Show scalability and reliability of computer network, Computer Networking

Assignment Help:

How do you account for higher scalability and reliability of computer network?

Ans: Computer network will have a large number of computers, which can share database, software and other resources. In the event of failure of one computer, its workload will be taken over by other computers. So, it gives higher reliability than centralized computing system.

Requirement of software, database, hardware etc. increases gradually. In centralized computing system, if one computer is not able to serve the purpose, we have to replace it by new one. Replacement of new computer needs lot of investment and effort, which will be avoided in computer network system. If there is require for more, one can buy another powerful computer, add it to computer network and utilize it. The several resources like computers, peripherals, etc. will be added in a scalable manner.


Related Discussions:- Show scalability and reliability of computer network

Name the three phases of ppp session establishment, The three phase of PPP ...

The three phase of PPP session establishment are:-  A. Link establishment phase  B. Authentication phase  C. Network layer protocol phase

Print Servers, Which of the following commands will display the current pri...

Which of the following commands will display the current print jobs on a printer named Office Printer 01?

Address space, Internet addresses are divided in five distinct types of cla...

Internet addresses are divided in five distinct types of classes. The classes were designated A by E. class A address space lets a small number of networks although a large number

What are the benefits of networking, What are the benefits of Networking? ...

What are the benefits of Networking? The following are the distinct notes in favor of computer networking. a. The computers, staff and information can be well managed b.

Define the method of encryption and decryption using by ssl, Encryption/dec...

Encryption/decryption using by SSL Once a session is established, the SSL generates a session key using public-key encryption to exchange information between the client and ser

Explain the types of security threats, Q. Explain the types of Security Thr...

Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut

Compare error detection and error correction, Compare Error Detection and E...

Compare Error Detection and Error Correction: The correction of errors is more difficult than the detection. In error detection, checks only any error has happened. In error co

Explain 10base-T- twisted pair ethernet, 10Base-T: Twisted Pair Ethernet ...

10Base-T: Twisted Pair Ethernet Most popular standard simplest to install and reconfigure Star topology LAN utilize UTP cable no need for AUI It supports data rag

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd