StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Within a Network of Computers - Essay Example

Cite this document
Summary
The paper "Within a Network of Computers" discusses that communication protocol plays a significant role in controlling the speed and mode of communication among computer systems through a well-designed software package. This protocol aspect limits chaos and enhances efficiency…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.2% of users find it useful
Within a Network of Computers
Read Text Preview

Extract of sample "Within a Network of Computers"

In TCP, data is divided into manageable bits and the protocol ensures that secure and appropriate routines are in place to oversee data correctly arrives at its destination. Then IP enforces logical addressing and routing of data which brings in the reliability factor (Garduno & Diaz, 2011). TCP/IP supports ASCII standards that help in formatting information transmitted into a range of supported formats such as JPEG, text, and MP3 standards among others. Distributed network protocol on the other hand supports communication in process automation systems and supports peer-to-peer and master-to-slave communications. Above all, this protocol is reliable in terms of security; it contains secure authentication features and does not require heavy infrastructure. CCost-wise both protocols are fairly affordable to implement due to fair infrastructural costs (Garduno & Diaz, 2011). Other features that make these protocols appropriate include both are open protocols, they support interoperability between different platforms and they can be optimized
According to this design, the adopted network architecture defines secure, interpretable infrastructure that provides reliable and open-standard-based communication for the distribution of information. The architecture also defines technologies required to support communications between various client machines and servers on the network (Garduno & Diaz,2011). There are established network standards that coordinate the secure implementation of network architecture as well as supporting traditional data such as voice and video. The architecture is based on open standards
In explaining the usefulness of a traffic analysis, When some work has been done for ISP's net flow can be used to determine PPS (Packets per second) to detect instances of DOS (Denial of Service) attacks. It also can help one figure out if there is a need to upgrade the network because of running out of capacity also when somebody asks if the connection is running slow and it manages to work its way up to the top-level escalation engineers, one can tell that it is fine from the amount of traffic hitting the CPE (Customer Premise Equipment). It is important to give a clear definition of some common terminologies and these include; Latency which refers to delays incurred in the processing network data. In networks, latency is measured using network tools such as ping tests that determine the time it takes a network packet to travel from source to destination node and back. A low latency defines a system that experiences short delay times while high latency defines systems that experience long delays. Systems suffering from high latency are said to be unreliable and slow and thus inefficient. Response time also refers to the time taken to establish communication on a networked computer system. This is the time between an end of an inquiry and the beginning of a response. Low response times indicate efficient network performance while long response time indicates unreliable network performances. Jitter is another concept that refers to variation in packet transit delay arising from queuing and serialization effects along the path of transmission. Mostly, these delays are propagated by traffic congestion due to the size of bandwidth used and the speed of transmission paths in place. In congested links, higher levels of jitters are likely to occur. Therefore, higher levels of jitters cause data transmission to be slow hence lowering the network performance.
It is worth noting that there are various effects of data rates on each part of the network. To begin with, Network cabling in which the Speed of information transmission on cables greatly impacts the overall network performance. It signals the amount of time data is expected to travel from the sender node to the receiver node. High data speeds are preferable since they help avert congestion on the network as well as make performance efficient. Therefore, in our design, we shall use high-speed network cables such as fiber optic for optimal network performance. In Wireless network communication, there is a wireless environment in which data speeds are higher than in wired networks. This implies that traffic within the wireless resource is quite manageable and the overall network performance reliable. In Network adapter cards, data speed in network adapters affects the time in which the adapters prepare data from the computer for the network cable. This also influences the time incurred in sending data to another computer and the flow of data between the computer and the cabling system. High data speeds, therefore, contribute to faster network adapter card functionality in terms of sending and receiving information.
In describing strategies to ensure the availability of network access in switched and routed networks, the following are found;
i. Identifying all the network requirements
ii. Designing a hierarchical network
iii. Using routers and multilayer switches the same device
iv. Employing the use of high-speed links
v. Use open short path first protocol which scales well in networked resources
vi. Employing load balancing technique Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“INDP, Part 2 Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1623468-indp-part-2
(INDP, Part 2 Essay Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/information-technology/1623468-indp-part-2.
“INDP, Part 2 Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1623468-indp-part-2.
  • Cited: 0 times

CHECK THESE SAMPLES OF Within a Network of Computers

Analysis of Thin Client Article

Clearly, the thin client is defined as a network computer that is maximized as a remote screen visual of the software application's output that is grounded on a working central computer network server.... INTRODUCTION The thin client is characterized as a network computer that is harnessed as a remote screen visual of the software application's output with data processing done within the central computer network server.... There are no computer programs installed in the thin client network computers strategically located in several points within the company....
5 Pages (1250 words) Assignment

Corporate Information Systems Strategy

Information is exchanged Within a Network of Computers in different geographical locations.... within the IT strategy, we mainly focused on how to implement the IS strategy using Software and Hardware, and Web Technologies.... : All the hotels within the chain, will be using the same billing system....
5 Pages (1250 words) Coursework

Types of Computer Networks

Instead, he can log into any computer in a network, from where it is possible to access the server, which is a centrally located computer that provides storage for all information in a network.... Instead, all computers in a network can be connected to a single printer such that users can access it from their workstations.... Computers and other hardware in a LAN are connected within a short geographical distance, for example, a building, a hospital or a school, through the use of guided media i....
1 Pages (250 words) Essay

Network Infrastructure Basics

The paper "Network Infrastructure Basics" describes that the network and sharing center is a tool like a network mapping and network location that allows viewing and specific additional settings and profiling of networks.... On the other hand, the subnet mask identifies the IP address portion that deals with a network address.... It is usually used in home computers, but in some cases, it is used as a business or the Internet network.... SDN network connection allows internet connections or direct communication between computers....
4 Pages (1000 words) Assignment

A Guide to Computer Network Security

For instance, in the case where data is flowing between two given computers, the attacker easily gains access to that data and creates modifications, and the receiver will receive the original data.... The author of "Establishing The Effective Security Measures" paper discusses the threats to communication networks, the role of encryption in network security, the benefits of network security, authentication, and access control, informing the users of the need for network security....
10 Pages (2500 words) Assignment

Computer Network Design Issues

A LAN network involves the communication of computers within a small geographical area.... In a MAN network, it covers a much bigger area such as communication of computers within a town or between one town and another one.... his is computer hardware that is designed to allow communication of computers in a network.... Computer networking is the communication of two or more computers that are in a network.... omputers in a network can have one of these relations....
7 Pages (1750 words) Assignment

A Computer Network as a group of Computers Linked Together

This paper "A Computer Network as a group of computers Linked Together" explains the network designs and types of Local Area Network (LAN), Metropolitan Area Network (MAN), Intranet, Wide Area Network (WAN), that can be adopted in a hotel to connect the main office with its branches.... A computer network is a group of computers that are linked together.... his is a network design in which all the computers on the networks are connected in the form of a ring....
6 Pages (1500 words) Report

XP Windows Operating Systems

here are myriad features that are in-built within the operating system that are designed to enhance its security aspects.... The paper "XP Windows Operating Systems" discusses some of the security features that are customized in the Windows XP OS.... The success of the Windows XP operating system can be attributed to several factors including the security measures that have been put in place....
18 Pages (4500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us