SlideShare ist ein Scribd-Unternehmen logo
1 von 72
Chapter 5 Networks, telecommunications  and the Internet
TOPICS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Computer networks defined ,[object Object],[object Object]
Figure 5.1  Communications links between different stakeholders in an industry
Business benefits of networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disadvantages of networks ,[object Object],[object Object],[object Object],[object Object]
TOPICS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Client/server model of computing ,[object Object],[object Object],[object Object]
Figure 5.3  Components of a client/server system
Why use client / server ? ,[object Object],[object Object],[object Object]
Problems to be managed with client/server ,[object Object],[object Object],[object Object],[object Object]
Servers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Servers (Continued) ,[object Object],[object Object],[object Object],[object Object]
Examples of different servers Network Contains functions to manage the network resources and control user access File This term is sometimes used to refer to network server functions. It can also indicate that users’ files such as documents and spreadsheets are stored on the network server Print Dedicated print servers have a queue of all documents for which print requests have been made, often combined with file or network servers Fax Used to route incoming and outgoing faxes received and sent from the users’ desktop Mail Stores and forwards e-mail messages Database Used to store data and provide the software to process data queries supplied by users, often accessed by Structured Query Language (SQL) Application Used to store programs such as spreadsheet or bespoke applications run by end-users on their PCs. This removes the need to store each application on every user’s hard disk Communications Manages connections with other networks in a WAN configuration. Sometimes known as gateways and attached to other gateway devices such as routers and firewall servers.
Servers (Continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Servers (Continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Servers (Continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Servers (Continued) ,[object Object]
Data communications equipment or telecommunications processors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Alternatives to the modem  and conventional telephone line   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Alternatives to the modem  and conventional telephone line ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data communications equipment or telecommunications processors ,[object Object],[object Object],[object Object],[object Object],[object Object]
A Simple Computer network
Telecommunications channels ,[object Object],[object Object]
Guided Media ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unguided or wireless media ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Signal type ,[object Object],[object Object],[object Object]
Transmission speed ,[object Object],[object Object],[object Object]
Network operating system (NOS) ,[object Object],[object Object],[object Object]
Network operating system (Continued) ,[object Object],[object Object],[object Object],[object Object],[object Object]
TOPICS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Evolution of networking technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TOPICS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is the Internet ? ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Internet ,[object Object],[object Object],[object Object],[object Object]
Figure 5.4  Infrastructure components of the Internet Source:  Chaffey (2004).
Business and consumer models of Internet access ,[object Object],[object Object],[object Object]
Figure 5.6  B2B and B2C interactions between an organisation, its suppliers and its customers Source:  Chaffey (2004).
Business and consumer models of Internet access ,[object Object],[object Object]
Figure 5.7  Summary of transaction alternatives between businesses and consumers Source:  Chaffey (2004).
Role of the Internet in restructuring  business relationships ,[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 5.8  Disintermediation of a consumer distribution channel showing (a) the original situation, (b) disintermediation omitting the wholesaler and (c) disintermediation omitting both wholesaler and retailer Source:  Chaffey (2004).
Role of the Internet in restructuring  business relationships (Continued) ,[object Object],[object Object],[object Object]
Figure 5.10  The move to re-intermediation: (a) original situation,  (b) disintermediation, (c) re-intermediation Source:  Chaffey (2004).
Intranets and extranets ,[object Object],[object Object],[object Object],[object Object]
Intranets and extranets (Continued) ,[object Object],[object Object],[object Object],[object Object]
Figure 5.12  The relationship between intranets, extranets and the Internet
Firewalls ,[object Object],[object Object],[object Object],[object Object],[object Object]
Firewalls (Continued) ,[object Object],[object Object],[object Object],[object Object]
Figure 5.14  An example of the use of firewalls to increase security within an e-business infrastructure Source:  Chaffey (2004).
What is the World Wide Web ? ,[object Object],[object Object],[object Object]
Web browsers and servers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 5.15  Information exchange between a web browser and web server Source:  Chaffey (2004).
TOPICS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Networking standards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Networking standards (Continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 5.16  The TCP/IP protocol Source:  Chaffey (2004).
TOPICS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wide Area Network (WAN) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WAN (continued) ,[object Object],[object Object]
 
