• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

Chapter Summary

  • Peer-to-peer networks are best used in situations where a few users need to share a few resources.

  • Peer-to-peer networks use share-level security, which means that each resource could have a different password.

  • Server-based networks provide for centralized management of the network.

  • Server-based networks log on a user with one password. The user can access any resources that he or she has been given the appropriate permissions for.

  • Server-based networks can distribute the workload among specialized network servers, such as file and print servers.

  • Special servers, such as Web servers, can expand the ability of the network to communicate outside its physical location.

  • The bus topology is the simplest topology and uses a passive methodology for computers accessing the network.

  • The star topology is the most common network topology and also the easiest to expand. The star topology is also considered a passive topology (like the bus topology).

  • The ring topology is an active topology because computers on the ring pass a token. To send data onto the network, possession of the token is required.

  • It is extremely important that you assess your networking needs before actually planning your network. Take future growth into account when assessing your LAN needs.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint