0% found this document useful (0 votes)
24 views

Elements of The Data Communication System

The document describes the basic elements of a data communication system, including the sender, receiver, transmission channel and communication protocol. Explains that a sender sends information through a channel to a receiver. It also describes the seven key components of a data communication system: 1) sender and receiver, 2) communication media, 3) communication protocol, 4) protocol functions, 5) message, 6) communication devices and 7) operator.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Elements of The Data Communication System

The document describes the basic elements of a data communication system, including the sender, receiver, transmission channel and communication protocol. Explains that a sender sends information through a channel to a receiver. It also describes the seven key components of a data communication system: 1) sender and receiver, 2) communication media, 3) communication protocol, 4) protocol functions, 5) message, 6) communication devices and 7) operator.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 28

ELEMENTS OF THE DATA COMMUNICATION SYSTEM

In every communication system a series of basic elements can be


distinguished: sender, receiver, transducer and transmission channel. In
the example in the following figure, the sender and receiver are the
terminal elements. The transducers convert the acoustic signals into
electrical signals that can be sent through a modem over telephone lines,
which constitute the transmission channel.

The data communication elements are made up of seven (07) parts,


detailed below:

1. Transmitter and Receiver

The sender is the terminal element of the communication that is


responsible for providing the information. It is contrasted with the receiver,
which is the terminal element of the communication that receives the
information from the sender.

For each sender there is a receiver. A sender is not conceived without a


receiver. However, there may be cases where there is one receiver and
multiple senders or one sender and multiple receivers. For example, a
television system consists of a transmitting station from which the
electromagnetic signal is distributed to multiple receivers. In a news
agency there is a single receiver of news (the agency itself) and multiple
transmitters of the same (journalists) distributed throughout the world.

Combinations of multiple transmitters to multiple receivers are also


possible, as is the case with most of the devices used in communication
networks between computers.
In order to communicate, the nodes must have a NIC (network interface
card), commonly called a network card.

When purchasing a network card, it is necessary to consider the


characteristics of the equipment on which it is to be installed and the
network to which it is to be installed.

2. Media or communication channels

A channel can be physical (cable) or a wireless medium (specific radio


frequency).

The selection of a channel depends on:

 Installation condition
 Volume of bits transported per unit of time
 Distance data can travel without damage
 Costs

3. Communication protocol

It is a set of rules, standards and procedures that guarantees the integrity


and correct sequence of transmitted data.

Every computer that is connected to the Internet uses a communication


protocol. It ensures that all nodes in a computer network emit and receive
data organized in the same way.

It is similar to the grammar of a language, it ensures that what is


communicated is understandable and that errors can be identified.

Example:

TCP/IP protocol. Every pair of computers connected to the Internet must


follow the rules of the TCP/IP protocol to exchange data.
4. Communication protocol functions

 Set a node to be ready to communicate


 Check and recover errors
 Number messages to check that they arrive in correct sequence
 Control the destination of messages.
 Decide which elements to emit and which to receive.

5. Message

It is the set of data they send and receive. In a network, messages are
transmitted through “packets”.

A package is a logical grouping of information that includes control


information and usually user data. The logical grouping scheme obeys a
communication protocol.

6. Communication devices.

They are electronic equipment specially designed to enable or improve the


connection to computer networks.

They make use of various technologies and are incorporated into


computer networks with different objectives.

Some of them are: Modem, Hub, Switch, Router, Bridge, Gateway.

7. Operator

The operator in this case is the person who manages or works with the
sender and the receiver is a person.
TYPES OF INFORMATION SYSTEMS

Information systems manage the flow and maintain the information that
the company uses on a daily basis for its different operations and are
made up of several components: people, hardware, software, networks,
procedures and data.

The most popular types of information systems can be classified as


follows:

1. Transaction processing systems

Transaction processing systems (TPS) are the core business systems that
serve the operational level of the organization.
A transaction processing system is a computerized system that performs
and records the daily routine transactions necessary for the operation of
the business. They are at the lowest level of the organizational hierarchy
and support the day-to-day activities of the business.

