Premium Essay

Network and Communication

In:

Submitted By bonni
Words 3635
Pages 15
Network and communication
Network: A computer network is a collection of computers and hardware components interconnected by communication channels that allow sharing of resources and information

Types of Network:
Local Area Network(LAN)
Metropolitan Area Network(MAN)
Wide Area Network(WAN)

LAN: When computers located within a small geographical area such as office or a University Campus are connected together we call it a Local Area Network.

MAN: The geographical range of MAN is bigger than LAN. It covers a small city.

WAN: Wide area network span broad geographical distances, ranging from several miles to across entire continents. WAN may consist of a combination of switched and dedicated Lines, microwaves, and satellite communication.

Types of LAN
Client-server: A client server LAN consists of the requesting microcomputers, called clients, and the supplying devices that provides the services, called servers. The server is a powerful computer that manages shared devices and software. Example file server, database server.

Peer-to-peer: In a peer-to-peer LAN all microcomputers on the network communicate directly with one another without the help of a server. This is less expensive than a client-server LAN and works effectively with up to 25 computers and thus appropriate for small groups.

Components of a LAN • LANs are made up of the following components: • Connection or cabling system • Microcomputers with interface cards • Network operating systems • Other shared devices • Bridges and gateways [ For details see the book by Huthcinson and Sawyer, chapter 8]

Uses of Computer Networks

Business Applications
1. First goal is the resource sharing to make all programs, equipment, and specially data available to anyone on the network without regard to the physical location of

Similar Documents

Premium Essay

Network and Communication

...UNIVERSITY SUBJECT: NETWORK AND COMMUNICATION Presentation Topic: Subnet Masking MBA IN E-GOVERNANCE - Programme III Prepared and Narrated by : KDU/MEG/03/11 – Theshantha Mukirigala Submission Date : 26 November 2015 Subnet Mask • An IP address has 2 parts: – The Network identification. – The Host identification. • Frequently, the Network & Host portions of the address need to be separately extracted. • In most cases, if you know the address class, it’s easy to separate the 2 portions. Subnet Mask (Cont.) • With the rapid growth of the internet & the ever-increasing demand for new addresses, the standard address class structure has been expanded by borrowing bits from the Host portion to allow for more Networks. • Under this addressing scheme, called Subnetting, separating the Network & Host requires a special process called Subnet Masking. Subnet Mask (Cont.) • The subnet masking process was developed to identify & extract the Network part of the address. • A subnet mask, which contains a binary bit pattern of ones & zeros, is applied to an address to determine whether the address is on the local Network. • If it is not, the process of routing it to an outside network begins. Subnet Mask (Cont.) • The function of a subnet mask is to determine whether an IP address exists on the local network or whether it must be routed outside the local network. • It is applied to a message’s destination address to extract the network address. •...

Words: 770 - Pages: 4

Premium Essay

Network Communication

...ANSWER 1 : Macro Benefits Macros offer many advantages to those who choose to use them. They reduce the possibility of human error that increases with many, repetitive keystrokes and tasks. Macros reduce the amount of time that must be spent performing basic computing tasks, freeing users up for more complex problem-solving and idea-generating activities. They also make complex computations easier to perform. Using Macros One of the benefits of macros is that they are easy to create, store and use. Macros record your keystrokes while you work. You can even assign a keyboard button to a macro so that common functions like formatting cells for text, adding formulas to spreadsheets, assigning rows to a target and formatting information into matched columns and rows. Editing Macros Making changes to a macro is as easy as setting one up. Macros aren't static. Once you record them, you can easily alter them to more effectively suit your needs. After you record a macro, you can view, change and correct errors in the code Microsoft wrote for it in Microsoft's Visual Basic Editor. Microsoft offers plenty of in-program help to guide beginners through the process of macro code editing. You'll quickly learn how to copy macros from one spreadsheet to another, share macros between workbooks with multiple users and much more. http://ask.brothersoft.com/what-are-the-advantages-of-excel-macros-197305.html ANSWER 2: T he steps are follows : 1 Make sure...

