Professional Documents
Culture Documents
Group Members Name Reg No
Group Members Name Reg No
ASSIGNMENT ON
COURSE TITLE: COMPUTER NETWORK AND DATA COMMUNICATION
COURSE CODE: CSC455
FOR GROUP 6
GROUP MEMBERS
NAME REG NO.
1. ODO KENNETH CHKWUBE ESUT/2014/155225
2. OFFOR LEONARD OBINNA ESUT/2014/155214
3. OKAFFOR LOVETH IFUNANYA ESUT/2014/155216
4. OGOLO IDAH ERNEST ESUT/2014/155217
5. OTUM CYPRIAN MICHEAL ESUT/2014/155218
6. OZOR MURPHY UGOCHUKWU ESUT/2014/155219
7. OKOYE BENITA ONYINYECHUKWU ESUT/2014/155220
8. EZE MICHEAL ONYEDIKACHI ESUT/2014/155221
9. ORJI UGOCHUKWU CHINAAGOROM ESUT/2014/155223
10. EZE EMMANUEL CHISOM ESUT/2014/155224
11. NCHUMA EMMANUEL CHIBUIKE ESUT/2014/155226
12. OKORIE CHARLES OKWUDILI ESUT/2014/155228
13. NWAGU LOVETH CHISOM ESUT/2014/155229
JANUARY, 2018
1
Abstract
A computer network, in general, comprises of numerous computers that are linked together to
communicate with each other. The goal of a computer network is to enable two or more
computers to share and exchange data with one another for various purposes. Users can access
remote resources by either logging into the appropriate remote computer or transfer data from the
remote computer to their own computers. To understand what a network is all about, this
document provides details on topologies, types of network and decentralized network.
2
Content
I. Abstract
II. Introduction
3
Introduction
As individual microchips in high-performance computing systems reach evermore prominent
speed, execution starts to depend less on the rate of processors and more on the framework that
supplies them with information. This framework is the network system, a regularly overlooked
yet essential piece of any complex computer (Osborn 2015). Network system administration is to
a great degree a wide subject in data science which calculates itself regarding profundity and
significance.
Taken just, on the other hand, a network system is close to a framework by which one can handle
components and send data to another. Accordingly, the discriminating parameter of a network
system is to measure the data stream. One essential metric is the transmission capacity or
bandwidth, or the greatest rate at which a system can move data over a line that partitions the
hubs/nodes into two equivalent gatherings. Generally, as essential for firmly coupled
multiprocessing, the time needed to exchange a message between hubs is called the latency. An
extensive and consistent examination exertion devotes itself to enhance these two numbers,
bringing about a tremendous scope of way to deal with network system outline. A network, in
general, is formed by a collection of people, devices, and agents where the agents communicate
with each other to share and gain resources.
4
Computer Network and Structures
Multipoint connections – more than two devices are sharing a link The entire capacity of the
link is either shared spatially or temporally. This means either every computer shares a specific
space of the link or each computer shares the link for a specific time when being used.
5
Network Topologies
Topology refers to the shape of the network or in other terms it is the network layout. The way
the computers in a network are physically linked to each other and how they communicate with
each other is determined by the network topology. Topologies are either physical or logical such
as:
6
Privacy since only the dedicated device receives the message.
Easy to detect a problem in the network by discovering which device is having problems
and examining the link that connects to it.
(b)Star Topology:
All the devices are connected to a central hub. Nodes communicate across the network by
passing through the hub. To reduce the number of links, every node is connected to one central
node in the star topology. A packet between any two nodes may need two hops via the central
node. If the central node is the source or the destination, only one hop is required. The central
node is a single point whose failure renders the entire network inoperative. In cases, where most
communication is between one server and its clients, the star topology is especially useful.
7
Easy to install, easy to configure
If one link fails the network can still function
(d)Bus Topology:
8
In the bus topology, all nodes are connected to a single cable, called the bus or backbone, with
no active devices. All the nodes in the system are directly connected to that link (the bus), which
may be organized as a straight line. The sites can communicate with each other directly through
this link. Each node is connected to it by a single tap. This can be very reliable and inexpensive.
The failure of one side does not affect communication among the rest of the sites. However, if
the link fails, the network is partitioned completely. The bus is the most popular topology for
local area networks (LAN) due to its simplicity and reliability. Initially, the most widely used
LAN, Ethernet uses the bus topology. Like the ring, the bus also has the broadcast property, i.e.,
as a packet propagates down the bus to its ends, it can be received by every node. In the mesh
and star topologies sending the same packet to every node requires that N − 1 copies of the
packet be separately transmitted.
9
Tree topology can be derived from the star topology. Tree has
a hierarchy of various hubs, like we have branches in a tree. In this case, every
node is connected to some hub or switch.
