Computer-based systems

Any system which uses a microprocessor or computer for controlling or executing the task it is designed to perform can be called a computer based system. In complex systems computers play a major role. While complex physical systems and sophisticated software systems can help people to lead healthier and more enjoyable lives, reliance on these systems can also result in loss of money, time, and life when these systems fail. Much of the complexity of these systems is due to integration of information technology into physical and human activities. Such integration dramatically increases the interdependencies among components, people, and processes, and generates complex dynamics not taken into account in systems of previous generations. Engineers with detailed understanding both of the application domain and computer electronics, software, human factors, and communication are needed to provide a holistic approach to system development so that disasters do not occur. Engineering activities The computer-based systems engineer develops a system within a system; the properties of the former have pervasive effects throughout the larger system. The computer-based system consists of all components necessary to capture, process, transfer, store, display, and manage information. Components include software, processors, networks, buses, firmware, application-specific integrated circuits, storage devices, and humans (who also process information). Embedded computer-based systems interact with the physical environment through sensors and actuators, and also interact with external computer-based systems (see illustration). The computer-based systems engineer must have a thorough understanding of the system in which the computer-based system is embedded, for example an automobile, medical diagnostic system, or stock exchange. Model-based development Models are necessary in systems engineering as they support interdisciplinary communication, formalize system definition, improve analysis of trade-offs and decision making, and support optimization and integration. The use of models can reduce the number of errors in the design and thus the system, reduce engineering effort, and preserve knowledge for future efforts. Maintaining models with up-to-date knowledge is a major problem as most systems are not generated from models, although this should be an industry goal. During the later stages of system development and testing, significant schedule pressure makes it difficult to keep the models and manually developed software consistent A computer network, often simply referred to as a network, is a collection of hardware components and computers interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network.

Linking output systems like teletypewriters to computers were an interest at the Advanced Research Projects Agency (ARPA) when. The same year. Paul Baran and Donald Davies independently conceptualized and developed network systems which used packets that could be used in a network between computer systems. 1965 Thomas Merrill and Lawrence G.e. Licklider was hired and developed a working group he called the "Intergalactic Network". scale. i. The first widely used telephone switch that used true computer control was introduced by Western Electric in 1965. started in the late 1950s. researchers at Dartmouth developed the Dartmouth Time Sharing System for distributed users of large computer systems. topology. Communications protocols define the rules and data formats for exchanging information in a computer network. The commercial airline reservation system semi-automatic business research environment (SABRE) went online with two connected mainframes in 1960. Early networks of communicating computers included the military radar system Semi-Automatic Ground Environment (SAGE). a research group supported by General Electric and Bell Labs used a computer to route and manage telephone connections. communications protocol used.R. telecommunications. George Stibitz used a Teletype machine to send instructions for a problem set from his Model at Dartmouth College to his Complex Number Calculator in New York and received results back by the same means. J. and the Internet Protocol Suite.[2][3] In 1964. for data communication between multiple networks. a hardware and Link Layer standard that is ubiquitous in local area networks. Many of the social behaviors seen in today's Internet were demonstrably present in the 19th century and arguably in even earlier networks using visual signals. History: Before the advent of computer networks that were based upon some type of telecommunications system. at Massachusetts Institute of Technology. information technology or computer engineering.Networks may be classified according to a wide variety of characteristics such as the medium used to transport the data. which defines a set of protocols for internetworking. Well-known communications protocols are Ethernet. Throughout the 1960s Leonard Kleinrock. a precursor to the ARPANET. since it relies upon the theoretical and practical application of these disciplines. as well as host-to-host data transfer. Computer networking is sometimes considered a sub-discipline of electrical engineering. Roberts created the first wide area network (WAN). and application-specific data transmission formats. in 1962.C. • • • • • • • In September 1940. computer science. and organizational scope. communication between calculation machines and early computers was performed by human users by carrying instructions between them. . and provide the basis for network programming.