2. Business process control systems

Business process control systems (BPM) monitor and control industrial or


physical processes, such as oil refining, power generation or steel
production systems in a steel plant.

For example, in an oil refinery, electronic sensors connected to computers


are used to continuously monitor chemical processes and make real-time
adjustments that control the refining process. A process control system
comprises a whole range of equipment, computer programs and operating
procedures.
3. Business collaboration systems

Enterprise collaboration systems (ERP) are one of the most used types of
information systems. They help company managers control the flow of
information in their organizations.

It is one of the types of information systems that are not specific to a


specific level in the organization, but rather provide important support for a
wide range of users. These information systems are designed to support
office tasks such as multimedia systems, emails, video conferencing and
file transfers.

4. Management Information Systems

Management information systems (MIS) are a type of information systems


that collect and process information from different sources to assist in
decision making regarding the management of the organization.

Management information systems provide information in the form of


reports and statistics. The next level in the organizational hierarchy is
occupied by low-level managers and supervisors. This level contains
computer systems that are intended to assist operational management in
supervising and controlling transaction processing activities that occur at
the administrative level.

Management information systems use the data collected by the TPS to


provide supervisors with the necessary control reports. Management
information systems are the types of information systems that take internal
system data and summarize it into useful formats such as management
reports for use in supporting management activities and decision making.

5. Decision support systems


A decision support system (DSS) is a computer-based system intended to
be used by an individual manager or a group of managers at any
organizational level to make a decision. decision in the process of solving
a semi-structured problem. Decision support systems are a type of
computerized organizational information system that helps the manager in
decision making when he needs to model, formulate, calculate, compare,
select the best option or predict the scenarios.

Decision support systems are specifically designed to help the


management team make decisions in situations where there is uncertainty
about possible outcomes or consequences. Helps managers make
complex decisions.

6. Executive Information Systems

Executive information systems (EIS) provide quick access to internal and


external information, often presented in graphical format, but with the
ability to present more detailed baseline data if necessary. Executive
information systems provide critical information from a wide variety of
internal and external sources in easy-to-use formats for executives and
managers.

An executive information system provides senior managers with a system


to help make strategic decisions. It is designed to generate information
that is abstract enough to present the entire operation of the company in a
simplified version to satisfy senior management.

ELEMENT S OF AN INFORMATION SYSTEM

In general, it is considered that all SIs contain a diversity of elements that


can be classified into five broad categories:
1. Financial elements . Those linked to the capital and available
assets of the organization.

2. Technological elements . Those that have to do with specialized


machinery and the capacity for automated information processing.

3. Human elements . Basically, personnel, both specialized and


managerial, as well as non-specialized or common.

4. Material elements . It refers to the location of the system, its


physical support and location.

5. Administrative elements . Those related to processes , driving


mechanics, permits, reports, transactions, etc.

TYPES OF SIGNALS

1. Synchronous Transmission

Synchronous transmission transmits data using timing bytes, instead of


start/stop bits to control the transmission. Digital signals are transmitted
with exact time registration. The signals have the same frequency. The
individual characters contained in control bits (the start and stop bits) mark
the beginning and end of each character.

That is to say, this type of transmission is when there is precise temporal


coordination between sender and receiver. In this type of transmission
there are no start or stop bits, so it is transmitted in many blocks where
each of these many bits is carried (Even in the event that there are no
characters to be transmitted, synchrony is maintained and is It is common
for so-called "stuffing" bits to be sent continuously.
2. Asynchronous Transmission

Asynchronous Transmission are signals transmitted without temporal


synchronization. Signals have different frequencies and phase
relationships. Individual characters contained in control segments mark
the beginning and end of each packet.

It is a form of data transmission in which data is sent intermittently, one


character at a time, rather than in a constant stream separated by fixed
intervals of time. Asynchronous transmission relies on the use of a start
and stop bit(s) in addition to the bits representing the character (AND an
optional parity bit), to distinguish separate characters.

3. Seriation

The serialization technique allows the artefactual assemblages to be


ordered in a succession that is then applied to determine their temporal
ordering. They must be objects of the same cultural tradition, of the same
function, and the series obtained will have a relative chronological value
that must be contrasted with the stratigraphy or absolute dating.

Types of Seriation

 Contextual serialization: according to the duration of the different


styles of artifacts.
 Frequency serie: changes in the abundance or proportional
frequency of a ceramic style.

DATA TRANSFERS
GRID

In computing , a network (usually a computer network or computer


network) is understood as the interconnection of a certain number of
computers ( or networks, in turn) through wired or wireless devices that,
through electrical impulses, electromagnetic waves or other means
physical, allow them to send and receive information in data packets,
share their resources and act as an organized group.

Networks have processes for sending and receiving messages , as well as


a series of codes and standards that guarantee their understanding by the
computers connected to the network (and not by any other). These
communication standards are known as protocols , and the most common
of them currently is TCP/IP.

Building a network allows you to manage internal communication, share


the execution of programs or Internet access, and even manage
peripherals such as printers, scanners, etc. These types of swarm
systems currently support many of the information management and
processing processes today, such as telecommunications networks, the
Internet or the various business intranets or various organizations.

The appearance of networks revolutionized the way of understanding


computing and opened a new field within this discipline to meet the needs
for improvement, security and operability of computer communication.

BENEFITS OFFERED BY COMMUNICATION NETWORKS

 Share files and computing resources such as storage, printers, etc.


 Share internet.
 Communication of all kinds between computers.
 It is very cheap to create a computer network in the same building,
especially with the use of WI-FI (wireless).
 Possibility of sharing the Internet connection of one of them on the
other computers.
 The possibility of sharing hardware resources such as printers, hard
drives, etc.
 Sharing files between computers.
 Another type of information exchange between computers.

Without a doubt, the benefits that computer networks offer are too many,
and examples of this are large companies, schools, hospitals, shopping
centers, self-service stores, etc. That through a network connection they
can have access to the Internet, share a printer and even share files and
information resources between computers and this is very common in
practical life.

OPERATION OF A NETWORK

A network works in the following way:

 The information to be transmitted is divided into packets according


to the protocol.
 Each computer or node has an address, and the information will go
from the source to the destination.
 Transmission is carried out through media (coaxial cable, fiber
optics, etc.)
 All the information passes through some levels, depending on the
protocol used, which add control information, reorganization of the
transmitted information, fragmentation into frames, etc.)
 Normally, the destination node examines all frames circulating on
the network and examines the destination address. If the
information is for him, he collects it.
 Depending on the protocol used, the destination node can send a
message saying that complete information has been received or
not.

TYPES OF NETWORKS

RES BROADCAST

Broadcast is the massive dissemination of information or data packets


through computer networks. The term is used in computing and
telecommunications. Depending on the subject in which it is used, its
definition varies a little.

In the case of computing, broadcast or diffusion is the transfer of


information from a sending node to a multitude of receiving nodes.

Material to carry out the broadcast

For the signal diffusion or transmission process to occur, the presence of


the following technical elements is necessary:

1. Antenna:
The antenna is a device that is located in service stations. It is responsible
for sending the programming through the air chain and also receiving it.
There are antennas that transmit and receive the signal.

2. Communications satellite:

Communications satellites receive the signal from the antenna and


distribute it. They offer greater service coverage thanks to the fact that
they are located at an altitude of 2,000 kilometers. This type of satellite in
particular uses Molniya orbits, geosynchronous orbits and low Earth orbits.

3. Channel:

The channel is the way through which the signals reach the audience. The
channel can be air, cable or Internet.

Broadcast signals comply with certain international security standards and


vary by region.

