Skip to main content

Newer Post or latest post

Li-Fi vs Wi-Fi: A Battle of Light and Waves

Li-Fi vs Wi-Fi: A Battle of Light and Waves Li-fi is a light fidelity device that supports only the infrared and other lighting systems to transfer the data to the device which is used to receive from the sender device. Wifi is a wireless fidelity device that supports the radio waves to transfer the data to the wifi device which is used to receive the wifi signals at the limited ranges due to the device version capacity. Introduction to the computer system and computer applications related topics are listed following below here: Li-Fi vs Wi-Fi: A Battle of Light and Waves Let’s discuss the computer system related topic and questions above listed and their answers are following below here: Li-Fi vs Wi-Fi: A Battle of Light and Waves There are some points on the computer system and data communication related to the topic of “Li-Fi vs Wi-Fi: A Battle of Light and Waves” following below here: Lifi based data communication system:- Li-Fi is a light based signal data transmission ...

Computer network architecture and its examples

What is computer network architecture and its examples?

Computer network architecture is a model of the computer network that contains how to connect the computer system with the network devices using the cable which are also in the different types of categories such as rj 45, cad 6, ethernet cable, usb cable etc.

The computer network architecture also included the storage device and data transmission model for how to transfer the data from one computer system to the another computer system using internet which type of medium such as:- wireless or wired connection medium. It is major difference of medium but there are so many layers that are used to different types of work for network data transmission and network communication system from one to another computer system using the network device.


Introduction to the computer system related topic of network architecture and the topic is following below here:


What is computer network architecture and its examples?


Let’s discuss this computer related topic of computer network architecture and their points are following below here:


In this topic you can learn about the computer system and computer network architecture related topic that contains the computer network architecture is a model which is made up of network device, security of network database and network device, processing system of database using the server side scripting program to manipulate, control and define database in the computer network model.


Computer network architecture and its examples In the image shows the diagram of bus topology with the network architecture
In the image shows the diagram of bus topology with the network architecture


Where the client is used the services that provided to the client used on the computer system through different types of network medium such as:- wireless or wired connection in the majority of types.

The network architecture also included the security model for how to manage the security database of the user who has also the database which is used as a security database to verify the data when the user access their account on the network system and other types of management of database and hardware resources that are connected to the network model is included in the network architecture of computer system.


What is computer network architecture and its examples?

There are some points on the computer system and network architecture of computers related to the topic of "What is computer network architecture and its examples?" following below here:


  • It is a structure of physical connection of computer network components
  • The architecture included the protocols of connection of two or more than two computers
  • Computer users are able to send the message to each other using network architecture
  • Computer network architecture also included the security rules that followed by the users


Let's discuss the points above about the computer system and network architecture of computers related to the topic of "What is computer network architecture and its examples?" explanation following below here:


It is a structure of physical connection of computer network components

It is a structure of physical connection of the computer network components that means the components are hardware devices which are used in the computer network and its architecture.

Such as network devices: server, router, hub etc. Cable of data, computer system, smart mobile device, gateway, etc.

These are the types of network architecture components which are used for communication systems and data sharing between two or more than two users.

Network architecture is designed for the compatibility of the users and sharing data techniques.

Network architectures have their different types of network such as topology models of network, metropolitan area network, wide area network etc.

Network architecture also includes the layer techniques that provide the different types of functionality such as application layer is used for web page, web site, web application interaction between two or more than two users etc. And more layers are working for the network architecture.


The architecture included the protocols of connection of two or more than two computers

The architecture included in the network, the protocol which is used to make a proper way to use the network system on the computer and smart mobile devices.

The protocols mean the rule of network systems and architecture that provide a model and make the discipline in the network system.

The rules which define the model for how to connect the network components in the model and an architecture of a network system and the aim of network architecture is to share database model, information, data, relational based files, object based files are used to share in the communication system in the network system and architecture.

Using the network device there so many computer systems can connect in the network architecture or model according to the available port of the computer system connection with the network device such as:- ethernet port is used to connect the data cable in the network architecture model to which provide the ability of sharing data between two or more than two computers.


Computer users are able to send the message to each other using network architecture

Computer user are able to send the message to each other using network architecture that means the architecture is a type of model of computer network system that designed according to the area of the department and it's widths and length, also it area is also customise according to the network architecture which is properly works in the physical level.

The hardware devices of the network architecture are used to reduce the traffic loads of the data sharing in the network model.

Such as more network devices to make it faster to send and receive messages and operate with the computer system.

Where the software is also used for reducing the traffic loads on the network device during the transmission of data.

The software reduces the traffic loads for example:- client side interface is developed by the programming of client side which works on a web page not on the network device server to process the server side scripting interface as working backend of the webpage and website to process the database.

Suppose the website take the input data type in th integer form and add with the two or value of the variable so it is works on a webpage to process it and send the process data from the client side scripting language and to the server side program to process the data only send the data that make a reduces of processing loads on the website which is makes traffic loads to protects from the hang condition of the network device.


Computer network architecture also included the security rules that followed by the users

Computer network architecture also included the security rules that were followed by the users. That means the security model included the two attributes of security to protect the database and verify the user on the network system.

The network security rule is to control the database which is stored in the memory of the computer system.

The network operating system provides an interface of the security model which contains two attributes: username and password.

Another higher security layer contains security code verified by the mobile devices by sending a message to the users mobile devices and it is a manual process to verify by the user to get a security code to make a verification code into the website or computer network architecture for the user to protect their database on the network architecture.

Comments

Popular posts from this blog

what are the function of the joystick and light pen?

Q 1. State the functions of a joystick and that of a light pen? Introduction to the joystick device, virtual or soft joystick tool, game controller, virtual or soft game controller and light pen topics are covered below here: Joystick What is the meaning of the joystick in computer? What is the joystick as a peripheral device in the computer system? What is main use of joystick in computer system peripheral devices? What is the purpose of the joystick in computer? What are the types of joysticks in the peripheral system for game purpose? What do you mean by analog joystick in peripheral system? What are the advantages of analog joystick device? What are the disadvantages or drawbacks of analog joystick device? What are the uses of joysticks? What are top 5 uses of joystick device in the computer system peripheral? Where is the use of joystick? How to connect the joystick for game in computer system? Can you connect the joystick to the laptop? Why do n...

Describe the different ways of mobile communication systems for users?

Describe the different ways of mobile communication systems for users? Mobile communication makes it easy to connect with many users through the different types of ways to provide the communication system, share the information to each other and make communication between two or more users through the mobile devices. Such as:- an internet service provides many ways to connect the users in the text, audio, image and video file or data connections sharing the information to each other using these data types to communicate to each other. The user needs to communicate with the other user on the data communication system application software provide the process the data to send the file or message to the user who is connected to the communication application software through their user ID name or email to communicate to share the text or audio file or video file or image file also can be shared into the application software to the user such as:- if the application software provide the chatt...

I am exploring the points on if data centers uses a SAN how it is bigger than SANs?

Is data centers using a SAN and how much are data centers bigger than SANs? The data centers are used to provide the big data analytics for the website and companies to provide the processed data for making different types of informed decisions at a large amount of data processing in the data centers because it is a very big area to install into the building and many buildings if it requires to install into many buildings. The large requirement of data centers installation is necessary because the data centers uses many types of computers, storage devices, network attached storages, network devices such as:- servers, switches, hubs, routers, bridges, repeaters, gateways etc. data cables and different types of network equipment to use in the data centers to make a large area of data processing for the companies uses and major projects for website at larger industrial area for website for data processing. The storage area network is used to provide the high performance of data processing...