SlideShare a Scribd company logo
1 of 18
Stand Alone
 Computers can be used on their own
without being connected to a network
but all computers now have the
capability to connect with a network.
Local Area Network
 A Local Area Network ( LAN) is a small
network in a single room, building or
site. Examples are:
 A school network
 A network in an office
 Connecting computers together to play
games at home.
 The computers can be linked using
copper cables or by a wireless
connection.
Wiring
Name Description
Twisted Pair This cable consists of two copper
wires twisted around each other.
Widely used because it is cheap and
capable of transmitting data at speeds
of 100 Mbps
Coaxial Not so commonly used as it is more
expensive.
It is used where there is lots of
interference that can corrupt data
because it has a protective shield to
prevent interference.
Fibre-Optic Fibre - Optic cable is made up of fine
strands of glass that transmit data as
pulses of light.
Fibre optic cable transmits at very high
speeds.
It doesn’t loose data because of
interference and is very secure.
It is very expensive to install.
Wireless
 Wireless networks use radio waves,
microwaves or infrared light to transmit
data.
 All you need is a transmitter / receiver in
every machine and a central device,
such as a wireless router; to pass the
data around the network.
Advantages to wireless
 Wireless networks are easy to install, as
there is no need for cables.
 You can move around when you work.
 Reasonably fast transmission speeds (
though slower compared to physical
cables)
Disadvantages to wireless
 Very vulnerable to hackers who can ‘tap
in’ to signals.
 Care is needed when setting up network
security if you don’t want other to access
your files or use your internet
connection.
The Internet
 The Internet is a global system of interconnected computer
networks.
 It has a number of different elements:
 The World Wide Web which is made up of multimedia
web pages that are stored on computers across the
world. Web pages hold text, sound, graphics, animations
and videos. These are linked by hyperlinks.
 Search engines to help users find their way around the
internet.
 Forums and chatrooms where you can meet people and
discuss all sorts of topics.
What is cloud storage?
 Video
Local Vs Cloud
 Businesses now have the choice of
buying and installing their own computer
hardware and software, and paying for
network connections, maintenance and
updating, or they can use the ‘Cloud’.
 This means they can rent equipment,
software, storage facilities and access to
the internet on a pay – as – you –go
basis.
Cloud Customers Local / non-Cloud users
Do not own the physical infrastructure, they are
owned by the Cloud Computing provider.
Own their own computer, backing storage
and wired or wireless connection equipment.
Can rent storage space on servers.
Customer can have a contract that enables them to
decide how much storage space they need for their
data.
This arrangement can be flexible and scaled.
Own their own hard drives, optical storage
and servers, which they have to maintains
and update.
Can have access to powerful networks without
great initial expense.
A business does not need to spend a large amounts
of money buying and installing systems.
Must bear the initial costs in buying
computers, backing storage and software,
which can be very high.
Can access a wide range of application software
and software for developing applications without
paying or installing.
Need to pay for and install all the software
required.
Have access to technical support, which is standard
to the service.
Need to provide/ pay for technical support.
Are billed for their service based on either time they
spend using the network or on a monthly or
quarterly basis. It is flexible.
Must bear the high initial setup costs before
the business can begin to use the system.
May have what is called a hybrid cloud system
where important data is stored locally.
Security concerns mean that some customers keep
what is called ‘mission critical data’ in computer
storage.
Are responsible for their own security. They
do not have the worry that data stored on the
‘Cloud’ can be hacked.
Client/Server
 Clients are workstations
 Servers are central computers
 Servers have:
 powerful processors
 Large memory capacity
<- NICs Ex2 ->
Client/Server
 The servers provide the resources for the
computers { clients} connected to the
network for example:
 Printer servers
 File Server
 Proxy server
Client/Server
 In a client server network it is possible to :
 organise Security for the whole network
 organise Backups for all the data on the
network
 control who can access the network by setting
up accounts {with IDs and passwords}
Peer to Peer network
 In a peer to peer network there is no
central server.
 The computers are linked together to
enable them to send and receive data.
 Each computer must back up its own data
and organise its own security
Peer to Peer Network
Peer to Peer network
 Since there is no centrally organised
security of backup system on a Peer to
Peer network:
 They are only suitable for ‘trusting’
environments’ e.g. home use.
 They are not suited to commercial or
business use.

