Information Systems Networking Essentials
VerifiedAdded on 2023/04/03
|12
|2957
|386
AI Summary
This document provides an overview of information systems networking essentials, including network devices, network simulation using packet tracer, modern computer networks, and network security and data verification issues. It discusses the functions of different network devices such as repeaters, hubs, bridges, switches, routers, gateways, and brouters. It also explains the concept of network simulation using packet tracer and the functions of LANs, WANs, and wireless networks. Additionally, it addresses network security concerns such as confidentiality, integrity, and availability.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
INFORMATION SYSTEMS NETWORKING ESSENTIALS 1
Information Systems Networking Essentials
Student Name
Institution
Course
Date
Information Systems Networking Essentials
Student Name
Institution
Course
Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INFORMATION SYSTEMS NETWORKING ESSENTIALS 2
Table of Contents
Introduction................................................................................................................................3
Network Devices........................................................................................................................3
Network Simulation Using Packet Tracer..................................................................................4
Modern Computer Networks......................................................................................................6
Network Security and Data Verification Issues.........................................................................8
Conclusion................................................................................................................................10
List of References....................................................................................................................12
Table of Contents
Introduction................................................................................................................................3
Network Devices........................................................................................................................3
Network Simulation Using Packet Tracer..................................................................................4
Modern Computer Networks......................................................................................................6
Network Security and Data Verification Issues.........................................................................8
Conclusion................................................................................................................................10
List of References....................................................................................................................12
INFORMATION SYSTEMS NETWORKING ESSENTIALS 3
Introduction
A computer network is a set of computers connected to one another that allows one
PC (personal computer) to interact with other PCs and share their data, resources, and
applications (Comer, 2015). A computer network consists of several characteristics which
include sharing resources from a single laptop to another, creating documents and storing
them in a single computer and accessing those documents in other laptops linked over the
network, and connecting one PC within the network to a scanner, printer or a fax machine
and allowing other network PCs utilize the devices available over the network. The basic
hardware components needed to establish a computer network are distributors, internal
network cards, network cables, routers and external network cards (Fisher, 2011). The
context will discuss the main functions and different components of modern computer
networks, sketch, design, develop and troubleshoot a basic LAN (Local Area Network), and
identify and evaluate the major data verification and security concerns associated with the
maintenance and creation of computer networks.
Network Devices
There are different kinds of networking devices which operate together to ensure the
network is operating well and is offering the required services to the end users. Every device
has a specific role within the network (Akyildiz, Rudin and Stiller, 2019). This section will
identify the different network devices with their specific functions
Repeater: this is a networking device that operates on the physical layer of the OSI
model and its function is to receive and boost signals over the same network to extend the
coverage to which the signal can be transmitted. It is important to note that repeater just
regenerates the signals bit by bit at its original strength but does not amplify it.
Hub: a hub functions more like a switch and connects different devices on the
network. This device is mostly used in the star network topology to connect different
workstations. What distinguishes a hub and a switch is that a hub broadcast the signal to all
the devices connected to it because it does not filter the data (Buh, Trobec and Ciglič, 2014).
A hub lacks the intelligent feature to specify the recipient of the signal on the network.
Bridge: this is basically a repeater with added features such as the ability to filter the
traffic by determining the source and destination MAC addresses. A bridge operates on the
Introduction
A computer network is a set of computers connected to one another that allows one
PC (personal computer) to interact with other PCs and share their data, resources, and
applications (Comer, 2015). A computer network consists of several characteristics which
include sharing resources from a single laptop to another, creating documents and storing
them in a single computer and accessing those documents in other laptops linked over the
network, and connecting one PC within the network to a scanner, printer or a fax machine
and allowing other network PCs utilize the devices available over the network. The basic
hardware components needed to establish a computer network are distributors, internal
network cards, network cables, routers and external network cards (Fisher, 2011). The
context will discuss the main functions and different components of modern computer
networks, sketch, design, develop and troubleshoot a basic LAN (Local Area Network), and
identify and evaluate the major data verification and security concerns associated with the
maintenance and creation of computer networks.
Network Devices
There are different kinds of networking devices which operate together to ensure the
network is operating well and is offering the required services to the end users. Every device
has a specific role within the network (Akyildiz, Rudin and Stiller, 2019). This section will
identify the different network devices with their specific functions
Repeater: this is a networking device that operates on the physical layer of the OSI
model and its function is to receive and boost signals over the same network to extend the
coverage to which the signal can be transmitted. It is important to note that repeater just
regenerates the signals bit by bit at its original strength but does not amplify it.
Hub: a hub functions more like a switch and connects different devices on the
network. This device is mostly used in the star network topology to connect different
workstations. What distinguishes a hub and a switch is that a hub broadcast the signal to all
the devices connected to it because it does not filter the data (Buh, Trobec and Ciglič, 2014).
A hub lacks the intelligent feature to specify the recipient of the signal on the network.
Bridge: this is basically a repeater with added features such as the ability to filter the
traffic by determining the source and destination MAC addresses. A bridge operates on the
INFORMATION SYSTEMS NETWORKING ESSENTIALS 4
data link layer of the OSI model. It can also be used to connect two different LAN operating
on the same protocol. It has a single output port and a single input port, therefore, it has only
two ports.
Switch: this is a networking device that is used to extend the network and is designed
to boost is performance and efficiency because it has many ports to connect the different
devices on the network. A switch has the ability to check for errors before transmitting the
data to the destination node. Also, it is intelligent enough to identify the right destination port
and will only forward the signals to that port (Comer, 2015).
Router: this device is typically used to route traffic and data signals depending on
their IP addresses. It operates on the network layer of the OSI layer and links WANs and
LANs to have a dynamic routing table which it uses to make routing decisions (Fisher, 2011).
Gateway: a gateway is a networking device that is used to connect two different
networks with different network models. As such, the gateway functions as an agent to
receive traffic or data packets from one network, analyze and interpret it, and transmits it to a
different network (Fisher, 2011). A gateway is sometimes referred to as a protocol converter.
As compared to a router or a switch, a gateway is a more complex device.
Brouter: this is a networking device that integrates the functions of a router and a
bridge. It operates either on the network or data link layer. As a bridge, it can filter local
traffic from the local network (Roy, Saraf and Shewale, 2017). As a router, it has the ability
to route packets to different destinations.
Modem: a modem is responsible for modulating and demodulating traffic signals
between analog signals that are transmitted over the telephone line and digital data that can
be understood by the computer (Jahanshahi and Bistouni, 2019). Modems make it possible to
transmit digital data over analog networks.
Network Simulation Using Packet Tracer
Packet tracer is a powerful tool used in network simulation. It can also be used to train
professionals and students for network certification courses on how to come up and design a
network that can accommodate many devices and be able to monitor, manage, and
troubleshoot them (Hashimi and Güneş, 2017). Simulation tools are required in network
design to enable the network engineers and administrators to first simulate a network before
data link layer of the OSI model. It can also be used to connect two different LAN operating
on the same protocol. It has a single output port and a single input port, therefore, it has only
two ports.
Switch: this is a networking device that is used to extend the network and is designed
to boost is performance and efficiency because it has many ports to connect the different
devices on the network. A switch has the ability to check for errors before transmitting the
data to the destination node. Also, it is intelligent enough to identify the right destination port
and will only forward the signals to that port (Comer, 2015).
Router: this device is typically used to route traffic and data signals depending on
their IP addresses. It operates on the network layer of the OSI layer and links WANs and
LANs to have a dynamic routing table which it uses to make routing decisions (Fisher, 2011).
Gateway: a gateway is a networking device that is used to connect two different
networks with different network models. As such, the gateway functions as an agent to
receive traffic or data packets from one network, analyze and interpret it, and transmits it to a
different network (Fisher, 2011). A gateway is sometimes referred to as a protocol converter.
As compared to a router or a switch, a gateway is a more complex device.
