Network configurations - cd rom network, Other Management

Assignment Help:

Network Configurations 

The basic components of a single CD-Rom workstation are a microcomputer and a CD-ROM drive. A printer will be necessary if you want to obtain a paper copy of searches and if you wish to do an online search to update CD-ROM search a modem and a telephone line will also be needed. If more than one person needs to use the system at a time, networking has to be taken, recourse to. The ideal CD-ROM configuration offers multi-user access to many databases.  

The advantages of putting CD-ROMs on a network are providing multiple concurrent access to information and help in streamlining of the disks themselves which otherwise would be distributed and loaded manually.

CD-ROM networks are normally mounted on PC-based local area networks. Standard available LANs do not properly support the use of CD-ROM, and require additional software add-ons to manage the optical drives. These are generally controlled by a separate optical file server (i.e., a computer adapted with CD controller cards to which drives are attached). 

There are three alternative architectures for implementing CD-ROMs on a network. These are: 

i)  a file server arrangement with the data files located on the file server itself, and the user interface and the search engine residing on the client workstation; 

ii)  a centralised approach, where both data and search engine and interface reside on a multi-user machine, with the workstation acting as a terminal; 

iii)  a client-server approach, where the data files and the search engine reside on the server machine, and the, user interface with the client workstation. This arrangement reduces the communications load by keeping the processing close to the data storage, and enables the full power of the workstation to be available to the client. 

At present, CD-ROMs running on local area networks have to compromise with all these basic aspects.  


Related Discussions:- Network configurations - cd rom network

Purpose of information, Purpose of information: A researcher needs inf...

Purpose of information: A researcher needs information for three purposes.  To keep up with new developments in his area of interest;  To get acquainted with the state-o

Organisation Behaviour, Rajender Kumar was a production worker at competent...

Rajender Kumar was a production worker at competent Motors Limited (CML) which made components and accessories for the automotive industry. He had worked at CML for almost seven ye

Library networks, Library Networks   A Library network is defined by Hu...

Library Networks   A Library network is defined by Hunter and Bakewell as "A group of libraries and/or information service points, connected together for the purpose of satisfy

Intercultural communication differences, Intercultural communication differ...

Intercultural communication differences: reconciliating disparities through recognition You represent a Mauritian hardware company which is negotiating to buy hardware from

Differentiate between planned change and unplanned change, Question: Fo...

Question: Forces for change exist in the external and the internal environments of the organisation. (a) Differentiate between planned change and unplanned change. (b)

Illustrate the concept of news worthiness, a) Define "news" and illustrate...

a) Define "news" and illustrate the concept of "news worthiness" in the field of PR. b) Describe how PR is distinguished from i. Advertising ii. Marketing iii. Sales pr

Benefits of b2b e-commerce in developing markets, Question: (a) What ...

Question: (a) What are the benefits of B2B E-Commerce in Developing Markets? (b) The B2B market has primary components: e-frastructure and e-markets, e_infrastructure is t

Please value the company with a dcf analysis, LogicSoft Inc., a start-up th...

LogicSoft Inc., a start-up that provides enterprise logistic software to transportation companies, is in negotiations with a new customer for a sales contract.  The software is hig

Important security measures in e-banking, a) Explain why the following se...

a) Explain why the following security measures are important in e-banking: (i) Data confidentiality (ii) Data Integrity (iii) Access control (iv) Auditing b)

HEALTH INFORMATION MANAGEMENT, WHAT IS A RECORD FORMAT THAT DIVIDES THE RE...

WHAT IS A RECORD FORMAT THAT DIVIDES THE RECORD INTO SECTIONS?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd