Skip to main content

NETWORK ARCHITECTURE & NETWORK TOPOLOGY

NETWORK ARCHITECTURE  & NETWORK TOPOLOGY

1. The way in which computers participate in a network with each other is called network architecture. 

2. The type of architecture chosen by an organisation depends on geographical location, number of users, the requirements of specific application packages, level of technical support available, existing systems, and of course cost etc 
Type of Network Architecture:- 
1. Peer to Peer Network 
2. Clint Server Network 
3. Hybrid Network

1. Peer to Peer Network 
Peer to peer is an approach to computer networking where all computers share equivalent responsibility for processing data differs from client-server networking, where certain devices have responsibility for providing or "serving" data and other devices consume or otherwise act as "clients" of those servers. Some main features of the Peer to Peer network 
a) Resources shared in a de
b) Shared resources include files and printers
c) Should be used where nodes 
d) Files are not stored centrally

e) Allows easy node
f) Support is usually part of OS
g) Sharing of files is responsibility of each participant
h) Participants form a ‘Workgroup’
i) Workgroup is assigned a name 
j) Peer to peer is best where Employees have little or no network experience
k) Peer to peer should be used with less than 15 nodes
l) Peer to peer does not require a server
m) It has very Little concern about security
n) Easy to configure
o) No requirement for server hardware/software
p) Users can manage their own resources
q) No need for a network administrator
r) Reduces total cost  

Disadvantages 
a) Provide a limited number of connections
b) May slow performance of nodes
c) Do not allow central management 
d) Do not have a central store of files 
e) Users responsible for managing own resources 
f) Offers very poor security 
g) Uses share-level security 
h) Allows password protection of resources 
i) Options are: 
j) Give access to all 
k) Assign a single password and give to all users who require access to the resource 
l) With share-level security a password cannot be assigned to a single individual – it 
assigned to the resource (soon everyone knows what the password is). 
 
2. Clint Server Architecture 
Clint Server network Architecture is a network in which there may be one or more servers for different purpose and clients to access the resources of server or the service provided by the different servers. The servers create the policy and client follows them. This type of architecture is most preferred architecture as it gives a centralized management of all the resources like clients, files, folders, printers, mail etc. The all administrative work like management of clients, assigning them various rights, assigning permission on folders, updating of computers, managements of computers all can be done from a central place thereby gives full control on the network. Some of the features of the client server architecture are as follows 

 Features:- 
1. Most common architecture 
2. Sometimes ‘next step’ after an organisation has outgrown peer-to-peer 
3. Centralised model for data storage, security, running applications and network administration 
4. Provide services such as printing, email etc 
5. Allow a high level of security to be implemented 
6. Can be centrally managed 

 Advantages:- 
1. Inexpensive but powerful way of managing the network 
2. Open systems means it can be expended as per requirements
3. Grows easily 
4. Individual client operating systems are required

 Disadvantages:- 
1. Maintenance nightmares 
2. Support tools lacking 
3. Retraining required 

Multi server Networks:- 
    A network in which more than one servers (physically) are used is called a multi server Networks. Whether a network will have single server or multi server depends on various factor like total no of clients, volume of traffic, type of role, server has to perform etc however a multi server network always gives more stability to the network. Some of the features of the multi server network are as follows - 

1. Each server provides a different service (or duplicates to provide redundancy) 
2. Typically 50 – 500 users 
3. Improves performance 
4. Servers optimized for their service 
5. Much more complex than single-server 
6. Supports thousands of users across company’s geographical locations 
7. May involve hundreds of servers 
8. Each location looks like a simple client-server system, but is linked to the corporate network 
9. A WAN extends the client-server model across many LANs (involving several servers to satisfy a request) 

Hybrid Networks:- 
    A LAN with a mixture of topologies and access methods is known as hybrid Networks. For example, a network that includes both a token ring and a CSMA/CD bus or A computer network made up of more than one platform or operating system or A network composed of both public and private facilities are known as Hybrid Network. Some of the features are as follows 1. Incorporates the best features of workgroups in Peer-to-Peer with the performance, reliability and security of server-based systems. 
2. Allows access to central resources, but also allows users to function at the Peer-to-Peer level 
3. Users do not have to log in to a central server 
4. Client-server apps are still centrally managed 
5. Users can assign local access to their resources 
6. Workgroups can manage resources without need for assistance from network administrator 
7. Network access can become burdensome 
8. Users required to remember multiple passwords 
9. Files can be duplicated. 
10. Files stored on the workstation are not backed up.

