SlideShare a Scribd company logo
1 of 19
Computer Network Architecture
• The design and setup of a computer network is called Computer Network Architecture. It is the
organization and arrangement of different network devices (i.e., the clients such as PCs, desktops,
laptops, mobiles etc.) at both physical and logical levels in order to fulfil the needs of the end
user/customer.
• The two most well-known Computer Network Architectures are:
8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 1
Peer-to-Peer
• The peers referred to here are the individual
devices linked together directly, having equal
responsibilities and equal powers without the
presence of any central authority.
• Due to the absence of a central device in
charge of tasks, this architecture is also known
as decentralized architecture.
• Each computer has special rights for resource
sharing, however this might cause issues if the
computer with the resource is unavailable.
• Useful in smaller environments with less
number of computers.
8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 2
Advantages of Peer to Peer Network
• No particular device is a client or a server, the
tasks and responsibilities of servers are
distributed among all the devices, which also
act as clients.
• Very inexpensive to set up, as there is no
requirement of a centralized server, and this
also ensures that in case of any failure in the
network, all unaffected devices continue to
operate normally.
• It’s simple to set up and maintain because each
computer runs independently.
8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 3
Disadvantages of Peer to Peer Network
• No centralized system, thus difficult to keep a
backup of the data in case of any fault.
• It has a security flaw because the computers
are self-managed.
• With a growth in the number of machines on
this network, performance, security, and
access may all become big issues
8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 4
Client-Server Architecture
• This is also known as centralized architecture,
as one powerful central computer is in charge
of serving all the requests from the client
computers. This central computer is a server.
• The client computers connect to the server as
and when they require the use of shared
resources or shared data. All of the shared data
is stored solely in the server, and not on any
other computer.
• A server handles all of the key tasks, such as
security and network administration.
• All of the clients interact with one another via
a server.
8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 5
Advantages of Client-Server Architecture
• This type of architecture is much easier to
scale since it is much more convenient to add
more server computers than configure the
network on each and every computer (as is the
case in peer-to-peer architecture).
• Much faster network speeds.
• Because a single server manages the shared
resources in a Client/Server network, there is
improvement in security.
• Backing up data is easy because of the
centralized system.
• The server provides a customized Network
Operating System (NOS) to offer resources to
a large number of users that want them.
8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 6
Disadvantages of Client-Server Architecture
• More prone to downtime because if the server
fails, none of the client machines are able to
get their requests served.
• Requirement of a dedicated network
administrator to handle all of the resources.
• It is far more expensive than P2P. This is due
to the requirement for a server with more
RAM, as well as the necessity for several
networking devices such as hubs, routers,
switches, and so on
8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 7
There are some more lesser-known computer
architectures
8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 8
Centralized Computing Architecture
One powerful computer is utilized to service one or more
low-powered computers in centralized computing
architecture. The nodes under the centralized architecture are
not linked; they are only connected to the server.
The centralized computing architecture includes the
following components:
• The primary, mainframe computer which handles all
processing.
• Terminals are connected to a central computer and function
as input/output devices.
• Linking of at least two mainframe computers together via
networks. Terminals communicate solely with the
mainframe and never with one another.
8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 9
Distributed Computing Architecture
A distributed architecture connects one or more nodes, which are
personal computers. It supports a variety of functions, including
file sharing, hardware sharing, and network sharing. The nodes
in the distributed architecture can manage their own data and
rely on the network for administration rather than data
processing.
The following components are found in distributed computing
architecture:
• Different computers are effective at performing independently.
• Completion of tasks on multiple computers locally.
• Networks enable computers to exchange data and services, but
they do not offer processing help.
8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 10
Collaborative Computing Architecture
The collaborative computing architecture is a hybrid of
centralized and decentralized computing. Individual
members of a network can process their users’
fundamental needs under the collaborative model.
A database server, such as an MSSQL server or an
ORACLE server, for example, observes or manages all
database-related operations on all network nodes. The
model will, however, execute requests that are not from
the database
8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 11
Summary
8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 12
• we have discussed the different types of architecture of computer network, such as peer to peer
architecture and client-server architecture, along with the advantages and disadvantages of each.
We have also discussed some architecture models such as: centralized computing, distributed
computing, collaborative computing.
8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 13
OSI Model
• OSI stands for Open System Interconnection is a reference model that describes how information
from a software application in one computer moves through a physical medium to the software
application in another computer.
• OSI consists of seven layers, and each layer performs a particular network function.
• OSI model was developed by the International Organization for Standardization (ISO) in 1984, and
it is now considered as an architectural model for the inter-computer communications.
• OSI model divides the whole task into seven smaller and manageable tasks. Each layer is assigned
a particular task.
• Each layer is self-contained, so that tas.k assigned to each layer can be performed independently
8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 14
Characteristics of OSI Model
• The OSI model is divided into two layers: upper layers and
lower layers.
• The upper layer of the OSI model mainly deals with the
application related issues, and they are implemented only in
the software. The application layer is closest to the end user.
Both the end user and the application layer interact with the
software applications. An upper layer refers to the layer just
above another layer.
• The lower layer of the OSI model deals with the data
transport issues. The data link layer and the physical layer
are implemented in hardware and software. The physical
layer is the lowest layer of the OSI model and is closest to
the physical medium. The physical layer is mainly
responsible for placing the information on the physical
medium.
8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 15
Functions of the OSI Layers
There are the seven OSI layers. Each layer has different
functions. A list of seven layers are given below:
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 16
8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 17
Human–machine interfaces
A human–machine interface is built on either a microprocessor
or an FPGA chipset, which requires its software to include at
least an application program and an operating system.
The human–machine interface (HMI) software enables
operators to manage industrial and process control machinery
via a computer-based graphical user interface (GUI). There are
two basic types of HMI software: supervisory level and
machine level. The supervisory level is designed for control
room environment and used for system control and data
acquisition (SCADA) a process control application which
collects data from sensors on the shop floor and sends the
information to a central computer for processing.
8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 18
The cutting area is an important section in the float glass production
line, which includes many productions control equipment, such as
longitudinal cutting, transverse cutting, conveying roller table, etc. The
main control part of the whole system is PLC, and the monitoring will
be undertaken by HMI. Is it required to use both HMI and PLC, As
opposed to just a PLC in this Production line? Justify your statement.
8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 19

