Skip to main content

Computer Network :Architecture

Computer Network Architecture

  • A Computer Network architecture gives an blueprint of how the communication network can be designed, and how will it work.
  • Computer Network architecture is the design of a communications network.
  •  It is a framework for the specification of a network's physical components and their functional organization and configuration.
  • In telecommunication, the specification of a network architecture may also include a detailed description of products and services delivered via a communications network, as well as detailed rate and billing structures under which services are compensated.
  • The network architecture of the Internet is predominantly expressed by its use of the Internet Protocol Suite, rather than a specific model for interconnecting networks or nodes in the network, or the usage of specific types of hardware link.

Types of Network Architecture

Peer-to-Peer Architecture

In a peer-to-peer network, tasks are allocated to every device on the network. Furthermore, there is no real hierarchy in this network, all computers are considered equal and all have the same abilities to use the resources available on this network. Instead of having a central server which would act as the shared drive, each computer thats connected to this network would act as the server for the files stored on it.


Advantages of a peer-to-peer network

  • Does not require a dedicated server which means its less costly.
  • If one computer stops working, the other computers connected to the network will continue working.
  • Installation and setup is quite painless because of the built-in support in modern operating systems.

Disadvantages of a peer-to-peer network

  • Security and data backups are to be done to each individual computer.
  • As the numbers of computers increases on a P2P network... performance, security, and access becomes a major headache.

Client/Server Architecture

In a client/server network, a centralized, really powerful computer(server) acts as a hub in which other computers or workstations(clients) can connect to. This server is the heart of the system, which manages and provides resources to any client that requests them.


Advantages of a client/server network

  • Resources and data security are controlled through the server.
  • Not restricted to a small number of computers.
  • Server can be accessed anywhere and across multiple platforms.

Disadvantages of a client/server network

  • Can become very costly due to the need of a server as well as networking devices such as hubs, routers, and switches.
  • If and when the server goes down, the entire network will be affected.
  • Technical staff needed to maintain and ensure network functions efficiently.

Comments

Popular posts from this blog

BIT ORIENTED PROTOCOLS : SDLC, HDLC, BISYNC, LAP & LAPB

BIT ORIENTED PROTOCOLS A bit-oriented protocol is a communications protocol that sees the transmitted data as an opaque stream of bits with no semantics, or meaning. Control codes are defined in terms of bit sequences instead of characters. Bit oriented protocol can transfer data frames regardless of frame contents. It can also be stated as "bit stuffing" this technique allows the data frames to contain an arbitrary number of bits and allows character codes with arbitrary number of bits per character. SDLC Synchronous Data Link Control (SDLC) supports a variety of link types and topologies. It can be used with point-to-point and multipoint links, bounded and unbounded media, half-duplex and full-duplex transmission facilities, and circuit-switched and packet-switched networks. SDLC identifies two types of network nodes: primary and secondary. Primary nodes control the operation of other stations, called secondary. The primary polls the secondary in a predeter

Can coronavirus spread through mosquitoes?

  Can coronavirus spread through mosquitoes? Scientists have confirmed for the first time that the novel coronavirus behind the COVID-19 pandemic cannot be transmitted to people by mosquitoes , a finding that adds evidence to WHO claims that the disease is not mosquito-borne. The research, published in the journal Scientific Reports, provided the first experimental evidence on the capacity of SARS-CoV-2, the virus that causes COVID-19 disease, to infect and be transmitted by mosquitoes. "Here we provide the first experimental data to investigate the capacity of SARS-CoV-2 to infect and be transmitted by mosquitoes," the study noted. "While the World Health Organization (WHO) has definitively stated that mosquitoes cannot transmit the virus, our study is the first to provide conclusive data supporting the theory," said Stephen Higgs, a co-author of the research from Kansas State University in the US. According to the study, conducted at the university&#

Do Google Assistant work on KaiOS?

Yes Google Assistant can now read, translate text on KaiOS Google on Tuesday announced that now within Google Assistant, KaiOS users in India can use Google Lens to read, translate, and define words. At Google I/O in 2019, the US-based search engine giant brought a camera-based translation to Google Lens to help understand information. With Lens, one can point the camera at text one see and translate it into more than 100 languages and can even speak the words out loud in the preferred language. "We brought these Lens capabilities to Google Go, so even those on the most affordable smartphones can access them. Today we are extending this capability to the millions of Google Assistant users on KaiOS devices in India," the company said in a statement. It is currently available in English and several Indian languages, including Hindi, Bengali, Telugu, Marathi, and Tamil, and will soon be available in Kannada and Gujarati. Users can simply press the right soft key

ASUS ROG Phone 3: Detail, launch date, review

ASUS ROG Phone 3 is the new high-end powerhouse meant for gaming and lots more ASUS ROG Phone 3 comes with Qualcomm Snapdragon 865 Plus processor, 144Hz display and more ASUS ROG Phone 3 ASUS has finally launched its third gaming smartphone -- the ROG Phone 3 -- in India. The smartphone comes as a successor to the ROG Phone 2 launched last year and features a slew of highlights such as a 144Hz refresh rate, Qualcomm Snapdragon 865 Plus processor, and more. Read on to know more about the new gaming smartphone in the country.   ASUS ROG Phone 3 Features, Specifications The ASUS ROG Phone 3 comes with a 6.59-inch AMOLED HDR10+ display with 144 Hz / 1 ms refresh rate. It is powered by the Snapdragon 865 Plus processor with improved 5G and Elite gaming capabilities, becoming the first device to come with the latest high-end processor. It supports the latest LPDDR5 RAM and UFS 3.1 storage, coming in two RAM/Storage variants: 8GB/128GB and 12GB/256GB.  On the camera front, the ROG

Computer Network : Layered Architecture

Layered Architecture Protocol Hierarchy To tackle with the design complexity most of the networks are organize as a set of layers or levels. The fundamental idea of layered architecture is to divide the design into small pieces. The layering provides modularity to the network design. The main duty of each layer is to provide offer services to higher layers, and provide abstraction. The main benefits of layered architecture are modularity and clear interfaces. Five Layered Network Design Issues:  Layered architecture in computer network design  Layered architectures have several advantages. Some of them are,   Modularity and clear interface   Provide flexibility to modify network services   Ensure independence of layers   Management of network architecture is easy   Each layer can be analysed and tested independen

What is Binary Exponential Back-off Algorithm in Computer Networking?

What is Binary Exponential Back-off Algorithm?                          When two station A and B transmit data simultaneously there will be collision and when collision occurs both the stations waits for some time before retransmitting the data. The time for which they stop sending the data is called back-off time and to calculate the back-off time we use an algorithm knows as Binary Exponential Back-off Algorithm.   How Binary Exponential Back- off Algorithm(BEB) Work?   After undergoing the collision both the stations wait for random amount of time in the range of    [0, (2^n)-1]. Value of n is - the nth times they are undergoing collision. If a station chooses a time K which is in the range [0, (2^n)-1] then Back-off time = K*time slot Example 1 - Collision occurs for 1st time then n=1 and range will be 0 to 1. Means K value will be between     0 to 1. Station A Station B  Remark  K=0          K=0