SlideShare a Scribd company logo
PREAMBLEPREAMBLEPREAMBLEPREAMBLE
Stay safe and take responsibility. Apply all prescribed safety guidelines and remainStay safe and take responsibility. Apply all prescribed safety guidelines and remainStay safe and take responsibility. Apply all prescribed safety guidelines and remainStay safe and take responsibility. Apply all prescribed safety guidelines and remain
free from COVDfree from COVDfree from COVDfree from COVD----19,19,19,19, tttthe reason for this mode of study (Ehe reason for this mode of study (Ehe reason for this mode of study (Ehe reason for this mode of study (E----Learning). Stay safe, please. ILearning). Stay safe, please. ILearning). Stay safe, please. ILearning). Stay safe, please. I
love you all.love you all.love you all.love you all.
C R E A T E D B Y L A W R E N E C I G E N E W A R I
BASIC TYPES OF LAN
INTRODUCTION
From our previous knowledge of Network
Topologies, we are aware the networks can be
implemented using any suitable layout, namely
Bus, Ring, Star, Mesh or Hybrid topology.Bus, Ring, Star, Mesh or Hybrid topology.
However, as a result of the numerous
advantages of Star topology, it the most widely
used topology. In this topic, we shall examine
the two basic ways of implementing a Local Are
Network (LAN). They are: Peer-to-peer and
Server based LAN
Created by Lawrenec Igenewari
Peer-to-peer (P2P) Network
In a Peer-to-peer network, all the computers in the network
have equal privileges. They all have the same abilities to use the
resources available on the network. The operating systems allow
users to share resources and files located on their computers
and to access shared resources found on other computers.
However, they do not have a file server or a centralized
Created by Lawrenec Igenewari
However, they do not have a file server or a centralized
management source. In a peer-to-peer network, all computers
are considered equal; In a p2p each computer must be
configured with individual user identification (userids) and
passwords. Peer-to-peer networks are designed primarily for
small to medium local area networks. AppleShare and Windows
for Workgroups such as Home Edition of Windows are
examples of operating systems that can used for peer-to-peer
local area network (LAN)
Fig.1 - Diagram of a Peer-to-Peer LAN
Created by Lawrenec Igenewari
Advantages of Peer-
CreatedbyLawrenecIgenewari
Advantages of Peer-
to-peer Network
Less initial expense - No need for a dedicated server.
Setup - An operating system (such as Windows XP) already in place may only
need to be reconfigured for peer-to-peer operations.
CreatedbyLawrenecIgenewari
Disadvantages of P2P
Decentralized - No central repository for
files and applications.files and applications.
Security - Does not provide the security
available on a client/server network.
Created by Lawrenec Igenewari
Server based LAN (Client/Server) Network
A Server-based network or LAN has a dedicated computer known as
a Server. The Server usually have high speed processor, Large
Primary memory (RAM) and very large sized Hard Disk Drive
(Secondary memory). The operating System in a Server is called
Network Operating Systems (NOS). For these reasons a Sever is
relatively expensive. The NOS allow the network to centralize
functions and applications in one or more dedicated file servers. The
Created by Lawrenec Igenewari
functions and applications in one or more dedicated file servers. The
file servers become the heart of the system, providing access to
resources and providing security. The other computers referred to as
workstations or clients have access to the resources available on the
file servers. The network operating system provides the mechanism
to integrate all the components of the network and allow multiple
users to simultaneously share the same resources irrespective of
physical location. Novell Netware, Sever 2000 and Server 2012 are
examples of network operating systems.
Fig.2 – Diagram of a Server-Based Network
using network the correct symbols
Created by Lawrenec Igenewari
Fig. 3 - Diagram of a Sever Based
Network
Created by Lawrenec Igenewari
ADVANTAGES OF A CLIENT/SERVER
NETWORK:
Centralized - Resources and data security are controlled through the server.
Scalability - Any or all elements can be replaced individually as needs increase.
Flexibility - New technology can be easily integrated into system.
Interoperability - All components (client/network/server) work together.
Accessibility - Server can be accessed remotely and across multiple platformsAccessibility - Server can be accessed remotely and across multiple platforms
C R E A T E D B Y L A W R E N E C I G E N E W A R I
Expense - Requires initial investment in dedicated
server.
Maintenance - Large networks will require a staff toMaintenance - Large networks will require a staff to
ensure efficient operation.
Dependence - When server goes down, operations
will cease across the network.
Requires highly skilled personnel to implement
Created by Lawrenec Igenewari

