Showing posts with label Concepts. Show all posts
Showing posts with label Concepts. Show all posts

Friday, May 6, 2011

FIGHTING CYBER SQUATTING


WHAT IS ACPA? OVERVIEW
The Anti Cyber Squatting Consumer Protection Act is a federal law that took effect on November 29, 1999.  This new domain name dispute law is intended to give trademark and service mark owner’s legal remedies against defendants who obtain domain names "in bad faith" that are identical or confusingly similar to a trademark or service mark.  If a mark is a famous mark, the same remedies are available if the domain name is identical to, confusingly similar to or dilutive of the mark.
  
Cyber Squatting Evidence

The plaintiff must prove the following elements to be convicted of cyber squatting:
The Defendant has a bad faith intent to profit from that mark, including a defendant name which is protected as a mark; 
Registers, traffics in, or uses a domain name that--
(I)           In the case of a mark that is distinctive at the time of registration of the domain name, is identical or confusingly similar to that mark;
 
(II)         In the case of a famous mark that is famous at the time of registration of the domain name, is identical or confusingly similar to or dilutive of that mark; or
 
(III)       Is a trademark, word, or name protected by reason of 18 U.S.C. § 706 (the Red Cross, the American National Red Cross or the Geneva cross) or 36 U.S.C. § 220506

*The key element that needs to be proven is that the defendant has bad faith intent to profit from the mark.


Determining Bad Faith

The ACPA gives the court some guidance when deciding whether ‘bad faith,” exists or not.  This should make it easier for the courts to follow the “rubric,” in a sense and determine “bad faith.”  “Bad faith,” is a mandatory requirement to award the plaintiff with statutory awards of any kind.
1.      The trademark or other intellectual property rights of the defendant, if any, in the domain name;
2.      The extent to which the domain name consists of the legal name of the defendant or a name that is otherwise commonly used to identify the defendant;
43.      The defendant's prior use, if any, of the domain name in connection with the bona fide offering of any goods or services;
.      The defendant's bona fide noncommercial or fair use of the mark in a site accessible under the domain name;
5.      The defendant's intent to divert consumers from the mark owner's online location to a site accessible under the domain name that could harm the goodwill represented by the mark, either for commercial gain or with the intent to tarnish or disparage the mark, by creating a likelihood of confusion as to the source, sponsorship, affiliation, or endorsement of the site;
6.      The defendant's offer to transfer, sell, or otherwise assign the domain name to the mark owner or any third party for financial gain without having used, or having an intent to use, the domain name in the bona fide offering of any goods or services, or the defendant's prior conduct indicating a pattern of such conduct;
7.      The defendant's provision of material and misleading false contact information when applying for the registration of the domain name, the defendant's intentional failure to maintain accurate contact information, or the defendant's prior conduct indicating a pattern of such conduct;
8.      The defendant's registration or acquisition of multiple domain names which the defendant knows are identical or confusingly similar to marks of others that are distinctive at the time of registration of such domain names, or dilutive of famous marks of others that are famous at the time of registration of such domain names, without regard to the goods or services of the parties; and
9.      The extent to which the mark incorporated in the defendant's domain name registration is or is not distinctive and famous within the meaning of Section 1125(c) (1) of the Lanham Act.
Bad faith intent will not be found in situations where the plaintiff believed they were acting lawfully and not in bad faith.


Violation Remedies
The Act authorizes a court to order the forfeiture or cancellation of a domain name or the transfer of the domain name to the owner of the mark.  In lieu of actual damages, the plaintiff may elect statutory damages and the court has discretion to award damages of a minimum of $1,000 and maximum of $100,000 per domain name, as the court considers just.

 WHAT IS ICANN? OVERVIEW

The contract for ICANN came from the US Department of Commerce and all other bidders were excluded from being involved.  The tasks delegated included managing the assignment of domain names and IP addresses.  Currently Paul Twomey heads ICANN and is the CEO.  Public participation was decided to be excluded on March 14, 2002, in a public meeting in Accra, in Ghana.

ICANN is the Internet Corporation for Assigned Names and Numbers.  Located in California, it is a non-profit corporation that consists largely of Internet society members.  It was created on September 18, 1998 in order to take over a number of Internet-related tasks previously performed on behalf of the US Government.

