Skip to main content
Workforce LibreTexts

5.11: Reliable Network

  • Page ID
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)

    ( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\id}{\mathrm{id}}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\kernel}{\mathrm{null}\,}\)

    \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\)

    \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\)

    \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    \( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\)

    \( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\)

    \( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vectorC}[1]{\textbf{#1}} \)

    \( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)

    \( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)

    \( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    Network Architecture

    Networks must help a wide scope of applications and services, just as they work over a wide range of cables and devices, making up the physical infrastructure. In this specific situation, the term network architecture alludes to the technologies that help the foundation and the programmed services and rules, or protocols, that move data over the network.

    As networks advance, we are finding that there are four fundamental qualities that the underlying architectures need to deliver to meet users desires:

    • Fault Tolerance
    • Scalability
    • Quality of Service (QoS)
    • Security

    Fault Tolerance

    The desire is that the Internet is consistently accessible to a great many clients who depend on it. This requires a network architecture that is worked to tolerate flaws. A fault-tolerant network restrains the effect of failure, with the goal that the least number of devices are influenced. It is additionally worked in a manner that permits brisk recuperation when such a disappointment happens. These networks rely upon various ways between the source and goal of a message. If a path fails, the messages can be instantly sent over an alternate link. Having numerous ways to a goal is known as redundancy.

    One way dependable networks give repetition is by executing a packet-switched network. Packet switching parts traffic into packets that are steered over a shared network. For example, a solitary message, an email, or a video stream, is broken into multiple message blocks, called packets. Every packet has the important addressing information of the source and goal of the message. The routers inside the network switch the packets dependent on the state of the network at that point. This implies all the packets in a solitary message could take totally different ways to the goal.


    A scalable network can grow rapidly to help new users and applications without affecting the service's performance being conveyed to existing users.

    Another network can be effortlessly added to a current network. Furthermore, networks are versatile because the designers observe acknowledged protocols and standards. This permits software and hardware vendors to improve items and administrations without stressing over structuring another arrangement of rules for working inside the network.

    Quality of Service

    Quality of Service (QoS) is additionally a consistently expanding requirement of networks today. New applications accessible to users over internetworks, for example, voice and live video transmissions, make better standards for the quality of the delivered services. Have you at any point attempted to watch a video with steady breaks and stops? As information, voice, and video content keep on combining into a similar system, QoS turns into an essential instrument for overseeing blockage and guaranteeing dependable conveyance of substance to all users.

    Congestion happens when the interest for bandwidth surpasses the amount which is accessible. Network bandwidth is estimated in the number of bits transmitted in a solitary second or bits per second (bps). When synchronous correspondences have endeavored over the network, the interest for network bandwidth can surpass its accessibility, making network congestion.

    When traffic volume is more prominent than what can be shipped over the network, devices queue or hold the packets in memory until assets become accessible to transmit them.

    With a QoS strategy set up, the router can deal with data and voice traffic progression, offering priority to voice communications if the network encounters congestion.


    Vital individual and business resources are the network infrastructure, services, and the data contained on network-attached devices.

    Two kinds of network security worries must be addressed: network infrastructure security and information security.

    Ensuring a network infrastructure incorporates the physical securing of devices that give network connectivity and forestalling unapproved access to the management software that resides on them.

    Data security ensures that the data contained inside the packets being transmitted over the network and the data put away on network-attached devices. To accomplish the objectives of network security, there are three essential requirements:

    • Confidentiality: Data secrecy implies that just the planned and approved recipients can access and read information.
    • Integrity: Data honesty affirms that the data has not been adjusted in transmission, from root to goal.
    • Availability- Data accessibility implies confirmation of timely and solid access to information services for approved users.