More Related Content

What's hot

DanOlaru-cv-IT
DanOlaru-cv-ITDanOlaru-cv-IT
DanOlaru-cv-IT
OLARU I. Dan
 
Network operating system
Network operating systemNetwork operating system
Network operating system
Jasper John Cinatad
 
Chapter 01 networking
Chapter 01 networkingChapter 01 networking
Chapter 01 networking
Ainuddin Yousufzai
 
Network configuration and simulation
Network configuration and simulationNetwork configuration and simulation
Network configuration and simulation
Crisanto Diola
 
Resume Fabien CHASTEL
Resume Fabien CHASTELResume Fabien CHASTEL
Resume Fabien CHASTEL
Fabien CHASTEL
 
Essential security for linux servers
Essential security for linux serversEssential security for linux servers
Essential security for linux servers
Juan Carlos Pérez Pardo
 
Cloud computing standards and protocols r.nabati
Cloud computing standards and protocols r.nabatiCloud computing standards and protocols r.nabati
Cloud computing standards and protocols r.nabati
nabati
 

What's hot (7)

DanOlaru-cv-IT
DanOlaru-cv-ITDanOlaru-cv-IT
DanOlaru-cv-IT
 
Network operating system
Network operating systemNetwork operating system
Network operating system
 
Chapter 01 networking
Chapter 01 networkingChapter 01 networking
Chapter 01 networking
 
Network configuration and simulation
Network configuration and simulationNetwork configuration and simulation
Network configuration and simulation
 
Resume Fabien CHASTEL
Resume Fabien CHASTELResume Fabien CHASTEL
Resume Fabien CHASTEL
 
Essential security for linux servers
Essential security for linux serversEssential security for linux servers
Essential security for linux servers
 
Cloud computing standards and protocols r.nabati
Cloud computing standards and protocols r.nabatiCloud computing standards and protocols r.nabati
Cloud computing standards and protocols r.nabati
 

Similar to Basic LAN types

Network Operating System
Network Operating SystemNetwork Operating System
Network Operating System
isma ishak
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answer
mandarshetye45
 
Clo architecture for video surveillance service based on p2 p and cloud compu...
Clo architecture for video surveillance service based on p2 p and cloud compu...Clo architecture for video surveillance service based on p2 p and cloud compu...
Clo architecture for video surveillance service based on p2 p and cloud compu...
manish bhandare
 
Network and Internet Security.docx
Network and Internet Security.docxNetwork and Internet Security.docx
Network and Internet Security.docx
stirlingvwriters
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
Ankit Sudegora
 
DESIGN AND IMPLEMENTATION OF PEER TO PEER NETWORK FOR FILE SHARING.pptx
DESIGN AND IMPLEMENTATION OF PEER TO PEER NETWORK FOR FILE SHARING.pptxDESIGN AND IMPLEMENTATION OF PEER TO PEER NETWORK FOR FILE SHARING.pptx
DESIGN AND IMPLEMENTATION OF PEER TO PEER NETWORK FOR FILE SHARING.pptx
AmpofoKwadwo
 
DESIGN AND IMPLEMENTATION OF PEER TO PEER NETWORK FOR FILE SHARING.pptx
DESIGN AND IMPLEMENTATION OF PEER TO PEER NETWORK FOR FILE SHARING.pptxDESIGN AND IMPLEMENTATION OF PEER TO PEER NETWORK FOR FILE SHARING.pptx
DESIGN AND IMPLEMENTATION OF PEER TO PEER NETWORK FOR FILE SHARING.pptx
AmpofoKwadwo
 
computer networks
computer networkscomputer networks
computer networks
Gicheru Onesmus
 
