SlideShare a Scribd company logo
1 of 7
CATEGORIES OF
NETWORKST H E L E A R N E R I S E X P E C T E D T O B E A B L E T O D E S C R I B E A N D E X P L A I N
C AT E G O R I E S O F N E T W O R K S
This topic is to be covered in one week. The mode of
instruction is through presentations online. The mode of
assessment is through CATs and class practical and a full
sitting Examinations.Others resources like journals are
also provided, that include journals and other textbooks
are listed.
1. Peer-to-Peer network.
A Peer is a computer that acts both as the client and a
server.
In this network, all the connected computers are equal &
each machine acts as both client and Server. This means
that, there is no central storage area for information & no
dedicated central Server.
No system administrator. Therefore, the user of each
computer determines what data & resources the computer
will shares with other computers on the network.
Peer-to-peer networks are appropriate in an environment
where:
There are 10 or less users.
The users are located in a general area.
Security is not an issue, e.g. in Bulletin boards
Advantages of Peer-to-peer networks.
(i). It is small & inexpensive.
(ii). It is easier to maintain.
(iii). It is easier to setup.
Disadvantages of Peer-to-peer networks.
(i). It is difficult to locate information stored in the
connected computers due to Shared level security.
(ii). Difficult to update documents and files.
(iii). It is expensive to train staff on how to share
resources, as each user is an administrator.
(iv). It is difficult to maintain security, as it is the user’s
responsibility to ensure that only authorized individuals
can access their data.
(v). It is more tedious as the user has to memorize
password for resources, and in case of any change, they
have to inform others.
1. Server-based networks.
In this network, there is usually a Server, e.g. a company which is dedicated to handle files
and/or information for clients, make & service requests from network clients, and ensure
security of files and directories for them.
Server-based networks require a network operating system.
Advantages of Server based networks.
(i) There is security since the Server controls the resources the clients need to access.
(ii) It can support a large number of users.
(iii) The server can be optimized to hand out information as fast as possible.
(iv) Fewer connections are required by the clients to get the resources.
(v) Easier to maintain backup for files (synchronization of files).
(vi) Cost effective as client workstations don’t need large hard disk (storage capacity).
Disadvantages of Server based networks.
(i) It is dependent on a Network administrator.
(ii) Requires servers, which are expensive.
Network Security
In networking, there are several ways of protecting your
data and information from intruders. They include: Share
level and User level security.
Share level security
This model of security is mostly used in peer-to-peer
networks. The user can decide which resources to give
for sharing.
Most Windows operating systems such as Windows 9X
provide such kind of security.
User-level security
The User level security is used on server-based networks.
A network administrator assigns accounts to users, i.e.,
each user is provided with a unique name and a password
which he/she can use to access network resources.
Review questions.
1. How does each of the following networking models
operate?
(i). Centralized computing.
(ii). Collaborative computing.
(iii). Distributed computing.
PRACTICE QUESTIONS
1. Define the term Transmission media.
2. (a). Give two advantages of coaxial cables.
(b). Explain the importance of the wire braid in coaxial
cable.
3. Distinguish between Thinnet and Thicknet coaxial
cables.
4. Define the term Pitch as used in twisted pair cabling.
5. (a). Give two advantages of fibre optic media.
(b). Differentiate between single mode and multimode
fibre optic cables

More Related Content

What's hot (18)

Ijetcas14 583
Ijetcas14 583Ijetcas14 583
Ijetcas14 583
 
Lesson 7
Lesson 7Lesson 7
Lesson 7
 
Bcs
BcsBcs
Bcs
 
Network field trip
Network field tripNetwork field trip
Network field trip
 
Database Security & Encryption
Database Security & EncryptionDatabase Security & Encryption
Database Security & Encryption
 
Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)
 
Educational Technology
Educational TechnologyEducational Technology
Educational Technology
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
Networking benefits
Networking benefitsNetworking benefits
Networking benefits
 
cryptography for home users
cryptography for home userscryptography for home users
cryptography for home users
 
Chapter 03 pertemuan 4- donpas- concept and management
Chapter 03  pertemuan 4- donpas- concept and managementChapter 03  pertemuan 4- donpas- concept and management
Chapter 03 pertemuan 4- donpas- concept and management
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecture
 
Distributed information system
Distributed information systemDistributed information system
Distributed information system
 
DISTRIBUTED DATABASE
DISTRIBUTED DATABASEDISTRIBUTED DATABASE
DISTRIBUTED DATABASE
 
Intro to servers
Intro to serversIntro to servers
Intro to servers
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
PST SC015 Chapter 3 Internet Technology (II)  2017/2018PST SC015 Chapter 3 Internet Technology (II)  2017/2018
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
 

Similar to computer networks

Network archetecture
Network archetectureNetwork archetecture
Network archetectureshah fahad
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfshubhangisonawane6
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to securityAmjad Afridi
 
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.Engr. Md. Jamal Uddin Rayhan
 
Internet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationInternet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationGambari Amosa Isiaka
 