ICANN holds their periodic public meetings with the intent of staying in touch with its members.  Critics site that the locations of the meetings are often in countries with small Internet access and far away from locations that the majority of the Internet-using public can afford to reach, therefore making public input and participation quite limited.  Some other people criticize ICANN as playing into the hands of US interests, given that the Internet is a worldwide resource and its formation was created through contributions from worldwide scientists.  Meanwhile, ICANN is seeking to privatize itself, withdrawing from its connections to the US Government and US Department of Commerce.

 FUTURE OF CYBER SQUATTING

The importance of cyber squatting to corporations has been growing since the creation of the ACPA and will continue to grow as time goes on.  We predict that cyber squatting will be an issue involved in e-commerce law in the future although the complainant may shift from big businesses to smaller businesses based on recent court decisions.  In addition, there are various amendments that could be made to the current cyber squatting acts in order to increase their effectiveness as well as fairness.  These changes will need to occur as the Internet expands and online businesses continue to flourish.

There are many current cases which challenge both the powerful individuals’ and businesses’ right to a domain name, as well as challenging the individual’s right to hold the domain for personal use.  Earlier this month, a case was tried in the U.S. Court of Appeals in regards to the use of the domain “fallwell.com” as a critical site to the preaching of televangelist Jerry Falwell.  Jerry Falwell accused the owner of this site of infringing on trademarks and cyber squatting but his claims were rejected when the courts decided that the site could not be confused with Jerry Falwell’s official domain “falwell.com” due to differences in both appearance and content.

This case is a major victory for individuals who wish to criticize public figures or organizations through the use of the Internet.  In the future, granted that the individuals who own and operate the domain have no intent to profit from its use, there is very slim chance that a court could find in favor of either a powerful individual or a large corporation.  This lack of “bad faith” intent involved with the operation of a site is used to protect individuals from being bullied out of cyberspace by large businesses.


Bad Faith in the Future

“Bad faith” has been used as a defense for many small businesses and has provided them with a layer of security when their use of the domain does not infringe upon the larger company’s trademark.  Non-profit use is one of the strongest defenses and its inclusion in the ACPA is one of the greatest strengths of the act.  Many other aspects of the ACPA allow big businesses to push smaller ones out of the Internet market and simply having larger exposure and a larger name has allowed them to bully others out of the e-commerce market [19].

The ability of large companies to force smaller ones to give up domain rights is being challenged by many court cases and the victories of some of these small businesses is paving the way for others in the future.  These results are also being looked at in many states as they look to clarify and improve the cyber squatting laws.  This is because as we stand now, the Internet may not be able to survive only on the acts which have been passed in the last few years.  With the Internet rapidly expanding into new domains, such as “.biz”, “.edu”, “.in”, and many others, the chances of registering common domains increases greatly.  Along with this, many individuals and companies are becoming more educated on the technical aspects of cyber squatting.  This is only increasing the complicated nature of cases and making it harder for courts to come to a decision regarding the rightful ownership of a domain name.


Changes

Problems can be dealt with through the expansion of the acts that currently deal with cyber squatting.  The ACPA, in conjunction with the ICANN, has power over the domain names that are registered and can influence the decisions made in regards to them.  By enhancing the ACPA with more individual-friendly sanctions, the government can help to protect the rights of an individual to own and operate a site that may be common to a corporation’s trademark.  In addition to this, the ICANN and other such organizations have the authority to sell the rights to a domain to anyone who pays for it, but also have gained the power to transfer these rights to another party if they deem fit.  These decisions can be appealed and taken to court; however, a failure to promptly file an appeal with the domain registrar can lead to a loss in court no matter what arguments are brought about.