More Related Content

What's hot (20)

Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT Infrastructure
 
Computer network
Computer networkComputer network
Computer network
 
Firewall
FirewallFirewall
Firewall
 
What is a network
What is a networkWhat is a network
What is a network
 
IT for Information Professionals Notes
IT for Information Professionals NotesIT for Information Professionals Notes
IT for Information Professionals Notes
 
Computing powerpoint
Computing powerpointComputing powerpoint
Computing powerpoint
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
LAN, WAN, MAN
LAN, WAN, MANLAN, WAN, MAN
LAN, WAN, MAN
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network Tutorial
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
Network Notes
Network Notes Network Notes
Network Notes
 
Cloud computing - new class of network based computing
Cloud computing - new class of network based computingCloud computing - new class of network based computing
Cloud computing - new class of network based computing
 
NETWORK,INTERNET & WWW ppt
NETWORK,INTERNET & WWW pptNETWORK,INTERNET & WWW ppt
NETWORK,INTERNET & WWW ppt
 
Punit kumar
Punit kumarPunit kumar
Punit kumar
 
Network internet
Network internetNetwork internet
Network internet
 
LI-FI
LI-FILI-FI
LI-FI
 
Transmission Media for Networking
Transmission Media for NetworkingTransmission Media for Networking
Transmission Media for Networking
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Send computer networ kf
Send computer networ kfSend computer networ kf
Send computer networ kf
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 

Similar to Stand Alone and Local Area Networks Explained

ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfHonKencyTress
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & NetworkingGohil Anshu
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - FerdonSusan Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorialSusan Ferdon
 
Computer networks7
Computer networks7Computer networks7
Computer networks7Ali Raza
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkammulu99
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialRodel Morales
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computingAliAbdelwahab6
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1TnNguyn57021
 

Similar to Stand Alone and Local Area Networks Explained (20)

ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdf
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorial
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Bis Chapter5
Bis Chapter5Bis Chapter5
Bis Chapter5
 
Computer network 1
Computer network 1Computer network 1
Computer network 1
 
Computer networks7
Computer networks7Computer networks7
Computer networks7
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Networking
NetworkingNetworking
Networking
 
Cn
CnCn
Cn
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1
 
Hardware1
Hardware1Hardware1
Hardware1
 
Hardware1
Hardware1Hardware1
Hardware1
 

More from missstevenson01

Lesson 3 - Coding with Minecraft - Variables.pptx
Lesson 3 -  Coding with Minecraft -  Variables.pptxLesson 3 -  Coding with Minecraft -  Variables.pptx
Lesson 3 - Coding with Minecraft - Variables.pptxmissstevenson01
 
Lesson 2 - Coding with Minecraft - Events.pptx
Lesson 2 - Coding with Minecraft - Events.pptxLesson 2 - Coding with Minecraft - Events.pptx
Lesson 2 - Coding with Minecraft - Events.pptxmissstevenson01
 
Lesson 1 - Coding with Minecraft -Introduction.pptx
Lesson 1 - Coding with Minecraft -Introduction.pptxLesson 1 - Coding with Minecraft -Introduction.pptx
Lesson 1 - Coding with Minecraft -Introduction.pptxmissstevenson01
 
Lesson2 - Coding with Minecraft - Events.pptx
Lesson2 - Coding with Minecraft - Events.pptxLesson2 - Coding with Minecraft - Events.pptx
Lesson2 - Coding with Minecraft - Events.pptxmissstevenson01
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virusmissstevenson01
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hackingmissstevenson01
 
S1 internet safety-chattingonline
S1 internet safety-chattingonlineS1 internet safety-chattingonline
S1 internet safety-chattingonlinemissstevenson01
 
Video Games and Copyright laws
Video Games and Copyright lawsVideo Games and Copyright laws
Video Games and Copyright lawsmissstevenson01
 

More from missstevenson01 (20)

S3 environment
S3 environmentS3 environment
S3 environment
 
The Processor.pptx
The Processor.pptxThe Processor.pptx
The Processor.pptx
 
How Computers Work
How Computers WorkHow Computers Work
How Computers Work
 
Lesson 3 - Coding with Minecraft - Variables.pptx
Lesson 3 -  Coding with Minecraft -  Variables.pptxLesson 3 -  Coding with Minecraft -  Variables.pptx
Lesson 3 - Coding with Minecraft - Variables.pptx
 
Lesson 2 - Coding with Minecraft - Events.pptx
Lesson 2 - Coding with Minecraft - Events.pptxLesson 2 - Coding with Minecraft - Events.pptx
Lesson 2 - Coding with Minecraft - Events.pptx
 
Lesson 1 - Coding with Minecraft -Introduction.pptx
Lesson 1 - Coding with Minecraft -Introduction.pptxLesson 1 - Coding with Minecraft -Introduction.pptx
Lesson 1 - Coding with Minecraft -Introduction.pptx
 
Lesson2 - Coding with Minecraft - Events.pptx
Lesson2 - Coding with Minecraft - Events.pptxLesson2 - Coding with Minecraft - Events.pptx
Lesson2 - Coding with Minecraft - Events.pptx
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virus
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
S1 internet safety-chattingonline
S1 internet safety-chattingonlineS1 internet safety-chattingonline
S1 internet safety-chattingonline
 
