This report contains information about networking, network topology, communication, bandwidth management, network protocols, and more. Suitable for those with some knowledge of networking.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Network Information Systems Abstract This report contains a lot of information about Networking.It can also be used by someone who has some knowledge about networking. This contains a lot of information about the impact of network topology, communication, and bandwidth management.Also talks about how protocols enable the effectiveness of networked systems. It is very important. This report contains further information about networking approaches, the importance of network management systems, and the independence of hardware, software, and networking.It also contains information about network protocols and standards and different network monitoring systems. P a g e1|17
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Content 1.Network Information Systems………………………………………………………………………………………..2 2.Abstract………………………………………………………………………………………………………………………….3 3.Table of Content…………………………………………………………………………………………………………….4 4.Computer networking…………………………………………………………………………………………………….5 4.1.What is the Network?.............................................................................................5 4.2.What is Topology?..................................................................................................6 4.3.Network communication…………………………………………………………………………………….9 4.4.Network bandwidth ..……………………………………………………………………………………….10 4.5.Networking Approaches……………………………………………………………………………………10 4.6.Network protocols and standards ……………………………………………………………………11 4.7.How do protocols enable the effectiveness of networked systems?...................12 5.The importance of Network Systems Management …………………………………………………….13 6.Interdependencies of hardware, software, and networking……………………………………..…14 7.Network monitoring systems ………………………………………………………………………………………14 8.Conclusion …………………………………………………………………………………………………………………..16 9.References. ………………………………………………………………………………………………………………….17 P a g e2|17
4.Computer networking 4.1.What is the Network? A computer network is often located on network nodes.And this is a group of computers that share the resources provided. Computers use common communication protocolstocommunicatewitheachother.Theseinterconnectionsconsistof telecommunicationnetworktechnologiesbasedonphysicallywired,optical,and wirelessradiofrequencymethodsthatcanbearrangedinvariousnetwork topologies.Nodesinacomputernetworkincludepersonalcomputers,servers, networking hardware, or general-purpose hosts.Computer networking has made many of today's tasks easier.People got the maximum results from this networking during the world corona pandemic.During this time, even big companies easily did their necessary work in the digital world.It provided facilities for the small child to the old person. As networking needs increased, so did the types of computer networks that served those needs. Some types of such computer networks are mentioned below. PAN – This network Serves only one person. P a g e3|17
ï‚·LAN - A LAN connects computers over a relatively short distance. This allows sharing of data, files, and resources. For example, a LAN can connect all computers in a university. ï‚·MAN - A MAN is usually larger than a LAN but smaller than a WAN. ï‚·WAN - A WAN connects computers across a wide area, such as region to region or continent to continent. The best example of this is the Internet. 4.2.What is Topology? Organizations often use network topology to define how their network nodes connect to each other. This is a physical arrangement. It is used by various endpoints and links in an enterprise network to communicate with each other.There are several types of network topology. They are as follows. ï‚·Point-to-point topology - This is a simple topology that directly connects two nodes. Here a cable or wire is used to physically connect point to point. ï‚·Bus topology - The leading cable acts as a standard cable in a bus topology. Another type of cable known as drop a line is used here. It helps connect stations to this main cable. The main cable acts as the backbone of this topology. P a g e4|17
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ï‚·Star topology - Nowadays, this network topology is widely used. This is because most of them are beneficial. This requires a switch as the central unit to which all other network devices are connected.This can also be described as a wireless LAN network. ï‚·Ring topology - Each hub is connected to two other hubs on either side in this network topology. And here the data moves sequentially in one direction. Here the last position P a g e5|17
is connected to the first position of the ring. This ring topology is often faster than the bus topology. ï‚·Tree topology - In this topology, nodes arrange like a tree's leaves, branches, and trunk. Leaves are attached to branches attached to the trunk of the tree. The backbone here is the trunk of the tree. ï‚·Mesh topology - In this network topology, every hub connects to every other hub. That means all devices are connected. There are two types of this mesh topology. They are full mesh and half/ partial mesh. P a g e6|17
4.3.Network communication Communication is a significant part of people as well as specific organizations. There are different ways to convey the meaning or message of information transmitted throughcommunication.Herewearetalkingaboutnetworkcommunication.A communication network is the way communication flows. It can be a method used to facilitatecommunication within a group. Here, connections create with different patterns. Some of such main network communication types mention below. P a g e7|17