Words: 355 - Pages: 2

Premium Essay

Analysis of Communication Network

...BISE – RESEARCH PAPER Analysis of Informal Communication Networks – A Case Study It is becoming more and more important for knowledge workers to increase their productivity. However, there is a general lack of (semi-)automated, IT-supported data collection and evaluation approaches that allow insights into the processes and structures of an enterprise’s internal networks and the activities of its knowledge workers. The article presents a prototype of an IT-supported instrument (“Social Badges”) that supports automatic collection of informal, personal interaction between (knowledge) workers within an enterprise. The authors’ aim is to introduce a novel approach which improves data quality over legacy methods. The approach uses Social Network Analysis (SNA) to make it easier for executives to analyze and manage informal communications networks. Its practical applicability is demonstrated by a case study. DOI 10.1007/s12599-008-0018-z The Authors Dr. Kai Fischbach Prof. Dr. Detlef Schoder Seminar for Business Informatics and Information Management University of Cologne Pohligstr. 1 50969 Cologne Germany {fischbach | schoder}@ wim.uni-koeln.de 1 Introduction If the formal organization is the skeleton of a company, the informal is the central nervous system driving the collective thought processes, actions, and reactions of its business units. (Krackhardt and Hanson 1993, p. 104) Both the volume and importance of knowledge workers are growing as industrialized countries...

Words: 3796 - Pages: 16

Free Essay

Networks / Data Communications

...Version attached for better viewing and printing) Networks / Data Communications NTC 360 Lecture Week Three INTRODUCTION Now that we have covered most of the media types available for our networks Protocols that run over the top of the media and the standards they follow, the final topic here is choosing a design of a network by choosing media types and infrastructure that will best suit the needs of the business. INFRASTRUCTURE When to use hubs verses routers and switches is not always a clear-cut decision. In many cases the decision is made due to cost not necessarily best choice. For most office environments a hierarchical design with 10/100/1000 Mbps Ethernet hub/repeaters are adequate. However, there are times when high-speed transfer is worth the cost of installing switches. A good example may be in the motion picture industry where large full motion video clips are developed and edited on computer screens. Due to the size of these kinds of files and the critical nature of time in the industry full duplex switching in the LAN environment may be called for along with Gigabit Ethernet or higher = ). There is an old saying out there that was “route when you can, bridge if you must” This saying still holds true through time. However, switching has for the most part replaced most bridges today. Routing is the best means of isolating and reducing network traffic, which in the end equates to better network performance, however the speeds of the new switches...

Words: 3575 - Pages: 15

Free Essay

Tele Communication Network

...|Sandeep Kumar | | |[pic] | | |sandeep_sidhwani@yahoo.com | | | | | | | | |[pic] | | |+92 333 717 3723 (preferred) | | | | | | | | |[pic] ...

Words: 448 - Pages: 2

Premium Essay

Avaya Unified Communications: a Call Center Communication Network

...Running head: AVAYA UNIFIED COMMUNICATIONS Avaya Unified Communications: A Call Center Communication Network Effective Communication in a call center is vital for success. Yet today there are too many communication devices which seem to be adversely challenging and confusing to today’s employees. The need for electronic business and communication technologies are growing as call centers grow to keep up with competition, develop e-business, and to go global. Office phones, cell phones, lap tops, smart phones, text messing, instant messaging, voice mail, and email are some of the ways to communicate and to stay constantly connected. However, if all of these devices are not directly connected there could be a delay in response. Avaya Unified Communications simplifies interaction with employees and customers resulting in a decrease in the delay time and creating a Unified Business. A Unified Businesses is a business that has mastered today’s diverse communications technology. Improving business operations and processes with Avaya Unified Communications is beneficial to our business and increases productivity by improving the customer service experience. Avaya, Inc. has been privately own company since 2007. Kevin Kennedy, the President and CEO, Avaya Inc. stated that our purpose is “To keep business communications, and society, constantly moving forward, to be the Futuremakers of communications” (Avaya, 2009). Avaya Uniform Communication All Inclusive will enables...

Words: 1016 - Pages: 5

Premium Essay

Nt1310 Unit 3 Network Communication

...b. Network communication protocols 1) Protocols, or official standards, have been designed for networks in order to control the movement of data exchanged between components, what the content of data is composed of, and how communication starts and stops. 2) Two connection types (Transmission Control Protocol [TCP]/Internet Protocol [IP] connections and Common Industrial Protocol [CIP] connections) are layered over each other each time data is transferred. 3) The TCP connection is the first connection established. It is used for all Ethernet/IP communication and is required for all CIP connection use. A single TCP/IP connection supports multiple CIP connections. 4) CIP a) Established over TCP connections, Ethernet/IP CIP connections transfer...

