Реферат: How To Design A Network Essay Research
topology. The bus topology is composed of a single link connected to many computers. All
computers on this common connection receive all signals transmitted by any attached computer.
Local area networks which connect separated by short distances, such as in an office or a
university campus, commonly use a bus topology. Twisted pair, for slow speed LANs, will be
the cabling of these computers. Here, the main cable is typically a shielded twisted pair (like
phone lines). The board is attached to a TAP via three cables then the tap is connected to the
twisted pair again at three points. An active hub will connect up to eight PCs and workstations.
Each PC or work station can be up from two thousand feet from the active hub. Each port of the
active hub will be electrically isolated and will not need terminators for unused ports.
Typically a LAN has a server node to provide certain services to the LAN users. In this case of
a small scale PC LAN, the server is attached to a laser printer, so that all users can share that
printer through the server. Another use of the server is that if the LAN users need to get some
updated files. Instead of copying to all the nodes each of them can copy / share from the server,
where only once those files can be loaded or updated.
The Network security structure would not be a very complicated. The Supervisor would be
granted full access to all the resources in the CIS program. Students who are a CIS major will
have read, copy and write capabilities for the classes they will attend. The Public accounts will
only have the right to be able to access the rights to Word Perfect, Excel, Power Point, etc. The
Faculty will also have rights to the classes with read, copy, write and send.
Networks are subject to hacking, or illegal access, so shared files and resources must be
protected. A network intruder could easedrop on packets being sent across network or send
fictitious messages. For important information, data encryption (scrambling data using
mathematical equations) renders captured packets unreadable to an intruder. This server will use
an authentication scheme to ensure that a request to read or write files or to use resources is from
a legitimate client (faculty or CIS majors) and not from an intruder. The system will have a
security measure of telling whether or not the user is a CIS major or not by given each CIS major
and faculty a code or password.. The CIS majors will be given a code in which they will have to
enter in every time he or she gets to the computer and wants information from a CIS class. Every
time the student enters in the code the computer will keep it in memory so if the same password