What is Computer Network Architecture

Ginni
Updated on 04-May-2021 13:51:15

7K+ Views

A network model represents the organization of multiple computers in a network. It describes how individual computers are interconnected in a network.The computer network architecture is as follows −Centralized Computing ArchitectureIn centralized computing architecture, one powerful computer is used to serve one or more low powered computers. In the centralized model, the nodes are not connected; they are only connected to the server.The centralized computing architecture contains the following −All processing holds a function in the central, mainframe computer.Terminals are linked to the central computer and operation just as input/output devices.Networks can be employed to interconnect at least two mainframe ... Read More

What is Ethernet in Computer Networking

Ginni
Updated on 04-May-2021 13:49:47

4K+ Views

Ethernet is a LAN architecture developed by XEROX and extended by DEC, IC and Xerox. It is specified by IEEE 802.3, and it defines two categories.These categories are as follows−BasebandBroadbandBaseband uses digital signals, while broadband uses analog signals. Baseband is further divided into five standard names as follows −10 Base 510 Base 210 Base T1 Base 5100 Base TThe first numbers used in all standards, i.e., 10, 1, 100, indicate the data rate in Mbps, while the last numbers 2, 5, and letter T indicate the maximum cable length or type of cable. Only one specification is defined for broadband, ... Read More

Goals of Computer Network

Ginni
Updated on 04-May-2021 13:48:30

24K+ Views

The main goals of computer networks are as follows −Resource SharingThe main goal of the computer network is Resource Sharing. It is to create all the programs, data and hardware accessible to anyone on the network without considering the resource’s physical area and the client.Saving MoneyThe second goal of a computer network is saving money. Small computers have a much excellent value proportion than higher ones. Mainframes are approximately a method ten times quicker than the quickest single-chip microprocessors, but they cost a huge number of times more.This imbalance has made numerous system designers build systems, including dynamic personal computers, ... Read More

Why We Need Computer Networks

Ginni
Updated on 04-May-2021 13:47:47

10K+ Views

In today’s technology-oriented world, sharing has become an integral part of businesses and other activities. This sharing can be achieved by networking. A computer network is linking two or more computers in order to share files or resources.Here, we will see why we need computer networks in more detail below −To share computer filesNetworks enable users to share files with others. For example, in a company, one file is to be shared by multiple branches. When we locate this file on the network system, all the branches can use this file.To share computer equipmentLaser printers and large hard-disk drives can ... Read More

Network Security Threats and Attacks

Ginni
Updated on 04-May-2021 13:42:38

1K+ Views

There are various network security threats and attacks which are explained below−Natural DisastersEarthquakes, floods, lightning, and fire can cause several damages to computer systems. It could include other threats such as riots, wars, and terrorist attacks could be included here. Although they are human-caused threats, they are classified as disastrous.Deleting and altering dataMalicious attackers who delete or alter data usually do this to prove a point or take revenge for something that has occurred to them. Inside attackers frequently do this to spite the organisation because they are disgruntled about something. Outside attackers might need to prove that they can ... Read More

What is Network Security

Ginni
Updated on 04-May-2021 13:39:57

855 Views

The objective of the network is to send data among its users located locally or remotely. Hence, it is possible that undesired users can hack the web and prove harmful to the network or the user's health.The network administrator should follow a few essential points to provide the network with adequate security other than network-specific security, such as e-commerce. These are given below:Networks are designed to share data. Therefore, it should configure the network to identify shareable data and non-shareable data.The network must also clear with whom can share the shareable data.With the increase of network security, the cost for ... Read More

What is SMTP

Ginni
Updated on 04-May-2021 13:38:28

5K+ Views

SMTP represents Simple Mail Transfer Protocol. SMTP is a set of interaction guidelines that allow the software to transmit electronic mail over the internet, referred to as Simple Mail Transfer Protocol.The main objective of SMTP is used to set up communication rules between servers. The servers have a way of recognizing themselves and announcing what kind of communication they are trying to perform. They also have a way of handling errors such as incorrect email address. For example, if the recipient address is wrong, then receiving a server reply with an error message of some kind.Working of SMTPSMTP is an ... Read More

What is the TFTP Operation?

Ginni
Updated on 04-May-2021 13:27:49

793 Views

TFTP operation is very simple. The client sends a read or write request at the server's UDP port 69. The server accepts the request by sharing data messages in case of the read request and sending acknowledgement in the write request. In either case, the server chooses a UDP port for further dialogue and sends its first response to the client through the selected UDP port.Each data message has a fixed size of the data block (512 octets) and is individually acknowledged. The last data block containing EOF (End of File) or a data block containing less than 512 octets ... Read More

FTP Operations Explained

Ginni
Updated on 04-May-2021 13:19:04

1K+ Views

When using File Transfer Protocol (FTP), the user implements some or all of the following operations −Connecting to a remote hostTo implement a file transfer, the user begins by logging into the remote host. Four commands are used.Open selects the remote host and sets up the login session.User recognizes the remote user ID.Pass authenticates the client.Site sends data to the foreign host that is used to provide services specific to that host.Navigating the directory structureAfter a client has been authenticated and logged on to the server, that client can navigate through the remote host's directory structure to locate the file ... Read More

What is FTP

Ginni
Updated on 04-May-2021 13:10:33

3K+ Views

FTP represents File transfer protocol and it is a standard internet protocol supported by TCP/IP used for transmitting the files from one host to another. FTP needs TCP as a transport protocol to help the reliable end to end connections and executes two types of connections in managing data transfers.The FTP clients initiate the first connection, referred to as the control connection, to wellknown port 21 (the clients port is typically ephemeral). It is on this part that an FTP server listens for it and accepts new connections. The control connection is issued for all of the control commands a ... Read More

Advertisements