POINT TO POINT NETWORK

Point-to-point networks are those that respond to a type of network


architecture in which each data channel is used to communicate only two
nodes, in clear opposition to multipoint networks, in which each data
channel can be used to communicate communicate with various nodes.

In a peer-to-peer network, networked devices act as equal partners, or


peers, to each other. As peers, each device can take on the role of sender
or the role of receiver. At one point, device A, for example, may make a
request for a message/data from device B, and device B responds by
sending the message/data to device A. Device A works as a receiver,
while B works as a sender. A moment later devices A and B can reverse
roles: B, as a receiver, makes a request to A, and A, as a sender,
responds to B's request. A and B remain in a reciprocal or even
relationship with each other.

Peer-to-peer networks are relatively easy to install and operate. As


networks grow, peer-to-peer relationships become more difficult to
coordinate and operate. Its efficiency decreases rapidly as the number of
devices on the network increases.

The links that interconnect the nodes of a point-to-point network can be


classified into three types according to the direction of the communications
they carry.

Characteristics

 It is used in long range networks (WAN).

 Routing algorithms are often complex, and error control is


performed at intermediate nodes in addition to the endpoints.

 The stations receive only the messages delivered to them by the


network nodes. These previously identify the receiving station
based on the destination address of the message.
 The connection between the nodes can be made with one or
several transmission systems of different speeds, working in
parallel.

 The delays are due to the transit of messages through intermediate


nodes.

 The end-to-end connection is made through the intermediate


nodes, so it depends on their reliability.

 Security is inherent in the mesh structure of the network itself in


which each node connects to two or more nodes.

 Cabling costs depend on the number of links between stations.


Each node has at least two interfaces.

Advantages of point-to-point networks

 Easy to configure.

 Less complexity.

 Lower cost since no network devices or dedicated servers are


needed.

Disadvantages of point-to-point networks

 Non-centralized administration.
 They are not very safe.

 All devices can act as both a client and a server, which can slow
down their operation.

 They are not scalable

 They reduce their performance.

MESH NETWORK

A mesh network is a network topology in which each node is connected to


all nodes. In this way it is possible to carry messages from one node to
another through different paths. If the mesh network is fully connected,
there can be absolutely no interruption in communications. Each server
has its own connections to all other servers.

Functioning

This topology, unlike other more common ones such as tree topology and
star topology, does not require a central node, which reduces the risk of
failure, and therefore periodic maintenance (an error in a node, Whether
important or not, it does not imply the downfall of the entire network).

Mesh networks can do without manual routing, or require little attention to


its maintenance. If dynamic routing protocols are implemented, they could
be considered “self-routable”, except for scenarios in which the size or
load of the network is highly variable, or virtually zero fault tolerance is
required (for example, due to the critical work that performed by some of
the nodes that make it up).

Communication between any two nodes in a mesh network can be carried


out even if one or more nodes disconnect from it unexpectedly, or if one of
the links between two adjacent nodes fails, since the rest will avoid
passing through that network. point—Nodes adjacent to a failed node or
link will propagate a change in the route table, notifying adjacent nodes of
the change in the network, and so on.

Consequently, a mesh network is very reliable. A network with mesh


topology offers total redundancy and therefore superior reliability and fault
tolerance. Although the ease of problem solving and increased reliability
are very interesting advantages, these networks are expensive to install,
since they necessarily require the interconnection of each node with
neighboring nodes (increasing the number of interfaces that each node
must have). ) and the cost of the infrastructure – cabling, switches/bridges,
signal repeaters, access points, etc. – of the entire network.

MULTIPOINT NETWORK

Multidrop networks are computer networks in which each data channel


can be used to communicate with multiple nodes.

In a multipoint network there is only one communication line whose use is


shared by all terminals in the network. Information flows bidirectionally and
is discernible to all terminals on the network.

In this type of networks, the terminals compete for the use of the medium,
so that the first one to find it available monopolizes it, although it can also
negotiate its use. In simpler terms: it allows the connection of several
terminals to your computer sharing the single transmission line, its main
advantage consists of lowering costs, although it may lose speed and
security.

