What type of network is formed when computers are connected with one server computer sharing its resources with multiple computers?

Network Communications Standards

Today’s networks connect terminals, devices, and computers from many different manufacturers across many types of networks, such as wide area, local area, and wireless. For the different devices on various types of networks to be able to communicate, the network must use similar techniques of moving data through the network from one application to another.

To alleviate the problems of incompatibility and ensure that hardware and software components can be integrated into any network, various organizations such as ANSI and IEEE (pronounced I triple E) propose, develop, and approve network standards. A network standard defines guidelines that specify the way computers access the medium to which they are attached, the type(s) of medium used, the speeds used on different types of networks, and the type(s) of physical cable and/or the wireless tech- nology used. A standard that outlines characteristics of how two network devices communicate is called a protocol. Hardware and software manufacturers design their products to meet the guidelines specified in a particular standard, so that their devices can communicate with the network.

The following sections discuss some of the more widely used network communications standards for both wired and wireless networks including Ethernet, token ring, TCP/IP, 802.11 (Wi-Fi), Bluetooth, UWB, IrDA, RFID, WiMAX, and WAP.

ETHERNET Ethernet is a network standard that specifies no central computer or device on the network (nodes) should control when data can be transmitted; that is, each node attempts to trans- mit data when it determines the network is able to receive communications. If two computers on an Ethernet network attempt to send data at the same time, a collision occurs, and the computers must attempt to send their messages again.

Ethernet is based on a bus topology, but Ethernet networks can be wired in a star pattern. The Ethernet standard defines guidelines for the physical configuration of the network, e.g., cabling, network cards, and nodes. Today, Ethernet is the most popular LAN standard because it is relatively inexpensive and easy to install and maintain. Ethernet networks often use cables to transmit data.

TOKEN RING The token ring standard specifies that computers and devices on the network share or pass a special signal, called a token, in a unidirectional manner and in a preset order. A token is a special series of bits that function like a ticket. The device with the token can transmit data over the network. Only one token exists per network. This ensures that only one computer transmits data at a time. Token ring is based on a ring topology (although it can use a star topology). The token ring standard defines guidelines for the physical configuration of a network. Some token ring networks connect up to 72 devices. Others use a special type of wiring that allows up to 260 connections.

TCP/IP Short for Transmission Control Protocol/Internet Protocol, TCP/IP is a network standard, specifically a protocol, that defines how messages (data) are routed from one end of a network to the other. TCP/IP describes rules for dividing messages into small pieces, called packets; providing addresses for each packet; checking for and detecting errors; sequencing packets; and regulating the flow of messages along the network.

TCP/IP has been adopted as a network standard for Internet communications. Thus, all hosts on the Internet follow the rules defined in this standard. Internet communications also use other standards, such as the Ethernet standard, as data is routed to its destination.

When a computer sends data over the Internet, the data is divided into packets. Each packet contains the data, as well as the recipient (destination), the origin (sender), and the sequence information used to reassemble the data at the destination. Each packet travels along the fastest individual available path to the recipient’s computer via communications devices called routers.

802.11 (WI-FIDeveloped by IEEE, 802.11 also known as Wi-Fi (wireless fidelity) and wireless Ethernet, is a series of network standards that specifies how two wireless devices communicate over the air with each other. Using Wi-Fi, computers or devices that have the appropriate wireless capa- bility communicate via radio waves with other computers or devices. The Wi-Fi standard uses tech- niques similar to the Ethernet standard to specify how physically to configure a wireless network. Most of today’s computers and many personal mobile devices, such as smart phones and handheld game consoles, are Wi-Fi enabled. 

One popular use of the Wi-Fi standard is in hot spots that offer mobile users the ability to connect to the Internet with their Wi-Fi enabled wireless computers and devices. Many homes and small businesses also use Wi-Fi to network computers and devices together wirelessly.

BLUETOOTH Bluetooth is a standard, specifically a protocol, that defines how two Bluetooth devices use short-range radio waves to transmit data. To communicate with each other, Bluetooth devices often must be within about 10 meters (about 33 feet) but can be extended to 100 meters with additional equip- ment. Examples of Bluetooth devices can include desktop computers, notebook computers, handheld computers, smart phones, PDAs, headsets, microphones, digital cameras, and printers.

UWB UWB, which stands for ultra-wideband, is a network standard that specifies how two UWB devices use short-range radio waves to communicate at high speeds with each other. For optimal com- munications, the devices should be within 2 to 10 meters (about 6.5 to 33 feet) of each other. Examples of UWB uses include wirelessly transferring video from a digital video camera, printing pictures from a digital camera, downloading media to a portable media player, or displaying a slide show on a projector.