Brouter: this is a networking device that integrates the functions of a router and a
bridge. It operates either on the network or data link layer. As a bridge, it can filter local
traffic from the local network (Roy, Saraf and Shewale, 2017). As a router, it has the ability
to route packets to different destinations.
Modem: a modem is responsible for modulating and demodulating traffic signals
between analog signals that are transmitted over the telephone line and digital data that can
be understood by the computer (Jahanshahi and Bistouni, 2019). Modems make it possible to
transmit digital data over analog networks.
Network Simulation Using Packet Tracer
Packet tracer is a powerful tool used in network simulation. It can also be used to train
professionals and students for network certification courses on how to come up and design a
network that can accommodate many devices and be able to monitor, manage, and
troubleshoot them (Hashimi and Güneş, 2017). Simulation tools are required in network
design to enable the network engineers and administrators to first simulate a network before
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INFORMATION SYSTEMS NETWORKING ESSENTIALS 5
buying the actual devices (Mohammed and Samaa, 2018). Packet tracer is a product from
Cisco, and its objective is to help network design enthusiasts to learn the various aspects of
networking and equip themselves with Cisco technology skills. Nevertheless, it is important
to mention that it is not a replacement to Switches or Routers.
It is a freeware program and can be freely downloaded and used if one has a Netacad
account. Many network experts have argued that the best way to learn network design and
implementation is to do it and participate in actual setup (Muhammet, 2015). However, for
student limited number of devices are available for them to interact with, as a result, there is
need to have a simulation tool that will enable them perform networking activities without
having to buy devices that would otherwise be expensive for the school or for individuals to
buy.
Packet tracer enables network professionals to simulate even the most complex
networking scenarios before deploying them using real devices (Mohammed and Samaa,
2018). In this paper, packet tracer will be used to simulate a small network that will represent
how various devices communicate. In the scenario, the building has three floors. Ground
floor is basically the Data center and IT department. First floor represents students VLAN,
second floor represent Staff VLAN, and third floor represents Vice Chancellor’s VLAN. In
the simulation, it can be noted how the different devices including routers, switches,
workstations, and servers communicate seamlessly.
The diagram below shows the simulation in the packet tracer:
buying the actual devices (Mohammed and Samaa, 2018). Packet tracer is a product from
Cisco, and its objective is to help network design enthusiasts to learn the various aspects of
networking and equip themselves with Cisco technology skills. Nevertheless, it is important
to mention that it is not a replacement to Switches or Routers.
It is a freeware program and can be freely downloaded and used if one has a Netacad
account. Many network experts have argued that the best way to learn network design and
implementation is to do it and participate in actual setup (Muhammet, 2015). However, for
student limited number of devices are available for them to interact with, as a result, there is
need to have a simulation tool that will enable them perform networking activities without
having to buy devices that would otherwise be expensive for the school or for individuals to
buy.
Packet tracer enables network professionals to simulate even the most complex
networking scenarios before deploying them using real devices (Mohammed and Samaa,
2018). In this paper, packet tracer will be used to simulate a small network that will represent
how various devices communicate. In the scenario, the building has three floors. Ground
floor is basically the Data center and IT department. First floor represents students VLAN,
second floor represent Staff VLAN, and third floor represents Vice Chancellor’s VLAN. In
the simulation, it can be noted how the different devices including routers, switches,
workstations, and servers communicate seamlessly.
The diagram below shows the simulation in the packet tracer:
INFORMATION SYSTEMS NETWORKING ESSENTIALS 6
Figure 1: Packet Tracer Simulation (Hashimi and Güneş, 2017)
Modern Computer Networks
Local Area Network (LAN)
A LAN is a set of computers and related machines that share the same wireless link or
communications line. Usually, linked devices share server’s or a processor’s resources within
a limited geographical space. A LAN is helpful for the distribution of resources such as
games, documents, printers and other programs (Irving, 2010). Besides, A LAN links to the
internet, and other LANs and WANs (Wide Area Networks).
Functions of a LAN
The key function of a LAN is to offer mutual communication and resource sharing, which
offers the following key services (Jovanovic et al., 2010).