Characteristics of multipoint networks

 In a multipoint network there is only one communication line, the


use of which is shared by all terminals in the network.

 Information flows bidirectionally and is discernible to all terminals on


the network. Typically, in a multipoint connection, the terminals
compete for the use of the medium (line) so that the first one to find
it available monopolizes it, although they can also negotiate its use.

 The terminals do not necessarily have to be geographically close.

 They have common access to the central computer through a line


to which they are connected, and which therefore supports all
information traffic.

 Each terminal must be able to detect whether the message sent by


the host affects it or not. To do this, each message will carry the
address of the terminal to which it is directed.

 Its method of accessing the medium is Polling: a technique by


which the central computer passes through all the terminals to find
out if they have information to send or are available to receive it.

NETWORK ON TREE
Tree network is a network topology in which the nodes are arranged in the
form of a tree. From a topological view, it is similar to a series of
interconnected star networks except that it does not have a central hub.
Instead, it has a trunk node, usually occupied by a hub or switch, from
which the other nodes branch. It is a variation of the bus network, the
failure of a node does not imply an interruption in communications. The
same communications channel is shared.

The tree topology can be seen as a combination of several star topologies.


Both the tree and the star topology are similar to the bus topology when
the interconnection node works in broadcast mode, since the information
propagates to all stations, only in this topology the branches extend from a
root point ( star), to as many branches as possible, according to the
characteristics of the tree.

The problems associated with the previous topologies are that the data is
received by all stations regardless of who it is intended for. It is then
necessary to provide the network with a mechanism that allows the
recipient of the messages to be identified, so that they can collect them
upon arrival. Additionally, due to the presence of a shared transmission
medium between many stations, interference between signals can occur
when two or more stations transmit at the same time. It is the best network
topology that exists and with it data flows faster than in other types of
network topologies.

Disadvantages of Tree Topology

 A lot of cable is required.

 The size of each segment is determined by the type of cable used.

 If the main segment falls, the entire segment also falls.

 It is more difficult to configure.

 If a node is disconnected, all those connected to it are disconnected


as well.
Advantages of Tree Topology

 Point to point wiring for individual segments.

 Supported by many software and hardware vendors.

 Ease of problem solving.

 Much faster than another.

PERSONAL AREA NETWORK (PAN)

We are talking about a computer network of a few meters, something


similar to the distance that the Bluetooth of the mobile phone needs to
exchange data. They are the most basic and are suitable for small spaces,
for example if you work in a single-story location with a couple of
computers.

PAN networks can be useful if you are connecting a few devices that are
not too far from each other. The most common option, however, to
increase the coverage radius and to avoid the installation of structured
cabling, is usually the purchase of a router and the installation of a
wireless local area network.

LOCAL AREA NETWORK (LAN).

It is the one that we all know and the one that is usually installed in most
companies, whether it is a complete building or a premises. It allows you
to connect computers, printers, scanners, photocopiers and many other
peripherals together so that you can exchange data and orders from the
different nodes in the office.

LAN networks can range from 200 meters to 1 kilometer of coverage .


CAMPUS AREA NETWORK (CAN).

A campus area network (CAN) is a network that connects local area


networks across a limited geographic area, such as a university campus ,
or a military base. It can be considered as part of a metropolitan area
network that applies specifically to an environment. Therefore, a campus
area network is larger than a local area network, but smaller than a wide
area network .

On a campus, university buildings are connected using the same type of


equipment and networking technologies that would be used in a LAN.
Additionally, all components, including switches , routers , cabling, and
others, belong to the same organization.

A CAN is a collection of LANS geographically dispersed within a campus


(university, government offices, maquilas or industries) belonging to the
same entity in an area delimited in kilometers.

A CAN commonly uses technologies such as FDDI and Gigabit Ethernet


for connectivity over communication media such as fiber optics and spread
spectrum.