CSS 12 - Q1 - Lesson 3.pptx
CSS 12 - Q1 - Lesson 3.pptxCSS 12 - Q1 - Lesson 3.pptx
CSS 12 - Q1 - Lesson 3.pptx
CatherineBotardo3
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - Ferdon
Susan Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorial
Susan Ferdon
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
MNM Jain Engineering College
 
Sdwan webinar
Sdwan webinarSdwan webinar
Sdwan webinar
pmohapat
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
IRJET Journal
 
Network archetecture
Network archetectureNetwork archetecture
Network archetecture
shah fahad
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
honey725342
 
Matrix
MatrixMatrix
Matrix
Sashank Dara
 
Technical Training v1.1.pptx
Technical Training v1.1.pptxTechnical Training v1.1.pptx
Technical Training v1.1.pptx
Ajit877325
 
Lec 1 network types
Lec 1 network typesLec 1 network types
Lec 1 network types
Ahmad sohail Kakar
 
Embedded Web Server based Home Automation using Raspberry PI
Embedded Web Server based Home Automation using Raspberry PIEmbedded Web Server based Home Automation using Raspberry PI
Embedded Web Server based Home Automation using Raspberry PI
Editor IJMTER
 

Similar to Basic LAN types (20)

Network Operating System
Network Operating SystemNetwork Operating System
Network Operating System
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answer
 
Clo architecture for video surveillance service based on p2 p and cloud compu...
Clo architecture for video surveillance service based on p2 p and cloud compu...Clo architecture for video surveillance service based on p2 p and cloud compu...
Clo architecture for video surveillance service based on p2 p and cloud compu...
 
Network and Internet Security.docx
Network and Internet Security.docxNetwork and Internet Security.docx
Network and Internet Security.docx
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
DESIGN AND IMPLEMENTATION OF PEER TO PEER NETWORK FOR FILE SHARING.pptx
DESIGN AND IMPLEMENTATION OF PEER TO PEER NETWORK FOR FILE SHARING.pptxDESIGN AND IMPLEMENTATION OF PEER TO PEER NETWORK FOR FILE SHARING.pptx
DESIGN AND IMPLEMENTATION OF PEER TO PEER NETWORK FOR FILE SHARING.pptx
 
DESIGN AND IMPLEMENTATION OF PEER TO PEER NETWORK FOR FILE SHARING.pptx
DESIGN AND IMPLEMENTATION OF PEER TO PEER NETWORK FOR FILE SHARING.pptxDESIGN AND IMPLEMENTATION OF PEER TO PEER NETWORK FOR FILE SHARING.pptx
DESIGN AND IMPLEMENTATION OF PEER TO PEER NETWORK FOR FILE SHARING.pptx
 
computer networks
computer networkscomputer networks
computer networks
 
CSS 12 - Q1 - Lesson 3.pptx
CSS 12 - Q1 - Lesson 3.pptxCSS 12 - Q1 - Lesson 3.pptx
CSS 12 - Q1 - Lesson 3.pptx
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorial
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
Sdwan webinar
Sdwan webinarSdwan webinar
Sdwan webinar
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
 
Network archetecture
Network archetectureNetwork archetecture
Network archetecture
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
 
Matrix
MatrixMatrix
Matrix
 
Technical Training v1.1.pptx
Technical Training v1.1.pptxTechnical Training v1.1.pptx
Technical Training v1.1.pptx
 
Lec 1 network types
Lec 1 network typesLec 1 network types
Lec 1 network types
 
Embedded Web Server based Home Automation using Raspberry PI
Embedded Web Server based Home Automation using Raspberry PIEmbedded Web Server based Home Automation using Raspberry PI
Embedded Web Server based Home Automation using Raspberry PI
 

Recently uploaded

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 

Recently uploaded (20)