Value-added networks (VANs) ,[object Object],[object Object],[object Object],[object Object]
Virtual private network (VPN) ,[object Object],[object Object],[object Object]
TOPICS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Local area network (LAN) ,[object Object],[object Object],[object Object]
Figure 5.24  A small workgroup network connecting a single server to three PCs and a laser printer
Network technology ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Bus or linear ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Star ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ring ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Peer-to-peer network ,[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Prachi gupta 8 a
Prachi gupta 8 aPrachi gupta 8 a
Prachi gupta 8 a
EashaGupta
 

Was ist angesagt? (18)

Class work 2,computer_network_317
Class work 2,computer_network_317Class work 2,computer_network_317
Class work 2,computer_network_317
 
Introduction to computer_lec_05
Introduction to computer_lec_05Introduction to computer_lec_05
Introduction to computer_lec_05
 
Prachi gupta 8 a
Prachi gupta 8 aPrachi gupta 8 a
Prachi gupta 8 a
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networks
 
Networking Components
Networking ComponentsNetworking Components
Networking Components
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 
Data Communications and Networks
Data Communications and NetworksData Communications and Networks
Data Communications and Networks
 
Networking.
Networking.Networking.
Networking.
 
Network administration Book
Network administration BookNetwork administration Book
Network administration Book
 
Introduction to computer networks ppt download
Introduction to computer networks   ppt downloadIntroduction to computer networks   ppt download
Introduction to computer networks ppt download
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
 
Data management issues
Data management issuesData management issues
Data management issues
 
Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED
 
Networking
NetworkingNetworking
Networking
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 

Andere mochten auch

Optical Fibre & Introduction to TDM & DWDM
Optical Fibre & Introduction to TDM & DWDMOptical Fibre & Introduction to TDM & DWDM
Optical Fibre & Introduction to TDM & DWDM
Hasna Heng
 
DWDM Presentation
DWDM PresentationDWDM Presentation
DWDM Presentation
ayodejieasy
 
Communication & network devices
Communication & network devicesCommunication & network devices
Communication & network devices
Harman Grewal
 

Andere mochten auch (8)

The technology of fiber optic in telcommunication
The technology of fiber optic in telcommunicationThe technology of fiber optic in telcommunication
The technology of fiber optic in telcommunication
 
20 Years of KVH Fiber Optic Gyro Technology: Presented at SPIE 2016
20 Years of KVH Fiber Optic Gyro Technology: Presented at SPIE 201620 Years of KVH Fiber Optic Gyro Technology: Presented at SPIE 2016
20 Years of KVH Fiber Optic Gyro Technology: Presented at SPIE 2016
 
Optical Fibre & Introduction to TDM & DWDM
Optical Fibre & Introduction to TDM & DWDMOptical Fibre & Introduction to TDM & DWDM
Optical Fibre & Introduction to TDM & DWDM
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management Devices
 
Fiber optic
Fiber opticFiber optic
Fiber optic
 
DWDM Presentation
DWDM PresentationDWDM Presentation
DWDM Presentation
 
Communication & network devices
Communication & network devicesCommunication & network devices
Communication & network devices
 
[OpenStack Day in Korea 2015] Keynote 5 - The evolution of OpenStack Networking
[OpenStack Day in Korea 2015] Keynote 5 - The evolution of OpenStack Networking[OpenStack Day in Korea 2015] Keynote 5 - The evolution of OpenStack Networking
[OpenStack Day in Korea 2015] Keynote 5 - The evolution of OpenStack Networking
 

Ähnlich wie Bis Chapter5

Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
UMaine
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
reddydivakara
 
Computer network
Computer networkComputer network
Computer network
Anupan Jain
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
ajaymane22
 
Networking Comptia
Networking ComptiaNetworking Comptia
Networking Comptia
Marco Cruz
 
Data communications
Data communicationsData communications
Data communications
UMaine
 

Ähnlich wie Bis Chapter5 (20)

Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networking
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Rkp internet part i
Rkp internet part iRkp internet part i
Rkp internet part i
 
Computer network
Computer networkComputer network
Computer network
 
L1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptxL1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptx
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
 
Client server technology main
Client server technology mainClient server technology main
Client server technology main
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationTECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
 
Networking Comptia
Networking ComptiaNetworking Comptia
Networking Comptia
 
Cn
CnCn
Cn
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Data communications
Data communicationsData communications
Data communications
 
What is a network
What is a networkWhat is a network
What is a network
 
Networking & Servers
Networking & ServersNetworking & Servers
Networking & Servers
 

Mehr von Chun Hoi Lam

Access Ch4 Creating Reports And Forms (Jy)
Access Ch4   Creating Reports And Forms (Jy)Access Ch4   Creating Reports And Forms (Jy)
Access Ch4 Creating Reports And Forms (Jy)
Chun Hoi Lam
 