NETWORK TOPOLOGY
The actual layout of a network and its media is called its physical topology and the way in which the data access the medium and transmits packets is the logical topology. 
    A glance at a network is not always revealing the type of network topology it actually has. Cables emerging from a Hub do not make it necessarily a Star Topology – it may actually be a bus or a ring. Choice of Logical Topology affects the Physical Topology – and vice versa. Design carefully – it may be difficult to change part way through the installation. Choice determines cable installation, network devices, network connections, protocols (and where to drill holes in the building!) 
Type of Physical Topologies 
1. Bus 
2. Ring 
3. Star 
4. Extended Star 
5. Mesh 
6. Hybrid 
Factors Affecting choice of a Topology 
1. Cost 
2. Scalability 
3. Bandwidth Capacity 
4. Ease of Installation 
5. Ease of fault finding and maintenance

BUS Topology:- 
A network topology in which nodes are connected to a single cable with terminators at each end or A network architecture in which all the nodes are connected to a shared cable or A LAN architecture in which all the devices are connected to a bus, or one communication line. Bus topology does not have a central point. 
 Some main features are as follows :- 
1. Network maintained by a single cable 
2. Cable segment must end with a terminator 
3. Uses thin coaxial cable (backbones will be thick coaxial cable) 
4. Extra stations can be added in a daisy chain manner
5. Standard is IEEE 802.3 
6. Thin Ethernet (10Base2) has a maximum segment length of 200m 
7. Max no. of connections is 30 devices 
8. Four repeaters may be used to a total cable length of 1000m 
9. Max no. of nodes is 150 
10. Thick Ethernet (10Base5) used for backbones 
11. Limited to 500m 
12. Max of 100 nodes per segment 
13. Total of four repeaters , 2500m, with a total of 488 nodes is permissible 

Advantages 
1. Inexpensive to install 
2. Easy to add stations 
3. Use less cable than other topologies 
4. Works well for small networks

Disadvantages 
1. No longer recommended 
2. Backbone breaks, whole network down 
3. Limited no of devices can be attached 
4. Difficult to isolate problems 
5. Sharing same cable slows response rates

Ring Topology 
    A system of local area networking in which each node or station is connected to two others, ultimately forming a loop is called a ring topology. Data are passed in one direction only, being received by each node and then transferred to the next node or A LAN topology that connects each node in a ring to create a circle. Each node acts as a repeater to regenerate the signal. Some of the features of Ring Topology are:- 
1. No beginning or end (a ring in fact!!) 
2. All devices have equality for access of media 
3. Single ring – data travels in one direction only. 
4. Each device has to wait its turn to transmit 
5. Most common type is Token Ring (IEEE 802.5)
6. A token contains the data, reaches the destination, data extracted, acknowledgement of receipt sent back to transmitting device, removed, empty token passed on for another device to use. 
This is the main principle how a token Ring works. 

Advantages 
Data packets travel at great speed 
1. No collisions 
2. Easier to fault find 
3. No terminators required 

Disadvantages 
1. Requires more cable than a bus 
2. A break in the ring will bring it down 
3. Not as common as the bus – less devices available 

Star Topology 
    A network topology in which nodes are connected to a common device such as hub or concentrator is called a star topology or A physical network topology in which all nodes are connected to a central connectivity device (e.g. a hub or switch).The main features of a star topology is as follows 
1. It is Like the spokes of a wheel (without the symmetry) 
2. Centre point is a Hub or switch 
3. Segments meet at the Hub 
4. Each device needs its own cable to the Hub 
5. Predominant type of topology 
6. Easy to maintain and expand 
7. Easy to add devices as the network expands 
8. One cable failure does not bring down the entire network (resilience) 
9. Hub provides centralised management 
10. Easy to find device and cable problems 
11. Can be upgraded to faster speeds 
12. Lots of support as it is the most used 

Disadvantages 
1. A star network requires more cable than a ring or bus network 
2. Failure of the central hub can bring down the entire network 
3. Costs are higher (installation and equipment) than for most bus networks

Extended Star Topology
A Star Network which has been expanded to include when more than one Hub/Switch is connected to form a topology same is known as topology. 