Resource sharing: LAN allows file, hardware resource and software inventory
information sharing. Consumers can share application software and system software
over a network.
Email and transfer of data: transfer of file and data is an essential characteristic of
modern LANs. Apart from transmitting data and documents, LAN can transmit
images and voices.
Enhance the dependability of the computer system: LAN PCs can support one another
to avoid disruption of business processes if one device fails.
Figure 1: Packet Tracer Simulation (Hashimi and Güneş, 2017)
Modern Computer Networks
Local Area Network (LAN)
A LAN is a set of computers and related machines that share the same wireless link or
communications line. Usually, linked devices share server’s or a processor’s resources within
a limited geographical space. A LAN is helpful for the distribution of resources such as
games, documents, printers and other programs (Irving, 2010). Besides, A LAN links to the
internet, and other LANs and WANs (Wide Area Networks).
Functions of a LAN
The key function of a LAN is to offer mutual communication and resource sharing, which
offers the following key services (Jovanovic et al., 2010).
Resource sharing: LAN allows file, hardware resource and software inventory
information sharing. Consumers can share application software and system software
over a network.
Email and transfer of data: transfer of file and data is an essential characteristic of
modern LANs. Apart from transmitting data and documents, LAN can transmit
images and voices.
Enhance the dependability of the computer system: LAN PCs can support one another
to avoid disruption of business processes if one device fails.
INFORMATION SYSTEMS NETWORKING ESSENTIALS 7
A LAN supports easy process distribution where tasks are divided across systems that
are connected to a powerful, high-performance system via a specific algorithm.
A local area network is made up of three major elements including hardware (servers,
workstations, routers, switches, modems among others), network software (network operating
system, firewall, among others), and the users (Miller, 2011). Every component has a specific
function on the network.
Wide Area Network (WAN)
This is a type of computer network that covers a wider area as compared to a LAN. It
spans across countries, states, or cities and can be public or private WAN. A WAN connects
many smaller LANs across different location (Roese et al., 2010).
Functions of WAN
A WAN has several functions especially if a company have several branches in
multiple locations. It enhances internal communication and improves productivity. The
following are some of the functions of WAN:
Improve privacy: having a WAN will enable sharing sensitive data with all the
branches and offices in a different location over the internet (Trivedi, 2013). Encryption can
be employed to ensure that an extra security layer is added for any sensitive materials
transmitted over a WAN. An organization requires all the security mechanisms it can
implement because of the increasing number of hackers and other cybercriminals targeting
critical corporate information.
Centralized IT infrastructure: WAN allows a company to set up one data center that is
accessible from any location and eliminates the need to bur file or email servers for every
office (Trivedi, 2013). Having one data center enables centralized management and
monitoring of all the IT resources and functions.
Eliminates ISDN requirement: WAN has enabled enterprises to reduce IT operational
cost by eradicating the need to have ISDN circuits which are expensive to rent. WAN has the
ability to offer services that could be otherwise provided by ISDN
WAN also cuts down on operating costs and increases revenue for businesses. For
instance, having centralized IT infrastructure allows the business to have a few employees to
A LAN supports easy process distribution where tasks are divided across systems that
are connected to a powerful, high-performance system via a specific algorithm.
A local area network is made up of three major elements including hardware (servers,
workstations, routers, switches, modems among others), network software (network operating
system, firewall, among others), and the users (Miller, 2011). Every component has a specific
function on the network.
Wide Area Network (WAN)
This is a type of computer network that covers a wider area as compared to a LAN. It
spans across countries, states, or cities and can be public or private WAN. A WAN connects
many smaller LANs across different location (Roese et al., 2010).
Functions of WAN
A WAN has several functions especially if a company have several branches in
multiple locations. It enhances internal communication and improves productivity. The
following are some of the functions of WAN:
Improve privacy: having a WAN will enable sharing sensitive data with all the
branches and offices in a different location over the internet (Trivedi, 2013). Encryption can
be employed to ensure that an extra security layer is added for any sensitive materials
transmitted over a WAN. An organization requires all the security mechanisms it can
implement because of the increasing number of hackers and other cybercriminals targeting
critical corporate information.
