a shared installation point for applications. Instead of having to load a CD-ROM onto each workstation, you can usually copy the contents of the CD-ROM to the server, and then have the installation program run from the server for each workstation. This makes the process of installing applications much faster. 4 E-mail: An extremely valuable resource today is e-mail. Not only can it be helpful for communications within a company, but also it is also fast becoming a preferred way of communicating with people outside the organisation. E-mail systems are roughly divided into two different types, which are: .

Field-based. Client / server A field-based e-mail system is one that consists of a set of files kept in a shared location on a server. The server doesn't actually do anything beyond providing access to the files. A client / server e-mail system is one where an e-mail server contains the messages and handles all the e-mail interconnections, both inside the company and to places outside the company.

A small company should use outlook express, as their main e-mail service at this can be very easy to set up. But a home system should use the service provider's email or external personal email providers such as Hotmail. A large company would provide 'in House' email facilities; this means the large company will have its own server with an email host. THE INTERNET Most communications between computers on the Internet are based on client / server structural design. Client / server describes a structure in which one computer may connect to another computer to ask it questions or instruct it to perform work. In such an arrangement, the computer that asks the questions and issues the instructions is the client.

The computer answering the questions and responding to the instructions is called the server. The same terms are used to describe the software programs that facilitate the asking and answering. A client application, for instance, presents an on-screen interface for the user to work with at the client computer; the server application 'welcomes' the client and knows how to respond correctly to the client's commands. Any file server or PC can be adapted for use as an Internet server, however a dedicated computer should be chosen. Anyone with a computer and modem can join this network by using a standard phone.

Dedicating the server that is, using a computer as a server only helps avoid some security and basic problems that result from sharing the functions of the server. To gain access to the Internet you will require an engineer to install the broadband modem. Then you will be able to use the server to network the Internet on all machines on a network. NETWORK SECURITY We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs. Although you may not consider our communications 'classified', you probably do not want strangers reading your email, using your computer to attack other systems, sending forged email from your computer, or examining personal information stored on your computer (such as financial statements). Intruders (also referred to as hackers, attackers) may not care about your identity.

Often they want to gain control of your computer so they can use it to launch attacks on other computer systems. WORKSTATION HARDWARE Any computer on a network that is used by people is usually referred to as a "network workstation". Sometimes such workstations are also called network clients. Usually, a network client is an Intel-based PC running some version of windows, which has an Network Interface Card (NIC) installed into it along with network client software, all of which allow the workstation to take part on the network. Network workstations can also be any other type of computer that includes the necessary network hardware and software, such as an Apple Macintosh or some form of UNIX-based computer. BUS TOPOLOGY Bus networks use a common backbone to connect all devices.

A single cable, the backbone functions as a shared communication medium, that devices attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message. STAR TOPOLOGY Many home networks including mine, use the star topology. A star network features a central connection point called a 'hub' that may be an actual hub or a switch. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet.

Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computer's network access and not the entire LAN. (If the hub fails, however, the entire network also fails.) RING TOPOLOGY In a ring network, every device has exactly two "neighbors" for communication purposes. All messages travel through a ring in the same direction (effectively either 'clockwise' or 'counterclockwise'). A failure in any cable or device breaks the loop and can take down the entire network. TREE TOPOLOGY Tree topologies integrate multiple star topologies together onto a bus. In its simplest form, only hub devices connect directly to the tree bus, and each hub functions as the 'root' of a tree of devices.

This bus / star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the broadcast traffic it generates) or a star (limited by the number of hub ports) alone. Topologies remain an important part of network design theory. It is very simple to build a home or small business network without understanding the difference between a bus design and a star design, but understanding the concepts behind these gives you a deeper understanding of important elements like hubs, broadcasts, ports, and routes. You should consider using the ring topology for a medium sized company. The best topology for a small company would be the ring topology as this is more easier, to transfer data. FIREWALLS firewall is a system or group of systems that enforces an access control policy between two networks.

The actual means by which this is put in to place varies widely, but in a standard form, the firewall can be considered as a pair of mechanisms: . One which exists to block traffic, . And the other which exists to permit traffic. Some firewalls place a greater emphasis on blocking traffic, while others emphasise permitting traffic.

Probably the most important thing to recognise about a firewall is that it implements an access control policy. DIGITAL SUBSCRIBER LINE (DSL) DSL (Digital Subscriber Line) is a service that offers a faster Internet connection than a standard dial-up connection. DSL technology uses existing 2-wire copper telephone wiring to deliver high-speed data services to homes and businesses. DSL uses the existing phone line and in most cases does not require an additional phone line. This gives 'always-on' Internet access and does not tie up the phone line.

