Wednesday 14 September 2016

Internet Technology Network Basics


So what are
Network Architecture???

configuration of computers,devices, and media on a  network
Switch

A communication device that provides a central point for cables in a network
   There are 2 types of network architecture:

 * Peer to Peer Network
     * Client / Server Network
We are decided to choose client/server network because it is suitable for our planning project,which is the place are at our cubicle our lecturer room in Selangor matriculation .

Client / Server Network in which one or more computers act as a server, and the other computer on the network (clients) request services from the server


Advantages for using this architecture



It works with any size of networks and does not tend to slow down with heavy use.
Security is more advanced than a peer-to-peer network, you can have passwords to own
individual profiles so that nobody can access anything when they want.




For Network Topology 


we are deciding to choose  Star Network


Which is  uses a central device(hub, switch) where all the nodes are connected to it using cables


In star topology, all data that transfer from one node to another passes through the hub or switch until it reaches the destination node.
Switch: Takes a signal from the sender and passes the message straight to the recipient.
BECAUSE THE Advantages IS


  • Adding or removing a node does not affect the rest of the star network.

  • Failure of one node usually does not affect the rest of the star network.  


And Lastly , for our Classification of Network




We are decided to choose Local Area Network (LAN) 


 BECAUSE a network that connects computers and devices in a limited geographical area such as a home, school computer laboratory, office building   

SO THE ADVANTAGES IS
#Allow users on the network to share resources, such as printers, large hard drives, data, programs, in a limited geographical area.
#Reduce cost because the hardware can be shared
 WHILE THE DISADVANTAGES IS


# IT is limited



#Exposed to viruses and unauthorized access when we are share a data
We are believe that our project are exactly same like what we have seen in the cubicle. Surely ,it is same like what on the real .

So ,that are our last looked for the network model .May you like it .




to people who are help us ,and thank you to our sm3k3t3 science computer lecturer's Madam Siew Moi


1 comment: