A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE

Page 1

A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE

ABSTRACT: In a computer network system, the many computers are connected to one another in order to facilitate the exchangeofdigitalinformation.Acomputernetworkis,initsmostbasicform,acollectionofdevicesthatareconnectedtoone anothervialinks.Distributedprocessing,inwhichataskissplitupandcarriedoutsimultaneouslyamongmultiplecomputers, isutilisedbycomputernetworks.Anassaultonanetwork'sresourcesisconsistentlyoneofthemostdifficultobstaclesitmust overcome.Theidea ofcomputernetworksisexaminedindepthinthisresearchstudy.Acomputernetworkconsistsofa collectionofdevicesthatareconnectedtooneanothervialinks.Hostsinpersonalcomputers,phones,andservers,inaddition tonetworkingdevices,canallbeconsiderednodesinanetwork.AccesstotheWorldWideWebforapplications,shareduseof applicationandstorageservers,printers,andfaxmachines,anduseofemailandinstantmessagingprogrammesareallmade possible through the use of computer networks. Sharing of information across many computer networks allows for the completionofavastarrayofjobs.Thereareopensystemsandclosedsystems,thetwoprimarycategoriesofsystems.Anopen systemcanbequicklyconnectedtothenetworkandisimmediatelyreadyforcommunicationwhenitdoesso.Ontheother hand,aclosedsystemcannotbesimplyjoinedtoanothernetworkduetotherequirementofadequateauthentication

KEYWORDS: Computernetworks,Protocols,Typesofnetworks,Topology,Nodes,Datatransfer.

1. INTRODUCTION

Anetworkofcomputers,servers,printers,routers,andswitchesthatareallconnectedtooneanotherandabletoexchange informationwithoneanotheriscalledacomputernetwork.Acomputernetwork'sprincipalfunctionistoenableusersin different locations to share data and resources with one another. Depending on their scale, location, topology, and communicationprotocols,computernetworksfallintoanumberofdistinctcategories.LocalAreaNetworks(LANs),WideArea Networks (WANs), Metropolitan Area Networks (MANs), Storage Area Networks (SANs), and Wireless Networks are all examplesofpopulartypesofnetworks.Localareanetworks(LANs)arenetworksthatconnectdevicesinsideasinglebuilding orcampus.Sincethesenetworksaremorelocalizedandcontainfewernodes,theyaremoreefficientanddependablethanwide areanetworks.Fileandprintersharing,aswellasemailandotherformsofonlinecommunication,relyheavilyonthem.Onthe other hand, wide-area networks (WANs) link offices located in various cities or even in other countries. These networks connectdevicesacrossawidergeographicregionthanLANsdoandmakeuseofavarietyoftechnologies,includingleased lines, satellite connections, and virtual private networks. Wide area networks (WANs) are widely employed for teleconferencing,videoconferencing,andcloudcomputing.MANsarequitesimilartoLANs,excepttheyconnectnumerous LANsacrossagreaterarea,suchasacityormetropolitanregion.Databackup,datareplication,anddisasterrecoveryarejust some of the storage-related tasks that SANs are designed to handle. Wireless networks eliminate the requirement for wiredconnections between nodes by employing radio waves. The simplicity and adaptability of these networks are contributingtotheirrisingpopularity.Wi-Fi,shortfor"wirelessfidelity,"referstoaspecificformofwirelessnetworkthatis widelydeployedinmanydifferentsettings.Datatransmissionandexchangeincomputernetworksismadepossible bya combinationofphysicalconnectionofdevicesandnumerouscommunicationprotocolsandtechnologies.Amongthemare Ethernet,Wi-Fi,TCP/IP,DNS,FTP,HTTP,andaplethoraofothers.Theeffectiveness,safety,anddependabilityofacomputer network dependonitsdesign,configuration,andadministration.Whenplanningandmanaginga network,securitymust alwaysbeatoppriority.Itentailstakingprecautionstopreventhackers,thieves,viruses,andothersecurityrisksfromgaining accesstothenetwork.Firewalls,anti-malwareprogrammes,IDS/IPS,andencryptionareonlyafewofthestandardsecurity methodsusedtoday.Inconclusion,acomputernetworkisasophisticatedsystemthatenablesdevicestointeractwithone anotherandsharedataandotherresources.Differentsizes,topologies,andtechnologycharacterisethemanydistinctvarieties of networks. Network performance, security, and dependability all improve with well-thought-out planning, setup, and maintenance.