Mesh Topology (Web) 
    This is a topology in which devices are connected with many redundant (alternative) 
interconnections between network nodes. In a true mesh topology every node has a connection to 
every other node directly as well as indirectly to meet any unexpected failover approach. Some 
features of the mesh topology is as follows
1. Not common on LANs
2. Most often used in WANs to interconnect LANS
3. Each node is connected to every other node
4. Allows communication to continue in the event of a break in any one connection
5. It is “Fault Tolerant”
6. Expensive 
7. Difficult to install 
8. Difficult to manage
9. Difficult to troubleshoot
10.Improves Fault Tolerance

Hybrid Topology 
A network topology that uses two or more network topologies is known as Hybrid Topologies.
Features:- 
1. Old networks are updated and replaced, leaving older segments
2. Hybrid Topology 
3. Commonly Star-Bus or Star
4. Star-Ring uses a MAU (Multi station Access Unit)

Logical Topologies 
    Also called signal topology. The logical topology is the way in which the signals act on the network media or the way in which the data passes through the network from one device to the next without regard to the physical interconnection of the devices. 
    Logical topologies are bound to the network protocols that direct how the data moves across a 
network. The Ethernet protocol is a common logical bus topology protocol. IBM's Token Ring is a 
common logical ring topology protocol. 
A network's logical topology is not necessarily the same as its physical topology. For example, twisted pair Ethernet is a logical bus topology in a physical star topology layout. While IBM's Token Ring is a logical ring topology, it is physically set up in a star topology. A Physical Star topology could be either a Bus or Ring in logical terms i.e in terms of data passing method. To further understand the same we can say that data packet inside a network will either be passed to all nodes in simultaneously like a BUS topology or one by one ,if it is transmitted simultaneously it is called logical BUS and if it is transmitted one by one to all nodes it is called logical ring.(for more better understanding students can refer working of Ethernet and token ring in subsequent chapters) 
There are two types of logical topology 
1. Logical BUS 
2. Logical Ring
 
Logical Bus
Features 
1. Modern Ethernet networks are Star Topologies (physically) 
2. The Hub is at the centre, and defines a Star Topology 
3. The Hub itself uses a Logical Bus Topology internally, to transmit data to all segments 

Advantages 
1. A single node failure does not bring the network down 
2. Most widely implemented topology 
3. Network can be added to or changed without affecting other stations
Disadvantages 
1. Collisions can occur easily 
2. Only one device can access the network media at a time 

Logical Ring 
Features 
1. Data in a Star Topology can transmit data in a Ring
2. The MAU (Multi station Access Unit) looks like an ordinary Hub, but data is passed internally using a logical ring 
3. It is superior to a Logical Bus Hub

Advantages:- 
1. The amount of data that can be carried in a single message is greater than on a 
logical bus 
2. There are no collisions 

Disadvantages:- 
1. A broken ring will stop all transmissions 
2. A device must wait for an empty token to be able to transmit


अन्य विषय 
अन्य जानकारी

Comments

Popular posts from this blog

Computer Generation/कंप्यूटर निर्माण की पीढियां

 पहली पीढ़ी कंप्यूटर (1946-1954)     इलेक्ट्रॉनिक वाल्व (वैक्यूम ट्यूब) का उपयोग करने वाले डिजिटल कंप्यूटर को पहली पीढ़ी के रूप में जाना जाता है। पहली पीढ़ी के कंप्यूटरों के कुछ उदाहरण हैं इंटरनेशनल बिजनेस मशीन की IBM-700 श्रृंखला IBM-701, IMB-709, EDVAC (इलेक्ट्रॉनिक डिस्क्रीट वेरिएबल ऑटोमैटिक कंप्यूटर), और UNIVAC (यूनिवर्सल ऑटोमैटिक कंप्यूटर)। पहली पीढ़ी के कंप्यूटर आमतौर पर सीपीयू घटकों के रूप में वैक्यूम ट्यूबों का उपयोग करते थे। वैक्यूम ट्यूबों की उच्च लागत ने मुख्य मेमोरी के लिए उनके उपयोग को रोक दिया। MIT में निर्मित बवंडर I, फेराइट कोर मेमोरी का उपयोग करने वाला पहला कंप्यूटर था। पहली पीढ़ी के कंप्यूटर प्रोग्रामिंग के लिए विधानसभा भाषा का इस्तेमाल किया। वे निश्चित-बिंदु अंकगणित का उपयोग करते थे। दूसरी पीढ़ी  कंप्यूटर (1955-1964)     दूसरी पीढ़ी के कंप्यूटरों में सीपीयू घटकों के लिए उपयोग किए जाने वाले ट्रांजिस्टर, मुख्य मेमोरी के लिए फेराइट कोर और द्वितीयक मेमोरी के लिए चुंबकीय डिस्क, ड्रम और टेप होते थे। उन्होंने प्रोग्रामिंग के लिए उच्च स्तरीय भाषा जैसे FOTRON (1956) ALGOL (19