S3 wireframe diagrams
S3 wireframe diagramsS3 wireframe diagrams
S3 wireframe diagrams
 
Sql
SqlSql
Sql
 
Alien database
Alien databaseAlien database
Alien database
 
Video Games and Copyright laws
Video Games and Copyright lawsVideo Games and Copyright laws
Video Games and Copyright laws
 
Games Design Document
Games Design DocumentGames Design Document
Games Design Document
 
Video game proposal
Video game proposalVideo game proposal
Video game proposal
 
Evaluation
EvaluationEvaluation
Evaluation
 
H evaluation
H evaluationH evaluation
H evaluation
 
H testing and debugging
H testing and debuggingH testing and debugging
H testing and debugging
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Stand Alone and Local Area Networks Explained

  • 1.
  • 2. Stand Alone  Computers can be used on their own without being connected to a network but all computers now have the capability to connect with a network.
  • 3. Local Area Network  A Local Area Network ( LAN) is a small network in a single room, building or site. Examples are:  A school network  A network in an office  Connecting computers together to play games at home.  The computers can be linked using copper cables or by a wireless connection.
  • 4.
  • 5. Wiring Name Description Twisted Pair This cable consists of two copper wires twisted around each other. Widely used because it is cheap and capable of transmitting data at speeds of 100 Mbps Coaxial Not so commonly used as it is more expensive. It is used where there is lots of interference that can corrupt data because it has a protective shield to prevent interference. Fibre-Optic Fibre - Optic cable is made up of fine strands of glass that transmit data as pulses of light. Fibre optic cable transmits at very high speeds. It doesn’t loose data because of interference and is very secure. It is very expensive to install.
  • 6. Wireless  Wireless networks use radio waves, microwaves or infrared light to transmit data.  All you need is a transmitter / receiver in every machine and a central device, such as a wireless router; to pass the data around the network.
  • 7. Advantages to wireless  Wireless networks are easy to install, as there is no need for cables.  You can move around when you work.  Reasonably fast transmission speeds ( though slower compared to physical cables)
  • 8. Disadvantages to wireless  Very vulnerable to hackers who can ‘tap in’ to signals.  Care is needed when setting up network security if you don’t want other to access your files or use your internet connection.
  • 9. The Internet  The Internet is a global system of interconnected computer networks.  It has a number of different elements:  The World Wide Web which is made up of multimedia web pages that are stored on computers across the world. Web pages hold text, sound, graphics, animations and videos. These are linked by hyperlinks.  Search engines to help users find their way around the internet.  Forums and chatrooms where you can meet people and discuss all sorts of topics.
  • 10. What is cloud storage?  Video
  • 11. Local Vs Cloud  Businesses now have the choice of buying and installing their own computer hardware and software, and paying for network connections, maintenance and updating, or they can use the ‘Cloud’.  This means they can rent equipment, software, storage facilities and access to the internet on a pay – as – you –go basis.
  • 12. Cloud Customers Local / non-Cloud users Do not own the physical infrastructure, they are owned by the Cloud Computing provider. Own their own computer, backing storage and wired or wireless connection equipment. Can rent storage space on servers. Customer can have a contract that enables them to decide how much storage space they need for their data. This arrangement can be flexible and scaled. Own their own hard drives, optical storage and servers, which they have to maintains and update. Can have access to powerful networks without great initial expense. A business does not need to spend a large amounts of money buying and installing systems. Must bear the initial costs in buying computers, backing storage and software, which can be very high. Can access a wide range of application software and software for developing applications without paying or installing. Need to pay for and install all the software required. Have access to technical support, which is standard to the service. Need to provide/ pay for technical support. Are billed for their service based on either time they spend using the network or on a monthly or quarterly basis. It is flexible. Must bear the high initial setup costs before the business can begin to use the system. May have what is called a hybrid cloud system where important data is stored locally. Security concerns mean that some customers keep what is called ‘mission critical data’ in computer storage. Are responsible for their own security. They do not have the worry that data stored on the ‘Cloud’ can be hacked.
  • 13. Client/Server  Clients are workstations  Servers are central computers  Servers have:  powerful processors  Large memory capacity <- NICs Ex2 ->
  • 14. Client/Server  The servers provide the resources for the computers { clients} connected to the network for example:  Printer servers  File Server  Proxy server
  • 15. Client/Server  In a client server network it is possible to :  organise Security for the whole network  organise Backups for all the data on the network  control who can access the network by setting up accounts {with IDs and passwords}
  • 16. Peer to Peer network  In a peer to peer network there is no central server.  The computers are linked together to enable them to send and receive data.  Each computer must back up its own data and organise its own security
  • 17. Peer to Peer Network
  • 18. Peer to Peer network  Since there is no centrally organised security of backup system on a Peer to Peer network:  They are only suitable for ‘trusting’ environments’ e.g. home use.  They are not suited to commercial or business use.