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page366

2. COMPONENTS OF A COMPUTER NETWORK

2.1 NIC (National interface card)

Anetworkinterfacecontroller,oftenknownasaNIC,isapieceofhardwarethatactsasaconduitforinformationtogo between a computer and another piece of hardware. The hardware addressesare kept in the NIC,and the data-link layer protocolusestheseaddressestoidentifythesystemthatisconnectedtothenetwork[3].TheNICisresponsibleforstoringthe hardwareaddresses.Thismakesitpossibleforthedatatobetransmittedtothecorrectdestination.ThewirelessNICandthe wiredNICarethetwovarietiesofnetworkinterfacecard(NIC)thatareavailable.

 Allcontemporarylaptopsmakeuseofwirelessnetworkinterfacecards(NIC),andaconnectionisestablishedby meansofanantennathatmakesuseofradiowavetechnology

 CablesarewhatfacilitatetheflowofdatathroughthemediumusingtheWiredNIC.

2.2 Hub

Incomputernetworking,ahubisadeviceusedtoconnectnumerouscomputerstoaLAN.Onceithasreceivedadatapacket fromonedevice,itwillsenditontoeveryotherdevicethatislinkedtoit.Thismeansthatdatatransmissionfromtwodevices connectedtothehubatthesametimecancausecollisionsanddegradenetworkperformance.Hubswerewidelyusedinthefirst stages of the networking revolution since they were low-cost and simple to set up. However, because to technological advancementsthathavemadeswitchesmorereasonablypricedandefficient,theyhavebecomelessfrequentinrecentyears.A switchisasmarterdevicethatonlysendsdatatotheintendedrecipient,whichgreatlyimprovesnetworkspeedbydecreasing congestion.However,hubsstillhaveaplace,especiallyinlow-trafficenvironmentswherepriceisafactor.Theabilitytoeasily monitornetworktrafficandidentifyissuesmakesthemvaluablefortroubleshootingaswell.

Incomputernetworking,arouterisadeviceusedtolinkandroutedataacrossseveralnodesonseparatenetworks.Likea trafficcop,itdirectstheflowofinformationbetweennetworksliketheInternetandacompany'sinternalLAN.

Inordertodeterminetheoptimalroutingforeachincomingdatapacket,routerslookatitsdestinationIPaddress.Routing tables, which hold data about the networks linked to the router and the paths to reach them, are used to make these determinations.Networkaddresstranslation(NAT)isafeatureofroutersthatenablesnumerousLANdevicestoshareasingle externalIPaddress.

Routersnotonlyforwarddatabetweennetworks,butcanofferadditionalsecurityfunctionslikefirewalls.Theycanprevent hackersfromgainingaccesstoasystemandprotectanetworkfrommalicioussoftware.

Routers can be purchased as physical devices, as network switches that also do routing, or as computer or server-based software.Theyplayacrucialroleintoday'scomputernetworksbyfacilitatingcommunicationbetweendevicesandnetworks andgrantingusersaccesstotheinternetandotherexternalnetworks.

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page367
Fig. 1: Components of Computer Network 2.3 Router

2.4 Modem

A modem isa gadgetthatallows a computer orother device toconnect to theinternet via a telephoneline. Thename "modem"isanabbreviationfor"modulator-demodulator,"whichiswhatitdoes.

A modem is a device that takes digital information from a computer and changes it into an analogue signal suitable for transmission over a telephone or cable connection. Using the preexisting telecommunications infrastructure, this enables computersandotherdevicestoconnectwitheachotherovergreatdistances.

Themodemyouneedwillvarybasedonthenetworkyou'reconnectingto.Connectingtothewebviaaregularphoneline requiresadial-upmodem,whereasconnectingviaacableTVnetworkcallsforacablemodem.DSLmodems,whichemploy digitalsubscriberlines(DSL)todeliverbroadbandInternetaccessoverregularphonelines,areanotheroption.

ISPsaretheoneswhosupplymodems,whichcanbestandalonedevicesorcomponentsoflargernetworkingdevices.Some modemsadditionallyprovideextrafunctionality,suchWi-Fioraphoneline.

Whenitcomestoconnectingcomputersandotherdevicestotheinternetandfacilitatinglong-distancecommunication,modems playacrucialrole.

2.5 Switches

AswitchisacomputernetworkingdevicethatconnectsnumerousdevicesonaLANandcontrolstheflowofdatabetweenthem. Switchesaresmarterthanhubsandcanjustsenddatatothedevicethatneedsit,ratherthanbroadcastingallincomingpackets toallconnecteddevices.

Todeterminewhichportshouldreceiveanincomingdatapacket,switchescheckitsdestinationMACaddress.Hubs,whichcan leadtocollisionsandslowdownnetworktraffic,areavoided,whichbothreducescongestionandincreasesperformance.

Separateunits,networkcardsthatdoubleasswitches,andscalable,modularswitchesarejustafewofthevarioustypesof switches available. The ability to adjust settings like virtual local area networks (VLANs) and Quality of Service (QoS) prioritisationisonewaytoclassifywhetherornottheyaremanaged.

Inorderforcomputerstotalktooneanotherviaalocalareanetwork(LAN)andfordata-intensiveactivitieslikevideostreaming and online gaming to go smoothly, switches are an essential part of today's networks. Access to the network can also be restrictedusingsecuritymeasureslikeMACaddressfiltering.

2.6 Cables

Today'scommunicationandinfrastructurenetworkssimplycannotfunctionwithoutcables.Theyenablethetransmissionof information,energy,andsignalsbetweenvariousentities.Copper,aluminium,andfibreopticstrandsarejustafewexamplesof thematerialsusedtoconstructcables.

Powercables,datacables,coaxialcables,andEthernetcablesarejustafewexamples.Datacablesareusedtotransportdigital data overshorterdistances,whereaspowercablesareusedtotransmitelectricalpower.Coaxial cablesareusedforhighfrequencybroadcastslikecableTV,theinternet,andothersimilarapplications,whereasEthernetcablesareusedforlocalarea network(LAN)connections.

Fibreopticcablesareamodernformofcablethatutilisestransparentstrandsofglassorplastictorapidlycarrydataacross great distances. Since these cables can transfer a lot of data swiftly and efficiently, they are gaining popularity in the telecommunicationsandinternetinfrastructureindustries.

Cablesareessentialtotheoperationofnearlyeveryaspectofourmoderntechnologicalandphysicalinfrastructure.Theymake possiblethevastmajorityofmodernconveniencesweuseonadailybasis.Mainlytherearethreetypesofcables:

a. Coaxial cable

Inelectricalwiring,acoaxialcable(orcoaxcable)hasthreeparts:aninnerconductor,anoutsideconductor,andaninsulating layer.Thesignalissentdownthecopperinnerconductor,whiletheoutsideconductoractsasashieldtoblockoutunwanted signals.Radiofrequencysignals,includingthoseusedforcableTV,internetconnections,andothercommunicationsapplications,

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page368

aretypicallytransmittedoveracoaxialcable.Duetotheirsuperiorbandwidth,minimalsignalloss,andnoisetolerance,these cablesarefrequentlyusedinplaceofothers.

b. Twisted pair cable

Twistedpaircableisatypeofinsulatedcopperwiringcommonlyusedintelecommunications.SinceEMIandcrosstalktendto worsenthequalityofdatatransmissionsatgreaterdistances,thetwisteddesignhelpstomitigatetheseissues.

Telephones,Ethernetnetworks,andInternetconnectionsarejustafewexamplesofthewidespreaduseoftwistedpaircables forspeechanddatatransmission.Cat5,Cat6,andCat7areonlyfewofthecategoriesavailable;eachhasitsownuniquesetof requirementsintermsofbandwidth,maximumtransmissiondistance,andotherfeatures.

