This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Two, no user file should remain hidden from him. And three, he must have authority to allow or disallow the facility services of network to the users. The earlier network strategy used for the growth of any kind of activity was not so effective and hence due to the beginning of the concept of new and more advanced network structure it has gained attention from a major part of industries in todays business world. All this is done to increase service quality and productivity. The main point behind the success of it is that it allows for errors and redesigns which can take place during the early designing phase or even if it the service gets completed or even in the middle of the activity. Networking 3 References Topologies - Network Topologies, Types of Topology Examples www.compnetworkingabout.com Internet Society (ISOC) All About The Internet: History of the Internet www.isoc.org...
View Full Document
This note was uploaded on 10/20/2011 for the course BUISNESS ab202 taught by Professor Millazzo during the Spring '11 term at Kaplan University.
- Spring '11