This expansion is mirrored by growth in the numbers and types of users of networks. PDAs. school. and the University of Utah were connected as the beginning of the ARPANET network using 50 kbit/s circuits. and this boom in communications would not have been possible without the progressively advancing computer network. the Stanford Research Institute. It would be more correct to call them access also provide a way to create a wired LAN using existing home wires (coaxial cables. computer networks are the core of modern communication. University of California at Santa Barbara. Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as home. continue to drive computer hardware. although new standards like ITU-T G. Computer networks. software. and telephony increasingly runs over the Internet Protocol. Some examples of devices that are used in a PAN are personal computers. printers. and later used as an underlying infrastructure for expanding TCP/IP networks. The scope of communication has increased significantly in the past decade. office building. because they are handling multiple subnets (the different colors). although not necessarily the public Internet. Those inside the library. could be called "layer 3 switches" because they only have Ethernet interfaces and must understand IP. Today. The reach of a PAN typically extends to 10 meters. from the researcher to the home user.Following are the types of network. Current wired LANs are most likely to be based on Ethernet technology. . or closely positioned group of buildings. telephones. phone lines and power lines). All modern aspects of the public switched telephone network (PSTN) are computer-controlled. All interconnected devices must understand the network layer (layer 3). Each computer or device on the network is a node. and even video game consoles. A PAN may include wired and wireless devices. Personal area network A personal area network (PAN) is a computer network used for communication among computer and different information technological devices close to one person. which have only 10/100 Mbit/s Ethernet connections to the user device and a Gigabit Ethernet connection to the central router. fax machines. scanners.• • In 1969 the University of California at Los Angeles. and the technologies needed to connect and communicate through and between them. Commercial services using X. computer laboratory. Network Types: .25 were deployed in 1972. where the router at the top is a distribution router that connects to the Internet and academic networks' customer access routers. and peripherals industries. A wired PAN is usually constructed with USB and Fire wire connections while technologies such as Bluetooth and infrared communication typically form a wireless PAN.

the network is likely to link a variety of campus buildings including. A backbone can tie together diverse networks in the same building. and student residence halls. Backbone network A backbone network is part of a computer network infrastructure that interconnects various pieces of network. academic colleges or departments. for example. In the case of a university campus-based campus network. routers) and transmission media (optical fiber. An important function is the sharing of Internet access. include their higher data transfer rates. Home area network A home area network (HAN) is a residential LAN which is used for communication between digital devices typically deployed in the home. The networking equipment (switches. This is the data transfer rate. such as disk arrays. the backbone's capacity is greater than that of the networks connected to it. in different buildings in a campus environment. such as printers and mobile computing devices. smaller geographic range. A SAN typically has its own network of storage devices that are generally not accessible through the local area network by other devices. in contrast to WANs (Wide Area Networks). copper plant. for example.). or over wide areas. block level data storage.3 LAN technologies operate at speeds up to 10 Gbit/s. and no need for leased telecommunication lines. providing a path for the exchange of information between different LANs or sub networks. Cat5 cabling etc. university. if a server cluster needs to be accessed by different . Campus area network A campus area network (CAN) is a computer network made up of an interconnection of LANs within a limited geographical area. accessible to servers so that the devices appear like locally attached devices to the operating system.) are almost entirely owned (by the campus tenant / owner: an enterprise.The defining characteristics of LANs. Normally. government etc. The cost and complexity of SANs dropped in the early 2000s to levels allowing wider adoption across both enterprise and small to medium sized business environments. the university library. often a broadband service through a cable TV or Digital Subscriber Line (DSL) provider. Current Ethernet or other IEEE 802. Storage area network A storage area network (SAN) is a dedicated network that provides access to consolidated. LANs can be connected to Wide area network by using routers. SANs are primarily used to make storage devices. A large corporation which has many locations may have a backbone network that ties all of these locations together. IEEE has projects investigating the standardization of 40 and 100 Gbit/s. tape libraries. usually a small number of personal computers and accessories. and optical jukeboxes.

or spans even intercontinental distances. which is the set of widearea network connections and core routers that interconnect all networks connected to the Internet.departments of a company which are located at different geographical locations. country. Sample EPN made of Frame relay WAN connections and dialup remote access. The equipment which ties these departments together constitutes the network backbone. using a communications . Network performance management including network congestion is critical parameters taken into account when designing a network backbone. Wide area network A wide area network (WAN) is a computer network that covers a large geographic area such as a city. Metropolitan area network A Metropolitan area network (MAN) is a large computer network that usually spans a city or a large campus. A specific case of a backbone network is the Internet backbone.