Twistedpaircablesarewidelyusedinthecommunicationindustrybecausetheyareinexpensiveandsimpletosetup.They deliverconsistentperformanceandareapplicableinavarietyofsettings,fromhomeofficestoenterprise-widerollouts.

c. Fibre optic cable

Thinstrandsofglassorplasticareusedinfibreopticcablestoswiftlycarrydataovergreatdistances.Multipleopticalfibresare enclosedinaprotectivejacketandformthecable.Eachfibreisaroundthethicknessofahumanhairandcantransmitdataover severalchannels.

Compared to copper cables, fibre optic cables have many advantages, including greater bandwidth, greater transmission distances,andresistancetoelectromagneticinterference(EMI).Theyfindwidespreaduseinhigh-speeddatatransmission settingsincludingtelecommunicationsnetworksandinternetbackbones.

Intermsofspeedandreliability,fibreoptictechnologyhascompletelychangedthewayweshareandaccessinformation. Despitethefactthatfibreopticcableinstallationismoreexpensivethancopperorcoaxialcableinstallationintheshortterm,the long-termbenefitsandsavingsmorethanmakeupfortheoriginaloutlay.

3. THE USE OF A COMPUTER NETWORK IN APPLICATIONS

3.1 Resource share

Allowforthesharingoffiles,data,andvariousothertypesofinformationina networkcontext,andgrantauthorisedusers accesstothefiles,data,andinformationthatiskeptonothercomputersthatarepartofthenetwork.

3.2 Interpersonal communications

E-mail,instantmessaging,chatrooms,thetelephone,videotelephoneconversations,andvideoconferencingarejustfewofthe waysthatindividualsareabletocontactwithoneanotherinanefficientanduncomplicatedmannerthankstotheuseofa network.

3.3 Server-Client model

Theserver-clientconceptiscommonlyusedinthefieldofcomputernetworking.Aserverisacentralcomputerthatisusedto store information and is maintained by the system administrator in this way. The server is accessed by other computers. Computersactingasclientsestablishconnectionswiththeserver.Clientsarethecomputersthatareemployedinordertogain accesstothedatathatisstoredontheserverviatheuseofaremoteconnection.

3.4 E-commerce

In businesses, a computer network is another component that is of the utmost importance. You should carry out your commercialoperationsonline.WebsiteslikeAmazon.com,whichdoalloftheirbusinessontheinternetandserveasamodelfor e-commerce,arethegreatestexamplesofwhate-commercemaylooklike.

3.5 Communication medium

Theoverallnumberofusersisstillunknown.Computernetworksdemonstratethequalitiesofacommunicationmediuminthat theyhavethesefeatures.Forexample,acorporationisconsideredtohaveanemailsystemifithasmorethanonecomputerand itsemployeesuseemailastheirprimarymethodofday-to-daycommunication.

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page369

4. THE BENEFITS OF WORKING WITH A COMPUTER NETWORK

Using a computer network has many useful applications. Some of the main benefits are as follows:

A. Sharing resources: Connecting many computers together in a network allows them to share peripherals like scanners,printers,andharddrives.Employees'accesstoresourcesisfacilitatedandexpeditedasaresult.

B. Improved communication: Networksfacilitateworkerinteractionbyuseofelectronicmail,IM,andothermeansof groupcommunication.Asaresult,productivityincreasesandcollaborativeeffortsbecomelessofahassle.

C. Increased security: Firewalls, passwords, and other network security measures can keep prying eyes out of computersandoffofprivateinformation.

D. Remote access: Withanetworkinplace,employeesareabletoconnectwithoneanotherandshareinformationfrom any location in the world. Businesses that employ freelancers or individuals who frequently travel to different locationsmaybenefitgreatlyfromthis.

E. Cost savings: Bysharingresourcesandusingcentralservers,companiescansavemoneyonhardwareandsoftware expenses.Additionally,networkscanhelpreducedowntimeandincreaseefficiency,whichcanleadtocostsavings overtime.