IRDA Some computers and devices use the IrDA specification to transmit data wirelessly to each other via infrared (IR) light waves. Infrared requires a line-of-sight transmission; that is, the sending device and the receiving device must be in line with each other so that nothing obstructs the path of the infrared light wave.

RFID RFID (radio frequency identification) is a standard, specifically a protocol, that defines how a network uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person. The tag consists of an antenna and a memory chip that contains the information to be transmitted via radio waves. Through an antenna, an RFID reader reads the radio signals and trans- fers the information to a computer or computing device. Readers can be handheld or embedded in an object such as a doorway or tollbooth.

WIMAX WiMAX (Worldwide Interoperability for Microwave Access), also known as 802.16, is a newer network standard developed by IEEE that specifies how wireless devices communicate over the air in a wide area. Using the WiMAX standard, computers or devices with the appropriate WiMAX wireless capability communicate via radio waves with other computers or devices via a WiMAX tower. The WiMAX tower, which can cover up to a 30-mile radius, connects to the Internet or to another WiMAX tower. 

Two types of WiMAX specifications are fixed wireless and mobile wireless. With fixed wire- less WiMAX, a customer accesses the Internet from a desktop computer at home or other permanent location. Mobile wireless WiMAX, by contrast, enables users to access the WiMAX network with mobile computers and mobile devices such as smart phones.

The WiMAX standard provides wireless broadband Internet access at a reasonable cost over long distances to business and home users. The WiMAX standard, similar to the Wi-Fi stan- dard, connects mobile users to the Internet via hot spots. The next generation of game consoles also plans to support the WiMAX standard. 

WAP The Wireless Application Protocol (WAP) is a standard, specifically a protocol, that specifies how some mobile devices such as smart phones can display the content of Internet services such as the Web, e-mail, and chat rooms. For example, users can check weather, sports scores, and headline news from their WAP-enabled smart phone. To display a Web page on a smart phone, the phone should contain a microbrowser. WAP uses a client/server network. The wireless device contains the client software, which connects to the Internet access provider’s server. 

In order to continue enjoying our site, we ask that you confirm your identity as a human. Thank you very much for your cooperation.

In its simplest form, a peer-to-peer (P2P) network is created when two or more PCs are connected and share resources without going through a separate server computer. A P2P network can be an ad hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files. A P2P network also can be a permanent infrastructure that links a half-dozen computers in a small office over copper wires. Or a P2P network can be a network on a much grander scale in which special protocols and applications set up direct relationships among users over the Internet.

The initial use of P2P networks in business followed the deployment in the early 1980s of free-standing PCs. In contrast to the minimainframes of the day, such as the VS system from Wang Laboratories Inc., which served up word processing and other applications to dumb terminals from a central computer and stored files on a central hard drive, the then-new PCs had self-contained hard drives and built-in CPUs. The smart boxes also had onboard applications, which meant they could be deployed to desktops and be useful without an umbilical cord linking them to a mainframe.

More

Many workers felt liberated by having dedicated PCs on their desktops. But soon they needed a way to share files and printers. The obvious solution was to save files to a floppy disk and carry the disk to the intended recipient or send it by interoffice mail.

Sneaker Nets

That practice resulted in the term "sneaker net." The most frequent endpoint of a typical sneaker net was the worker who had a printer connected to his machine.

While sneaker nets seemed an odd mix of the newest technology and the oldest form of transportation, the model is really the basis for today's small P2P workgroups.

Whereas earlier centralized computing models and today's client/server systems are generally considered controlled environments in which individuals use their PCs in ways determined by a higher authority, a classic P2P workgroup network is all about openly sharing files and devices.

In general, office and home P2P networks operate over Ethernet (10M bit/sec.) or Fast Ethernet (100M bit/sec.) and employ a hub-and-spoke topology. Category 5 (twisted-pair) copper wire runs among the PCs and an Ethernet hub or switch, enabling users of those networked PCs access to one another's hard drives, printers or perhaps a shared Internet connection.

Both Client and Server

In effect, every connected PC is at once a server and a client. There's no special network operating system residing on a robust machine that supports special server-side applications like directory services (specialized databases that control who has access to what).

In a P2P environment, access rights are governed by setting sharing permissions on individual machines.

For example, if User A's PC is connected to a printer that User B wants to access, User A must set his machine to allow (share) access to the printer. Similarly, if User B wants to have access to a folder or file, or even a complete hard drive, on User A's PC, User A must enable file sharing on his PC. Access to folders and printers on an office P2P network can be further controlled by assigning passwords to those resources.

Cope is an Indiana-based freelance writer. He can be contacted at .

Read accompanying stories:

See additional

Copyright © 2002 IDG Communications, Inc.