SlideShare a Scribd company logo
1 of 2
Download to read offline
1/22/2017
Essential Information about Network Architecture and
Design
bizeducator.com/essential-information-about-network-architecture-and-design/
Networks are implemented to enable the sharing of resources and the exchange of information between users. As
the number of resources, users, and connections increases, most networks must be routinely modified to
accommodate growth ideally without any reduction in the features and performance levels users have come to
expect.
This makes network architecture and designs a dynamic and continuous process within most organizations.
Network architecture can be described as the structured grouping of hardware, software, and applications.
The successful integration of these three elements allows for the transfer of all types of messages between users,
administrators, and devices. Networking or LAN technologies for PCs were introduced in the 1980s to manage the
rapid growth of desktop computing within many organizations.
Problems associated with stand alone devices include the following:
Each PC stores data locally, unlike mainframes or minicomputers, both of which use centralized storage. As a result,
faulty reporting and decision making can occur if the same data is updated on some PCs, but not on others.
Security is a major concern, since every PC can potentially contain sensitive data, making it easier for unauthorized
individuals to gain access to valuable organizational information.
Backups may not exist for critical data if users do not duplicate their files on a regular basis. The failure of a single
storage device can result in significant disruption and costs in terms of time, resources, and money.
Various users or groups are free to install and use different software applications on their PCs, making file sharing
difficult within the organization.
It is more difficult to justify the purchase of expensive devices or services, since only one PC at a time can benefit.
For example, a dedicated high rate Internet connection is typically not economically feasible for every user in an
organization with tens or hundreds of stand-alone PCs.
Implementing a network makes it possible to solve these problems in the
following ways:
A network makes it possible to centralize data. All files shared by users are stored in a central location, which
guarantees consistency and simplifies the update process.
Multiple levels of security can be implemented on a network, making it more difficult to obtain unauthorized access
to data.
A network can be equipped with a backup system that runs at specific intervals, ensuring that critical data is
available from a secondary source if needed.
In addition to user-created files, software applications can be installed on centralized storage, accessible from any
station connected to the network. This accelerates the deployment process, since any application or update needs
1/2
to be installed only once on the network versus on each stand-alone PC.
All users can access any resource connected to the network (e.g., high-speed copiers or Internet links). Physically, a
network can be as small as two connected PCs and the media used to enable the connections (i.e., cabling, a
wireless link, or a telecommunications circuit). In addition to wired or wireless connectivity, a network must be
equipped with services designed for resource sharing, including:
Access control, which is necessary in cases where two or more devices attempt to use a shared resource (e.g.,
telecommunications circuit between two sites, a printer) at the same time.
Synchronization, which is necessary to ensure that a receiving device is listening when a sending device is
transmitting to that device.
Flow control, which is necessary to monitor and adjust the rate at which data is transferred from sender to receiver
in order to minimize transfer time and data loss. For example, if a receiving device is occupied with other tasks, it
will use flow control to ask the sending device to pause transmission.
Error control, which is necessary to verify that a message was transferred successfully between a sender and a
receiver (or to request a retransmission if the transfer was not successful).
BY BIZEDUCATOR
2/2

More Related Content

What's hot

The information technology revolution
The information technology revolutionThe information technology revolution
The information technology revolution
gomezcarla
 
Data centre administration
Data centre administrationData centre administration
Data centre administration
Ujjwal 'Shanu'
 

What's hot (20)

Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
 
Lecture 4 sharing of resources on network
Lecture 4 sharing of resources on networkLecture 4 sharing of resources on network
Lecture 4 sharing of resources on network
 
Network resources
Network resourcesNetwork resources
Network resources
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Database tyes centrlized & distributed database
Database tyes centrlized & distributed databaseDatabase tyes centrlized & distributed database
Database tyes centrlized & distributed database
 
Computer network
Computer network Computer network
Computer network
 
Chapter 14: Information Technology
Chapter 14: Information TechnologyChapter 14: Information Technology
Chapter 14: Information Technology
 
The information technology revolution
The information technology revolutionThe information technology revolution
The information technology revolution
 
security issue
security issuesecurity issue
security issue
 
17581556 045 lab 3
17581556 045  lab 317581556 045  lab 3
17581556 045 lab 3
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Session1
Session1Session1
Session1
 
Data centre administration
Data centre administrationData centre administration
Data centre administration
 
information of system technology
information of system technologyinformation of system technology
information of system technology
 
SNPResume
SNPResumeSNPResume
SNPResume
 
Network
NetworkNetwork
Network
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Computer network
Computer network Computer network
Computer network
 
DISTRIBUTED DATABASE
DISTRIBUTED DATABASEDISTRIBUTED DATABASE
DISTRIBUTED DATABASE
 

Similar to Essential Information about Network Architecture and Design

Similar to Essential Information about Network Architecture and Design (20)

What is a network
What is a networkWhat is a network
What is a network
 
Internet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationInternet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentation
 
Computer networks
Computer networksComputer networks
Computer networks
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notes
 
Computer Networks
Computer Networks Computer Networks
Computer Networks
 
UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdf
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networking
 
Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
 
Unit I Networking.pptx
Unit I Networking.pptxUnit I Networking.pptx
Unit I Networking.pptx
 