5. DISADVANTAGES OF COMPUTER NETWORK

While computer networks have many advantages, there are also some disadvantages to be aware of, including:

a) ThreatstonetworksecurityComputernetworkspresentnewentrypointsforhackersandothercrooks.Inadequate networksecuritymightresultinthedisclosureoralterationofsensitivedata.

b) Computer networks can be difficult to implement and manage, eating up a lot of time and money. This might be difficultforstartupswithlittleresourcesandknowledge.

c) Intheeventofanetworkoutageorothertechnicaldifficulties,businessesthatrelylargelyoncomputersmayendure disruptionsinservice.Productivityandincomemaysufferasaresultofthis.

d) Settingupandmaintainingacomputernetworkcanbecostly,despitethefactthattheyhelpbusinessessavemoneyby standardising procedures and increasing productivity. All the resources (computers, programmes, and people) requiredtokeepthenetworkrunningsmoothlygounderthiscategory.

e) Connectivityissues,incompatibilities,andhardwarefailuresarejustafewexamplesofthetechnicalproblemsthatcan ariseincomputernetworks.Fixingtheseproblems,especiallyifyouneedtobringinoutsidetechnicalexpertise,may beexpensiveandtime-consuming.

6. TOPOLOGY IN COMPUTER NETWORK

Theterm"topology"maybebrokendownintoitsmostelementarycomponents,whicharetheorganizationofanetworkand themethodinwhichthevariouscomponentsofthenetworkareconnectedtooneanother.Boththelogicalandthephysicalmay bethoughtofastopologiesintheirownright.Neitheroneismoreimportantthantheother.Thebasicgoalofphysicaltopology istoofferageometricrepresentationofallofanetwork'snodes,andoneofthepurposesofphysicaltopologyistotrytoprovide thisrepresentation.

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page370

6.1 Bus Topology

a) The bus topology that is utilized often is also referred to by the phrase "backbone cable." A bus topology is characterizedbytheuseofasinglecabletolinkeachnodetotheothernodesinthenetwork.

b) Therearetwowaysthateachnodecanconnecttothebackbonecable:eitherdirectlyorindirectlythroughadrop cable.

c) Wheneveranodeorsystemwishestosendamessagetoanothernodeorsystemusinganetwork,itwillfirstupload the message to the network. The message is transmitted to each and every node in the network, regardless of whetherornotthatnodehasanaddressassociatedwithit.

d) Thebustopologyisthemostfrequentstructureusedfornetworktopologiesthatadheretothe802.3(Ethernet)and 802.4standards.

e) Theconfigurationofabustopologyisnoticeablysimplerincomparisontothedesignofothertopologies.

f) The"singlelane"thatallowsforthetransmissionofmessagestoallofthenodesiswhatismeantwhentheword "backbone"isused.

6.2 Ring Topology

a) Theonlydifferencebetweenthistopologyandthebustopologyisthatthenodesareconnectedwithoneanother usingapoint-to-pointconnection.

b) Duetothefactthatitisunidirectional,datatransfermayonlyoccurinonewayatatime.

c) Thereisnoonepointatwhichtheconnectionsbetweenthevariousnodesinthisstructurecometoastop,asallofthe nodesareconnectedtooneanother.

d) Thisstructureisreferredtoashavingringtopologyduetothering-likestructurethatitpossesses.

e) Whenaringtopologyisutilized,theflowofdataoccursinaclockwisemanner.

6.3 Star Topology

a) Astartopologyisasortofnetworkdesigninwhicheverydeviceonthenetworkislinkedtoacentralhuborswitch. This style of architecture is also known as a star configuration. The centralised hub serves as an intermediary, controllinganddirectingtheflowofdatabetweenallofthedevicesthatarelinkedtoit.

b) Everynodeonthenetworkhasadirectlinktothecentralhubwhenthenetworkissetupinastartopology,which enablesdevicestocommunicatewithoneanotherinatimelyandeffectivemanner.Becauseofthisarchitecture,evenif oneofthedevicesonthenetworkstopsworking,itwillnothaveaneffectontheotherdevicesonthenetworkbecause eachdevicehasitsownindependentconnectiontothehub.