METROPOLITAN AREA NETWORK (MAN)

Much broader than the previous ones, they cover much larger
metropolitan spaces. They are usually used when public administrations
decide to create Wi-Fi zones in large spaces. It is also the entire cable
infrastructure of a telecommunications operator for the deployment of fiber
optic networks. A MAN network usually connects the various LANs that
exist in a space of about 50 kilometers.

WIDE AREA NETWORK (WAN)


They are those that are usually deployed by Internet provider companies
to cover the network connection needs of a very large area, such as a city
or country.

STORAGE AREA NETWORK (SAN)

It is its own network for companies that work with servers and do not want
to lose performance in user traffic, since they handle a huge amount of
data. It is often used a lot by technology companies.

VIRTUAL LOCAL AREA NETWORK (VLAN)

The networks we talk about are normally connected physically. VLANs are
logically chained together (using protocols, ports, etc.), reducing network
traffic and improving security. If a company has several departments and
you want them to work with a separate network, the VLAN network.

NETWORK TOPOLOGY

There are three models of topology or organization of a network:

Bus networks . Also called linear, they have a server at the head of a
successive line of clients , and have a single communication channel
called a bus or backbone.

Star networks . Each computer has a direct connection to the server,


which is in the middle of all of them. Any communication between
clients must first go through the server.

In ring . Also called circular, they connect the clients and the server in
a circular circuit, although the server maintains its hierarchy over the
system.
ELEMENTS OF A NETWORK

To install a computer network, the following elements are needed:

Hardware . Devices and machines that allow the establishment of


communication, such as network cards, modems and routers, or
repeater antennas if they are wireless.

Software . Programs required to manage communications hardware ,


such as the Network Operating System (NOS: Network Operating
System), and communication protocols such as TCP/IP.

Servers and clients . The servers process the network data flow,
responding to the requests of the other computers on the network
called clients or workstations. These allow users to access information
individually, sharing the resources managed by the server.

Broadcast media . This refers to the wiring or electromagnetic waves


that, as the case may be, serve as a medium for the communication of
the message.

INTERNET

The Internet is a network of computers that are interconnected


worldwide to share information. It is a network of computing equipment
that relates to each other through the use of a universal language.

The concept of the Internet has its roots in the English language and is
made up of the words inter (which means between) and net (from
network, which means electronic network). It is a term that should
always be written in capital letters since it refers to “The Network”
(which connects computers worldwide through the TCP/IP protocol)
and without an accompanying article (the) to refer to it.

There are different types of internet connection, that is, different means
by which one can obtain a connection to the network of networks. The
first of them was the dial-up connection, that is, taking the connectivity
of a telephone line through a cable. Then other more modern types
emerged, such as ADSL, fiber optics, and 3G and 4G (LTE)
connectivity for mobile devices.

To access the billions of websites available on the great network of


networks, which we know as the Internet, web browsers (software) are
used, some of the most used being Google Chrome, Internet Explorer,
Mozilla Firefox, and Safari, all of them. developed by different
technology companies.

NETWORK OPERATING SYSTEMS

A network operating system is a software application that works as a


platform to improve both the operation of a computer and that of several
computers within the same interconnected network.

In this way, a network operating system is capable of enabling


communication between computers belonging to the same computer
network. But how many exist today?

Network operating systems are especially useful when managing all the
work of personal computers and servers that are connected to a local
network, enabling sharing from the use of printers, to a common file
system, databases, etc. . Currently, the list of network operating systems
includes the following.
LANTASTIC BY ARTISOFT
Artisoft's LANtastic is a peer-to-peer networking operating system for
DOS, Windows, and OS/2.

It was originally developed by Artisoft Inc. in Arizona and its main


peculiarity lies precisely in its point-to-point networks, which means that
communication only between two points (two computers).

In addition to being less expensive than other types of networks, it is very


easy to configure and maintain and allows data and resources to be
shared.