ईथरनेट शब्दावली /Ethernet Terminology

           ईथरनेट   शब्दावली   ईथरनेट नियमों के एक सरल सेट का अनुसरण करता है जो इसके मूल संचालन को नियंत्रित करता है। इन नियमों को बेहतर ढंग से समझने के लिए, ईथरनेट शब्दावली की मूल बातें समझना महत्वपूर्ण है।  मध्यम   (Medium) ईथरनेट डिवाइस एक सामान्य माध्यम से जुड़ते हैं जो एक रास्ता प्रदान करता है जिसके साथ इलेक्ट्रॉनिक सिग्नल यात्रा करेंगे। ऐतिहासिक रूप से, यह माध्यम समाक्षीय तांबा केबल रहा है, लेकिन आज यह अधिक सामान्यतः एक मुड़ जोड़ी या फाइबर ऑप्टिक केबलिंग है।   खंड ( Segment ) हम ईथरनेट खंड के रूप में एकल साझा माध्यम का उल्लेख करते हैं। नोड डिवाइस जो उस सेगमेंट से जुड़ते हैं वे स्टेशन या नोड होते हैं। ढांचा नोड्स छोटे संदेशों में कहे जाते हैं, जिन्हें फ्रेम कहा जाता है, जो सूचनाओं के भिन्न आकार होते हैं।  फ़्रेम ( Frame )  मानव भाषा में वाक्यों के अनुरूप हैं। अंग्रेजी में, हमारे वाक्य बनाने के नियम हैं: हम जानते हैं कि प्रत्येक वाक्य में एक विषय और एक विधेय होना चाहिए। ईथरनेट प्रोटोकॉल फ्रेम के निर्माण के लिए नियमों का एक सेट निर्दिष्ट करता है। फ़्रेम के लिए अधिकतम लंबाई, और फ़्रे

मदर बोर्ड / Motherboard

Popular posts from this blog

Computer Generation/कंप्यूटर निर्माण की पीढियां

 पहली पीढ़ी कंप्यूटर (1946-1954)     इलेक्ट्रॉनिक वाल्व (वैक्यूम ट्यूब) का उपयोग करने वाले डिजिटल कंप्यूटर को पहली पीढ़ी के रूप में जाना जाता है। पहली पीढ़ी के कंप्यूटरों के कुछ उदाहरण हैं इंटरनेशनल बिजनेस मशीन की IBM-700 श्रृंखला IBM-701, IMB-709, EDVAC (इलेक्ट्रॉनिक डिस्क्रीट वेरिएबल ऑटोमैटिक कंप्यूटर), और UNIVAC (यूनिवर्सल ऑटोमैटिक कंप्यूटर)। पहली पीढ़ी के कंप्यूटर आमतौर पर सीपीयू घटकों के रूप में वैक्यूम ट्यूबों का उपयोग करते थे। वैक्यूम ट्यूबों की उच्च लागत ने मुख्य मेमोरी के लिए उनके उपयोग को रोक दिया। MIT में निर्मित बवंडर I, फेराइट कोर मेमोरी का उपयोग करने वाला पहला कंप्यूटर था। पहली पीढ़ी के कंप्यूटर प्रोग्रामिंग के लिए विधानसभा भाषा का इस्तेमाल किया। वे निश्चित-बिंदु अंकगणित का उपयोग करते थे। दूसरी पीढ़ी  कंप्यूटर (1955-1964)     दूसरी पीढ़ी के कंप्यूटरों में सीपीयू घटकों के लिए उपयोग किए जाने वाले ट्रांजिस्टर, मुख्य मेमोरी के लिए फेराइट कोर और द्वितीयक मेमोरी के लिए चुंबकीय डिस्क, ड्रम और टेप होते थे। उन्होंने प्रोग्रामिंग के लिए उच्च स्तरीय भाषा जैसे FOTRON (1956) ALGOL (19