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page371
Fig. 2: Types of Network Topology

c) Thesimplicityofinstallationandupkeepisoneofthemostsignificantadvantagesofferedbyastartopology.Inorderto addorremovedevices,oneneedjustconnectorunplugthemfromthecentralhub.Thiswillnotaffectthefunctionality of the remaining devices on the network. In addition, because each device has its own dedicated connection, the performanceofthenetworkcanbeoptimizedandmaintainedwithfarlesseffort.

d) Thefactthatastartopologyisdependentonacentralhubis,unfortunately,oneofitsdrawbacks.Intheeventthatthe hubfails,thefunctionalityofthewholenetworkwillbedisrupteduntilthehubiseitherfixedorreplaced.Inaddition, thecostofthecentralhubmightbeamajorinvestment,particularlyfornetworksthatareonabiggerscale.

e) Becauseofitsstraightforwarddesignanduser-friendliness,thestartopologyisfrequentlyusedintheconstructionof smalltomedium-sizednetworks.Itensuresthatdevicesareabletocommunicatewithoneanotherinadependableand effectivemanner,butcaremustbetakentoensurethatthecentralhubisproperlymaintainedandsafeguardedtoavoid disruptionstothenetwork.

6.4 Mesh Topology

a) A computer network witha mesh topology isan architecturein which the nodes are interconnected in a gridlike fashion.Inthisconfiguration,allnodesarelinkedtooneanother,allowingfordifferentcommunicationchannels.This meansthatevenifonelinkfails,datamaystillbesentviaotherchannels,makingmeshtopologyahighlyredundantand fault-tolerantnetworkdesign.

b) Wirelessnetworksfrequentlyemployamesharchitecture,especiallyforlarge-scaleinstallationswhereredundancy andstabilityareparamount.Somewirednetworksutiliseitaswell,includingthoseforHPCandserverfarms.When comparedtoothernetworktopologies,thefundamentaldrawbackofameshtopologyisthecomplexityandcostit entailsduetotheenormousnumberofphysicalconnectionsitrequires.

6.5 Tree Topology

a) Whenitcomestocomputernetworkdesign,"treetopology,"alsoknownas"hierarchicaltopology,"referstoa configurationinwhichnodesareplacedinahierarchicalstructure.Ahuborswitchinthecentreofthistopology connectstootherhubsorswitches,formingatree-likestructureamongthenodes.Inconventionalnetwork architecture, nodes at the bottom of the hierarchy represent end users or devices, while nodes higher up representroutersandswitches.

b) Enterprisenetworksoftenemploytreetopologyduetoitsscalabilityandmanagementbenefits,makingita popularchoiceforlarge-scaleinstallations.Ithascertainbenefitsoverbustopology,forexample,sinceitgives redundancyindatatransferandmaybeexpandedwithoutrequiringmajorchangestotheunderlyingnetwork architecture.However,ifthehierarchygoestoodeep,itcancauseperformanceconcernsandincreasedlatency, makingitmoredifficulttomaintainthanalternativetopologies.Asinglepointoffailurecandisruptthewhole networkbecauseofitsdependenceonacentralhuborswitch.

6.6 Hybrid Topology

a) Theterm"hybridtopology" referstoa specific category ofcomputer network design inwhichtwoormore distincttopologiesarecombinedintoasinglesystem.Thestar-bustopology,acombinationofthestarandbus topologies,isthemostprevalenttypeofhybridtopology.

b) Inthisconfiguration,acentralhuborswitchislinkedtoseveralnodesinastartopology,andthenodesinthe startopologyarelinked to eachother ina bus topology.Assubsetsof devices maybeadded or withdrawn withoutimpactingthewholenetwork,andbackupconnectionscanbeusedintheeventofaconnectionfailure, thisdesignproducesanetworkarchitecturethatisbothscalableandfault-tolerant.

c) Inbigbusinessnetworks,wherevariousdepartmentsmayneeddistinctnetworkarchitecturestosuitspecific requirementsoraccommodateexistingequipment,hybridtopologiesarefrequentlyutilised.Abustopology mightbeusedtoconnectindividualstartopologyLANsindifferentofficebuildingsintoaWANthatconnectsall oftheofficesinthefirm.

