1. Peer-to-peer Network: This is a network where the computers that are connected to each other do not have a centralized authority but all the connected computers are equal within the network. The computers within the network can serve both as a client requesting for the resources as well as the server which helps in providing the resources. Small scale organizations mostly use peer to peer networks since they make the use of limited number of computers.
This is a computer network that involves a powerful machine, called the server, which manages the network within a centralized point to handle the entire network. The mechanism of this network depends upon the user sending a request to the server and the server then responds accordingly to make sure if the request made by the server can be returned to access the resource required on the server.
The network design described above are mostly seen to be used in the schools and also in the organizations who are focusing on managing their networks to make sure that the people who are accessing the networks have been assigned with the authority to access these files and the network resources.
The way that a network is arranged and the way the network system is described is known as a Network Topology. The physical topology of a network can be defined as the description of the layout that the cables have and the workstations and locations of the network components as a whole. When two or more devices are connected together, it is known as a link and when two or more links are joined together, it forms a topology.
The four types of topologies that are physical in nature and which are generally found are the bus, ring, star and mesh. These can be described as below:
Bus Network Topology: The topology where within a networking system all the computers are connected via a common cable is known as Bus Network Topology. The common cable connects the computers be series from one to the other with the help of the interface connectors. The central cable helps all the computers to be connected each other. However, it is not seen in the latest time that a physical bus topology is being used in the latest networks. On the other hand, there are still networks that logically operate through the bus network topology.
Ring Network Topology: In this Networking system, the computers would be connected via the networking cable making a structure of a circle or a ring. The passing of information within these computers occur via the passing of information to the adjacent proximity computer that has been set by the ring structure. Each computer while the traversing of information, is handled by the packets while information is transferred. The ring topology consists of two different kinds of of structure. They are single ring topology and dual ring topology. These ring topology structures are to be described as follows:
When a data is addressed for the hosts and not addressed to the neighbours, the data is passed on to the adjacent connected host unless the data packet is transferred to the next connected host when it fails to reach to the recipient host. This is a process by which the information can be easily passed on to any given host within the required network. It may also be possible that the data packet passed from one computer to the other is not a direct packet connection since it may occur that the data is transferred through many hosts before reaching the destination host arriving at the destination. Ring topologies are not found any more in use.
Star Topology happens to be one of the most used and most common physical topology. In this particular physical topology, the computers within the network are connected by a cable, which is knows as a drop cable. The drop cable is as actually a twisted pair cable which is generally used for connecting every computer to a central point known as switch, hub, router or computer. This central point keeps on acting as a data flow repeater. The different protocols used in a Star Network Topology makes it act somewhat like the Bus or Ring topology. When one host is in need of sending data to the other host, the data first needs to be transferred to some other host, then the information would be sent to the central connecting device. The information is then replicated by the central connecting device and then it is transferred to the relevant and appropriate host.
In this kind of physical topology, there is no presence of the concept of a central point like the main computer or a hub. The computers connected within the network are mostly interconnected within each other. There are two types of network topology design of mesh network topology which are Fully Mesh Network Topology and Partial Network Topology. In a Fully Mesh Network Topology, all the nodes within the connection are connected to each other individually. On the other hand, in a Partial Mesh Topology, the nodes within the network are not entirely connected to each other. The Mesh Network Topology most has existences as a theoretical topology, which is only feasibly implemented via the wireless networking. This can be understood with the example of ad-hoc, which is implemented in the similar way. The central connecting point is absent in ad-hoc and in place of that, each of the wireless host helps in establishing a direct communication with any other wireless hosts.