In order to prevent these organizations from unfairly dictating the law of the Internet, legislation must be passed in order to amend the ACPA in order to correct the flaws that have been found in recent court hearings.  This will undoubtedly gather much opposition from large businesses and influential individuals who wish to protect their own rights without concerning the right of the common individual.  These laws in the United States act to override the laws of foreign nations and also act to undermine the authority of international efforts such as ICANN in order to avoid complex and costly international lawsuits.  The ACPA has received much opposition and typically gains complaints including such grounds as legislative overkill, free speech concerns, and reverse domain hijacking.  The future of the ACPA holds legal ramifications that will affect not only U.S citizens, but also foreign citizens and businesses.  This holds true in the case of the International Olympic Committee which has used the ACPA as a weapon in order to prevent the use of domains remotely associated with the Olympics.

CONCLUSION
Cyber squatting has been an active threat since the early 1990’s and has increased in severity ever since.  The prevention of cyber squatting revolves mainly around two acts, the UDRP and the ACPA.  The UDRP was adopted by ICANN in order to provide a mechanism for trademark holders to obtain domain names from cyber squatters.  The UDRP states that before a domain name registrar will cancel, suspend, or transfer a domain name that is the subject of a trademark-based dispute, it must have an agreement signed by the parties, a court order, or an arbitration award.  The development of the UDRP created a "cyber arbitration" procedure to quickly resolve domain name ownership disputes that involve trademarks.  All owners of “.com”, “.net”, and “.org” domain names are subject to the UDRP by virtue of the registration agreements at the time of acquiring their domain names.

The ACPA is a valuable tool intended to protect the infringement of trademarks online and to protect the credibility of a company through the protection of their name as a domain.  However, it is also a weapon used by corporations in order to force smaller businesses out of the e-commerce market.  For this reason, the ACPA must be modified in order to account for some of the unfair court cases which have been decided in the past years.  The rights of the individual must be protected and as it currently stands, courts have been favouring the businesses with the largest name and largest pockets regardless of the intent of the individual who owns the domain.

Both of these systems have their advantages, but they must be used properly in order to achieve the desired result.  The UDRP provides a method for quick resolution of a dispute whereas the ACPA allows for an extended legal battle with the potential of large monetary settlements being awarded.  However, both systems help to provide security and structure to the complicated and widespread problem of cyber squatting.  These acts, along with the legal system, are the only protection available to those who wish to defend themselves from cyber squatters. 

Since cyber squatting is going to shift from larger businesses to small businesses in the future, modifications to the cyber squatting acts will need to be made in order to   increase protection.  The ACPA will need to be modified to protect individuals who own a cite similar to a corporation's trademark because currently the act favours big businesses.  Cyber squatting problems are going to continue to develop because of the rapid growth and expansion of the Internet.  The issue cannot simply be ignored or else it may hurt the economy.  Its important to learn from the victims of cyber squatting so we can prepare ahead of time for the issues to come.

    

ARE YOU A VICTIM OF CYBER SQUATTING?

DEFINITION

Cyber squatting (also known as domain squatting), according to the United States federal law known as the  Anti cyber squatting Consumer Protection Act, is registering, trafficking in, or using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. The cyber squatter then offers to sell the domain to the person or company who owns a trademark contained within the name at an inflated price.
INTRODUCTION
After the dot com boom, it became apparent to business owners how vital the Internet would be to their success.  At this time there were few people ahead of those business owners who found a way to use this to their own advantage.  These people, or cyber squatters, realized the importance of the Internet as a part of business, and knew the business owners would soon wise up as well.  If you own a trademark and find that someone is holding it hostage as a domain name until you pay a large sum for it, according to www.nolo.com, you may be a victim of cyber squatting. 
 Victims of cyber squatting are protected under the 1999 federal law known as the Anti-Cyber Squatting Consumer Protection Act.  Victims can sue or initiate arbitration proceedings under the authority of the Internet Corporation of Assigned Names and Numbers (ICANN) and win the name back.  This became known as the Uniform Domain Name Dispute Resolution Policy.  
In this report the beginnings of cyber squatting are outlined and discussed, some of the laws and acts that were born as a result of this problem compared and contrasted, example cases over domain names briefed, and our future outlook on cyber squatting is predicted as follows.

