• الصفحة الرئيسية
  • إتصل بنا
  • سياسة الخصوصية
Logo
  • الرئيسية
  • أفكار
  • صحة
  • معلومات
  • عجائب وغرائب
  • تكنولوجيا
الصفحة الرئيسية IT Tutorials Networking Network Functions

Network Functions

الكاتب ahmed في 1:49 AM IT Tutorials Networking

Following are some of the important functions that a network needs to perform


1.       Switching
2.       Routing
3.       Flow control
4.       Speed
5.       Security
6.       Backup
7.       Failure monitoring
8.       Traffic monitoring
9.       Accountability
10.   Internetworking
11.   Network management

1.       Switching
Switching is defined as the ability of a network to connect different channels attached to each node to each other. This is essential for moving the traffic from incoming channel to the desired outgoing channels.

2.       Routing
Routing is defined as the ability of the network to select a path. The routing can be of different types, namely the fixed routing or alternative routing. The routing can also be classified as static routing or dynamic routing.

3.       Flow control
Flow control is the control over the rate of traffic. It is necessary in order to reduce the network congestion.

4.       Speed
The speed of different devices is different. Also the codes used by different devices are different from each other. In the digital networks, we have to allow the communication between all such devices.

5.       Security
Network security is defined as the ability of a network to disallow any unauthorized access to the network and the data travelling over it. We have to take the measures such as using passwords of use of data encryption and physical security.

6.       Backup
It is defined as the ability of a network to react to the component failures. Back up also includes sending to indicate failures or to route the traffic via some other path to avoid a failed component.

7.       Failure monitoring
It is the ability of the network to keep track of faulty and working components.

8.       Traffic monitoring
It is defined as the ability of the network to keep track of traffic levels. It is useful for the network design.

9.       Accountability
It is the ability of the network to keep a track of who is actually using the network. This is possible through the billing and charge back process. It gives us an understanding of the various users of a network. This is different from the traffic monitoring.

10.   Internetworking
When two or more networks are connected they are called internetwork of internet. Individual networks are joined into internetworks by the internetworking devices like bridges, routers and gateways.
The term internet (lower case i) is a generic term used to mean and interconnection of networks and Internet (upper case I) is the name of specific worldwide network. A common form of internet is a collection of LANs connected by a WAN. Internetworking is defined as performing the function needed for communicating with other networks in as internetwork.
The internetworking includes the following functions:
i)                    To provide routes for traffic.
ii)                   To allocate resources such as buffers and links

11.   Network management
The network management is not a one single function. It is instead a combination of many functions. It includes the following functions:
i)        To maintain the user’s list.
ii)       To maintain the addresses of the devices.
iii)     To keep an eye on changes in schedules of network.
iv)     Fault isolation.
Some of the network functions are carried out at each node and the others are needed to be carried our only by the first and the last node.


You Might also view the following Related Posts

  • Networking Fundamental
  • Network Topology
  • Network Functions
  • Network Reference Models (Network Architectures)
  • Internet Security & IP Security (IPSec)
  • Secure Socket Layer (SSL)

For more Posts: Click Here

شارك المقال :
Tweet
✚

مقالات ذات صلة

التالي
المشاركةالتالية
السابق
المشاركة السابقة

تحويل كودإخفاء محول الأكواد الإبتساماتإخفاء

شكرا لمشاركتنا رأيك
Subscribe to: Post Comments (Atom)
  • Facebook
  • twitter
  • googleplus
  • youtube
  • linkedin