Access Ch3 Maintaining A Database (Jy)
Access Ch3   Maintaining A Database (Jy)Access Ch3   Maintaining A Database (Jy)
Access Ch3 Maintaining A Database (Jy)
Chun Hoi Lam
 
Access Ch5 Multi Table Forms (Jy)
Access Ch5   Multi Table Forms (Jy)Access Ch5   Multi Table Forms (Jy)
Access Ch5 Multi Table Forms (Jy)
Chun Hoi Lam
 

Mehr von Chun Hoi Lam (9)

Bis Chapter3
Bis Chapter3Bis Chapter3
Bis Chapter3
 
Bis Chapter6
Bis Chapter6Bis Chapter6
Bis Chapter6
 
Bis Chapter15
Bis Chapter15Bis Chapter15
Bis Chapter15
 
Bis Chapter4
Bis Chapter4Bis Chapter4
Bis Chapter4
 
Bis Chapter2
Bis Chapter2Bis Chapter2
Bis Chapter2
 
Access Ch4 Creating Reports And Forms (Jy)
Access Ch4   Creating Reports And Forms (Jy)Access Ch4   Creating Reports And Forms (Jy)
Access Ch4 Creating Reports And Forms (Jy)
 
Access Ch3 Maintaining A Database (Jy)
Access Ch3   Maintaining A Database (Jy)Access Ch3   Maintaining A Database (Jy)
Access Ch3 Maintaining A Database (Jy)
 
Bis Chapter1
Bis Chapter1Bis Chapter1
Bis Chapter1
 
Access Ch5 Multi Table Forms (Jy)
Access Ch5   Multi Table Forms (Jy)Access Ch5   Multi Table Forms (Jy)
Access Ch5 Multi Table Forms (Jy)
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Bis Chapter5

  • 1. Chapter 5 Networks, telecommunications and the Internet
  • 2.
  • 3.
  • 4. Figure 5.1 Communications links between different stakeholders in an industry
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Figure 5.3 Components of a client/server system
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Examples of different servers Network Contains functions to manage the network resources and control user access File This term is sometimes used to refer to network server functions. It can also indicate that users’ files such as documents and spreadsheets are stored on the network server Print Dedicated print servers have a queue of all documents for which print requests have been made, often combined with file or network servers Fax Used to route incoming and outgoing faxes received and sent from the users’ desktop Mail Stores and forwards e-mail messages Database Used to store data and provide the software to process data queries supplied by users, often accessed by Structured Query Language (SQL) Application Used to store programs such as spreadsheet or bespoke applications run by end-users on their PCs. This removes the need to store each application on every user’s hard disk Communications Manages connections with other networks in a WAN configuration. Sometimes known as gateways and attached to other gateway devices such as routers and firewall servers.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. A Simple Computer network
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Figure 5.4 Infrastructure components of the Internet Source: Chaffey (2004).
  • 37.
  • 38. Figure 5.6 B2B and B2C interactions between an organisation, its suppliers and its customers Source: Chaffey (2004).
  • 39.
  • 40. Figure 5.7 Summary of transaction alternatives between businesses and consumers Source: Chaffey (2004).
  • 41.
  • 42. Figure 5.8 Disintermediation of a consumer distribution channel showing (a) the original situation, (b) disintermediation omitting the wholesaler and (c) disintermediation omitting both wholesaler and retailer Source: Chaffey (2004).
  • 43.
  • 44. Figure 5.10 The move to re-intermediation: (a) original situation, (b) disintermediation, (c) re-intermediation Source: Chaffey (2004).
  • 45.
  • 46.
  • 47. Figure 5.12 The relationship between intranets, extranets and the Internet
  • 48.
  • 49.
  • 50. Figure 5.14 An example of the use of firewalls to increase security within an e-business infrastructure Source: Chaffey (2004).
  • 51.
  • 52.
  • 53. Figure 5.15 Information exchange between a web browser and web server Source: Chaffey (2004).
  • 54.
  • 55.
  • 56.
  • 57. Figure 5.16 The TCP/IP protocol Source: Chaffey (2004).
  • 58.
  • 59.
  • 60.
  • 61.  
  • 62.
  • 63.
  • 64.
  • 65.
  • 66. Figure 5.24 A small workgroup network connecting a single server to three PCs and a laser printer
  • 67.
  • 68.  
  • 69.
  • 70.
  • 71.
  • 72.