The networking topology
of the future is likely to evolve around a client /server
architecture . With this, server
machines run special programs which wait for connections from
client machines. These server programs typically
respond to networked applications, such as electronic
mail , WWW , file transfer,
remote login , date/time servers
, and so on.
application programs are currently run over local area networks,
but in the future many could be run over wide area networks, or
even over the Internet .
This means that computers would require the minimum amount of configuration
and allows the standardization of programs at a single point (this
also helps with bug fixes and updates). There may also be a time
when software licensing is charged by the amount of time that a
user actually uses the package. This requires applications to be
run from a central source (the server ).
Internet , networks and
increased computing power will have
great effects on all areas of life, whether they
are in commerce, in industry or in home life. The standardization
of networking technology has allowed for the standardization of
systems, especially in electronic mail , and
remote working. The key of this success is the worldwide acceptance
of the TCP /IP protocol ,
which allows different computer systems over the world to communicate,
no matter their type, their architecture ,
or their operating system .
Internet is likely to have a great effect
on how companies do business. It is likely in the coming years that
many companies will become reliant on electronic commerce for much
of their business, whether it is by direct sales over the Internet
or the integration of their financial operation in an electronic
commerce involves customers using electronic communications to purchase
goods, typically using the Internet . This
will change the way that many businesses do business, and the way
that consumers purchase their goods. Society is now moving from
a cash based society to a cashless society. Most consumers
now use ATMs (Automatic Telling Machines)
for cash withdrawals, and debit and credit cards to purchase goods.
The future is likely to see an increase in consumers using electronic
methods to pay for their goods. An important key to the acceptance
of Internet-based purchases is that they must be secure, and cannot
be used by criminals to make false purchases, or criminals setting
up companies which take payments for incorrect services.
Computer networks are a crucial part of many
organizations and many users now even have a network connection
in their own home. Without networks, there would be no electronic
mail , no Internet access and no networked
applications. It is one of the fastest growing technological areas
and brings benefits to virtually every country in the world. With
the interconnection of networks to the Internet, the world has truly
become a Global Village. For many people, especially children, the
first place to search for a given topic is the World Wide
Web (WWW ).
would believe the pace of technology over ten short years, such
networks of tens of computers operating at speeds of thousands of
bits per second to networks with thousands of computers operating
at billions of bits per second.
From organizations that passed paper
documents back and forward, to the
totally paperless organizations.
From people who
sent one letter each month to people who send tens of electronic
mail s every day.
From sending letters
around the world which would take days or weeks to arrive, to the
transmission of information around the world within
a fraction of a second.
that relied on central operations to ones that can be distributed
around the world, but can communicate as if they were next door.
From the transmission
of memos which could be viewed by people and organizations
which were not meant to read the message, to the transmission
of messages that can only be read by the intended destination (and
maybe, by space aliens). Not even the CIA can decrypt these messages.
From written signatures
that can be easily forged, to digital signatures which are almost
impossible to forge, and not only authenticate the sender but also
all of the contents of a message.
These days virtually every computer
in a company is networked and networks are key to the effective
working of an organization .
Without them, few people could work effectively. They provide us
Electronic mail .
Remote control of
Shared disk resources.