head offices. . in order to share computer resources. Organizational scope Networks are typically managed by organizations which own them. which has no single owner but a distinct status when seen by an organizational entity that of permitting virtually unlimited global connectivity for a great multitude of purposes. A special case of network is the Internet. authorized users. An intranet is a set of networks. VPNs. cables. e. or may have a defined service level agreement (SLA) between the VPN customer and the VPN service provider. for example. and the network layer. A WAN often uses transmission facilities provided by common carriers. A large intranet will typically have at least one web server to provide users with organizational information. VPN may have best-effort performance.. usually a LAN. An extranet is a network that is limited in scope to a single organization or entity and also has limited connections to the networks of one or more other usually. but not necessarily. According to the owner's point of view. the data link layer. The data link layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. Most commonly. One common application is secure communications through the public Internet. using the Internet Protocol and IP-based tools such as web browsers and file transfer applications that are under the control of a single administrative entity.g. a VPN has a topology more complex than point-to-point. shops. production sites. such as authentication or content encryption. that combines many types of media such as telephone lines. Virtual private network A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e. can be used to separate the traffic of different user communities over an underlying network with strong security features. That administrative entity closes the intranet to all but specific. Intranets and extranets Intranets and extranets are parts or extensions of a computer network. an intranet is the internal network of an organization. networks are seen as intranets or extranets. such as telephone companies. Enterprise private network An enterprise private network is a network built by an enterprise to interconnect various company sites. remote offices.. the Internet) instead of by physical wires. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer.g. and air waves. but a VPN need not have explicit security features.

corporate. where each wireless client connects to the central Wireless access point. called 10BASE5 and 10BASE2. Service providers and large enterprises exchange information about the reach ability of their address spaces through the Border Gateway Protocol (BGP). The Internet is also the communications backbone underlying the World Wide Web (WWW). MAN. It is based on the networking technologies of the Internet Protocol Suite. an extranet may also be categorized as a CAN. and private computer networks. Technically. A ring network: each node is connected to its left and right neighbor node.or rightwards. This was the layout used in the original Ethernet. although an extranet cannot consist of a single LAN. protocols compatible with the Internet Protocol Suite and an addressing system (IP addresses) administered by the Internet Assigned Numbers Authority and address registries. Network topology Common layouts A network topology is the layout of the interconnections of the nodes of a computer network. Common layouts are: • • • • • A bus network: all nodes are connected to a common medium along this medium. This is the typical layout found in a Wireless LAN. or other type of network. A star network: all nodes are connected to a special central node. it must have at least one connection with an external network. The Fiber Distributed Data Interface (FDDI) made use of such a topology. academic. . and often standardized. Participants in the Internet use a diverse array of methods of several hundred documented. A fully connected network: each node is connected to every other node in the network.trusted organizations or entities a company's customers may be given access to some part of its intranet while at the same time the customers may not be considered trusted from a security standpoint. It is the successor of the Advanced Research Projects Agency Network (ARPANET) developed by DARPA of the United States Department of Defense. A mesh network: each node is connected to an arbitrary number of neighbors in such a way that there is at least one traversal from any node to any other. such that all nodes are connected and that each node can reach each other node by traversing nodes left. public. WAN. Internet The Internet is a global system of interconnected governmental. forming a redundant worldwide mesh of transmission paths.

