Thursday, 22 September 2016

Internet Technology (Building a Model)

Hello and a very good day to all readers! My friends and I have been working on our model for about a month now. We are so happy that we have finally completed the model. As for the network architecture, we use client server network. We classify our model as local area network (LAN). Next, for the topology, we go for star network topology. Below are the definition what we apply on our model.

Client/Server Network
- One or more computers act as a server that provide services, to the other computer on the network (clients) which request services from the server.

Local Area Network (LAN) 
- Is a network that connects computers and devices in a limited geographical area such as a home, school computer laboratory and office building.

Star Network Topology
- Consists of a central device (hub/switch) where all the nodes are connected to it using cables. Data travels from one node to another passes through the hub or switch until it reaches the destination node. Hub: Data travels to all the nodes and only the recipient node accepts the data. Switch: Data travels straight to the recipient.


Based on figure 2, we make the personal computer as our server while others as clients. The model consists of switch. Our reason of choosing star network topology is because it has many advantages. The advantages are, if one node fails, it does not affect the rest of the star topology and adding or removing nodes will cause little or no disturbance to the rest of the network. As mentioned earlier, we classify our network as LAN. LAN allow users on the network to share resources, such as printers, large hard drives,data, programs, in a limited geographical area. Plus, LAN reduces cost because the resources can be shared. We imagine our model is in an office.

The client server architecture allows a server to store an organization's email messages. Client server network works with any size of networks and does not tend to slow down with heavy use. In addition, the security is more advanced than peer-to-peer network, you can have passwords to own individual profiles so that nobody can access anything when they want.
Figure 1
Figure 2