Some of the advantages that occur when you subscribe to a DSL include some of the following: . Cost Effective. Faster Downloads. Phone / Internet Simultaneously. Up to 25 x Times Faster Than Dial-up Modem. No More Busy Signals.

No More Dropped Connections. Always-On Service. Faster Games. Multiple Computers on Single DSL Line. Dedicated Connection & Speed ACCOUNT SECURITY " Recently, Microsoft has been announcing security flaws in several versions of Windows. Since then, CAEN staff have seen a number of particularly aggressive computer viruses (worms) appear across U-M. These worms exploit the security flaw, which is found in Windows NT, Windows 2000, Windows XP, and Windows 2003 Server.

Microsoft has released several patches to correct these flaws. To obtain these patches, go to Microsoft Windows Update (windows update. microsoft. com), click the Scan for updates link, and install any needed Critical Windows Updates and Service Packs". It is also important to keep your personal computer updated and patched with the most current anti-virus software. The University of Michigan provides anti-virus software for free to all students, faculty and staff.

For instructions on how to update and protect your computer, and information on recent viruses, refer to the U-M Virus Busters web site". Source: web this report I have talked about the way in which businesses should set up and build a successful network. From my research I have come to the conclusion that businesses should use the LAN network type, as this type of network is more reliable. The MAN and WAN would be ideal for larger company's, but if the company decided to expand they then can change the type of network they use. WAN could be very useful if they decide to go international, as my research has indicated. I think the way that a small company should set up their network by a client / server approach.

This would help the company become more secure and keep in touch within what others are doing. The client / server would by far better than peer-to-peer. A network of this type would not cost as much as a larger company's would. On average a Company will have to spend a good amount of money in order to have a successful network that will be reliable and east to maintain in the long run. Although if a company wanted to expand it will have to consider using a different type of network. The server would store all the data of the business that each employee has and the data would not be in any danger as the server would be secure and reliable.

The benefits of setting up a network is: . Offer multiple facilities. Offers every one access to the devices such as printers, plotters etc... Improves business out-put. Communication The benefits of setting up a Client / server network: . All data is stored on a reliable server.

East to set-up. Centralised administration. Using equipment better suited to managing and offering each resource. Perfect for larger than 10 users. Very secure. Better performance.

Optimised to handle the needs of many users simultaneously... Centralised backup. Backup jobs can be run overnight when the server is not in use. Very reliable Employees Benefits. Work faster. Work more efficiently.

Communicate better within the organisationRECOMMENDATIONA Small Business Network Recommendation By analyzing the various points outlined in this report I recommend that small businesses should consider using the Client / server network in your local area network. The e-mail facility should be set up in outlook express, which is logged on the server. A Large Business Network Recommendation recommend that large companies should consider using the MAN and WAN network. WAN is very useful if they decide to go international, as my research has indicated.

The MAN is used in the University of Wolverhampton as it is connected over three campuses and is connected at very high speed. A Home Network Recommendation This is how I have networked my own home network and I would recommend using this method, as it is very cheap and straightforward. If you wanted to network two computers, you need two Ethernet network adapters or an Ethernet wire, Simple. When I networked my home pc with my brothers PC (in different rooms), I used a hub / router which is used as a method of transferring data and sharing resources, for example at home me and my brother can both use the internet at the same time and also share files together. I brought some Cat 5 Cable in order for me to accomplish this. The cable cost about lb 30.00 and a firewall hub, which cost around lb 45.00 (D-Link Hub).

And finally you connect the router to both of the PC, and both of the networks will be established, you can use the Windows sharing facility in order to share files, music, also play multiplayer games networked. BIBLIOGRAPHY I recommend that you look at the following text, as this will help you improve on the factors mentioned in this report and also help you with difficult decisions about your business. I recommend looking at this text: INTERNET USERS' GUIDE TO NETWORK RESOURCE TOOLS A. Wesley (2000) 1st Ed, Pub: NetskilsNETWORK MONITORING EXPLAINED: DESIGN AND APPLICATION D. Ming & R. Sudama (1992) Pub: Ellis Horwood NETWORK PLANNING AND MANAGMENT YOUR PERSONAL CONSULTANT S. Rigney (1995) Pub: Ziff-Davis Publications INTRODUCTION TO DATA COMMUNICATIONS AND NETWORKING B. Forouzan (1998) Pub: Mc-Graw Hill BUSINESS DATA COMMUNICATIONS AND NETWORKING J. FitzGerald (1999) Pub: John Wiley & Sons Useful Web Sites: web BIBLIOGRAPHY Brief: This is an annotated bibliography for the work CP 2099 Individual Assessment on Networking. Reference: A. Wesley (2000), Internet Users' Guide To Network Resource Tools 1st Ed, Pub: Netskils Annotation: This is a concise, no-nonsense guide to the best and most credible online tools and resources it helps you find what you need on the Internet fast. Written to help make the most of your time online, the Internet Users' Guide to Network Resource Tools provides a quick and easy reference to the Internet and all its related technologies.