The following list gives examples of Network Performance measures for a circuit-switched network and one type of packet-switched network. using a network. The number of rejected calls is a measure of how well the network is performing under heavy traffic loads. technology. they will require four modems (for the Internet connection) and four printers. provided he is authorized to do so. Increased Storage Capacity: As there is more than one computer on a network which can easily share files. as each network is different in nature and design. Performance can also be modeled instead of measured. each having their own computer. Advantages of Computer Networks Following are some of the advantages of computer networks. but when many . The facility of shared folders can also be availed by family members. echo and so on. provides a cheaper alternative by the provision of resource sharing. if they want to use the resources at the same time. and just one modem and printer can efficiently provide the services to all four members. ensuring that the network will be optimally designed. by using a storage device.Network performance Network performance refers to the service quality of a telecommunications product as seen by the customer. many people can access or update the information stored in a database. In addition to that. A computer network. stability. For example. if there are four people in a family. ATM: In an Asynchronous Transfer Mode (ATM) network. the issue of storage capacity gets resolved to a great extent. These diagrams allow the network planner to analyze how the network will perform in each state. It saves the time which is wasted in copying a file from one system to another. • • • File Sharing: The major advantage of a computer network is that is allows file sharing and remote file access. data throughput. quality of service (QoS). on the other hand. In this way. viz. one example of this is using state transition diagrams to model queuing performance in a circuit-switched network. • There are many different ways to measure the performance of a network. Resource Sharing: Resource sharing is also an important benefit of a computer network. A person sitting at one workstation of a network can easily see the files present on the other workstation. Other types of performance measures can include noise. It should not be seen merely as an attempt to get "more through" the network. performance can be measured by line rate. network performance is synonymous with the grade of service. ATM: • Circuit-switched networks: In circuit switched networks. all the four computers can be interconnected. A standalone computer might fall short of storage memory. connect time. modulation technique and modem enhancements. making it up-to-date and accurate.

The basic need of for most computers to interact in a business is to share files. increasing the interaction capability of the entire business. Costly devices like routers. It’s true this can be done with email. physical access becomes necessary for any kind of data theft. the system becomes useless. the File Server should be a powerful computer. If a computer is a standalone. In case of big networks. Computer networks resolve this issue as the software can be stored or installed on a system or a server and can be used by the different workstations.. Such spread can be dangerous if the computers have important database which can get corrupted by the virus. Viruses get spread on a network easily because of the interconnectivity of workstations. by networking all company computers in local area networks or LANs. memory of different computers can be used in such case. if a computer is on a network. Dependency on the Main File Server: In case the main File Server of a computer network breaks down. in case they are not inbuilt. Disadvantages of Computer Networks Following are some of the major disadvantages of computer networks. so wouldn’t it make sense that they too communicate like their users? Many businesses are starting to agree. They are connected in a network of speech. He will also have to buy NICs (Network Interface Cards) for each of the workstations.• computers are on a network. The Importance of Computer Networks in Business Employees in a business come into the company already capable of interacting with each other to share information and create new projects. hubs. In this arrangement each computer can connect to the other. a computer hacker can get unauthorized access by using different tools. Each of those computers are used to perform the employee’s job. etc. various network security software are used to prevent the theft of any confidential and classified data. but there is always the issue of a file being saved on someone’s . However. Rapid Spread of Computer Viruses: If any computer system in a network gets affected by computer virus. One can also design a storage server on the network in order to have a huge storage capacity. In nearly every business those same employees are using computers. which often makes it expensive. Increased Cost Efficiency: There are many software available in the market which are costly and take time for installation. there is a possible threat of other systems getting affected too. • • • • Security Issues: One of the major drawbacks of computer networks is the security issues involved. can add up to the bills of a person trying to install a computer network. In case of big organizations. switches. Expensive Set Up: The initial set up cost of a computer network can be high depending on the number of computers to be connected.

a single high-end printer can be linked to the computer network and used by all. And when networked. Additionally. Instead of purchasing multiple printers for various groups. With a network. any employee can retrieve the same files when needed. as well as brainstorm. large projects are much easier to transfer than through email alone. . and with a networking system each employee can stay organized by staying on the same page. It is an ideal system for businesses with employees that need to travel and still access information when who is absent. For example printers. computer networks can be outfitted with remote access so employees can grab and share files from outside of the office like on their home computers or smart phones. much more efficiently in an open setting in which additional workers can make suggestions. A successful business is an organized business. It is also a better medium for collaboration as employees can pass files back and forth. Employees can share project schedules directly across the network and make changes appropriately. Employing a network can in some cases save money for a business in equipment costs as well.

Sign up to vote on this title
UsefulNot useful