मदर बोर्ड / Motherboard

ईथरनेट शब्दावली /Ethernet Terminology

           ईथरनेट   शब्दावली   ईथरनेट नियमों के एक सरल सेट का अनुसरण करता है जो इसके मूल संचालन को नियंत्रित करता है। इन नियमों को बेहतर ढंग से समझने के लिए, ईथरनेट शब्दावली की मूल बातें समझना महत्वपूर्ण है।  मध्यम   (Medium) ईथरनेट डिवाइस एक सामान्य माध्यम से जुड़ते हैं जो एक रास्ता प्रदान करता है जिसके साथ इलेक्ट्रॉनिक सिग्नल यात्रा करेंगे। ऐतिहासिक रूप से, यह माध्यम समाक्षीय तांबा केबल रहा है, लेकिन आज यह अधिक सामान्यतः एक मुड़ जोड़ी या फाइबर ऑप्टिक केबलिंग है।   खंड ( Segment ) हम ईथरनेट खंड के रूप में एकल साझा माध्यम का उल्लेख करते हैं। नोड डिवाइस जो उस सेगमेंट से जुड़ते हैं वे स्टेशन या नोड होते हैं। ढांचा नोड्स छोटे संदेशों में कहे जाते हैं, जिन्हें फ्रेम कहा जाता है, जो सूचनाओं के भिन्न आकार होते हैं।  फ़्रेम ( Frame )  मानव भाषा में वाक्यों के अनुरूप हैं। अंग्रेजी में, हमारे वाक्य बनाने के नियम हैं: हम जानते हैं कि प्रत्येक वाक्य में एक विषय और एक विधेय होना चाहिए। ईथरनेट प्रोटोकॉल फ्रेम के निर्माण के लिए नियमों का एक सेट निर्दिष्ट करता है। फ़्रेम के लिए अधिकतम लंबाई, और फ़्रे

Ethernet/ईथरनेट

         ईथरनेट (Ethernet)  ईथरनेट एक ऐसा प्रोटोकॉल है जो सभी डिवाइसों को सभी साझा किए गए एकल केबल की मदद से नेटवर्क पर अन्य सभी उपकरणों के साथ संचार करने में सक्षम बनाता है। यह मूल रूप से दो सरल पर काम करता है प्रधान अध्यापक:- 1. एक निश्चित समय पर केवल एक उपकरण संचारित होगा और बाकी सभी वाहक के सुनने में होंगे। पैकेट सभी को भेजा जाएगा लेकिन केवल सही नोड द्वारा प्राप्त किया जाएगा। बाकी सभी नोड इस पैकेट को अस्वीकार कर देंगे। एक बार पैकेट को अग्रेषित करने के बाद अगला उपकरण समाप्त हो जाएगा और अन्य सभी सुनने में होंगे। 2. यदि दो डिवाइस एक ही समय में अग्रेषित करना शुरू करते हैं तो पैकेट की टक्कर होगी और संवेदन के बाद दोनों उपकरण प्रसारण बंद कर देंगे और फिर से एक-एक करके प्रसारण शुरू कर देंगे।   1973 में, ज़ेरॉक्स कॉरपोरेशन के पालो ऑल्टो रिसर्च सेंटर (जिसे आमतौर पर PARC के रूप में जाना जाता है) में, शोधकर्ता बॉब मेटकाफ ने पहले ईथरनेट नेटवर्क का डिजाइन और परीक्षण किया। ज़ेरॉक्स के "ऑल्टो" कंप्यूटर को प्रिंटर से लिंक करने के तरीके पर काम करते समय, मेटकाफ ने केबल बिछाने की भौतिक विधि व

Novell netware & window NT

INTRODUCTION OF VARIOUS NETWORK OPERATING SYSTEMS AND THEIR SPECIAL FEATURES       Proper support of a local area network requires hardware, software, and miscellaneous support devices .A network operating system is the most important software component. Application programs  are also required to support users on a LAN. Support devices such as hubs, switches, routers, servers,modems, power supplies and more are also necessary other than operating system.       An operating system manages all applications and resources in a computer.       A multitasking operating system supports the execution of multiple processes at one time.       A network operating system is a large, complex program that manages the resources common on most local area networks .Besides performing standard operating system functions, a network operating system is called upon for additional functions, such as …  a) Maintain a file system of data sets , application ,user profiles ,network peripherals etc  b) Coordinat

What is Computer ? कम्प्यूटर क्या है?