2. The model with the help of which network communications can be divided into seven separate layers is known as Open System Interconnection of OSI model. The OSI model has a description for the interaction between each layer. This model can also form a reference for the model in networking layers to understand the communication applications over a network. The seven layers at as described as below:
OSI model |
Layers |
Description |
Application |
7 |
These are responsible for the applications and network processing |
Presentation |
6 |
This helps in the conversion of the data formats for the provision of standard interface which is present in the application layer. |
Session |
5 |
The establishment, management and termination of the connection according between the remote and local applications |
Transport |
4 |
Head in the delivery of the end-to-end connection providing consistency and reliability |
Network |
3 |
Logical addressing and domain for routing is responsibility of this phase |
Data link |
2 |
Helps in the provision of the physical addressing providing media access procedures |
Physical |
1 |
Provide solution for the physical and electrical stimulation for the devices |
A similar to the OSI model, there is not a primary lean on networking model which has the ability to divide a network communication between four layers and this model is known as TCP / IP net working model or transmission control protocol / internet protocol model. This model develops the interconnection of network devices on the internet but this is only possible shooting the communication protocols throughout. this networking model as the ability of stipulating the switching off data over the internet with the help of delivering end to end communication which categorise is the fact on how the transmission data should be divided into smaller packets and should be routed transmitted are addressed and inward bound at the destination.
TCP/IP model |
Layers |
Description |
Application |
4 |
Data is presented to the user |
Transport |
3 |
Delivery of the end to end data services |
Internet |
2 |
Helps in network path regulation |
Network access |
1 |
Network access controlling is done by the hardware components of the network |
OSI model |
TCP/IP model |
Application layer 7 |
Application layer 4 |
Presentation layer 6 |
|
Session layer 5 |
|
Transport layer 4 |
Transport layer 3 |
Network layer 3 |
Internet layer 2 |
Data link layer 2 |
Network access layer 1 |
Physical layer 1 |
If the 5th 6th and 7th layer of the OSI model and accumulated together it can be seen that they are almost like the application layer of the TCP / IP model. The only difference between them is that TCP / IP do not possess a different presentation layer or session layer.
When it comes to both the reference model of OSI and TCP / IP it can be said that every layer has a specialised service in relevance to the layer that is just above it for providing the seamless communication process through the network. for the development of standard communication model for equipment and applications it is required that the various vendors uses the OSI model. On the other hand when TCP / IP suit of protocols used it is relevant the TCP / IP model is specifically used.
3. In both the networking models of TCP / IP and OSI, the application layer has various protocols which provide interface formed between the application programs of various kinds within a device. This can be explained as below:
Hypertext transfer protocol communicates between the network systems in a standardized way. The way in which the communication happens are depicted by the way the communication operates when a user chooses a uniform resource locator or any URL while surfing the internet on the computer. Hypertext transfer protocol every send request to IP address with help of the computer containing the web page and then the request is feasibility and it by the hyper text transfer protocol that exist within the computer which can send it back again to the webpage in suitable format.
On the other hand, the SMTP servers are used for sending emails and are used for storing the email addresses of the senders and recipients. Response IP address is me to identify by deleting into the domain name system or DNS servers, which is the newest to establish a connection sandwiched between the sender and receiver. Furthermore the transmitting of the data within the email is established within the communicating devices with the help of this SMTP server.
Outbound Mail: The internet protocol version 4 or IPv4 is the IP protocols 4th edition that primarily is being used widely as a protocol for data communication via different network of various kinds. This is a service that resides in the network layer in OSI model but for the TCP / IP model this service resides in the internet layer. It is a standard as communication that takes place between the network system of different kinds and helps in the delivery of a logical connection in between the network devices. This is done to provide a proper identification for every device in connection between the networks. It can be configured in various ways and with every type of devices; however, both the manual and automatic configuration depends on the type of network.
4.
