Computer Network Essay Example

A computing network is a group of computers connected together through a set of nodes. The interconnection of the computers is executed through cabling through the use of a set of Ethernet cables or either wireless connections or by radio waves connection (Taylor & Christine). The interconnected computers can be able to share the files through the based connection, and they can share data using the peripheral connections such as printers, the web connection as well as file servers (Maran et al.). The purpose of a computer network is to allow one computer to do multitasking developments and it can be broken down into a variety of topologies through a series of connecting. There are a variety of topologies which can be used to develop protocols and topology of a computer network, and they include the star topology, bus topology as well as the collapsed ring topology (Maran et al.).

Star topology— this is a network connection which uses the central node of the computer to develop the design whereby the computers share information from the central node (Maran et al.). The star topology I interconnected in a way where in the case of cable breakage the other computer can be able to operate with minimal problems.

Bus topology— this type of computer network uses one cable to share data with a series of computers and the computer connected at the end of the node has to receive data run through all the computers connected.

Collapsed Ring Topology— the connected network uses a single ring which is connected through a single cable, but the computers at the end of the node are interconnected (Maran et al.
). Therefore, the computers can be able to share information without running through all the computers connected Network Topologies

A network topology is a design through which a series of systems are connected through the use of nodes as well as connecting lines. There are two main types of a network topology which involve the physical as well as logical topology.

Physical Topology- this kind of topology indicates the directive geometric layout which is exhibited in the workstation. The topologies in the physical network include bus, star, token ring, ring, mesh and tree bus networks. They are indicated in the diagram below.

at 2 files..

Figure 1: physical topologies (Maran et al.).

Logical Topology— this type of topology defines the path through which the flow of the signals is flowing from one node to another. A network in this protocol can operate in physical topology but with a logic expression in terms of another system. The physical layout of the network can be developed in a star configuration but get executed in a bus configuration or a ring strategic development (Maran et al.).

Network hardware

These are the portable devices through which a computer can be able to transfer the information through devices through the interaction of the peripherals within the system
. The relative units in this case act as mediators of the information in a chain where the last element receiving the information over the network is called the data terminal equipment. NIC

Network Interface Card is a connection where the hardware components of the computer are able to develop an interface through which the series of connected computers can be able to connect to a network. The NIC card is applied in the topology to enable the computers to access both wireless connections as well as wired connections (Taylor & Christine).

NIC, can aloo refer to a network interface controller since it is used to control the protocol of computer communication as well as a network adapter card.

A hub is a standard device which is required in networking to interconnect a variety of computers or a series of network devices through the use of wireless communication strategy. Contrary to the operation of a switch or the execution of a router since it does not apply the intelligence as well as routeing cable in an attempt to send the information required for the selected connections (Maran et al.). The hubs are responsible for detecting the collisions within a network and information breakdown over the ports. The hubs are used to breakdown information or extend it over a series of computers through USB
, ram or over a WAN network. Router

A router is defined as a network device which shares a set of data packets over a series computer through either a wired or a wireless connection. The purpose of a router is to direct the network in the direction necessary using the data packets (Taylor & Christine). Information is shared over a series of nodes through loops which lead the internetwork through to the destination.

at 2 files.. 1

Figure 2: A router developed in 1987 by Cisco


A firewall is simply defined as network security protocol where it can be in either hardware or software, and it is used to regulate the traffic for both incoming and outgoing data. The firewall is used as a link between trusted networks to an untrusted network. The network
uses a positive control model for the execution of protocol for allowing the trusted networks to flow through the connection as per the regulation of the firewall policy. Ethernet Technology Network Design and Troubleshooting

Ethernet technology uses a protocol where the specifications defined in the IEEE 802.3 and it uses a series of cables to transfer data over the internet. Ethernet technologies are used for the high traffic flow as well as significant data rates strategic decisions (Rooney). The troubleshooting strategy by Ethernet technologies involves
listening to signal disruption and determining collisions through the process of truncating the signal (Taylor & Christine). The Ethernet Frame Format Scenarios

An Ethernet frame is a network protocol which sends a packet of data over the network through the use of a different
structure of an Ethernet link. The format scenarios of Ethernet frame involves the use of a preamble as well as a start frame delimiter also referred to as an SFD. The components are part of the physical layer of each of the Ethernet frames.

The carrier-sense multiple access is a device used for detecting collisions through the control of the media access, and it is frequently utilised in the early Ethernet technology control most used for LAN.

at 2 files.. 2

Figure 3: CSMA/CD (Rooney).The TCP/IP Protocols

A transmission control protocol and the internet protocols can be defined as the use of the simplest language to communicate over the web. The protocols are used as the basis for communication over a wide variety of networks which are private in nature. Below is a diagram of a transmission control protocol example

at 2 files.. 3
Switching and Routing

Switching refers to data transfer over a network where the data obtained transferred from one source to another through the defined MAC address. The switching process is done within a specific
network, unlike the routing process which occurs over a certain network. The routing
process is also a transferee of data over a network through the use of a defined IP address. Network Management and Security

The internet and computer systems require having an autonomous network which is well managed and controlled through network management. Network management is a series of processes involving organisation, deployment, and integration as well as monitoring strategic moves through network control as well as its components.

Network management is implemented through the use of hardware components such as Bit error rate tester, software and systems developed by Microsoft for their products such as the Ping and ifconfig commands (Rooney).

Security is the protection of data and information sent over a network or over the internet. Safety is an important aspect as it reduces the probability of data getting into wrong hands and developing a trusted ring. Measures to implement security involve encryption of data and decryption for authorised personnel, use of passwords and limiting of access to information through block commands.

Works Cited

Maran, Ruth, and Kelleigh Johnson. Computers. Mississauga, Ont: MaranGraphics, 2005. Print

Rooney, Anne. Computers. Mankato, MN: Smart Apple Media, 2006. Print.

Taylor-Butler, Christine. Computers. , 2017. Print.