Reference: D. Ming & R. Sudama (1992), Network Monitoring Explained: Design And Application Pub: Ellis Horwood Annotation: Network administration is a growing field, and users are facing a new age of computing based on networks and distributed systems. This book discusses the challenges of network monitoring, describing the various approaches that may be employed and surveying the existing technology. The book opens with an overview of the current state-of-the-art in network architecture and design. A design of the various places in a distributed computing system where monitoring functions can reasonably be performed follows, accompanied by a detailed look at the nature of the information that may be useful to capture in a monitor. Reference: S. Rigney (1995), Network Planning And Management Your Personal Consultant Pub: Ziff-Davis Publications Annotation: Every business is different and a computer network must be developed to fit the business.

This guide aims to provide all the information needed to design a network to meet the needs of a particular company. Credible pages on networking windows 2000 p 102-110. Reference: B. Forouzan (1998), Introduction To Data Communications And Networking Pub: Mc-Graw Hill Annotation Written to introduce students to the fundamental concepts of electronic communications systems, data systems, and networks, this text provides extensive coverage of a wide range of data communications and networking issues while offering preliminary information on basic electronic communications and telecommunications systems pages 51-63 have very useful information on networking small businesses and how communication tales place. Topics explored include wireless and wire line telecommunications systems, basic data communications networks and systems, local area networks, Internet works, and the Internet including TCP / IP protocol suite. Reference: J. FitzGerald (1999), Business Data Communications And Networking Pub: John Wiley & Sons Annotation: This book is based and focuses mainly on a fast-paced networking environment. Technologies and applications change rapidly, the fundamental concepts evolve much more slowly; they provide the foundation from which new technologies and applications can be understood, evaluated, and compared.

This edition features a chapter on wireless LANS, an expansion of the security chapter to include more on security design and new technologies, and more coverage of technology design material on network design including a selection of technologies and best practices for network design. Appendix 1.1: The Server 250 GB Ethernet Server Disk 10/100 7200 rip 8 MB Source: PC World Featuring advanced file-sharing technology; the La Cie Ethernet Disk frees PC file servers by providing independent, stand-alone storage accessible to anyone in the network. Ideal for small- and medium-sized business environments, it will store, back up and share files among as many as 25 users at the same time. The La Cie Ethernet Disk can easily be incorporated into a variety of environments. Its sturdy aluminum design allows it to be used as a stand-alone device that, when positioned on the desktop, can support a monitor weighing as much as 40 lbs (25 kg). This drive can also be stacked with other La Cie d 2 devices, or easily integrated into 19-inch racks.

Offering simple installation, the Ethernet Disk can be easily administered and controlled via any Web browser, with a variety of user-friendly tools and wizards. Moreover, this versatile storage device offers universal connectivity with all existing operating systems. Appendix 1.2: The Network Card PCI UTP (10 / 100) Network Card Source: PC World Windows compatible PCI network card with industry standard UTP network cable socket. Send and receive data via the network at up to 100 megabits per second. Suitable for use with 10 Base-T or 10/100 networks. Easy to install, includes installation software If you want the fastest multi-player gaming with your mates, then this is the network adaptor for you!

Featuring dual speed operation with a maximum throughput of 100 m bps (using 100 m bps hub and cabling) even the most demanding multi-player games will run smoother and more reliably. Ideal for games like Quake, Half-Life and Unreal Tournament, Windows networking and data transfer. Supplied with drivers for Windows 95, 98 and Windows NT. Appendix 1.3: The Router ADSL 16 port Router with built in Modem & Firewall Source: PC World The Instant Broadband Ether Fast Cable / DSL VPN Router is the ideal solution for remotely accessing a network securely over the Internet using cutting edge encryption and authentication methods. 16 Port Router, which expands its functionality and security, features by utilizing 56-bit DES and 168-bit 3 DES encryption, and Internet Key Exchange (IKE). A built-in IPSec coprocessor from Hif n allows for complete data privacy for the access and exchange of your most sensitive data from your home to your corporate network or between remote branch offices without the additional cost of IPSec VPN client software for each computer.

The Router is capable of conducting up to 70 simultaneous IPSec VPN tunnels while allowing additional savings with no upgrade fees or technical support costs.