Network Types
The network computers may be linked through cables, telephone lines, radio waves, satellites, or
infrared light beams. There are three basic types of computer networks:
• Local area networks (LAN)
• Metropolitan area network (MAN)
• Wide area network (WAN)
10
file server are called as workstations. In most of the LANs, cables are used to connect the NIC in
each computer. Most LANs connect workstations and personal computers. Each node (individual
computer) in a LAN has its own CPU with which it executes programs, but is also able to access
data and devices anywhere on the LAN. The users can share expensive devices such as laser
printers, communicate with each other by sending emails, or engage in chat sessions. The
following characteristics differentiate one LAN from another:
LANs are capable of transmitting data at very fast rates, much faster than data that can be
transmitted over a telephone line, limitation being the number ocomputers attached to a single
LAN. A LAN can be configured either as a client– server LAN or a P2P LAN.
Peer-to-Peer Model: P2P networks are the simplest and least expensive networks to set up. P2P
networks are simple in the sense that the computers are connected directly to each other and
share the same level of access on the network. Computer A will connect directly to computer B
and will share all files with the appropriate security or sharing rights. If many computers are
connected, a hub may be used to connect all these devices.
Client-Server Model: The most common LAN types used by companies today are the “client-
server model,” since they consist of the server (storing the files and running applications) and the
client machines (computers used by the workers). Using a client–server setup can be helpful in
many ways. It can free up disk space by providing a central location for all the files to be stored
ensuring that the most recent file is available to all. A server can act as a mail server (collecting
and sending the mails) or a print server (performing print jobs), thus freeing computing
power on the client machine to continue working.
11
Fig. 2.2 Client–server model versus peer-to-peer Model
(d) Internetworks
When two or more networks are connected, they become an Internetwork, ornInternet. Individual
networks are joined into Internetworks by the use of Internetworking devices. These devices
include routers and gateways.
Wireless Networking
12
Although the origins of radio frequency-based wireless networking can be traced back to the
University of Hawaii’s ALOHANET research project in the 1970s, the key events that led to
wireless networking becoming one of the fastest growing technologies of the early twenty first
century have been the ratification of the IEEE 802.11 standard in 1997, and the subsequent
development of interoperability certification by the Wi-Fi Alliance (formerly WECA).
DECENTRALIZED NETWORK
13
https://en.wikipedia.org/wiki/Decentralized_computing
Decentralized Internet can be identified using peer to peer connections rather than using a
single point network access. The major difference between centralized and decentralized Internet
is that the latter connects to different points (peers: other computers, printers, scanners, servers
etc) without having to go through a mandatory point. There is no fixed network topology here. In
fact, none of the network topologies, I learned so far, belong to decentralized Internet.
Decentralized Computing
There is no single server machine that is solely responsible for all the processing.
The architecture allows to distribute the workload among multiple compute
nodes (aka machines), and each of them is equally capable of servicing requests.
The best example that I should definitely mention is Cassandra data store. Data is
stored on multiple nodes, and client requests can come to any node (probably the one
that is geographically nearest to minimize the latency).
There isn’t really any single point of failure because client machines aren’t relying
on a single server to fulfill all requests. The system comprises of multiple nodes which
might be still available to process user requests.
We can scale-out the system by adding more nodes (and thus more compute power,
more fault tolerance etc).
Obviously in such systems we run into the complexities of problems with
distributed systems like — replica management, maintaining consistency across
copies of data across multiple nodes etc etc.
14
So, my understanding is that fundamental concepts of distributed systems should
definitely be understood and internalized before going about designing a
decentralized system.
We should be aware of the well known challenges in the distributed system space.
In centralized computing, we have simple and sweet mental model since there is
just a single server machine that does all the jobs. If that is gone, we are out of luck.
But in decentralized computing, mental model is not easy. Since now we have more
machines, we also have more problems to deal with. I would actually call decentralized
computing similar to distributed computing as I really don’t see much of difference.
We typically need to deal with same set of problems and challenges in both spaces.
15
Conclusion
Networks are very necessary for everyday computer usage. In choosing the perfect network
setup, there are a few things that one must consider. Number one is the cost of the topology. If
the user own a small business or; wants a network for their home this could be a major
consideration for them. In addition, for 1arger size businesses that have to network more
computers they have to consider what is the easiest and fault tolerant.
Computer networks have been around for a while and with the always—growing technology
world, the best of networks are yet to come.
16
References
1. Buzzle. (2015). Advantages and disadvantages of computer networks.
2. Carlson, M., Davies, E., Nortel, U. K., Wang, Z., & Weiss, W. (1998). An architecture
for
differentiated services.
3. Chen, S., & Nahrsted, K. (1998). An overview of quality of service routing for next-
generation high-speed networks: problems and solutions. Network IEEE, 12(6), 64–79.
4. Crawley, E., Sandick, H., Nair, R., & Rajagopalan, B. (1998). A framework for QoS-
based routing in the internet.
5. Gu, G. Q., & Luo, J. Z. (2006). Some issues on computer networks: Architecture and key
technologies. Journal of Computer Science and technology, 21(5), 708–722.
17