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page372

7. CONCLUSION

Explaininthisarticletheanalyticalstudythatwasdoneonthemanyfundamentaltopologiessothatwemayhavearoughidea ofwhateachtopologycomprisesandhowtheydifferfromoneanother.Thefeaturesoftopologyareasfollows:reliability, scalability,flexibility,andefficiency.Ifitmixestwoormoredistincttopologies,thedesignmaybecomemoredifficult,andthe infrastructuremaybecomemoreexpensive.Thisisthesolepotentialnegativeoftheapproach.Thedevelopmentofcomputer networks will fundamentallyalter people's ways oflife,suchthatitwill neveragainbe thesame. Humanactivitieslikeas working,playing,andtalkingwillallmakeuseofnetworksinthefuture.Theproliferationofcomputernetworkshashadan effectontheprogressthathasbeenmadethroughouttheworld.Thenetworkswillgiverisetonewprotocolsandstandards, newapplicationswillbeconceivedup,andasaresultofthesechanges,ourliveswillcontinuetobetransformedandenhanced.A networkismadeupoftwoormorecomputersthatarelinkedtooneanotherbymeansofatelecommunicationssysteminorder tomakeiteasierforuserstoshareinformationandmakeuseofcommonresources.Ifbusinesseswereunabletoconnecttoa network,itwouldbeimpossibleforthemtoworktogetheronprojectsorshareresourceswithoneanother.Theabilityto forecastthecharacteristicsofcomplexnetworksrequiresfundamentalinformation,whichispartoftheprimitiveknowledge base.Itwouldappearthatelectroniccommunicationhasthepotentialtoevolveintoahighlyvaluabletoolfornetworking, particularlyifalargenumberofindividualswithsimilarinterestshadaccesstothetechnology.Specifically,thiswouldbethe caseiflargenumbersofpeoplewithsimilarinterestshadaccesstotheinternet.

REFERENCES

[1] A.Mangen,B.R.Walgermo,andK.Brønnick,“Readinglineartextsonpaperversuscomputerscreen:Effectsonreading comprehension,” Int. J. Educ. Res.,2013,doi:10.1016/j.ijer.2012.12.002.

[2] M.Jammal,T.Singh,A.Shami,R.Asal,andY.Li,“Softwaredefinednetworking:Stateoftheartandresearchchallenges,” Computer Networks 2014,doi:10.1016/j.comnet.2014.07.004.

[3] M.N.O.SadikuandC.M.Akujuobi,“Computernetworks,”in Computers, Software Engineering, andDigital Devices,2005.

[4] W.Liu,Z.Wang,X.Liu,N.Zeng,Y.Liu,andF.E.Alsaadi,“Asurveyofdeepneuralnetwork architecturesandtheir applications,” Neurocomputing,2017,doi:10.1016/j.neucom.2016.12.038.

[5] G. Edwards, “Methods Review paper Mixed-Method Approaches to Social Network Analysis,” ESRCNatl. Cent. Res. Methods,2010,doi:10.1108/17465640910978391.

[6] A.Hakiri,A.Gokhale,P.Berthou,D.C.Schmidt,andT.Gayraud,“Software-definednetworking:Challengesandresearch opportunitiesforfutureinternet,” Computer Networks.2014,doi:10.1016/j.comnet.2014.10.015.

[7] R. P. Richner, “Research Collection,” Brisk Bin. Robust Invariant Scalable Keypoints, 2011, doi: 10.3929/ethz-a010782581.

[8] C.Szegedy et al.,“Goingdeeperwithconvolutions,”in Proceedings of the IEEE Computer Society Conferenceon Computer Vision and Pattern Recognition,2015,doi:10.1109/CVPR.2015.7298594.

[9] A. Graves et al., “Hybrid computing using a neural network with dynamic external memory,” Nature,2016, doi: 10.1038/nature20101.

[10] N. M. M. K. Chowdhury and R. Boutaba, “A survey of network virtualization,” Comput. Networks, 2010, doi: 10.1016/j.comnet.2009.10.017.

[11] IEEE Computer Society, “IEEE Standard for Ethernet - Section Two,” IEEE Stand. Ethernet, 2012, doi: 10.1109/IEEESTD.2012.6419735.

BIOGRAPHIES

Rajesh Kumar SystemAnalyst

DepartmentofE-Governance UniversityGrantsCommissionNewDelhi-110001

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page373

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.