Network Device |
Function |
Server |
This is a particular type of server that consists of the domain name server or DNS, the web servers as well as the mail servers. The server of domain name server has the record of a database of domain names which is normally the names used in human language stored on the web portals. it is in translated to the human language name and also into numerals and dresses which is understandable by a computer and is used for the accession of a particular website. This is where the web server enable the access two websites and with this the mail service also provides the access over the electronic mails, like the sending and receiving storage and other services provided by mails.. |
Switch |
The function of a network switch offers at layer 2 of the OSI model and this helps in the connection of the devices put together within a computer network that has been used by the packet switching for the processing receiving and sharing of data to a destination device. |
Router |
Router happens to be a functional part of the third layer of OSI model that function like a switch and helps in the connection of computers that Falls together with in a network. In addition to that a router helps in the direction of traffic in a network device and enables a mode of communication between names for switching the flood traffic within each of the network ports. Routers also provide security measures for the network and the computers bounded in them. |
Hub |
A hub is normally a simple device that provides functionality at the first OSI model level and health in the connection of multiple local area network or LAN devices at the same time. The cell in the functioning of repeating the electrical signals that has been received by one port in a network and relies on the signals to the ports that have been connected together. in the modern network the haves and no longer available since they are very inexpensive and a simple sweets can provide the services which previously was offered by hubs. |
Wireless Devices |
Wireless devices are facilitated by wireless networks that provide these devices to communicate with each other and the network source utilising the network. Communication is in standard and more the devices that access point communication starts to occur instantaneously. |
3G/4G mobile |
A 3G or 4G mobile supports both the networks connected to a phone via the internet. The only difference is that the access speed of 4G is much more than 3G. It is up to 10 times faster than the third generation when used in the real world and ranges between 20 megabytes per second to 50 megabytes per second. the speed however fluctuates depending on the position of the device from the network and the power of the radius that are within the phone. |
5. A particular Client Operating System or OS is the one that makes the human interactions between computer desktops and other portable devices possible. This is important for the centralized server’s standard operating system could only support one user at a time. Normal and most commonly used client operating system would include a Microsoft Windows 10 and MAC OS X by Apple. Hindi song writing systems server are specifically manufactured for performing a run on the service the software that is situated at the top of all the other software programs and application helps it run the server hardware. Other client operating systems are Windows server 2012 and Mac OS X server.
6. Firewall: The screening of a network is done by the network security system of firewall. These are used for the control and influence of networking conducted through security rules that has been arranged previously and has the ability of monitoring the outgoing and incoming network traffic. It is then decided whether the network traffic and the influence of the network would be allowed or blocked in. It can also be put together that firewall is an amalgamation of the hardware or software or it can also happened that a firewall is a blend of both. Graphical user interface ODI of a Windows operating system is something that people are mostly accustomed with. Based on that the windows new technology and Windows 2000 server that are meant to be the most commonly used service elections means installation of the fire old very easy and the approximate cost of installation varies between different sellers but approximately ranges within 999 USD.
Email Web: The web based electronic mail accounts which are freely used and can be operated from different websites like Yahoo mail hot mail in Gmail can be termed as email web. The email as control and influence over the network that allows a user to access the person email accounts when they get access over the internet as well as the web browser or application. It was the majority of the operating system that connected to the internet with the sole purpose of enabling the centre and the receiver of emails via the web based email accounts.
Virtualization: In this process the partitioning of the physical layer happens to be divided into various virtual servers so that everyone of two separated virtual server can internet independently with any other user or device in real time. This presence of computer generated hardware and operating system for virtualizations turns a single physical machine to partition into and functions like several virtual machines. Total cost of implementation of virtualisation can vary differently depending on the service provider. Based on the assumptions Microsoft has scheme of providing free service for 12 months and then to 150 GBP for 12 months.
References
Abbasi, Q.H., Yang, K., Chopra, N., Jornet, J.M., Abuali, N.A., Qaraqe, K.A. and Alomainy, A., 2016. Nano-communication for biomedical applications: A review on the state-of-the-art from physical layers to novel networking concepts. IEEE Access, 4, pp.3920-3935.
Adesemowo, A.K. and Gerber, M., 2014. E-skilling on fundamental ICT networking concepts–Overcoming the resource constraints at a South African university. In Proceedings of the e-Skills for Knowledge Production and Innovation Conference (pp. 1-16).
Aveyard, S., 2018. What is the Purpose of a Computer Server. [Online]
Available at: https://www.techwalla.com/articles/what-is-the-purpose-of-a-computer-server
Berendsohn, W.G. and Geoffroy, M., 2016. Networking. Taxonomic. Concepts.—. Uniting. without.‘Unitary-ism’. In Biodiversity Databases (pp. 25-34). CRC Press.
Brower, N., 2016. Microsoft. [Online] Available at: https://docs.microsoft.com/en-us/microsoft-desktop-optimization-pack/appv-v4/application-virtualization-system-requirements [Accessed 16 October 2018].
cicnavi, 2011. Overview of Network Types and Topologies. [Online] Available at: https://www.utilizewindows.com/overview-of-network-types-and-topologies/
Coker, O. and Azodolmolky, S., 2017. Software Defined Networking with OpenFlow.
