There are many kinds of networks, however this paper will be about networking computers. As we move further and further into the paperless society, the need for people to be connected and able to exchange data just as fast as they could by handing a paper to someone increases. This can be accomplished by having a group of computers connected by a network, so that as soon as data is entered into one computer, it can be immediately accessed by someone else on a connected computer, no matter how far away it may be (though usually it is in the same building). There is much work involved in this and it in includes a lot of math, from equations to basic problems. This report will be based around the mathematical aspects of setting up a network.
The first mathematical question in setting up a network is very basic. How many computers will be connected to this network and how many guest computers might come on at one time is the question. An example of a guest computer is if someone brought a laptop and connected it for a short while to download or access data. To find the answer to the question, simply count the desktop computers that will be connected and how many guest computers you expect to be connected at one time.
The second mathematical problem that occurs is best solved using an algebraic equation. Let x=the amount of desktop computers that will always be connected, y=the amount of guest computers that you expect to be connected at one time. So, the equation is: x+y+1. The one added on the end of the equation is another guest file just to make sure you don't fall short. So, this tells you how many files you need to create. The guest files will all be generically named so that all guests have the same access privileges, and all the permanent computers will have their own named file so they can have more personalized access privileges. These files are put on one main computer, the server. This controls all access privileges and any data put into a computer branching off from it in it's network can be accessed from this all-powerful server computer. The previously stated problems are a large part of networking, although I couldn't possibly tell about all the math involved without going on for another 3 or 4 pages. Those problems help with networking as far as setting up the network on the computer goes, but there is a whole nother side. The physical side.
The physical side of computer networking involves problems such as how many feet of cable are you going to need to connect the computers. Some large office buildings can have 1 mile of cable between their networked computers! If someone has 2 computers in their house, it may only involve 3 feet. The mathematical procedure is quite simple although it might take a while to complete. Just take out the old meter stick and start measuring. Don't measure direct lines between the computers unless you want the cable stretching in a straight line between them. Chances are you will want it to run along a wall or around another object. Once the measuring is done, just add up the cable length and you have the answer to the problem.
If you don't have a very tight budget, you can afford faster networks than cable networks. These are more sophisticated but I was lucky enough to get to try it this summer. It is called infrared data transfer (IDT). Instead of cables, you have an infrared connector hooked to your computer. Just aim the little infrared panel at the infrared panel on the other computer and it will trade information with infrared light. These panels are usually about 1 square inch in size. This is much quicker and doesn't involve annoying cables. You still need to gauge distance because there is a distance limit on how far apart they can be and still work. When you install them, your computer will ask you questions such as how many lumens (measurement of brightness of light) you would like your panel to emit. It is invisible to the naked eye but the amount of lumens it outputs is critical. If you have a fast computer, you might want more lumens so that your computer doesn't crash because of lagging. If you have a slower computer you will want less lumens because other wise you will be sending data too fast for your computer and there will end up being a lot of gibberish that will mess up the receiving computer. The mathematical things that networking involves are almost endless depending on the situation. I couldn't adequately explain them if I had the time, because anybody who didn't understand quite a bit about computers wouldn't know what I was talking about, forcing me to explain many things that are off the subject of mathematics in networking. I hope I have given you an idea of what it involves, but if you want to know about all of the mathematics, you will just have to network some computers yourself.
Computer Communications: Bus Network Bus Network, in computer science, a topology (configuration) for a local area network in which all nodes are connected to a main communications line (bus). On a bus network, each node monitors activity on the line. Messages are detected by all nodes but are accepted only by the node(s) to which they are addressed. Because a bus network relies on a common data 'highway,' a malfunctioning node simply ceases to communicate; it doesn't disrupt operation as it might on a ring network, in which messages are passed from one node to the next. To avoid collisions that occur when two or more nodes try to use the line at the same time, bus networks commonly rely on collision detection or Token Passing to regulate traffic.Star NetworkStar Network, in computer science, a local area network in which each device (node) is connected to a central computer in a star-shaped configuration (topology); commonly, a network consisting of a central computer (the hub) surrounded by terminals. In a star network, messages pass directly from a node to the central computer, which handles any further routing (as to another node) that might be necessary. A star network is reliable in the sense that a node can fail without affecting any other node on the network. Its weakness, however, is that failure of the central computer results in a shutdown of the entire network. And because each node is individually wired to the hub, cabling costs can be high.Ring networkRing Network, in computer science, a local area network in which devices (nodes) are connected in a closed loop, or ring. Messages in a ring network pass in one direction, from node to node. As a message travels around the ring, each node examines the destination address attached to the message. If the address is the same as the address assigned to the node, the node accepts the message; otherwise, it regenerates the signal and passes the message along to the next node in the circle. Such regeneration allows a ring network to cover larger distances than star and bus networks. It can also be designed to bypass any malfunctioning or failed node. Because of the closed loop, however, new nodes can be difficult to add. A ring network is diagrammed below.Asynchrous Transfer ModeATM is a new networking technology standard for high-speed, high-capacity voice, data, text andvideo transmission that will soon transform the way businesses and all types of organizationscommunicate. It will enable the management of information, integration of systems andcommunications between individuals in ways that, to some extent, haven't even been conceived yet. ATM can transmit more than 10 million cells per second,resulting in higher capacity, faster delivery and greater reliability. ATM simplifies information transfer and exchange by compartmentalizing information into uniformsegments called cells. These cells allow any type of information--from voice to video--to betransmitted over almost any type of digitized communications medium (fiber optics, copper wire,cable). This simplification can eliminate the need for redundant local and wide area networks anderadicate the bottlenecks that plague current networking systems. Eventually, global standardizationwill enable information to move from country to country, at least as fast as it now moves from officeto office, in many cases faster.Fiber Distributed Data Interface. The Fiber Distributed Data Interface (FDDI) modules from Bay Networks are designed ...