Words: 785 - Pages: 4

Premium Essay

Security Issues and Procedures in Communication Networks

...PROCEDURES OF COMMUNICATION NETWORKS Student’s Name Institutional Affiliation Currently prompt evolution in computer communications linked to terminal-based, multi-operator systems, and in computer networks. Almost all these arrangements interconnect process, keep important data that is consider reserved or patented by their possessors and managers, or that should be protected from illegal access as a requisite of the law. Additionally, telecommunication systems, connected terminals, communication processors, and computers should be safeguarded from invaders who may strive to modify programs or files in the system, or to interrupt the facilities offered. The above threats are existent, as it is not challenging to interrupt communications in telecommunication systems, and the probability of connecting illegitimate terminals or computers into the scheme with the aim of “managing" the usual terminal-computer network, or making the system inaccessible to others. The security of such systems against the several dangers encompasses identification, and verification of the individuality, organized right to use to computers and their databases, and shelter of the information being carried in the telecommunication system. Related to every threat is various conceptual, along with technical challenges and a diversity of solutions. Local area network (LAN) refers to an assembly of PCs and other devices spread over a reasonably limited area and linked by a communications connection that...

Words: 3002 - Pages: 13

Free Essay

It System

...R17. What is the difference between a permanent address and a care-of address? Who assigns a care-of address? Answer: A permanent address is the home address and care of address is the given address of the device such as mobile. Permanent address is where mobile devices live. Care of address is given to the mobile device by the foreign agent when a device entire to another network area. Permanent address will get all the derive data and then the home agent forward data/messages onto the other network via the care of address. After that mobile device directly responds to the correspondent. R1. What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity? Can you have integrity without confidentiality? Justify your answer. Answer: Confidentiality is the property that the original plaintext message cannot be determined by an attacker who intercepts the cipher text-encryption of the original plaintext message. Message integrity is the property that the receiver can detect whether the message sent (whether encrypted or not) was altered in transit. The two are thus different concepts, and one can have one without the other. An encrypted message that is altered in transmit may still be confidential but will not have message integrity if the error is undetected. Similarly, a message that is altered in transit (and detected) could have been sent in plaintext and thus would not be confidential Message confidentiality...

Words: 528 - Pages: 3

Free Essay

Wlan

...Having a secure WLAN is very important, I would even go to say more important than a normal LAN. One way to secure a WLAN is to use encryption. This uses a key that will encrypt and decrypt data on the WLAN so only people what the key would be able to connect to the network. The encryption needs to be strong or a sniffer will crack the key so using a WPA2 would be best. Another way would be to simple change the SSID or ESSID. The reason this is a good way to secure a WLAN is because in most cases if you didn’t change the SSID a hack would think that you didn’t do anything to your network, making it easier to hack. “Though knowing the SSID does not allow anyone to break into your network, it usually indicates that the person hasn't taken any steps to protect their network, thus these networks are the most common targets” ("How to secure," 2007). The ramification of your WLAN being breached could be many things. The first thing I can think of is data theft and by that personal or secret information if someone can get on your WLAN. Also they could be trying to disrupt your network to cause damage or just want to ride on your wireless to gain access to the Internet. I think that stolen information would be the biggest threat. Reference: How to secure a wlan. (2007, February 15). Retrieved from...

Words: 254 - Pages: 2

Premium Essay

Compsec

...Source Address | Destination | Payload | Week 3 The Network Intrusion Detection Engine Network based IDS engines process a stream of time sequential TCP/IP packets to determine a sequence of patterns. Patterns are also known as signatures. Most network signatures are based on the contents of the packets (Packet Content Signature = Payload of a packet). Patterns are also detectable in the header and flow of the traffic, relieving the need for looking into packets. Operational Concept Two primary operational modes 1. Tip off - Look for something new, something not previously classified. 2. Surveillance - Look for patterns from "targets" Forensic work bench * Same tool as in surveillance * Monitor online transactions * track network growth - PCs; mobile devices * System services usage * Identify unexpected changes in the network Benefits of a Network IDS 1. Outsider Deterrence - Make life hard for the hackers 2. Detection - Deterministic; Stochastic 3. Automated Response and Notification - Notifications(email, SNMP, pager, onscreen, audible) Response: Reconfigure router/firewalls; Doing a counter attack is not smart; Lose the connection. Challenges for network based technologies 1. Packet reassembly - Broken packets might not be enough detection. Pattern broken into different packets. 2. High Speed Networks - Flooding and dropping of packets 3. Anti Sniff (Sniffer Detection) - Designed by hackers to detect IDS. Find...

Words: 360 - Pages: 2

Premium Essay

Illustrate the Significance and Relevance of Communication Networks in Your Organization

...Illustrate the significance and relevance of communication networks in your organization By Sylvia Zvavamwe Communication maintains and sustains relationships in an organization regardless of the type of the organization. How people in an organization communicate with each other determines or shows how satisfied they are with each other’s work. An organizational communication address how information circulates among employees and this circulation of information occurs through formal and informal communication networks. According to Fielding (1993), networks are “the interconnecting lines of communication used to pass information from one person or one section to another”. Networks ensure that information in an organization does not flow randomly, but, follow set up channels. Formal communication network include vertical, lateral and diagonal communication whereas, informal communication includes grapevine and bypassing networks. This essay is going to illustrate the significance and relevance of these formal and informal communication networks at the University of Zimbabwe. Formal communication network is whereby communication follows the hierarchical structure of the organization or the chain of command (Richmond 2005). According to Evans (1984) formal communication is applied to those communications which are routed through what have been called ‘official channels’. These definitions imply that formal communication is observed through formal organizational structures...

Words: 1848 - Pages: 8

Premium Essay

Nt1310 Unit 3 Assignment 3 Data Communication And Networks

...ASSIGNMENT # 03 (DATA COMMUNICATION AND NETWORKS) ANS 1: WIRESHARK:- As we all know well that networking and communication of computers happens worldwide in the terms of packets. Data divides into the packets like IP packets and then these packets travels over a network and then reaches its end point where packets then reassembled and the data or information is delivered to the destination. But there is a requirement of packet analyzers to analyze and captures the packet which reaches to the machine. Wireshark is the best open source packet analyzers available in market now a days. Wireshark is the best GUI based open source packet analyzer. Wireshark provides some following features: • It is available for windows and UNIX operating system. • It...

Words: 579 - Pages: 3

Premium Essay

Business Networking and Communication

...CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two or more computers that are linked together. D. the use of satellites linking computers together. Answer: C 2. Reference: Basic Network Anatomy Difficulty: Easy The three essential components of every computer system include all of the following EXCEPT: A. software. B. hardware. C. people. D. cables. Answer: D 3. Reference: Basic Network Anatomy Difficulty: Easy All of the following are advantages of using a computer network EXCEPT that it: A. reduces costs when hardware is shared. B. promotes independence so users have exclusive control over their own data and applications. C. saves money when software is shared. D. enables data sharing, increasing efficiency and productivity. Answer: B Reference: Basic Network Anatomy Difficulty: Easy Copyright © 2008 Prentice-Hall. All rights reserved. Chapter 8: Networking and Digital Communication 4. All of the following statements are true EXCEPT: A. Wireless networks are convenient. B. Wireless networks are generally slower than wired LANs. C. Wireless networks use radio transmitters. D. Wireless networks are generally faster than wired networks. Answer: D 5. Reference: Networks Near and Far Difficulty: Moderate A(n) ____________ broadcasts messages to all devices connected to a LAN. A. switch...

Words: 3749 - Pages: 15

Free Essay

Effects of E-Communication on Cooperate Organization

...EFFECTS OF E-COMMUNICATION ON CORPORATE ORGANIZATIONS CHAPTER 1 INTRODUCTION Electronic communication otherwise known as E-Communication is a type of communication carried out using electronic media. Such communications allow transmission of message or information using computer systems, fax machine, e-mail, tele and/or video conferencing and satellite network. People can easily share conversation, picture(s), image(s), sound, graphics, maps, interactive software and many other things. Due to electronic technology, jobs, working locations and cultures are changing and therefore people can easily get access to worldwide communication without any physical movement. Experts have defined electronic communication as the transmission of information using advanced techniques such as computer modems, facsimile machines, voice mail, electronic mail, teleconferencing, video cassettes, and private television networks.” 1.1 Background of the Study Communication is said to be the imparting or exchanging of information by speaking, writing, or using some other medium. It could be between two or more persons, human and machines or any other communicable entity. Group communication can be carried out through various means such as smoke signals and drums which was common in ancient Africa, America and parts of Asian, the fixed semaphore in ancient Europe and electronic means which is most prominent, popular and recent. This research details on the effects of communication in cooperate...

Words: 8745 - Pages: 35