Centralized IT infrastructure: WAN allows a company to set up one data center that is
accessible from any location and eliminates the need to bur file or email servers for every
office (Trivedi, 2013). Having one data center enables centralized management and
monitoring of all the IT resources and functions.
Eliminates ISDN requirement: WAN has enabled enterprises to reduce IT operational
cost by eradicating the need to have ISDN circuits which are expensive to rent. WAN has the
ability to offer services that could be otherwise provided by ISDN
WAN also cuts down on operating costs and increases revenue for businesses. For
instance, having centralized IT infrastructure allows the business to have a few employees to
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
INFORMATION SYSTEMS NETWORKING ESSENTIALS 8
working in the data center rather than having a number of IT personnel working in every
office.
Wireless Network
Wireless networks have become very crucial in today’s technology. Some of the
examples of wireless networks include Bluetooth, Wi-Fi, infrared among others. Wireless
serves very many functions especially in smart home technologies for controlling the
different smart devices within a home or in an office (Jin and Huang, 2017). The wireless
network also improves communication by enabling portability and allowing the users to work
from anywhere as long as they have a wireless connection.
Functions of Wireless Networks
Users are able to share files and communicate without having a wired connection.
Wireless networks eliminate the need to have cables laid out across the building. This
also cuts on operating cost.
Setting up a wireless network such as Wi-Fi in business premises can attract more
customers thus increasing revenue.
It allows a bigger number of users to be connected as compared to a wired connection.
Network Security and Data Verification Issues
Computer systems have constantly become the target of attacks because of the
increased reliance on computer and network systems in this digital error. Information is a
very critical resource that every organization should strive to protect at any cost (Li, 2014).
There are several security and data privacy issues that have arisen because of the heavy
dependence on the computer network. The include confidentiality, integrity, and availability.
This is the major issues that affect both data verification and network security.
Confidentiality
Confidentiality involves restricting access to sensitive data and only allowing
authorized users to get access (Cox, 2019). However, because of the internet and the fact that
many organizations have connected their critical systems to the internet, confidentiality issues
because data can be tapped while being transmitted over the network (Li, 2014). This also
depends on the nature and capacity of network security measures that have been implemented
working in the data center rather than having a number of IT personnel working in every
office.
Wireless Network
Wireless networks have become very crucial in today’s technology. Some of the
examples of wireless networks include Bluetooth, Wi-Fi, infrared among others. Wireless
serves very many functions especially in smart home technologies for controlling the
different smart devices within a home or in an office (Jin and Huang, 2017). The wireless
network also improves communication by enabling portability and allowing the users to work
from anywhere as long as they have a wireless connection.
Functions of Wireless Networks
Users are able to share files and communicate without having a wired connection.
Wireless networks eliminate the need to have cables laid out across the building. This
also cuts on operating cost.
Setting up a wireless network such as Wi-Fi in business premises can attract more
customers thus increasing revenue.
It allows a bigger number of users to be connected as compared to a wired connection.
Network Security and Data Verification Issues
Computer systems have constantly become the target of attacks because of the
increased reliance on computer and network systems in this digital error. Information is a
very critical resource that every organization should strive to protect at any cost (Li, 2014).
There are several security and data privacy issues that have arisen because of the heavy
dependence on the computer network. The include confidentiality, integrity, and availability.
This is the major issues that affect both data verification and network security.
Confidentiality
Confidentiality involves restricting access to sensitive data and only allowing
authorized users to get access (Cox, 2019). However, because of the internet and the fact that
many organizations have connected their critical systems to the internet, confidentiality issues
because data can be tapped while being transmitted over the network (Li, 2014). This also
depends on the nature and capacity of network security measures that have been implemented
INFORMATION SYSTEMS NETWORKING ESSENTIALS 9
by the organization. Private data should be kept private. Also, there are laws and regulations
that govern data confidentiality and privacy.