Chapter ii thesis
Chapter ii  thesisChapter ii  thesis
Chapter ii thesis
 
Computer Networks Notes by -Dr. K. Adisesha
Computer Networks Notes by -Dr. K. AdiseshaComputer Networks Notes by -Dr. K. Adisesha
Computer Networks Notes by -Dr. K. Adisesha
 
Chapter 6.0
Chapter 6.0Chapter 6.0
Chapter 6.0
 
Cn
CnCn
Cn
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
SYNCHRONIZATION
SYNCHRONIZATIONSYNCHRONIZATION
SYNCHRONIZATION
 
Computer Communications
Computer CommunicationsComputer Communications
Computer Communications
 

More from Bizeducator.com

More from Bizeducator.com (11)

Billionaire secrets revealed 2019
Billionaire secrets revealed 2019Billionaire secrets revealed 2019
Billionaire secrets revealed 2019
 
Respond to job announcement and request an interview
Respond to job announcement and request an interviewRespond to job announcement and request an interview
Respond to job announcement and request an interview
 
Learn to write professional resignation letter
Learn to write professional resignation letterLearn to write professional resignation letter
Learn to write professional resignation letter
 
Performance management defined
Performance management definedPerformance management defined
Performance management defined
 
Importance of job performance
Importance of job performanceImportance of job performance
Importance of job performance
 
Most valued workplace skills employee seek in 2017
Most valued workplace skills employee seek in 2017Most valued workplace skills employee seek in 2017
Most valued workplace skills employee seek in 2017
 
Satisfaction and dissatisfaction on the job
Satisfaction and dissatisfaction on the jobSatisfaction and dissatisfaction on the job
Satisfaction and dissatisfaction on the job
 
Dealing with problematic employees in workplace
Dealing with problematic employees in workplaceDealing with problematic employees in workplace
Dealing with problematic employees in workplace
 
Happy 6th Birthday Google Plus!
Happy 6th Birthday Google Plus!Happy 6th Birthday Google Plus!
Happy 6th Birthday Google Plus!
 
Benefits of Computerized Accounting System in Workplace
Benefits of Computerized Accounting System in WorkplaceBenefits of Computerized Accounting System in Workplace
Benefits of Computerized Accounting System in Workplace
 
How to Develop a Productive Team
How to Develop a Productive TeamHow to Develop a Productive Team
How to Develop a Productive Team
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Essential Information about Network Architecture and Design

  • 1. 1/22/2017 Essential Information about Network Architecture and Design bizeducator.com/essential-information-about-network-architecture-and-design/ Networks are implemented to enable the sharing of resources and the exchange of information between users. As the number of resources, users, and connections increases, most networks must be routinely modified to accommodate growth ideally without any reduction in the features and performance levels users have come to expect. This makes network architecture and designs a dynamic and continuous process within most organizations. Network architecture can be described as the structured grouping of hardware, software, and applications. The successful integration of these three elements allows for the transfer of all types of messages between users, administrators, and devices. Networking or LAN technologies for PCs were introduced in the 1980s to manage the rapid growth of desktop computing within many organizations. Problems associated with stand alone devices include the following: Each PC stores data locally, unlike mainframes or minicomputers, both of which use centralized storage. As a result, faulty reporting and decision making can occur if the same data is updated on some PCs, but not on others. Security is a major concern, since every PC can potentially contain sensitive data, making it easier for unauthorized individuals to gain access to valuable organizational information. Backups may not exist for critical data if users do not duplicate their files on a regular basis. The failure of a single storage device can result in significant disruption and costs in terms of time, resources, and money. Various users or groups are free to install and use different software applications on their PCs, making file sharing difficult within the organization. It is more difficult to justify the purchase of expensive devices or services, since only one PC at a time can benefit. For example, a dedicated high rate Internet connection is typically not economically feasible for every user in an organization with tens or hundreds of stand-alone PCs. Implementing a network makes it possible to solve these problems in the following ways: A network makes it possible to centralize data. All files shared by users are stored in a central location, which guarantees consistency and simplifies the update process. Multiple levels of security can be implemented on a network, making it more difficult to obtain unauthorized access to data. A network can be equipped with a backup system that runs at specific intervals, ensuring that critical data is available from a secondary source if needed. In addition to user-created files, software applications can be installed on centralized storage, accessible from any station connected to the network. This accelerates the deployment process, since any application or update needs 1/2
  • 2. to be installed only once on the network versus on each stand-alone PC. All users can access any resource connected to the network (e.g., high-speed copiers or Internet links). Physically, a network can be as small as two connected PCs and the media used to enable the connections (i.e., cabling, a wireless link, or a telecommunications circuit). In addition to wired or wireless connectivity, a network must be equipped with services designed for resource sharing, including: Access control, which is necessary in cases where two or more devices attempt to use a shared resource (e.g., telecommunications circuit between two sites, a printer) at the same time. Synchronization, which is necessary to ensure that a receiving device is listening when a sending device is transmitting to that device. Flow control, which is necessary to monitor and adjust the rate at which data is transferred from sender to receiver in order to minimize transfer time and data loss. For example, if a receiving device is occupied with other tasks, it will use flow control to ask the sending device to pause transmission. Error control, which is necessary to verify that a message was transferred successfully between a sender and a receiver (or to request a retransmission if the transfer was not successful). BY BIZEDUCATOR 2/2