WHAT IS A COMPUTER?       Computer is a device which accepts input, processes it, stores the data, if required and gives desired output as per user requirement. The term computer is used to describe a device made up of a  combination of electronic and electromechanical (part electronic and part mechanical) components. By itself, a computer has no intelligence and is referred to as hardware. In general the computer does the  following.  1. Accept user supplied data and instructions.  2. Stores large volume of information given at high speed as per the instruction given.  3. Process the information given at a high speed as per the instruction given.  4. Output the results according to user specifications 5. Transfers Data, Images, Sound and Graphics through cables at a very fast rate       In other words, we supply to the computer; the data to be processed and the instructions to  process the data with. The computer remembers both the data and the instructions, does the processing  when

Computer Basic Short Cut Key

Computer Basic Short Cut Key Ctrl+ A            Select all contents of the page Ctrl+B               Bold highlighted selection Ctrl+C               copy selected text Ctrl+V               Paste selected text Ctrl+X               Cut Selected text Ctrl+Y               Redo the last action performed Ctrl+Z             Undo Last action Delete               Delete function Shift+F10 Key Displays the shortcut Menu for the selected   item Shift+Delete      Delete the selected item permanently without placing it in the recycle Bin to display F1 Key             To Display Help F2 Key             Rename the selected   item. F3 Key             Search a folder or a file F4 Key             Display the address Bar list in my computer or Windows Explorer F5 Key             Update the Active Windows F6 Key             Cycle through the screen elements in a windows   or on the desktop F10 Key            To active the Menu Bar in the active program Ctrl­+A               Select All items Ctrl+F4

TYPES OF RAM AND ROM

TYPES OF RAM AND ROM  Common RAM Types  • SRAM       Static random access memory uses multiple transistors, typically four to six, for each memory cell  but doesn't have a capacitor in each cell. It is used primarily for cache. These types of memory are physically bulky and somewhat limited to its capacity.       In Static RAM, a form of flip-flop holds each bit of memory. A flip-flop for a memory cell takes four or six transistors along with some wiring, but never has to be refreshed. This makes static RAM significantly faster than dynamic RAM. However, because it has more parts, a static memory cell takes up a lot more space on a chip than a dynamic memory cell. Therefore, you get less memory per chip, and that makes static RAM a lot more expensive      Static RAM is fast and expensive, and dynamic RAM is less expensive and slower. Static RAM is  used to create the CPU's speed-sensitive cache, while dynamic RAM forms the larger system RAM space.  • DRAM  In the most common fo

Computer Objective Quetions 03

Computer Objective Quetions 03 Ans is at bottom 1 . The brain of a computer is (1) CPU (2) CD (3) Floppy disc (4) Megabyte  (5) None of these www.hinsoli.com 2. In computer language, one kilobyte equals (1) 1000 bytes  (2) 1024 bytes  (3) 100 bytes (4) 8 bytes (5) None of these S 3. Example of a telecommunications device is a (1) Keyboard  (2) Mouse (3) Modem (4) Printer (5) Scanner www.hinsoli.com 4. A device that copies or reproduced text and images is also called a(n) (1) Optical scanner (2) Bar code reader (3) Character device (4) Digital camera (5) Printer 5. Storage that retains its data after the power is turned off is referred to as (1) Volatile storage (2) Sequential storage (3) Direct storage (4) Non-volatile storage (5) Mobile storage 6. Which of these system input and output devices are located outside the system unit? (1) Desktop system (2) Personal digital assistants (3) Smartphone (4) Laptop computer (5) None of the above (7) . A byte is formed by a group of (1) 4 bits 2

GENERATION OF COMPUTERS

HISTORY AND GENERATION OF COMPUTERS  First Generation (1946-1954)        The digital computers using electronic valves (vacuum tubes) are known as first-generation  computers. Some examples of the first-generation computers are International Business Machine’s IBM-700 series IBM-701, IMB-709, EDVAC (Electronic Discrete Variable Automatic Computer), and UNIVAC (Universal Automatic Computer). The first generation computers usually used Vacuum tubes as CPU components. The high cost of vacuum tubes prevented their use for main memory. Whirlwind I, constructed at MIT was the first computer to use ferrite core memory. The first generation computers  used assembly language for programming. They used fixed-point arithmetic.  Second Generation (1955-1964)       The second-generation computers used transistors used for CPU components, ferrite cores for main memory, and magnetic disks, drums and tapes for secondary memory. They used high level language such as FOTRON (1956) ALGOL (1960) and COBOL