Being multi-platform support, it is possible to access, from a client


workstation, a combination of Windows or DOS operating systems.

It also allows the possibility of sharing files, printers and any other
application within the corporate environment.

Advantages

 It is possible to restrict certain features on certain days and times


 Supports hundreds of workstations and more than 500 users.
 Up to 32 computers on a server can be observed and controlled
simultaneously.
 It is easy to install and maintain, and has a simple interface with
Microsoft and Novell
 It is the system with the greatest end-to-end security
 It is economical and has optional security
 It is possible to copy, paste and cut files from other machines

Disadvantages
 Acquiring it requires an extra cost compared to the acquisition of
other products in order to make it compatible with other operating
systems.
 It has a very low market
 Does not have support everywhere

NOVELL'S NETWARE
Novell NetWare is one of the best-known computer networking systems,
initially intended for use by large companies. It supports MAC and DOS
and is one of the most reliable platforms by offering secure access to both
the network and information resources.
Advantages

 It is one of the best large-scale network administrators


 It is a hardware-independent network operating system
 It has one of the best levels of security
 It is capable of supporting applications through loadable NetWare
modules and provides long-term technical support and assistance.

Disadvantages

 It is a more complex network operating system when installing and


managing which is influencing a loss of market
 The platform is a bit limited
 When using FTP or HTTP services it is necessary to purchase
additional software from Novell

 It is an expensive system in the case of small networks


 When updating, the process is slow and complex
 The operating system stopped being updated starting in 2009
MICROSOFT LAN MANAGER
Microsoft's LAN Manager is an operating system developed by Microsoft
and IBM, running under OS/2 that connects computers with DOS, OS-2
and UNIX. In addition to grouping domain file servers, it is suitable for
macro computers and has the particularity of being offered for both
dedicated and non-dedicated servers.
Advantages

 Has multiple file servers


 Offers permissions
 It has dedicated and non-dedicated servers

Disadvantages

 It is a practically obsolete system in terms of performance and


speed.
 Offers very little security

MICROSOFT WINDOWS SERVER


Windows Server is an operating system released by Microsoft as part of
the Windows NT family. This operating system is developed in C, C++ and
assemblyr. It is a multi-process system that supports several users.
However, it is more used by companies since the cost of the license is
somewhat high.
Windows Server Advantages

 It is very easy to use and manage. In addition, learning to use it is


very fast.
 It has excellent support and complete official documentation.
 Less development time for applications and programs.
 Supports ASP.NET, a fairly powerful framework. At the same time,
this framework is widely used in web development.

Disadvantages of Windows Server

It is also necessary to mention the disadvantages that this operating


system could present:

 As it is proprietary software, it is necessary to pay for the license to


use it.
 After an update it requires a restart.
 It consumes more resources if we compare it with other server
operating systems.
 It is complex: more knowledge is necessary for a high-level
installation.
 Low security: Due to being quite commercial, it is targeted by
malware developers, which is why they constantly take advantage
of flaws in the code of this system.

LINUX FOR SERVERS


Without a doubt, one of the most used network operating systems to date
is Linux , due to the countless advantages it offers. It is also completely
open source and free. However, Linux is not an operating system but a set
of operating systems and it is possible to find several distros that serve a
network.

Some of the most used Linux distributions for servers are:

 Ubuntu Server
 Red Hat Enterprise
 SUSE Linux
 CentOS
 Debian
Advantages of Linux Server

Linux is very stable , fast and reliable, making it an ideal system for
networks and servers.

It is free software : it is completely modifiable and has a wide variety


of free applications and programs on the internet.

It is no longer difficult to use as before : Over time, programs have


been developed in Linux that are used to configure the entire operating
system.

Disadvantages of Linux Server

 It is necessary to know all the hardware very well before installing it, so
as not to have problems with proprietary drivers that are not compatible
with this system.
 Does not support Windows hard drive partitions.
 It does not have support for applications and programs that run under
Windows.

You might also like