                                                                                                        I.            HISTORY OF CYBER SQUATTING


Before 1999, the business world was still resisting the need for the Internet as a tool for success.  They didn’t see the need to register their trademarks as domain names.  However, cyber squatters did see the increasing importance of the Internet, and saw the businesses making the mistake of ignoring it.  This is how cyber squatting was born and began causing problems.  Cyber squatters took advantage of those companies by registering domain names identical or similar to the business’ trademarks.  Domain name registrars accept all applications for domain names by applicants unless that exact identical name is in use. After the cyber squatter has the domain name registered, the company can no longer have their trademark as their domain name.  This causes a problem since customers and clients frequently try to find businesses online. 

One of the first cyber squatters were Dennis Toeppen in the early 90’s who registered some very famous marks before companies did.  He then demanded a ransom of $13,000 for each domain name.  This type of cyber squatting causes firms to lose money not only by paying cyber squatters to get their domain names, but as a loss of profit for what they could be making with an effective website.  Some of the cyber squatters made websites to slam a business using their own mark as a domain name for that page.  This could ruin the reputation of a company and now take away from business they had at one point.  Cyber squatting causes monetary losses and damaged reputations.  Businesses were not happy when these issues become apparent to them.  They have wised up since the beginning of cyber squatting, and now realize the harm it can cause to their business and customers.  They have learned of the important benefits of owning their trademark domain names. Congress decided to take action in 1999 to help out businesses and stop cyber squatting.  The laws and acts passed helped businesses battle the increase in cyber squatting from 1999 on.


                                                                                                                     II.            Recognizing Cyber Squatting


How do you know if the domain name you want is being used by a cyber squatter? Follow these steps to find out.Check where the domain name takes you. As a general rule, first check to see if the domain name takes you to a website. If it does not take you to a functioning website, but instead takes you to a site stating "this domain name for sale," or "under construction," or "can't find server," the likelihood increases that you are dealing with a cyber squatter. The absence of a real site may indicate that the domain name owner's only purpose in buying the name is to sell it back to you at a higher price.

Of course, absence of a website does not always mean the presence of a cyber squatter. There may also be an innocent explanation and the domain name owner may have perfectly legitimate plans to have a website in the future.

If the domain takes you to a functioning website that is comprised primarily of advertisements for products or services related to your trademark, you may also have a case of cyber squatting. For example, if your company is well-known for providing audio-visual services and the website you encounter is packed with ads for other company's audio-visual services, the likelihood is very strong that the site is operated by a cyber squatter who is trading off your company's popularity to sell Google ads to your competitors.
If the domain name takes you to a website that appears to be functional, has a reasonable relation to the domain name, but does not compete with your products or services, you probably aren't looking at a case of cyber squatting. For example, if your trademark is "Moby Dick" for fine art dealing with whaling, and the website you encounter (www.mobydick.com) is for road cleaning machines, you do not have a case of cybersquatting. You may, under certain circumstances, have a case of trademark infringement. 

Contact the domain name registrant. Before jumping to any conclusions, contact the domain name registrant. To find the name and address of a domain name owner, you can use the "WHOIS Lookup" at whois.net. Find out whether there is a reasonable explanation for the use of the domain name, or if the registrant is willing to sell you the name at a price you are willing to pay.

Pay, if it makes sense. Sometimes, paying the cyber squatter is the best choice. It may cheaper and quicker than filing a lawsuit or initiating an arbitration hearing.
However there are some options available to help fighting Cyber Squatting:
  • Sue under the provisions of the Anti-cyber squatting Consumer Protection Act (ACPA).
  • Use an international arbitration system created by the Internet Corporation of Assigned Names and Numbers (ICANN).
Trademark experts consider the ICANN arbitration system to be faster and less expensive than suing under the ACPA and the procedure does not require an attorney.


   


Tuesday, April 19, 2011

BASIC OF WANs

Basics of WANs

A WAN typically consists of two components, which are:


  • Transmission lines: These lines move bits of data between the nodes. Transmission lines could be circuits, channels, or trunks.
  • Switching elements: Switching elements are specialized nodes to connect two or more transmission lines. The elements direct the information from an incoming transmission line to an outgoing transmission line. The switching element or the node has specialized software installed on it to determine the appropriate outgoing transmission line. The switching elements are also known as packet switching nodes.


Transmission Lines
Transmission lines used for WAN connectivity are normally leased from the service provider, such as a telephone company, and are known as leased lines. After being leased by an organization, the leased line functions as a dedicated transmission line that caters to the network traffic of the specific organization.

