Professional Documents
Culture Documents
Network System: Benefits of Computer System
Network System: Benefits of Computer System
Network models
Computer networks can logically be classified into two models as,
Network types
There are several kinds of network systems, which each is having special characteristics.
It can be classified based on purpose or size. They are namely, (LAN, PAN, MAN,
WAN)
➢ Intranet
An intranet is a private LAN designed to use by everyone within an organization.
Figure 10 INTRANET
➢ Extranet
This is a network that links members of your firm with those outside the
organization.
Figure 11 EXTRANET
Transmission medium,
To send data through the channel it requires some type of transmission media. I may be
physical or wireless.
▪ Cabling
Computers in a network are usually physically connected to each other using cables.
There are several types of cables as;
Features – Inexpensive
Plastic sheath
Two types as Unshielded Twisted Pair (UTP) and Shielded Twisted Pair
(STP)
❖ Unshielded Twisted Pair (UTP)
UTP is made up of two copper wires that have been wrapped in insulation. This cable
has interference suppression capabilities and doesn't need a physical shield. It is used
for telephonic applications.
✓ Advantages of UTP
The cheapest
Simple to install
Capacity for high-speed
✓ Disadvantages of UTP
Vulnerable to interference from outside
Less performant and with a lower capacity than STP
❖ Shielded Twisted Pair (STP)
This cable type has a protective jacket to prevent outside interference.
✓ Advantages of STP
reduces echoing
Better performance
Comparatively faster
✓ Disadvantages of STP
Quite difficult to install and produce
More expensive
Figure 16 INFRARED
Satellite system – Receive transmitted signals, amplify them, and then transmit the
signals to the appropriate locations
Physical topology
Here, the network laid out physically. There are different types of physical
topologies as;
Bus topology
In the bus topology all devices share single communication line or cable.
Bus topology may have problems while multiple hosts sending data at the same
time.
As a solution for that either uses CSMA/CD technology or recognizes one host as
bus master.
Importance and impact of bus topology
o Being simple and requires minimal cabling
o Cost effectiveness
o Expansion of the network being easy
Star topology
Here, every node connects to a central device. (Hub, switch, computer). The
central device act as a server and the other devices acts as clients. (computer hope,
2023)
Importance and Impact of star Topology
o Centralized control
o Being easy to add or remove devices without disrupting the entire network
o Ease of management
o Being a user-friendly network
VLAN
VLAN divides a single broadcast domain into multiple broadcast domains. Host in one
VLAN cannot speak to another host. By default, all hosts are placed into the same VLAN.
Token ring
Token ring operates at the network access layer of the TCP/IP model. It is using IBM
connectors and cables. This is physically a star topology.
Networking standards
Networking standards are the set of guidelines which outlines the best practices,
specifications, or requirements for a particular technology, product, or service.
Standards are basically developed by organizations such as the International Organization
for Standardization (ISO) or the Institute of Electrical and Electronics Engineers (IEEE).
Standards help to ensure that products and services are safe, of high quality, and can work
together seamlessly.
IEEE standards
In 1985, the computer society of IEE has started the “project 802” in order to set
standards and to enable inter communication among equipment from a variety of
manufactures. So, this can specify the functions of the physical layer and the data link
layer of major LAN protocols.
Example;
IEEE 802.x – this is deal with LAN and MAN. And also, these are restricted to networks
carrying variable size packets. The services and protocols which used this standard are
map in the lower two layers of the OSI networking referral model.
IEEE 802.3 (ethernet) – this defines the physical layer and data link layer’s media
access control (MAC) of wired ethernet. This is generally, a LAN technology with some
WAN applications.
IEEE 802.11 (Wi-Fi) – this specifically devoted for WLANs with a character to develop
a MAC protocol and physical medium specification.
IEEE 802.1Q (VoIP (Voice over Internet Protocol)) – this standard helps ensure that
voice calls and other data can share the same network without interfering with each other
Benefits of standards
Compatibility
Provide a foundation for new technologies and innovations to build
Networks being reliable and stable
Global adoption
constraints of standards
Rapid Technological Changes
Limitation of Choice
Complexity
Protocols
Protocols means a set of rules and procedures for transmitting data between two or more
devices. It specifies the structure, timing, order, and error checking involved in data
transmission between devices. Examples for protocols; TCP, IP, UDP, POP further
discussed in page 39-43.