Secure Distributed Deduplication Systems with Improved Reliability
Secure Distributed Deduplication Systems with Improved ReliabilitySecure Distributed Deduplication Systems with Improved Reliability
Secure Distributed Deduplication Systems with Improved Reliability1crore projects
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?IRJET Journal
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
 
Types of networks according
Types of networks accordingTypes of networks according
Types of networks accordingMicrobiology
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to securityMicrobiology
 
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET Journal
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 

Similar to computer networks (20)

Network archetecture
Network archetectureNetwork archetecture
Network archetecture
 
Compare peer
Compare peerCompare peer
Compare peer
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
 
DISTRIBUTED SYSTEM 16M.docx
DISTRIBUTED SYSTEM 16M.docxDISTRIBUTED SYSTEM 16M.docx
DISTRIBUTED SYSTEM 16M.docx
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to security
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
 
Basic of Networking
Basic of NetworkingBasic of Networking
Basic of Networking
 
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
 
Internet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationInternet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentation
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Secure Distributed Deduplication Systems with Improved Reliability
Secure Distributed Deduplication Systems with Improved ReliabilitySecure Distributed Deduplication Systems with Improved Reliability
Secure Distributed Deduplication Systems with Improved Reliability
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
 
Lesson 9
Lesson 9Lesson 9
Lesson 9
 
Types of networks according
Types of networks accordingTypes of networks according
Types of networks according
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to security
 
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFS
 
unit 4-1.pptx
unit 4-1.pptxunit 4-1.pptx
unit 4-1.pptx
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 

More from Gicheru Onesmus (7)

Lesson 8
Lesson 8Lesson 8
Lesson 8
 
Lesson 6
Lesson 6Lesson 6
Lesson 6
 
Lesson 5
Lesson 5Lesson 5
Lesson 5
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 

Recently uploaded (20)

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 

computer networks

  • 1. CATEGORIES OF NETWORKST H E L E A R N E R I S E X P E C T E D T O B E A B L E T O D E S C R I B E A N D E X P L A I N C AT E G O R I E S O F N E T W O R K S This topic is to be covered in one week. The mode of instruction is through presentations online. The mode of assessment is through CATs and class practical and a full sitting Examinations.Others resources like journals are also provided, that include journals and other textbooks are listed.
  • 2. 1. Peer-to-Peer network. A Peer is a computer that acts both as the client and a server. In this network, all the connected computers are equal & each machine acts as both client and Server. This means that, there is no central storage area for information & no dedicated central Server. No system administrator. Therefore, the user of each computer determines what data & resources the computer will shares with other computers on the network. Peer-to-peer networks are appropriate in an environment where: There are 10 or less users. The users are located in a general area. Security is not an issue, e.g. in Bulletin boards
  • 3. Advantages of Peer-to-peer networks. (i). It is small & inexpensive. (ii). It is easier to maintain. (iii). It is easier to setup. Disadvantages of Peer-to-peer networks. (i). It is difficult to locate information stored in the connected computers due to Shared level security. (ii). Difficult to update documents and files. (iii). It is expensive to train staff on how to share resources, as each user is an administrator. (iv). It is difficult to maintain security, as it is the user’s responsibility to ensure that only authorized individuals can access their data. (v). It is more tedious as the user has to memorize password for resources, and in case of any change, they have to inform others.
  • 4. 1. Server-based networks. In this network, there is usually a Server, e.g. a company which is dedicated to handle files and/or information for clients, make & service requests from network clients, and ensure security of files and directories for them. Server-based networks require a network operating system. Advantages of Server based networks. (i) There is security since the Server controls the resources the clients need to access. (ii) It can support a large number of users. (iii) The server can be optimized to hand out information as fast as possible. (iv) Fewer connections are required by the clients to get the resources. (v) Easier to maintain backup for files (synchronization of files). (vi) Cost effective as client workstations don’t need large hard disk (storage capacity). Disadvantages of Server based networks. (i) It is dependent on a Network administrator. (ii) Requires servers, which are expensive.
  • 5. Network Security In networking, there are several ways of protecting your data and information from intruders. They include: Share level and User level security. Share level security This model of security is mostly used in peer-to-peer networks. The user can decide which resources to give for sharing. Most Windows operating systems such as Windows 9X provide such kind of security. User-level security The User level security is used on server-based networks. A network administrator assigns accounts to users, i.e., each user is provided with a unique name and a password which he/she can use to access network resources.
  • 6. Review questions. 1. How does each of the following networking models operate? (i). Centralized computing. (ii). Collaborative computing. (iii). Distributed computing.
  • 7. PRACTICE QUESTIONS 1. Define the term Transmission media. 2. (a). Give two advantages of coaxial cables. (b). Explain the importance of the wire braid in coaxial cable. 3. Distinguish between Thinnet and Thicknet coaxial cables. 4. Define the term Pitch as used in twisted pair cabling. 5. (a). Give two advantages of fibre optic media. (b). Differentiate between single mode and multimode fibre optic cables