Switching
Switching is the technique of dynamically selecting a path from multiple paths that carry data to its desired location. WAN uses the following three types of switching techniques:


  1. Circuit switching
  2. Message switching
  3. Packet switching


Circuit Switching
In circuit switching, a dedicated path or communication channel is set up for use between two communicating nodes. Until the connection lasts, only the two nodes can use the channel. After the communication between the two nodes is over, the channel becomes available to another set of communicating nodes. A telephone conversation is an example of circuit switching.

The biggest disadvantage of the circuit switching technology is that if the specified path fails, the communication between the two nodes is disrupted completely. Circuit switching also results in wasting the bandwidth of a communication channel. This is because, during a connection, the channel is not used for any other purpose.

Message Switching
In message switching, there is no direct communication channel between the sender and the receiver. The message is stored temporarily at the switching element and forwarded later. The message is always stored and forwarded in entirety. The message is forwarded from the switching element one hop at a time. A typical example of message switching is e-mail and fax.

NB: A message might consist of a number of data packets.

Message switching makes full use of the bandwidth of the communication channel because multiple messages can be sent using one channel. Message switching transmits the messages in their entirety so there is no need to assemble or disassemble the packets in the messages. In addition, message switching does not require the sender and the receiver to be present at the same time. However, the disadvantage of message switching is that the communication between the sender and the receiver is not interactive.


Packet Switching
Packet switching segments a message into small packets, which are then transmitted over a communication channel. Due to the breaking up of message into small packets, a channel can be used by many users at the same time.

The main advantage of packet switching is that due to fixed packet sizes, the data packets of a single user do not block the transmission channel. In addition, packet switching does not statically reserve the bandwidth. Instead, packet switching acquires and releases the bandwidth, as required. However, the disadvantage of packet switching is that the sizes of data packets are restricted.

The following figure shows WAN connectivity between two LANs at Florida and Texas, over the Internet by using the services of a service provider. This service provider could be a telephone company. T1 and E1 are dedicated phone lines.
WAN Connectivity

   

Tuesday, April 12, 2011

HOW TO CHOOSE A PROTOCOL?

Choosing and Combining Protocols
The factors that govern the choice and implementation of protocols on a network are:


Physical layout of the network: The Physical layout is the topology of the network used. For example, the star topology typically uses the Ethernet protocol.

Span of the network: Networks can span a room, a floor, a building, a city, a country, or continents. The span of the network also dictates what protocols need to be implemented. For example, networks that span across cities, countries, and continents can use protocols, such as TCP/IP, while networks in a room or on a floor can use protocols, such as NetBIOS and NetBEUI.

Network operating system (NOS): NOSs also influence the choice of protocols largely. For example, Netware v3.2 uses the IPX/SPX protocol suite, while Windows 3.11 uses NetBEUI, by default.
Budget of the organization: This factor is possibly the most important factor because it influences the physical layout of the network and the choice of NOS, which, in turn, influences the choice of protocol.


The choice of a protocol to be used on a network depends on the requirements of the network. The requirements of a network may change over time.
To understand this, consider a scenario in which an organization had a LAN setup of 10 computers a decade ago. This network used the NetBEUI protocol. Now, the company wishes to connect the LAN to the Internet. Because the Internet uses TCP/IP, the company cannot use NetBEUI to communicate over the Internet.

Similarly, consider a scenario in which an organization with a TCP/IP-based network takes over another organization, which has two mainframes. In this case, the SNA protocol is required to implement connectivity between the two mainframes and TCP/IP-based hosts.
   

Wednesday, April 6, 2011

BASICS OF NETWORK PROTOCOLS

Understanding the Need for Protocols

Apart from network components and transmission media, protocols are also basic building blocks of networks.Due to the immense popularity of networks, many vendors offer the network components and software solutions required for a network. However, the problem is that each vendor uses their own specifications to develop their network solutions and products. The specifications might not be compatible with each other.

In everyday life, we follow some rules while communicating. For example, in a phone transaction, one person speaks at a time. If both people speak at the same time, neither of them will be able to understand what the other person is saying.