الأكثر زيارة

  • Solved MCQ on Database Backup and Recovery in DBMS set-1
    1) Which of the following is not a recovery technique? A. Deferred update B. Immediate update C. Two-phase commit D. Recovery management 2)C...
  • 8 طرق طبيعية فعالة لعلاج حب الشباب
    حب الشباب يعد من اكثر الاشياء المزعجة التي يعاني منها الكثير من الناس  وفي هذا الموضوع سنتناول افضل الطرق الطبيعية للتخلص من حب ...
  • Best 10 ways of making money online
    Best 10 ways of making money online
    Making money online is not easy task if you don't know about the best and easy ways for that. Since, Internet is itself a virtual world,...
  • Top 10 List Of Stock Photography Sites To Earn Online
    I have already posted that, through stock photography sites you can earn online by sharing your original stocked photographs. You should po...
  • What are the different types of scheduling methods?
    Process scheduling is one way for a processor to handle n processes , by scheduling the execution process. Each process is executed one by ...
  • List of sites to create shortcut URL for your bog or site
    V3.com URL Forwarding: url or domain forwarding (also called 'redirect') transfers your traffic from your V3 Sub Domain to another ...
  • SQL MCQ Interview Questions With Answers set-3
    1. In SQL , which command is used to remove a stored function from the database? Cover of SQL Server magazine (Photo credit: Wikipedia ) A) ...
  • How to Create Oracle Forms by Using Wizard ?
    How to Create Oracle Forms by Using Wizard ?
    Oracle Forms is a technology developed by Oracle to develop database driven web applications quickly and easily. It is a component of Oracle...
  • Solved MCQ on Physical Layer in OSI Reference Model set-1
    1) Which of the following is/are the applications of twisted pair cables ...... A. In the local loop B. In the DSL line C. In the ISDN Netwo...
  • MCQ on c++ Programming with Answers set-6
    1. If a class C is derived from class B, which is derived from class A, all through public inheritance, then a class C member function can a...

الأقسام

  • Artificial Intelligence(AI)
  • Backlinking
  • Basic IT
  • Best List
  • Blogging Tips
  • C
  • C#
  • C++
  • Computer Architecture
  • Computer Fundamental
  • Computer Security
  • Computer/IT Officer Exam
  • CSS
  • Data Mining and Warehousing
  • Data Recovery Tools
  • Data Structure
  • Database Management System
  • E-commerce
  • E-government
  • Internet & Web Designing
  • IT Law
  • IT Tips and Tricks
  • IT Tutorials
  • Java
  • JavaScript
  • Keyword Research Tools
  • MIS
  • Multiple Choice Question (MCQ)
  • Networking
  • Online Earning
  • Online IT Jobs
  • Operating System
  • Oracle Forms and Reports
  • Programming Guide
  • Programming Language
  • SEO
  • Social Networking Sites
  • Software Download
  • Software Engineering
  • System Analysis and Design
  • Top List
  • VB.Net
  • صحة
  • عجائب وغرائب

الأرشيف

  • ►  2017 (4)
    • ►  November (3)
    • ►  October (1)
  • ►  2016 (5)
    • ►  April (5)
  • ►  2015 (87)
    • ►  August (1)
    • ►  July (8)
    • ►  June (13)
    • ►  May (2)
    • ►  April (2)
    • ►  March (4)
    • ►  February (20)
    • ►  January (37)
  • ►  2014 (77)
    • ►  December (31)
    • ►  November (4)
    • ►  September (4)
    • ►  August (11)
    • ►  July (8)
    • ►  June (2)
    • ►  May (2)
    • ►  April (2)
    • ►  March (2)
    • ►  February (7)
    • ►  January (4)
  • ►  2013 (132)
    • ►  December (11)
    • ►  November (6)
    • ►  October (4)
    • ►  September (6)
    • ►  August (16)
    • ►  July (9)
    • ►  June (9)
    • ►  May (12)
    • ►  April (13)
    • ►  March (23)
    • ►  February (6)
    • ►  January (17)
  • ▼  2012 (59)
    • ►  December (15)
    • ▼  November (20)
      • Secure Socket Layer (SSL)
      • Internet Security & IP Security (IPSec)
      • Solved MCQ of System Analysis and Design Set-3
      • Solved MCQ of System Analysis and Design Set-2
      • Solved MCQ of System Analysis and Design Set-1
      • Data model and Relational Database Model
      • Database Management System (DBMS)
      • E-commerce Security Issues
      • Risk of e-commerce
      • Benefits of e-commerce
      • Development of e-commerce
      • Graph Definition
      • Definition of Tree
      • Definition of Queues
      • Definition of Stack
      • Fundamental of data structures
      • Programming Language Definition
      • Network Reference Models (Network Architectures)
      • Network Functions
      • Network Topology
    • ►  October (21)
    • ►  September (3)

إنضم لنا

© 2017 أفكار جميع الحقوق محفوظة