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
ï‚·Wheelnetwork-Commands/informationcomesfromasinglesuperiorand subordinates act as a wheel in the network.The entire network is a highly centralized model.Once the message is delivered to the recipient, it is expected to be delivered immediately. ï‚·Chain network - Here there is no bottom-up communication. The best example of this is the leader who leads a group of people. This is because the message must necessarily reach from the higher level to the lower level without any change in meaning or words. ï‚·Circle network - In this network, employees communicate only with adjacent members of the organization. Each member connects to two members on either side. ï‚·All-channel network - This allows all members to communicate with each other. These types of networks do not have one central leader. 4.4.Network bandwidth Network bandwidth is a measure of the data transfer capacity of a given network. It is critical to understand a network's speed and quality. Network bandwidth usually measures in bps.Following are some of the main solutions that network administrators can use to monitor network bandwidth. ï‚·Network traffic can be monitored and analyzed in real-time. ï‚·Network issues and bandwidth hogs that cause bandwidth bottlenecks should be identified. ï‚·Network quality should be assessed by monitoring network throughput and speed at regular intervals. Increasing the network bandwidth brings us many advantages.Some ways to increase network bandwidth are as follows. ï‚·Creating subnets within networks.This method can increase the network bandwidth. P a g e8|17
Streamline the flow of data in the network by strategically adding routers, switches, and modems. Create and enforce granular policies. Software updates during off-peak hours to avoid network congestion and productivity disruptions. 4.5.Networking Approaches A network approach often involves building highly effective relationships around a shared vision to achieve goals or create a business. It is a very effective way of working. A group of friends working together is often more productive than a group of strangers working together. In this approach, understanding each other's needs and working toward shared goals is always encouraged. There are two types of this network approach. The Peer-to-Peer approach – A Peer-to-Peer network is a group of connected computers and users that appear to be friends. There are as few as 10 computers and very few members. There are very few security issues here. This type of network can be implemented at a very low cost. The Client-Server approach - This is also called server-based networking. One or more computers act as a server. Its other computers are connected to it. The server is used to control access to the network and administer its resources to clients. The client has to connect to the server to access its resources. 4.6.Network protocols and standards Protocols enable different components of a network to communicate with each other. It contains a set of rules that allow effective communication. We come across protocols every day in our life. Protocols are essential for networking. That's because a protocol is the only standard that describes how specific devices communicate and exchange data. In other words, a network protocol can determine how data transmit between different devices on the same network. Essentially, it allows connected devices to communicate with each other without any changes in their internal processes or design. P a g e9|17
Standards are the set of rules required to exchange information between devices. Here it is essential to follow the standards created by various standard organizations like IEEE, ISO, ANSI, etc. There are two types of these standards. They are as follows. ï‚·De Facto Standard - It means "by the fact" or "by convention". These are not endorsed by any organization but are adopted as standards because they are used widely. ï‚·De Jure Standard - It means "by law" or "by regulation". These standards are the standards approved by officially recognized organizations like ANSI, ISO, IEEE, etc. These are the standards to follow if necessary. 4.7.How do protocols enable the effectiveness of networked systems? Implementing these network protocols takes large-scale processes and breaks them into smaller, specialized tasks. It happens at all levels of the network. Each function must collaborate at each level to complete the more significant task. When discussing these network protocols, it is essential to know about the OSI (Open Systems Interconnection) model. This model divides the communication process between two network devices into seven layers. Each layer can assign a task where the seven layers are independent in the seven layers of the OSI model, so each task can be performed independently. In this model, seven network layers separate into two groups. 7, 6, and 5 are the upper layers, and 4, 3, 2, and 1 are the P a g e10|17
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
lower layers. The upper layers here mainly deal with application issues. The lower layers mainly deal with data transport issues. Layer 1 – This provides an interface between the network medium and the device. Layer 2 – In this layer, packet transmits errors are detected and corrected. Layer 3 – This layer decides which physical lane to use for data. Layer 4 – This layer manages message delivery to the network. Layer 5 – Here the user's session and dialogues are managed. Layer 6 – This layer ensures that the format of the data is usable or not. Layer 7 - Standard services such as a virtual terminal, file, and operations are provided in this layer. 5.The importance of Network Systems Management P a g e11|17