Similar to the example discussed above, a set of established and agreed-upon rules is required to enable effective communication on a network. The set of standards, rules, or conventions are called protocols.
Either a vendor or a networking standard organization can develop protocols.
After a protocol is conceived, developed, and tested, it must be approved by a standardization organization.

Understanding the Need For OSI Reference Model

A protocol model or reference model is a set of guidelines followed by vendors to develop protocols. The models also explain the services that are required to transfer data from one computer to another. In addition, reference models also help understand complex network functions.

The International Standards Organization Open System Interconnection (ISO OSI) reference model first achieved the International standardization of the protocols. ISO developed the standards for connecting systems that are open to communication with other systems.
      

Monday, April 4, 2011

WIDE AREA NETWORK AND INTERNET CONCEPTS

WIDE AREA NETWORK AND INTERNET CONCEPTS




A wide area network (WAN) is very similar in concept to a widely distributed client/server LAN. In a wide area network, some distances typically separate computers. A typical WAN is a local city- or countywide network, like the one in the following figure. This network links network members together through a Bulletin
Board Service (BBS). Users can access the bulletin board’s server with a simple telephone call.

A Country-Wide Network

Several types of communication systems connect WANs together. These communication paths are referred to as links. In some areas, high-speed intermediate-sized networks, referred to as Metropolitan Area Networks (MANs), are coming up. These networks typically cover areas up to 30 miles or 50 kilometers in diameter and are operated to provide access to regional resources. They are like LANs in speed and operation, but use special high-speed connections and protocols to increase the geographic span of the network, like a WAN.


The most famous WAN is the Internet. The Internet is actually a network of networks, working together. The main communication path for the Internet is a series of networks, established by the U.S. government, to link supercomputers together at key research sites. This pathway is referred to as the backbone and is affiliated with the National Science Foundation (NSF). Since the original backbone was established, the Internet has expanded around the world. It offers access to computer users in every part of the globe.

The TCP/IP protocol divides the transmission into packets of information, suitable for retransmission across the Internet. Along the way, the information passes through different networks that are organized at different levels. Depending on the routing scheme, the packets may move through the Internet using different routes to reach the intended address. At the destination, the packets are reassembled into the original transmission.
The packets movement around the Internet is shown in the following figure.

Data Packet Moving Through Internet

As a message moves from the originating address to its destination, it may pass through LANs, mid-level networks, routers, repeaters, hubs, bridges, and gateways.
A mid-level network is simply another network that does not require an Internet connection to carry out communications.
A router receives messages, amplifies them, and retransmits them to prevent the messages from deteriorating as they travel.
Hubs are used to link networks together, so that nodes within them can communicate with each other.
Bridges connect networks together, so that data can pass through them as it moves from one network to the next. A special type of bridge, called a gateway translates messages as they pass through, so that they can be used on different types of networks, such as Apple
networks and PC networks.

     

Wednesday, March 30, 2011

Logical Network Topologies& Network Control Strategies

Logical Topologies& Network Control Strategies

Logical Topology

Logical topologies describe how network messages travel and get delivered across a network. It would be easy to visualize the connections of physical topologies if the nodes simply connected to each other. However, this is not the case in newer LAN arrangements. This is due to the fact that most LAN installations employ connection devices, such as hubs and routers, which alter the appearance of the actual connection scheme.

Therefore, the logical topology will not match the appearance of the physical topology. The particulars of the connection scheme are hidden inside the connecting device. As an illustration, the following figure shows a typical network connection scheme using a router. The physical topology appears as a star. However, the internal wiring of the connecting router provides a logical bus topology.
It is not uncommon for a logical ring or mesh topology to be implemented in a physical star topology.

Logical Network Topology


Network Control Strategies

When you begin to connect computers to other computers and devices over a LAN so that they can share resources and data, the issue of how and who will control the network comes up. In some applications, such as developing a book like this one, it is good for the author, artists, and pagination people to be able to share access to text and graphics files, as well as access to devices such as printers. However, in a business network, companies must have control to provide access to sensitive information and company resources.