More Related Content

Similar to robotics

CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7Chaing Ravuth
 
Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp ciscoJheyson Ayala
 
Elements of Systems Design.ppt
Elements of Systems Design.pptElements of Systems Design.ppt
Elements of Systems Design.pptKRISHNARAJ207
 
Grid and cluster_computing_chapter1
Grid and cluster_computing_chapter1Grid and cluster_computing_chapter1
Grid and cluster_computing_chapter1Bharath Kumar
 
Types of Distributed System
Types of Distributed SystemTypes of Distributed System
Types of Distributed SystemAshish KC
 
Cloud Module 1.pptx
Cloud Module 1.pptxCloud Module 1.pptx
Cloud Module 1.pptxJohn Veigas
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  dannyijwest
 
Introduction of Cloud Computing
Introduction of Cloud ComputingIntroduction of Cloud Computing
Introduction of Cloud ComputingRahul Hada
 
Week 01- Lecture 1.pptx
Week 01- Lecture 1.pptxWeek 01- Lecture 1.pptx
Week 01- Lecture 1.pptxEngr Saghir
 
ch2-What are Connections?
ch2-What are Connections?ch2-What are Connections?
ch2-What are Connections?ssuser06ea42
 
A Comparative Study: Taxonomy of High Performance Computing (HPC)
A Comparative Study: Taxonomy of High Performance Computing (HPC) A Comparative Study: Taxonomy of High Performance Computing (HPC)
A Comparative Study: Taxonomy of High Performance Computing (HPC) IJECEIAES
 
_Cloud_Computing_Overview.pdf
_Cloud_Computing_Overview.pdf_Cloud_Computing_Overview.pdf
_Cloud_Computing_Overview.pdfTyStrk
 
Week 1 Lecture_1-5 CC_watermark.pdf
Week 1 Lecture_1-5 CC_watermark.pdfWeek 1 Lecture_1-5 CC_watermark.pdf
Week 1 Lecture_1-5 CC_watermark.pdfJohn422973
 
Network archetecture
Network archetectureNetwork archetecture
Network archetectureshah fahad
 
NECOS - Concertation Meeting EUBrasilCloudFORUM
NECOS -  Concertation Meeting EUBrasilCloudFORUMNECOS -  Concertation Meeting EUBrasilCloudFORUM
NECOS - Concertation Meeting EUBrasilCloudFORUMEUBrasilCloudFORUM .
 
introduction to cloud computing for college.pdf
introduction to cloud computing for college.pdfintroduction to cloud computing for college.pdf
introduction to cloud computing for college.pdfsnehan789
 

Similar to robotics (20)

CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7
 
Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp cisco
 
Elements of Systems Design.ppt
Elements of Systems Design.pptElements of Systems Design.ppt
Elements of Systems Design.ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A01260104
A01260104A01260104
A01260104
 
Grid and cluster_computing_chapter1
Grid and cluster_computing_chapter1Grid and cluster_computing_chapter1
Grid and cluster_computing_chapter1
 
Types of Distributed System
Types of Distributed SystemTypes of Distributed System
Types of Distributed System
 
Cloud Module 1.pptx
Cloud Module 1.pptxCloud Module 1.pptx
Cloud Module 1.pptx
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
A STUDY OF GRID COMPUTING AND CLOUD COMPUTING
A STUDY OF GRID COMPUTING AND CLOUD COMPUTING A STUDY OF GRID COMPUTING AND CLOUD COMPUTING
A STUDY OF GRID COMPUTING AND CLOUD COMPUTING
 
Introduction of Cloud Computing
Introduction of Cloud ComputingIntroduction of Cloud Computing
Introduction of Cloud Computing
 
Week 01- Lecture 1.pptx
Week 01- Lecture 1.pptxWeek 01- Lecture 1.pptx
Week 01- Lecture 1.pptx
 
ch2-What are Connections?
ch2-What are Connections?ch2-What are Connections?
ch2-What are Connections?
 
Week2
Week2Week2
Week2
 
A Comparative Study: Taxonomy of High Performance Computing (HPC)
A Comparative Study: Taxonomy of High Performance Computing (HPC) A Comparative Study: Taxonomy of High Performance Computing (HPC)
A Comparative Study: Taxonomy of High Performance Computing (HPC)
 
_Cloud_Computing_Overview.pdf
_Cloud_Computing_Overview.pdf_Cloud_Computing_Overview.pdf
_Cloud_Computing_Overview.pdf
 
Week 1 Lecture_1-5 CC_watermark.pdf
Week 1 Lecture_1-5 CC_watermark.pdfWeek 1 Lecture_1-5 CC_watermark.pdf
Week 1 Lecture_1-5 CC_watermark.pdf
 
Network archetecture
Network archetectureNetwork archetecture
Network archetecture
 
NECOS - Concertation Meeting EUBrasilCloudFORUM
NECOS -  Concertation Meeting EUBrasilCloudFORUMNECOS -  Concertation Meeting EUBrasilCloudFORUM
NECOS - Concertation Meeting EUBrasilCloudFORUM
 
introduction to cloud computing for college.pdf
introduction to cloud computing for college.pdfintroduction to cloud computing for college.pdf
introduction to cloud computing for college.pdf
 

Recently uploaded

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 

Recently uploaded (20)