Network models
In order to understand and manage the computers we are using network models. It helps to
describe how the networks work. There are different models, each with its own rules and
standards for sharing data. Some popular models are OSI, TCP/IP, and hybrid models.
These models make dealing with networks easier and more organized for everyone
involved. There are two types of network models as,
o ISO OSI Model
o TCP/IP Model
ISO/OSI Model
For data to travel smoothly across countries and the world, we need systems that can talk
to each other. ISO, which stands for International Organization of Standardization, made a
set of rules called the OSI model. There are 7 layers. This model helps different systems
work together, like speaking a common language, making global communication possible.
(studytonight, n.d.)
Benefits of OSI model are;
▪ Reduces complexity
▪ Standardizes interfaces
▪ Facilitates modular engineering
▪ Accelerates evolution
Physical layer
The lowest layer of OSI model is physical layer. This layer creates the actual connection
between all physical devices and media involved in data exchange.
Data link layer
▪ This is the second layer of OSI model.
▪ Messages are delivered from node to node by this.
▪ The data link layer is in charge of using the host's MAC address to transmit
messages when they are received by.
▪ We can classify two sub layers as;
1. logical link control
2. MAC, or media access control
ARP (address resolution protocol) is used to encapsulate the receiver's MAC address in the
data connection layer.
Network layer
This is the third layer of OSI model. Network layer facilitates the transfer of data between
the network nodes. The process used by the network layer to add the sender's and receiver's
IP addresses to the header is refer as the logical addressing.
Transport layer
This is the fourth layer of OSI model. Transport layer is responsible for end to end
communication over a network. The transport layer provides an access to both the session
layer and the network layer.
Session layer
This is the fifth layer of OSI model. This session layer provides the mechanism for opening,
closing and managing a session end user application process.
Presentation layer
This is the sixth layer of OSI model. This layer explains how data is presented to the user.
Data encryption is also a function of presentation layer to ensure data security.
Application layer
This is the last layer of OSI model. The function of this layer is to present data to user by
enabling direct interaction between user and software applications.
TCP/IP Model
The Department of Defense created and developed TCP/IP, which is based on standard
protocols, in the 1960s. TCP/IP stands for “Transmission Control Protocol/Internet
Protocol”. Compared to the OSI model's seven layers, TCP/IP model has four layers.
(geeksforgeeks, 21 Jul, 2023)
There are 4 layers of this model as;
o Application Layer
o Transport Layer
o Internet Layer
o Network Access layer/Link Layer
Figure 27 TCP MODEL
Application layer
▪ This is the final layer of TCP/IP model.
▪ The Application, Presentation, and Session Layers of the OSI model are
performed by this layer.
▪ Examples for protocols in transport layer;
➢ File Transfer Protocol (FTP)
File Transfer Protocol (FTP) is a special way to transfer files between computers on the
internet. FTP used to be like talking between two devices, but now it's often used to store
files safely online in the cloud. (Mitchell, 2023)
Figure 28 FTP
➢ Simple Mail Transfer Protocol (SMTP)
Simple Mail Transfer Protocol (SMTP) is an internet standard communication protocol
for electronic mail transmission.
Figure 29 SMTP
Telnet
Telnet allows you to connect to remote computers over a TCP network.
Figure 30 HTTP
➢ Hypertext Transfer Protocol secure (HTTPS)
HTTPS used to secure socket layer or transport layer security as a sub later under
regular HTTP application layering.
Networking principles are the main foundation that is under the design, implementation
and management of a network.
Networks should be reliable. Networks should be dependable and should work
consistently. Another principle is security. Ensuring the security of a network is must
needed. The network should perform well. That is another principle. One of the main
principles is standardization. In a network, we should use common protocols and
standards to ensure the efficiency of the network.
With the help of these principles, the effectiveness and efficiency of a system is
determined.