Control of a network can be implemented in two ways:

  • As a peer-to-peer network where each computer is attached to the network in a ring or bus fashion and is equal to the other units on the network.
  • As a client/server network where dependent workstations, referred to as clients, operate in conjunction with a dedicated master computer.

The following figure shows a typical peer-to-peer network arrangement. In this arrangement, the users connected to the network can share access to different network resources, such as hard drives and printers. However, the control of the local unit is fairly independent. The nodes in this type of network configuration usually contain local hard drives and printers that the local computer has control of. These resources can be shared at the discretion of the individual user. A common definition of a peer-to-peer network is one in which all nodes can act as both clients and servers of the other nodes under different conditions.

Peer-To-Peer Network
The following figure shows a typical client/server LAN configuration. In this type of LAN, control tends to be very centralized. The server typically holds the programs and data for its client computers. It also provides security and network policy enforcement.

Client-Server Network
In some cases, the client units do not even include a local hard drive or floppy drive unit. The bootup process is performed through onboard BIOS, and no data is stored at the client machine. This type of client is referred to as a diskless workstation.
The major advantages of the client/server networking arrangement include:
  • Centralized administration
  • Data and resource security
Keep it up!
        

Network Topologies Overview

Network Topologies

Network topology is a schematic layout or map of the arrangement of nodes over a network. This layout also determines the manner in which information is exchanged within the network.
However, topologies can be implemented physically or logically.


Bus Topology
In the bus topology, nodes or stations of the network connect to a central communication link. Each node has a unique address along the bus that differentiates it from other users on the network. Information can be placed on the bus by any node. The information must contain network address information about the node or
nodes. Other nodes along the bus ignore the information.

Bus Topology


Ring Topology
In a ring network configuration, the communication bus is formed into a closed loop. Each node inspects the information on the LAN as it passes by. A repeater, built into each ring LAN card, regenerates every message not directed to it and sends the message to the next appointed node. The originating node eventually receives the message back and removes it from the ring.

Ring topologies tend to offer very high data transfer rates but require additional management overhead. The additional management is required for dependability. If a node in a ring network fails, the entire network fails.

Primary Ring Topology

 To overcome this, ring designers have developed rings with primary and secondary data paths as shown in the following figure. If a break occurs in a primary link, the network controller can reroute the data onto the secondary link to avoid the break.

Primary&Secondary Ring Topology

Star Topology
In a star topology, the logical layout of the network resembles the branches of a tree. All nodes are connected in branches that eventually lead back to a central unit. Nodes communicate with each other through the central unit. The central station coordinates the network’s activity by polling nodes, one by one, to determine whether they have any information to transfer. If so, the central station gives that node a predetermined slice of time to transmit. If the message is longer than the time allotted, transmissions are divided into small packets of information that are transmitted over several polling cycles.

Star Topology


Mesh Design
The mesh design offers the most basic network connection scheme. In this design, each node has a direct physical connection to all other nodes in the network. While the overhead for connecting a mesh network topology together in a LAN environment is very high, this topology is employed in two very large network environments, the public telephone system and the Internet.

Mesh Topology
Keep it up!
        

Local Area Network (LAN)

"THIS SITE IS UNDER CONSTRUCTION"

LOCAL AREA NETWORKS

When more than two computers are linked together so that they can share information, a network is formed. Networks in a relatively confined geographical area are called local area networks (LANs), while networks distributed over wider geographical areas are referred to as wide area networks (WANs).



Local area networks (LANs) are systems designed to connect computers in relatively close proximity. These connections enable users attached to the network to share resources such as printers, modems, and other hardware devices on the network.
LAN connections also enable users to communicate with each other to share data among their computers.
When discussing LANs, there are two basic topics to consider, the LAN’s topology (hardware connection method) and its protocol (communication control method).

In concept, a minimum of three stations must be connected to have a true LAN. If only two units are connected, point-to-point communications software and a simple null modem could be employed.

Network topologies are physical connection/configuration strategies. LAN topologies
fall into four types of configurations:

  1. Bus
  2. Ring
  3. Star
  4. Mesh


The following figure shows all four topologies.

Star, Bus, Ring, and Mesh Configurations

Well, the next publication will give more about about network topologies.
Keep it up!