0% found this document useful (0 votes)
49 views

Assignment 3

A computer network consists of two or more connected computers that allow sharing of resources and exchange of information. The goals of computer networks include information and resource sharing between distributed organizations, retrieving remote information from databases, fast interpersonal communication through email and social media, online commerce, highly reliable systems through distributed data storage, and cost-effective systems compared to standalone computers. Network applications include accessing remote programs and databases as well as communication facilities. For a network to function well, it must provide good performance in terms of speed, high reliability by minimizing failures and quick recovery, and security against unauthorized access and data damage.

Uploaded by

moxita verma
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views

Assignment 3

A computer network consists of two or more connected computers that allow sharing of resources and exchange of information. The goals of computer networks include information and resource sharing between distributed organizations, retrieving remote information from databases, fast interpersonal communication through email and social media, online commerce, highly reliable systems through distributed data storage, and cost-effective systems compared to standalone computers. Network applications include accessing remote programs and databases as well as communication facilities. For a network to function well, it must provide good performance in terms of speed, high reliability by minimizing failures and quick recovery, and security against unauthorized access and data damage.

Uploaded by

moxita verma
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

COMPUTER

Assignment 3

Question. What is a Network? What are its goal and their applications?

Answer. A network consists of two or more nodes (e.g. computers) that are linked in order
to share resources (such as printers and CDs), exchange files, or allow electronic
communications. The computers on a network may be linked through cables, telephone lines,
radio waves, satellites, or infrared light beams.
A system of interconnected computers and computerized peripherals such as printers is called
computer network. This interconnection among computers facilitates information sharing
among them. Computers may connect to each other by either wired or wireless media.

Goals of Computer Network

Computer networks have become invaluable to organizations as well as individuals. Some of


its goals are as follows:
1. Information and Resource Sharing: Computer networks allow organizations having
units which are placed apart from each other, to share information in a very effective manner.
Programs and software in any computer can be accessed by other computers linked to the
network. It also allows sharing of hardware equipment, like printers and scanners among
varied users.
2. Retrieving Remote Information: Through computer networks, users can retrieve remote
information on a variety of topics. The information is stored in remote databases to which the
user gains access through information systems like the World Wide Web.
3. Speedy Interpersonal Communication: Computer networks have increased the speed and
volume of communication like never before. Electronic Mail (email) is extensively used for
sending texts, documents, images, and videos across the globe. Online communications have
increased by manifold times through social networking services.
4. E-Commerce: Computer networks have paved way for a variety of business and
commercial
transactions online, popularly called e-commerce. Users and organizations can pool funds,
buy or sell items, pay bills, manage bank accounts, pay taxes, transfer funds and handle
investments
electronically.
5. Highly Reliable Systems: Computer networks allow systems to be distributed in nature,
by the virtue of which data is stored in multiple sources. This makes the system highly
reliable. If a failure occurs in one source, then the system will still continue to function and
data will still be available from the other sources.
6. Cost–Effective Systems: Computer networks have reduced the cost of establishment of
computer systems in organizations. Previously, it was imperative for organizations to set up
expensive mainframes for computation and storage. With the advent of networks, it is
sufficient to set up interconnected personal computers (PCs) for the same purpose.

Network Applications:

 Access to remote programs.


 Access to remote databases.
 Value-added communication facilities.

Some more applications:

A network must be able to meet a certain number of criteria. The most important of these are
performance, reliability, and security.

Performance

Performance can be measured in many ways, including transit time and response time.
Transit time is the amount of time required for a message to travel from one device to
another. Response time is the elapsed time between an inquiry and a response. The
performance of a network depends on a number of factors, including the number of users, the
type of transmission medium, the capabilities of the connected hardware, and the efficiency
of the software.

Performance is often evaluated by two networking metrics: throughput and delay. We often
need more throughputs and less delay. However, these two criteria are often contradictory. If
we try to send more data to the network, we may increase throughput but we increase the
delay because of traffic congestion in the network
Reliability

In addition to accuracy of delivery, network reliability is measured by the frequency of


failure, the time it takes a link to recover from a failure, and the network's robustness in a
catastrophe.

Security

Network security issues include protecting data from unauthorized access, protecting data
from damage and development, and implementing policies and procedures for recovery from
breaches and data losses.

You might also like