Network management is the process of knowing the operational status of network resources.It collects, stores, and monitors data from resources across the network to ensure they are performing as they should. Network management is a necessity nowadays. Without network management in your office, you will find it difficult to even leave your computers and go home. Why should we do network management? Find and Troubleshoot Problems - Early on, when things on the network weren't working, you wanted to know why.It is the same today.It is very difficult to do because of the amount of usage.The fault management component of network management is used to detect these faults.Using this you can fix the error once you find it. Verify Security Compliance – Security breaches are a frequent occurrence these days. In suchcases,networkmanagementhelpsensurecompliancewithorganizational standards. This can detect when an attacker is on the network. Improve Network Visibility – You can't run a network effectively if you don't know what's in it.Network management can help you get the visibility you need in this situation. This gaining visibility can also help you identify parts of the network that you don't have access to, but should.This will help reduce network silos that limit troubleshooting and management of a network. Perform Capacity Planning – Traffic in a network changes from time to time. In these situations, you need network management to plan for these changes in network capacity. The data you obtain can often help you identify trends and patterns necessary for proper capacity planning. Save Time - Managing your network can help you save time. With the right monitoring tool, you can quickly find the root cause of network problems. It saves your time. 6.Interdependencies of hardware, software, and networking P a g e12|17
Networking hardware often designs to perform some forwarding layer function. A layer of software must be programmed to make that hardware work as it's supposed to. Usually, this is called a 'driver'. That, in turn, links to more platform-dependent code that provides system-specific support. A hardware abstraction layer (HAL) is on top of the platform-dependent code, an API that presents an abstract bridge and router. A platform-independent layer provides management-plane and control-plane functionality on top of the HAL. 7.Network monitoring systems Network monitoring provides network administrators with information about whetheranetworkisoperatingoptimally.Thisisveryimportantfornetwork administrators. With tools like networking monitoring software, administrators can identify vulnerabilities, optimize efficiency, and more. The table below contains some important information to consider in network monitoring. P a g e13|17
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Network monitoring systems include software and hardware tools that monitor various aspects of a network and its performance. These are different aspects like traffic, bandwidth usage, and uptime. These systems can identify devices and other elements that comprise or touch the network. Status updates can also be done in the same way. P a g e14|17
8.Conclusion This report is about "what is the network?", "What is topology?", Network communication, network bandwidth, networking approaches, network protocols, and standards, "How protocol enables the effectiveness of the networked system?", The importanceofNetworkmanagementsystems,Networkmonitoringsystems,etc. Matters have been discussed. Using this report, even a person who does not have basic networking knowledge can get general knowledge. P a g e15|17
References Anon., 2022.Flisland Consulting.[Online] Available at:https://flisrand.com/2016/07/the-basics-of-a-network-approach/#:~:text=A%20network %20approach%20intentionally%20builds,people%20work%20together%20as%20peers [Accessed 12 September 2022]. Captain, F., 2022.Fidel Captain.[Online] Available at:http://fidelcaptain.com/educator/studenthandouts/computernetworks.html [Accessed 12 September 2022]. FAQ, 2022.FAQ Blog.[Online] Available at:https://faq-blog.com/how-protocols-enable-the-effectiveness-of-networked-systems [Accessed 12 09 2022]. GeeksforGeeks, 2021.GeeksforGeeks.[Online] Available at:https://www.geeksforgeeks.org/protocol-and-standard-in-computer-networks/ [Accessed 07 September 2022]. Hossein, 2022.Spice Works.[Online] Available at:https://www.spiceworks.com/tech/networking/articles/what-is-network-topology/ [Accessed 12 09 2022]. IBM Cloud Education, 2021.IBM.[Online] Available at:https://www.ibm.com/cloud/learn/networking-a-complete-guide [Accessed 13 09 2022]. IBM, 2021.IBM.[Online] Available at:https://www.ibm.com/docs/en/i/7.3?topic=communications-common-networking- standards [Accessed 12 09 2022]. Michale Boss, 2021.Nakivo.[Online] Available at:https://www.nakivo.com/blog/types-of-network-topology-explained/ [Accessed 13 09 2022]. Olivier Bonaventure, 2011.Research Gate.[Online] Available at:https://resources.saylor.org/wwwresources/archived/site/wp-content/uploads/2012/02/ Computer-Networking-Principles-Bonaventure-1-30-31-OTC1.pdf [Accessed 12 09 2022]. Techvera, 2022.Techvera.[Online] Available at:https://techvera.com/the-importance-of-network-management-for-your-business/ #:~:text=Network%20management%20increases%20the%20efficiency,easily%20identify%20potential %20security%20threats [Accessed 10 September 2022]. Toppr, 2021.Toppr.[Online] Available at:https://www.toppr.com/guides/business-correspondence-and-reporting/communication/ P a g e16|17
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
network-in-communication/ [Accessed 13 09 2022]. Winds, S., 2021.Solar Winds.[Online] Available at:https://www.solarwinds.com/resources/it-glossary/network-bandwidth [Accessed 12 09 2022]. P a g e17|17