Integrity
This another aspect that is normally affected. Data integrity refers to the accuracy and
reliability of the data being accessed (Parkinson, 2017). Basically, it states that data being
accesses should be correct, up to date, and is unmodified by unauthorized users. Hackers and
other cybercriminals are constantly looking for ways to access corporate data either to steal it,
destroy or modify. Regardless of the nature of the crime, unauthorized access to data affects
the integrity of the data. Therefore, companies and institutions should implement strong
network security measures. Other events surge such as power surge may lead to loss of the
integrity of a file is destroyed as a result of such activity.
Availability
Availability is an aspect of computing that ensures the presence of resources
whenever the users need them. It also means that data should be available whenever the users
attempt to access it by providing the proper credentials to be authorized to access it. A
network should have the ability to ensure zero downtime where users have access to critical
resources (Patel, 2015). Businesses enterprises such as eBay, Amazon among others should
ensure 24/7 availability because having a downtime even for a minute can cost the company
millions of dollars. Issues such as power failures, natural disasters such as earthquakes, and
cyber threats such as a denial of services attacks are examples of security issues that affect
availability. While setting up a network, these issues should be keenly taken into
consideration because they dictate the reliability, efficiency, and performance of the network.
Security Mechanism
In order to maintain and ensure availability, integrity, and confidentiality of data while
creating or maintain a network, instruction can implement various security techniques and
tools to enhance network security. They include (Wen et al., 2015):
by the organization. Private data should be kept private. Also, there are laws and regulations
that govern data confidentiality and privacy.
Integrity
This another aspect that is normally affected. Data integrity refers to the accuracy and
reliability of the data being accessed (Parkinson, 2017). Basically, it states that data being
accesses should be correct, up to date, and is unmodified by unauthorized users. Hackers and
other cybercriminals are constantly looking for ways to access corporate data either to steal it,
destroy or modify. Regardless of the nature of the crime, unauthorized access to data affects
the integrity of the data. Therefore, companies and institutions should implement strong
network security measures. Other events surge such as power surge may lead to loss of the
integrity of a file is destroyed as a result of such activity.
Availability
Availability is an aspect of computing that ensures the presence of resources
whenever the users need them. It also means that data should be available whenever the users
attempt to access it by providing the proper credentials to be authorized to access it. A
network should have the ability to ensure zero downtime where users have access to critical
resources (Patel, 2015). Businesses enterprises such as eBay, Amazon among others should
ensure 24/7 availability because having a downtime even for a minute can cost the company
millions of dollars. Issues such as power failures, natural disasters such as earthquakes, and
cyber threats such as a denial of services attacks are examples of security issues that affect
availability. While setting up a network, these issues should be keenly taken into
consideration because they dictate the reliability, efficiency, and performance of the network.
Security Mechanism
In order to maintain and ensure availability, integrity, and confidentiality of data while
creating or maintain a network, instruction can implement various security techniques and
tools to enhance network security. They include (Wen et al., 2015):
INFORMATION SYSTEMS NETWORKING ESSENTIALS 10
Implementing proper and effective authentication mechanisms such as the use of
passwords, biometrics, access cards among others.
Access control: this works together with authentication by ensuring that only users
who are authorized are allowed to access specific data resources
Encrypting data that is transmitted over the network
Training employees on the importance of using strong passwords and constantly
changing them.
Creating effective backup and recovery strategies to enable business continuity in
case of a disaster.
Using firewalls to track and filter malicious traffic from getting onto the network.
Implementing intrusion detection and prevention systems
Using virtual private networks to connect remote sites
Burglar proofing the data center to prevent any unauthorized physical access into the
data center
Implementing these security measures will ensure security, integrity, confidentiality, and
availability of data at all time.
Conclusion
In conclusion, this paper has attempted to discuss the different network aspects. The
paper has identified various networking devices including router, switch, bridge, gateway,
modem, bridge, brouter among others. It has also described the importance of the different
network types including LANs, WANs, and wireless networks. The paper finalized by
discussing the three major data security and verification issues including integrity,
confidentiality, and availability. It is important for any organization to implement proper and
reliable network security measures to ensure data security and protection of other critical
resources on the network. Packet tracer enables network professionals to simulate even the
most complex networking scenarios before deploying them using real devices. In this paper,
packet tracer will be used to simulate a small network that will represent how various devices
communicate.
