Yolanda

Solo disponible en BuenasTareas
  • Páginas : 6 (1412 palabras )
  • Descarga(s) : 0
  • Publicado : 12 de septiembre de 2012
Leer documento completo
Vista previa del texto
Network Topologies
Network Topologies

Network Topologies
Uma Jinna
Telecommunication Conceps
CS125
9/12/2012
Network Topologies
Uma Jinna
Telecommunication Conceps
CS125
9/12/2012
Cinthia Benitez
Network software consists of computer programs that establish protocols, or rules, for computers to communicate with each other. These protocols are implemented by sending andreceiving formatted data sets called packets. The protocols indicate how to perform logical connections between network applications, direct the movement of packages through the physical network and minimize the chances of collision between packets sent simultaneously.

Cinthia Benitez
Network software consists of computer programs that establish protocols, or rules, for computers to communicatewith each other. These protocols are implemented by sending and receiving formatted data sets called packets. The protocols indicate how to perform logical connections between network applications, direct the movement of packages through the physical network and minimize the chances of collision between packets sent simultaneously.

Networks

Set of techniques, physical connections and softwareused to connect two or more computers or computers. Users on a network can share files, printers and other resources, send emails and run programs on other computers.

A network component has three levels: application software, network software and network hardware. Application software consists of computer programs that communicate with the users of the network and to share information (such asdatabase files, documents, graphics or videos) and resources (such as printers and disk drives). A kind of software application is called client-server. Client computers send requests for information or use of resources to other computers, called servers, which control the flow of data and applications running across the network. Another type of software application called "peer to peer" (peer topeer). In such a network, the computers send messages and requests directly without using a server as an intermediary. These networks are more restricted in their security capabilities, audit and control, and are typically used in work areas with few computers and where precise control is not as strict application usage and privileges for accessing and modifying data and are used, for example,home networks or workgroups within a larger corporate network.

Networking hardware component consists of materials between computers. Two important components are the transmission media that carry signals from computers (typically standard cables or optical fiber, but there are wireless networks that perform transmission infrared or radio frequency) and the network adapter, which allows access tomaterial medium that connects computers, software receive packets from the network and transmit instructions and requests to other computers. Information is transferred in the form of binary digits, or bits (ones and zeros), which can be processed by the electronic circuits of computers.

The fundamental objective is really obvious a network is to provide connectivity between its nodes.Depending on the needs of its users networks can be isolated; for reasons of safety for example or connected to other networks. The networks usually consist of "sharing resources", and one of its goals is to make all programs, data and equipment available to anyone on the network that requests it, regardless of the physical location of the resource and the user. In other words, the fact that the user isa distance of 1000 km from the data, this must not prevent the user to access the data as if it were locally originated.
A second objective is to provide high reliability by having alternative sources of supply. For example all files could double in two or three machines, so that if one is not available, you may use one of the other copies. Furthermore, the presence of multiple CPU means that...
tracking img