Thursday, 10 April 2014

The Impact of User Applications ON the Network



Real-time application is the another sort of application which will be affected by the network mostly like interactive applications as Voice over IP (VoIP) and the human interaction is required for the video type of applications according to the transfer of data amount bandwidth plays a major role and these applications work on time critical, latency which will delay the network and in the process even if there is a small jitter will affect the application process any not only with the proper bandwidth the QoS is a mandatory step and video applications with run on VoIP should be given highest priority.

And in the recent environment issues the ads will be popped up in the certain browser with various showing that the how much money can be saved by using the VoIP and how it can be used and installed at easy steps by using VoIP router into the network. Applications which are tend to work start and when they run slowly and they are unusable and taking an example when a certain phone conversation is going on and quality is poor. And this sort of implementation will not provide required bandwidth to the internet sources nor does it provide a proper QoS scheme in the system.

Any this sort of issues can be sorted out by using a proper network design.

The main function of the user application is that they use to enable users to one among another through the means of the various types of third party software. In the day-to-day process the most of the business will relay on these platform of applications. And a special part of relationship is build up in between the application and the network which may effect in the network performance and then to the application the effect may continue. And then there should be an understanding in between the network and the user applications.
Some of the Interactions between the different applications are:
  • User Real-Time applications.
  • System-to-system batch applications.
  • User Interactive applications.
Mostly when there is a problem in between the user and the application there is always a certain lag in the bandwidth allocation of the user and it was main important concern among them, and when the Batch applications mainly as inventory updates, TFTP, and FTP which helps simply to transfer the data which was in bulk content, which was initiated by the user and then it was directed by the software and furthermore there will be no human interactions. Bandwidth was important but it was not considered as critical and there the human interaction occurs.

Some important applications which are interactive such as ERP which defines as Enterprise Resource Planning software, which perform tasks basically as database updates and inventory enquires which require more human interaction. The user was requests some type of information from the server and waits for the source to reply. And these variant types of applications the bandwidth plays a major role in the user patience due to the slow response from the other side. And to overcome these type of problems some other features are implemented such as (QoS) which helps to alleviate some sort of bandwidth in the limitations interactive applications preference over the other batch applications.

Numerical Methods Root Finding

Methods in Finding the Common Numerical Root:

In the common root of finding the schemes for in the functions in the one independent with are variable are mainly briefly in the discussed in the following section.

Bisection Method:


In the idea of the bisection method is mainly based in the fact in a function will change the sign when there is passes through the zero. In the evaluation of the function in the middle of the interval and in replacing whichever the limit in the same sign, in the bisection method can be halve the main size of the interval in the each iteration and eventually in the root.
https://www.efunda.com/math/num_rootfinding/images/Bisection2.gif
When there is an interval in the roots, in the bisection of the method is the one that will not fail. In the cases it is the slowest. When there contains more than the one root, and then the bisection can be find one.

Secant Method:

For the improve in the slow convergence in the bisection method, in the secant method of a certain function there is approximately linear for the local region in the interest and in the uses of the zero-crossing in the line connecting the limits of the intervals as in the new sort of the reference point. In the next interaction starts from the function at the new point of the reference. And in the interaction starts in from the evaluating in the function of the new reference point and then he forms of another line. And then the process is repeated until the main root is found.

https://www.efunda.com/math/num_rootfinding/images/Secant2.gif
In a mathematical form this secant method is will converges and more rapidly in a near root than the false of the position method. In fact there in the secant method always will not always bracelet the main roots, for not sufficiently smooth functions the algorithm may not cover the functions.

False Position Method:

In a similar way to the secant method, in the false position of the method also mainly uses in the straight line for an appropriate of the function in the local interest of the region. And the main and only difference in the two methods are that the secant methods keeps the most of the recent two estimates, and when there is a false position method then they retains the most of the recent estimations and the next one which was recent which has a main opposite sign in the value of  function.

https://www.efunda.com/math/num_rootfinding/images/FalsePosition2.gif

In the false position method it sometimes makes to keep the older reference point in order to maintain the opposite sign bracket in the around the root, which has a lower and the uncertain convergences of the rate when compared to the secant method and in this the emphasis the bracketing the main root and in sometimes there they will restrict to the false positioning to the method and in the difficult situations and when there is a need to solve the highly nonlinear equations.

Physical Components of a Network

http://www.networkworld.com/subnets/cisco/chapters/1587054620/graphics/01fig02.jpg
The physical components of a hardware devices which are mainly interconnected to the network of the computer. According to the size of the network the components are varies in the system but generally most of the computers consists basic part of components.

In a computer network there are around four major categories of a physical components:
  • Personal Computers’ (PCs): In the PCs they serve as endpoints in the network by receiving and sending the data.
  • Interconnections: In a network from one point to another for the transmission of data the interconnections are used by their components and this category consists and includes the components as follows.
•    NICs- Network Interface Cards which is translated from the data from which is produced by a computer into a certain format and it can be transmitted over a local network.
•    Network media mainly as wireless media or by cables, that which provides the means by the signals which are transmitted from one networked device into another.
•    Connections that which provide the various connections point in a media.
  • Switches: These are the devices which are protected by the network attachment by the end systems and by the intelligent switching of the data in between the local area network.
  • Routers: For choosing the best paths in between the networks the routers are interconnected.

Interpreting in a Network Diagram:

While in the description or in a designing a computer network there they uses the drawing and the diagram to describe the various components and there various physical components which are interconnected.