Comer, D.E., 2018. The Internet book: everything you need to know about computer networking and how the Internet works. Chapman and Hall/CRC.
Edwards, J. and Bramante, R., 2015. Networking self-teaching guide: OSI, TCP/IP, LANs, MANs, WANs, implementation, management, and maintenance. John Wiley & Sons.
Foukas, X., Marina, M.K. and Kontovasilis, K., 2015. Software Defined Networking Concepts. Software Defined Mobile Networks (SDMN): Beyond LTE Network Architecture, p.21.
Hanlon, J., 2018. 3G vs 4G: What’s the difference?. [Online] Available at: https://www.whistleout.com.au/MobilePhones/Guides/The-difference-between-3G-and-4G
Kreutz, D., Ramos, F.M., Verissimo, P.E., Rothenberg, C.E., Azodolmolky, S. and Uhlig, S., 2015. Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1), pp.14-76.
Lu, H.K. and Lin, P.C., 2017. A Study of the Impact of Collaborative Problem-Solving Strategies on Students’ Performance of Simulation-Based Learning–A Case of Network Basic Concepts Course. International Journal of Information and Education Technology, 7(5), p.361.
Mahapatra, N., Sahu, N., Nanda, S., Kaur, G. and Prahar, M., 2017. Unit-3 Networking Concepts.
Microsoft, 2018. Microsoft Azure. [Online] Available at: https://azure.microsoft.com/en-gb/free/virtual-machines/search/?&OCID=AID719823_SEM_qNcFdVsr&lnkd=Google_Azure_Nonbrand&dclid=CI_1_KaQjN4CFdtA4Aod7FEMvw [Accessed 27 November 2018].
Microsoft, 2018. microsoft. [Online] Available at: https://www.microsoft.com/en-gb/search?q=nt+server [Accessed 10 10 2018].
Mijumbi, R., Serrat, J., Gorricho, J.L., Bouten, N., De Turck, F. and Boutaba, R., 2016. Network function virtualization: State-of-the-art and research challenges. IEEE Communications Surveys & Tutorials, 18(1), pp.236-262.
Mousa, M., Bahaa-Eldin, A.M. and Sobh, M., 2016, December. Software Defined Networking concepts and challenges. In Computer Engineering & Systems (ICCES), 2016 11th International Conference on (pp. 79-90). IEEE.
Pearson, 2018. Network topologies. In: Higher Nationals In Computing Core Textbook. Harlow: Pearson Education Limited, pp. 46-52.
Pooch, U.W., 2018. Telecommunications and Networking: 0. CRC Press.
Reeves, B., 2015. Transmission Control Protocol / Internet Protocol (TCP/IP). In: Computer Science. London: Hodder Education, pp. 349-351.
Rehman, J., 2018. https://www.itrelease.com/2017/01/advantages-disadvantages-network-operating-system/. [Online] Available at: https://www.itrelease.com/2017/01/advantages-disadvantages-network-operating-system/ [Accessed 10 October 2018].
Rouse, M., 2018. Search Server Virtualization. [Online] Available at: https://searchservervirtualization.techtarget.com/definition/network-virtualization[Accessed 16 October 2018].
Sahingoz, O.K., 2014. Networking models in flying ad-hoc networks (FANETs): Concepts and challenges. Journal of Intelligent & Robotic Systems, 74(1-2), pp.513-527.
Sahingoz, O.K., 2014. Networking models in flying ad-hoc networks (FANETs): Concepts and challenges. Journal of Intelligent & Robotic Systems, 74(1-2), pp.513-527.
O. U., 2018. Identify network hardware and protocols. [Online] Available at: https://www.open.edu/openlearncreate/mod/oucontent/view.php?id=129583
Teach-ICT, 2002. Teach-ICT. [Online] Available at: https://www.teach-ict.com/gcse_new/networks/peer_peer/miniweb/pg5.htm
[Accessed 2018 October 2018].
Wilkins, S., 2015. Routers and Switches and Hubs, Oh My! An Introduction to Network Devices and Their Functions. [Online]
Available at: https://www.pearsonitcertification.com/articles/article.aspx?p=2434666
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download