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 

robotics

  • 1. Computer Network Architecture • The design and setup of a computer network is called Computer Network Architecture. It is the organization and arrangement of different network devices (i.e., the clients such as PCs, desktops, laptops, mobiles etc.) at both physical and logical levels in order to fulfil the needs of the end user/customer. • The two most well-known Computer Network Architectures are: 8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 1
  • 2. Peer-to-Peer • The peers referred to here are the individual devices linked together directly, having equal responsibilities and equal powers without the presence of any central authority. • Due to the absence of a central device in charge of tasks, this architecture is also known as decentralized architecture. • Each computer has special rights for resource sharing, however this might cause issues if the computer with the resource is unavailable. • Useful in smaller environments with less number of computers. 8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 2
  • 3. Advantages of Peer to Peer Network • No particular device is a client or a server, the tasks and responsibilities of servers are distributed among all the devices, which also act as clients. • Very inexpensive to set up, as there is no requirement of a centralized server, and this also ensures that in case of any failure in the network, all unaffected devices continue to operate normally. • It’s simple to set up and maintain because each computer runs independently. 8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 3
  • 4. Disadvantages of Peer to Peer Network • No centralized system, thus difficult to keep a backup of the data in case of any fault. • It has a security flaw because the computers are self-managed. • With a growth in the number of machines on this network, performance, security, and access may all become big issues 8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 4
  • 5. Client-Server Architecture • This is also known as centralized architecture, as one powerful central computer is in charge of serving all the requests from the client computers. This central computer is a server. • The client computers connect to the server as and when they require the use of shared resources or shared data. All of the shared data is stored solely in the server, and not on any other computer. • A server handles all of the key tasks, such as security and network administration. • All of the clients interact with one another via a server. 8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 5
  • 6. Advantages of Client-Server Architecture • This type of architecture is much easier to scale since it is much more convenient to add more server computers than configure the network on each and every computer (as is the case in peer-to-peer architecture). • Much faster network speeds. • Because a single server manages the shared resources in a Client/Server network, there is improvement in security. • Backing up data is easy because of the centralized system. • The server provides a customized Network Operating System (NOS) to offer resources to a large number of users that want them. 8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 6
  • 7. Disadvantages of Client-Server Architecture • More prone to downtime because if the server fails, none of the client machines are able to get their requests served. • Requirement of a dedicated network administrator to handle all of the resources. • It is far more expensive than P2P. This is due to the requirement for a server with more RAM, as well as the necessity for several networking devices such as hubs, routers, switches, and so on 8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 7
  • 8. There are some more lesser-known computer architectures 8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 8
  • 9. Centralized Computing Architecture One powerful computer is utilized to service one or more low-powered computers in centralized computing architecture. The nodes under the centralized architecture are not linked; they are only connected to the server. The centralized computing architecture includes the following components: • The primary, mainframe computer which handles all processing. • Terminals are connected to a central computer and function as input/output devices. • Linking of at least two mainframe computers together via networks. Terminals communicate solely with the mainframe and never with one another. 8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 9
  • 10. Distributed Computing Architecture A distributed architecture connects one or more nodes, which are personal computers. It supports a variety of functions, including file sharing, hardware sharing, and network sharing. The nodes in the distributed architecture can manage their own data and rely on the network for administration rather than data processing. The following components are found in distributed computing architecture: • Different computers are effective at performing independently. • Completion of tasks on multiple computers locally. • Networks enable computers to exchange data and services, but they do not offer processing help. 8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 10
  • 11. Collaborative Computing Architecture The collaborative computing architecture is a hybrid of centralized and decentralized computing. Individual members of a network can process their users’ fundamental needs under the collaborative model. A database server, such as an MSSQL server or an ORACLE server, for example, observes or manages all database-related operations on all network nodes. The model will, however, execute requests that are not from the database 8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 11
  • 12. Summary 8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 12 • we have discussed the different types of architecture of computer network, such as peer to peer architecture and client-server architecture, along with the advantages and disadvantages of each. We have also discussed some architecture models such as: centralized computing, distributed computing, collaborative computing.
  • 13. 8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 13
  • 14. OSI Model • OSI stands for Open System Interconnection is a reference model that describes how information from a software application in one computer moves through a physical medium to the software application in another computer. • OSI consists of seven layers, and each layer performs a particular network function. • OSI model was developed by the International Organization for Standardization (ISO) in 1984, and it is now considered as an architectural model for the inter-computer communications. • OSI model divides the whole task into seven smaller and manageable tasks. Each layer is assigned a particular task. • Each layer is self-contained, so that tas.k assigned to each layer can be performed independently 8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 14
  • 15. Characteristics of OSI Model • The OSI model is divided into two layers: upper layers and lower layers. • The upper layer of the OSI model mainly deals with the application related issues, and they are implemented only in the software. The application layer is closest to the end user. Both the end user and the application layer interact with the software applications. An upper layer refers to the layer just above another layer. • The lower layer of the OSI model deals with the data transport issues. The data link layer and the physical layer are implemented in hardware and software. The physical layer is the lowest layer of the OSI model and is closest to the physical medium. The physical layer is mainly responsible for placing the information on the physical medium. 8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 15
  • 16. Functions of the OSI Layers There are the seven OSI layers. Each layer has different functions. A list of seven layers are given below: 1. Physical Layer 2. Data-Link Layer 3. Network Layer 4. Transport Layer 5. Session Layer 6. Presentation Layer 7. Application Layer 8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 16
  • 17. 8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 17
  • 18. Human–machine interfaces A human–machine interface is built on either a microprocessor or an FPGA chipset, which requires its software to include at least an application program and an operating system. The human–machine interface (HMI) software enables operators to manage industrial and process control machinery via a computer-based graphical user interface (GUI). There are two basic types of HMI software: supervisory level and machine level. The supervisory level is designed for control room environment and used for system control and data acquisition (SCADA) a process control application which collects data from sensors on the shop floor and sends the information to a central computer for processing. 8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 18
  • 19. The cutting area is an important section in the float glass production line, which includes many productions control equipment, such as longitudinal cutting, transverse cutting, conveying roller table, etc. The main control part of the whole system is PLC, and the monitoring will be undertaken by HMI. Is it required to use both HMI and PLC, As opposed to just a PLC in this Production line? Justify your statement. 8/22/2023 Dept. of Mechanical Engineering, NMAMIT,NITTE 19