Implementing proper and effective authentication mechanisms such as the use of
passwords, biometrics, access cards among others.
Access control: this works together with authentication by ensuring that only users
who are authorized are allowed to access specific data resources
Encrypting data that is transmitted over the network
Training employees on the importance of using strong passwords and constantly
changing them.
Creating effective backup and recovery strategies to enable business continuity in
case of a disaster.
Using firewalls to track and filter malicious traffic from getting onto the network.
Implementing intrusion detection and prevention systems
Using virtual private networks to connect remote sites
Burglar proofing the data center to prevent any unauthorized physical access into the
data center
Implementing these security measures will ensure security, integrity, confidentiality, and
availability of data at all time.
Conclusion
In conclusion, this paper has attempted to discuss the different network aspects. The
paper has identified various networking devices including router, switch, bridge, gateway,
modem, bridge, brouter among others. It has also described the importance of the different
network types including LANs, WANs, and wireless networks. The paper finalized by
discussing the three major data security and verification issues including integrity,
confidentiality, and availability. It is important for any organization to implement proper and
reliable network security measures to ensure data security and protection of other critical
resources on the network. Packet tracer enables network professionals to simulate even the
most complex networking scenarios before deploying them using real devices. In this paper,
packet tracer will be used to simulate a small network that will represent how various devices
communicate.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INFORMATION SYSTEMS NETWORKING ESSENTIALS 11
List of References
Akyildiz, I., Rudin, H. and Stiller, B. (2019). Computer Networks (COMNET) Editorial for
2018. Computer Networks, 148, p.iii-iv.
Buh, T., Trobec, R. and Ciglič, A. (2014). Adaptive network-traffic balancing on multi-core
software networking devices. Computer Networks, 69, pp.19-34.
Comer, D. (2015). Computer Networks and Internets. Pearson Education Limited.
Cox, K. (2019). Legal Landscape of Consumer/ User Data Privacy and Current Policy
Discussions. The Current Privacy Landscape, (297), pp.15-37.
Fisher, D. (2011). Professional Networking For Dummies. New York, NY: John Wiley &
Sons.
Hashimi, S. and Güneş, A. (2017). Performance Evaluation of a Network Using Simulation
Tools or Packet Tracer. IOSR Journal of Computer Engineering, 19(01), pp.01-05.
Irving, P. (2010). Computer networks. [Colchester, Essex]: Lexden Pub.
Jahanshahi, M. and Bistouni, F. (2019). Reliable networking in Ethernet ring mesh networks
using regular topologies. Telecommunication Systems.
Jin, P. and Huang, C. (2017). Sandwich Tree: A new datacenter network based on passive
optical devices. Optical Switching and Networking, 25, pp.133-148.
Jovanovic, N., Markovic, S., Popovic, O. and Jovanovic, Z. (2010). Managing Network
Elements in the Computer Network. International Journal of Computer and Electrical
Engineering, pp.316-323.
Li, Y. (2014). Network Security Protection Measures. Advanced Materials Research, 971-
973, pp.1659-1662.
Miller, L. (2011). Home networking for dummies. Indianapolis, IN: Wiley Pubishing, Inc.
Mohammed, K. and Samaa, K. (2018). Project Scenario of Communication Network using
Cisco Packet Tracer. International Journal of Computer Applications, 181(29), pp.37-41.
List of References
Akyildiz, I., Rudin, H. and Stiller, B. (2019). Computer Networks (COMNET) Editorial for
2018. Computer Networks, 148, p.iii-iv.
Buh, T., Trobec, R. and Ciglič, A. (2014). Adaptive network-traffic balancing on multi-core
software networking devices. Computer Networks, 69, pp.19-34.
Comer, D. (2015). Computer Networks and Internets. Pearson Education Limited.