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 

Basic LAN types

  • 1. PREAMBLEPREAMBLEPREAMBLEPREAMBLE Stay safe and take responsibility. Apply all prescribed safety guidelines and remainStay safe and take responsibility. Apply all prescribed safety guidelines and remainStay safe and take responsibility. Apply all prescribed safety guidelines and remainStay safe and take responsibility. Apply all prescribed safety guidelines and remain free from COVDfree from COVDfree from COVDfree from COVD----19,19,19,19, tttthe reason for this mode of study (Ehe reason for this mode of study (Ehe reason for this mode of study (Ehe reason for this mode of study (E----Learning). Stay safe, please. ILearning). Stay safe, please. ILearning). Stay safe, please. ILearning). Stay safe, please. I love you all.love you all.love you all.love you all. C R E A T E D B Y L A W R E N E C I G E N E W A R I
  • 2. BASIC TYPES OF LAN INTRODUCTION From our previous knowledge of Network Topologies, we are aware the networks can be implemented using any suitable layout, namely Bus, Ring, Star, Mesh or Hybrid topology.Bus, Ring, Star, Mesh or Hybrid topology. However, as a result of the numerous advantages of Star topology, it the most widely used topology. In this topic, we shall examine the two basic ways of implementing a Local Are Network (LAN). They are: Peer-to-peer and Server based LAN Created by Lawrenec Igenewari
  • 3. Peer-to-peer (P2P) Network In a Peer-to-peer network, all the computers in the network have equal privileges. They all have the same abilities to use the resources available on the network. The operating systems allow users to share resources and files located on their computers and to access shared resources found on other computers. However, they do not have a file server or a centralized Created by Lawrenec Igenewari However, they do not have a file server or a centralized management source. In a peer-to-peer network, all computers are considered equal; In a p2p each computer must be configured with individual user identification (userids) and passwords. Peer-to-peer networks are designed primarily for small to medium local area networks. AppleShare and Windows for Workgroups such as Home Edition of Windows are examples of operating systems that can used for peer-to-peer local area network (LAN)
  • 4. Fig.1 - Diagram of a Peer-to-Peer LAN Created by Lawrenec Igenewari
  • 5. Advantages of Peer- CreatedbyLawrenecIgenewari Advantages of Peer- to-peer Network Less initial expense - No need for a dedicated server. Setup - An operating system (such as Windows XP) already in place may only need to be reconfigured for peer-to-peer operations. CreatedbyLawrenecIgenewari
  • 6. Disadvantages of P2P Decentralized - No central repository for files and applications.files and applications. Security - Does not provide the security available on a client/server network. Created by Lawrenec Igenewari
  • 7. Server based LAN (Client/Server) Network A Server-based network or LAN has a dedicated computer known as a Server. The Server usually have high speed processor, Large Primary memory (RAM) and very large sized Hard Disk Drive (Secondary memory). The operating System in a Server is called Network Operating Systems (NOS). For these reasons a Sever is relatively expensive. The NOS allow the network to centralize functions and applications in one or more dedicated file servers. The Created by Lawrenec Igenewari functions and applications in one or more dedicated file servers. The file servers become the heart of the system, providing access to resources and providing security. The other computers referred to as workstations or clients have access to the resources available on the file servers. The network operating system provides the mechanism to integrate all the components of the network and allow multiple users to simultaneously share the same resources irrespective of physical location. Novell Netware, Sever 2000 and Server 2012 are examples of network operating systems.
  • 8. Fig.2 – Diagram of a Server-Based Network using network the correct symbols Created by Lawrenec Igenewari
  • 9. Fig. 3 - Diagram of a Sever Based Network Created by Lawrenec Igenewari
  • 10. ADVANTAGES OF A CLIENT/SERVER NETWORK: Centralized - Resources and data security are controlled through the server. Scalability - Any or all elements can be replaced individually as needs increase. Flexibility - New technology can be easily integrated into system. Interoperability - All components (client/network/server) work together. Accessibility - Server can be accessed remotely and across multiple platformsAccessibility - Server can be accessed remotely and across multiple platforms C R E A T E D B Y L A W R E N E C I G E N E W A R I
  • 11. Expense - Requires initial investment in dedicated server. Maintenance - Large networks will require a staff toMaintenance - Large networks will require a staff to ensure efficient operation. Dependence - When server goes down, operations will cease across the network. Requires highly skilled personnel to implement Created by Lawrenec Igenewari