Common symbols are captured in the information related to the network for the planning, reference, and for troubleshooting the purposes by the network diagram. The information differs from one type of organization to the other organization and there details of that information also varies. In the network topology in a common are represented by the series of the lines and the icons.

The following diagram shows and describes the typical network diagram:
  • Internet and the WAN connections are represented by the cloud.
  • Router is represented by the cylinder with the arrows.
  • A workgroup switch was represented by the rectangular box with the arrows.
  • Server is represented by the tower PC.
  • A monitor and computer or a laptop are represented by an end user PC.
  • Ethernet link was represented by the straight line.
  • Serial link was represented by the A-Z shaped line.
http://www.networkworld.com/subnets/cisco/chapters/1587054620/graphics/01fig03.jpg

In this other sort of information are included in the space follows. And when considered an example it is mostly desirable for to identify an interface in the network of a device which was in the format of the s0/0/0 and for the serial interfaces or the fa0/0 in a Fast Ethernet Interface. And this a common for the inclusion in the network address in a segment of the format such as the 10.1.1.0/24, where in 10.1.1.0 that it indicates various address and also the /24 shows that the subnet of a mask.    



Building a Simple Network Platform

Building a network is an overwhelming when there are tasks and other type of components. And then the key for the success is to known the foundations of the network communications and then by knowing this a network can be easily built. For the complex numbers which was involves in the gaining and the understanding of the logical and the physical components of a network in a point-to-point form. There is need to know the knowledge of why the networks are moistly built and the various protocols where used in the modern network designs to become a proficient in the network administration.

What is a General Network?

The main and important task of a business meet and its objectivities is to known how to build a computer network and understanding the basic uses. Network is simply defined as the connection and collection of the devices and the end systems mainly as a computer and servers with will communicate with each other’s.

The network was carried out in many different places and various types of environments which includes as homes, small business and very large business enterprisers. And where in the large sort of enterprisers they need a number of various locations and there should be communication in between them and those locations are briefly described as follows:

  •     Main Office: these is the main and important place where most of the data and important information is located and everyone is connected to this place by using the network. In this office there used to be around hundreds’ or even thousands of people who mainly depends upon the network and its access to do their jobs. Several buildings are connected in the office premises which includes many floors in a building.
  •   Remote Locations:  In this there are other type of variety locations which uses the network in order to connect to main office or to each other

A.     Branch office: in these sort of offices there are employees of a smaller group and there the people communicate with each other using the network. And here there was bulk of information was located in the office. And in this offices there uses mostly local Area Connections and other resources mainly as printers but the main information should be directly from the main office.

B.     Home offices: when an individual person works from his home then the location is known as a home office. In the home workers are often on the demand connections to the main or to the branch offices for the access of the information for mainly resources as a file servers.

C.     Mobile users: The mobile device users mainly connects to the main office network while if there are in the main office itself, at from the branch office, or travelling. According to the mobile device location the network access are required.
http://www.networkworld.com/subnets/cisco/chapters/1587054620/graphics/01fig01.jpg


There are many various and different locations of a network are existed. Network was mainly used in the home or in office to have a communication via the internet, to locate the place, to send the information or messages to the friends, and to place orders to the merchandise.

Cisco IOS for the Switches and the Routers

When a small sort of network was grow and was it become a more complex and a greater functionality and has a control over the network components then a there is a delivered through the more sort of sophisticated network in the devices and that such as the routers and the switches which becomes critical. And this the most of the hardware platforms implement the network services in the cisco products, which includes in carrying the chosen network functions and their protocols, which controls the access and in prohibited unauthorized use of network, and adding to this interfaces and the capability’s which are needed in the network growth. We use this sort of command line interface in the Cisco IOS software in order to enter the configuration details of the Cisco switches and the routers which mainly implements the network certain requirements and the network organization. There is need for the understanding of the cisco IOS software where to configure the more numbers of the complex protocols and their functions in the cisco switches and the routers.

Cisco IOS CLI functions:

In this the Cisco IOS software uses the CLI as its most traditional console in the environment of to enter the commands.

Although the Cisco IOS Software was a core type of technology that with extends across many sort of products, and its operation details are varies in the depending of the internetworking devices which are involved. And to enter the various commands in the CLI, there types should be pasted or typed in the entries within one of the more several type of configuration in the modes. And in configuration mode of the each configuration command which was entered is pressed as soon as possible by the entering the Enter Key.
In the syntax if there are no certain errors, then there is command which is executed in a certain configuration-mode of the structure. And the command will not specifically saved in the NVRAM.

The Cisco IOS software mainly uses the hierarchy of the command in the configuration-mode of structure. And in each configuration mode there is an indicated with the distinctive supports and the prompts 

As type of security mainly depends upon the features which are Cisco IOS Software the EXEC sessions into the two various levels:

User EXEC:
in this they can access only to a limited sort of numbers in the basic monitoring commands.

Privileged EXEC: in these they allows the access to all the commands of the device, which are used in the management and the configuration, and in this it was password protected and with allows only the users with the authorized to gain the access of the device.

Configuration of the Modes in the Cisco IOS Software:

According to the features with are being used there will be a different set of configurations modes that works with the Cisco IOS Software.

In this the first set of the configuration on a Cisco device id the setup type of utility, with helps the creation in the basic initial configuration. And for the more set of the specific and the complex configurations, there is a use of the CLI to enter the terminal of the configuration of the mode.

  •     Interfaces
  •     Line
  •     Router
  •     Sub interface
  •     Controller
  •     Link