Linux is an operating system that was initially created as a hobby by a young student, Linus Torvalds, at the University of Helsinki in Finland. Linus had an interest in Minix, a small UNIX system, and decided to develop a system that exceeded the Minix standards. He began his work in 1991 when he released version 0.02 and worked steadily until 199...
(anonymous) WHAT IS A COMPUTER VIRUS: The term usually used to define a computer virus is: ' A computer virus is often malicious software which replicates itself' [ Podell 1987 for similar definition ] - COMPUTER VIRUSES ARE BASICALLY PROGRAMS, LIKE A SPREADSHEET OR A WORD PROCESSOR....
What really makes a car go? There are many parts to an engine that are visible, like an alternator, starter, hoses, wires and a bunch of other things. But what is in the inside and how does it work? The process is really just a mixture of parts, moving in sync in a distinct pattern called the four-stoke cycle. To understand the components of a f...
Although many inventions have helped us and made our lives easier they have also caused some problems. With the invention of the car came problems such as air pollution. Cities are becoming more and more congested with people using their cars even for short distances. The government is trying to make this better by making cars pass an emmission co...
Identification and Description of the Issue Copyright law are perhaps those laws which are breached the most by individual on a daily bases. This is because one might not know be informed about these law or because not much is done to enforce these law. Also some countries of the world have no Copyright laws. Software Piracy is a breach of a copyri...
I understand that some students that have already graduated from College are having a bit of trouble getting their new businesses started. I know of a tool that will be extremely helpful and is already available to them; the Internet. Up until a few years ago, when a student graduated they were basically thrown out into the real world with just th...
If you never built a computer you may think it's pretty hard but in my opinion it's kind of over rated. Pretty much to build a computer you connect the inside of the computer case. Connecting the inside of the computer case isn't that hard . To me it felt as if we just placed in the motherboard and connected a few wire. Maybe it felt that way to m...
1) La croissance de l'inde est tr?s faible, une situation puissance ?conomique tr?s contraste, pauvret? envahissante et massive, un ?tat d?faillant 2) Lancement du processus de lib?ralisation ?conomique, en raison de la taille de sa marche int?rieure que de l'abondance de ses ressources en travail qualifie, L'inde est une cible prioritaire dans le...
write the code that tells computers what to do. System code tells a computer how to interact with its hardware; applications code tells a computer how to accomplish a specific task, such as word processing or spreadsheet calculating. Systems must be familiar with hardware specifications, design, memory management, and structure, while applications...
ENG 121 The volume and use of computers in the world are so great, they have become difficult to ignore anymore. Computers appear to us in so many ways that many times, we fail to see them as they actually are. People associated with a computer when they purchased their morning coffee at the vending machine. As they drove themselves to work, the tr...
A young man sits illuminated only by the light of a computer screen. His fingers dance across the keyboard. While it appears that he is only word processing or playing a game, he may be committing a felony. In the state of Connecticut, computer crime is defined as: 53a-251. Computer Crime (a) Defined. A person commits computer crime when he v...
I Ever since I got my first computer. I have enjoyed working on them. I have learned a tremendous amount of trouble shooting. With my recent computer I have come across computer crime. I got interested in hacking, prhreaking, and salami slicing. But before I go to far, I need to learn more about it like the consequences? One question in mind...
In the world of computers, computer fraud and computer crime are very prevalent issues facing every computer user. This ranges from system administrators to personal computer users who do work in the office or at home. Computers without any means of security are vulnerable to attacks from viruses, worms, and illegal computer hackers. If the prope...
Technology is one of the principle driving forces of the future. It is transforming and shaping our lives at rates unprecedented in history. Tech- nology has developed and changed drastically over the past century. Each day many new things are being developed. It's amazing to see how these inventions have the capability to change the world in su...