Information Technology Reference
In-Depth Information
Read only - this should be used when the remote user only requires to copy or execute
files. The remote user cannot modify any of the files.
Full - this option should only be used when the remote user has full access to the files
and can copy, erase or modify the files.
Depends on password - in this mode the remote user must provide a password for either
read-only access or full access.
If the peer-to-peer network has a local server, such as Novell NetWare or Windows NT/2000
then access can be provided for certain users and/or groups, if they provide the correct pass-
word.
Figure 25.2 File access rights
25.2 Network topologies
There are three basic topologies for LANs, which are shown in Figure 25.3. These are
a star network, a ring network and a bus network.
There are other topologies which are either a combination of two or more topologies or are
derivatives of the main types. A typical topology is a tree topology, that is essentially a com-
bined star and a bus network, as illustrated in Figure 25.4. A concentrator (or hub) is used to
connect the nodes to the network.
Search WWH ::




Custom Search