logo

Computer Systems Architecture

   

Added on  2023-01-09

13 Pages3589 Words80 Views
Computer Systems
Architecture
Computer Systems Architecture_1
Table of Contents
INTRODUCTION ..........................................................................................................................1
TASK 3............................................................................................................................................1
P5. Explain the relationships between hardware and network addresses including their use
with regards to networking devices and components.................................................................1
P6. Setup, configure and document appropriate hardware and software systems to establish
computer based network connectivity.........................................................................................3
TASK 4............................................................................................................................................4
P7. Use information gathering methods to assess, troubleshoot and document solutions to a
number of different technical hardware, software and networking issues..................................4
P8. Conduct and document a range of maintenance activities with regards to computer
hardware and software................................................................................................................4
CONCLUSION................................................................................................................................4
REFERENCES................................................................................................................................5
Computer Systems Architecture_2
INTRODUCTION
A computer system is considered as the nutshell as it include looking back to the timeline
of the computer evolution over the decades. A computer is a machine which is instructed in
terms of carrying out the significant sequence of logical operations automatically through
computer programming. These programmes include computers in terms of performing wide
range of task as it include hardware, operating system, software and other concerning
equipments that are used for the further operations and referred as the computer system (Lao and
et. al., 2020). It is a programmable device which automatically perform prominent sequence of
calculations and other operations as it can store, process, retrieve and process data as per the
internal instructions. The report is going to cover the relationship among hardware and network
address including their usage concerning the networking devices and also setup, configure and
document hardware and software system for the effectively developing computer based network.
Furthermore, it also use the prominent information of collecting various methods to assess and
document solutions to the number of various technical hardware and other networking issues.
Lastly, it conduct a range of care activities for computer.
TASK 3
P5. Explain the relationships between hardware and network addresses including their use with
regards to networking devices and components
Network communication technology include ICT network which consider explanation of
various technologies like intranet, internet and extranet. For this, it leads to include various
network protocols that deliver reliable and fast communication over large distances. As computer
system relies on the networks on the repeatable operations in terms of maintaining network
integrity for executing transfer protocol models that forces information to adhere to primary
rules. Few network protocols are mentioned below:
TCP/IP Protocol: This protocol represents the significant activities that are used as the
protocol stack as by resembling the OSI, TCP/IP work on its own particular manner. In terms of
this, IP refers to the internet protocol of data transmission in which data is separated into units of
data and also sent over the routing information that direct to the destination (Dickerson and
Mavris, 2016). Along with this, TCP depicts the transmission control protocol that develop
1
Computer Systems Architecture_3
significant connections and send data concerning the receipt of information and the receiver
notifies the sender regarding the information that remain intact.
UDP: It refers to the User Datagram protocol which is used as the transport layer and the
application developers use UDP at the place of TCP. It is the scaled down economy model and it
does not offer prominent bells and signal of TCP as it does a very good job for transporting
information which does not need reliable delivery and also use far fewer network resources. It is
also undertaken as the unreliable transport protocol that sends segments over the network and
also forget about other networks and also permit for the acknowledgement of safe arrival.
OSI Protocol task: This model of network data moves from one computer to another in
terms of succeeding the layers of computer software. Moreover, this model set up the prominent
system of layers including physical layer of wires and electricity at the lowermost section. In
terms of this, when an individual send data over the network, it moves down to the heap by each
layer acquiring several data headers, address the information and security checking devices at
every level before reaching over the physical medium (Hwang and Jotwani, 2016).
ICMP: It refers to the Internet Control Message Protocol that leads to support protocol
for the internet suite and also used by network devices considering routers to send fault messages
and other operational information that indicate towards the success and failure in terms of
communicating with another IP address. It differs from the transport protocols including TCP
and UDP which is not used to exchange information and data among systems and also regularly
employed by end user network applications.
Relationship between Hardware and network address
An IP address is the unique set of numbers that leads to examine the device which is
connected to the internet in order to understand that from where the address come and also
understand that how it works. It is a bunch of various networks that are connected together and
also work together in terms of purchasing a services from an ISP as it connect ISP network from
all other networks (Firouzi and et. al., 2018). On the other hand, MAC address examines the
unique network interface within the device as the IP addresses are delegated by the ISPs that can
be re-assigned to other devices that connect and disconnect to its addresses and tied to the
physical adapter. Moreover, both of these work together and interlinked with each other for the
effective use of transport data from one to another network by using prominent TCP/IP protocol
and MAC deliver data to the significant devices on the network.
2
Computer Systems Architecture_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Systems Architecture
|15
|4443
|2

Computer Networking and Internet Protocols
|8
|1008
|334

Internet Protocols: A Set of Rules Governing Communication Across the Internet
|6
|1234
|416

BN106 - Network Models, Media and Connections - Networking Fundamentals
|7
|1771
|110

IT Network Security
|68
|3007
|50

Faculty of Information & Communication Technology
|3
|1589
|327