Cox, K. (2019). Legal Landscape of Consumer/ User Data Privacy and Current Policy
Discussions. The Current Privacy Landscape, (297), pp.15-37.
Fisher, D. (2011). Professional Networking For Dummies. New York, NY: John Wiley &
Sons.
Hashimi, S. and Güneş, A. (2017). Performance Evaluation of a Network Using Simulation
Tools or Packet Tracer. IOSR Journal of Computer Engineering, 19(01), pp.01-05.
Irving, P. (2010). Computer networks. [Colchester, Essex]: Lexden Pub.
Jahanshahi, M. and Bistouni, F. (2019). Reliable networking in Ethernet ring mesh networks
using regular topologies. Telecommunication Systems.
Jin, P. and Huang, C. (2017). Sandwich Tree: A new datacenter network based on passive
optical devices. Optical Switching and Networking, 25, pp.133-148.
Jovanovic, N., Markovic, S., Popovic, O. and Jovanovic, Z. (2010). Managing Network
Elements in the Computer Network. International Journal of Computer and Electrical
Engineering, pp.316-323.
Li, Y. (2014). Network Security Protection Measures. Advanced Materials Research, 971-
973, pp.1659-1662.
Miller, L. (2011). Home networking for dummies. Indianapolis, IN: Wiley Pubishing, Inc.
Mohammed, K. and Samaa, K. (2018). Project Scenario of Communication Network using
Cisco Packet Tracer. International Journal of Computer Applications, 181(29), pp.37-41.
INFORMATION SYSTEMS NETWORKING ESSENTIALS 12
Muhammet, E. (2015). Cisco Network Performance Evaluation Using Packet
Tracer. International Journal of Electronics, Mechanical and Mechatronics Engineering,
5(1), pp.905-911.
Parkinson, S. (2017). Use of access control to minimise ransomware impact. Network
Security, 2017(7), pp.5-8.
Patel, A. (2015). Network performance without compromising security. Network Security,
2015(1), pp.9-12.
Roese, J., Braun, R., Tomizawa, M. and Ishida, O. (2010). Optical transport network evolving
with 100 gigabit Ethernet evolving with 100 gigabit ethernet [100 gigabit ethernet
transport. IEEE Communications Magazine, 48(3), pp.S28-S34.
Roy, D., Saraf, P. and Shewale, N. (2017). Discovery of Networking Devices in the
Network. IOSR Journal of Computer Engineering, 19(02), pp.38-41.
Trivedi, B. (2013). Computer networks. New Delhi, India: Oxford University Press.
WEN, Z., ZHANG, D., YU, K. and SATO, T. (2015). Information Centric Networking for
Disaster Information Sharing Services. IEICE Transactions on Fundamentals of Electronics,
Communications and Computer Sciences, E98.A(8), pp.1610-1617.
Muhammet, E. (2015). Cisco Network Performance Evaluation Using Packet
Tracer. International Journal of Electronics, Mechanical and Mechatronics Engineering,
5(1), pp.905-911.
Parkinson, S. (2017). Use of access control to minimise ransomware impact. Network
Security, 2017(7), pp.5-8.
Patel, A. (2015). Network performance without compromising security. Network Security,
2015(1), pp.9-12.
Roese, J., Braun, R., Tomizawa, M. and Ishida, O. (2010). Optical transport network evolving
with 100 gigabit Ethernet evolving with 100 gigabit ethernet [100 gigabit ethernet
transport. IEEE Communications Magazine, 48(3), pp.S28-S34.
Roy, D., Saraf, P. and Shewale, N. (2017). Discovery of Networking Devices in the
Network. IOSR Journal of Computer Engineering, 19(02), pp.38-41.
Trivedi, B. (2013). Computer networks. New Delhi, India: Oxford University Press.
WEN, Z., ZHANG, D., YU, K. and SATO, T. (2015). Information Centric Networking for
Disaster Information Sharing Services. IEICE Transactions on Fundamentals of Electronics,
Communications and Computer Sciences, E98.A(8), pp.1610-1617.
1 out of 12
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.