logo

Network and Security: Understanding Networking Hardware, Models, and Cloud Computing

   

Added on  2022-11-10

9 Pages2463 Words154 Views
9/19/2019
Running Head: IT 0
NETWORK AND
SECURITY

IT 1
Contents
Introduction................................................................................................................................2
Network and Security.................................................................................................................2
Networking Hardware and Model..............................................................................................3
The Application Layer...............................................................................................................3
Network Interface – The Data Link Layer.................................................................................4
The Internet (Network) layer.....................................................................................................4
Fundamental aspects of cloud computing and networking needs for business..........................6
References..................................................................................................................................8

IT 2
Introduction
This report aims to gain understanding from various learning outcomes related to
network and computing, its associated principles, software and hardware entities help in
network communications, various aspects of cloud computing and corporate networking
needs for the successful operations of business.
Network and Security
Network connectivity defines the extensive procedure to connect numerous parts of a
network to one another so that to share resources and data effectively (Yang & Leskovec,
2015). A computer network is a group of computer machines and engineering uses various
devices to link together for the purpose of communication and sharing of resources and
through an extensive range of users.
In present scenario of computing requirement, there are different types of data
exchange in the computer networking share by organisation and individual users. It is also
known as electronic data exchange (EDI). Some of these include streaming music via various
online platforms such as Amazon Music, Spotify and Pandora. Other than this, it also
includes, sharing information and data over emailing, saving file for sharing purposes on
OneDrive and Dropbox. In sharing of information and resources with network connectivity,
various technologies are needed including web servers, user system, routers and modems as
these involve receiving and transmission of information and data over a communications
network.
In networking, there is also a computer number systems that help in representing
numbers in the system architecture and therefore, every value that a user is saving or
receiving into the system has a defined number system. The four supported number system in
computer architecture includes binary number system, octal number system, decimal number
system and hexadecimal number system. Understanding various number systems is very
useful in many computer-related fields where binary and hexadecimal are very common. In
computer networks, vital elements such as masks, addresses and keys all include binary or
hexadecimal numbers and considering how such hexadecimal and binary number function is

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Networking and Security: Overview of OSI and TCP/IP Models
|7
|1984
|70

Networking Technologies and the OSI Model
|9
|2308
|394

Fundamental of Computer System
|11
|2560
|288

ITECH1102 | Roles and Functions of Network Connectivity in Today’s Computing
|15
|2028
|23

Literature Review of Layered Network Reference Model for Networking Devices
|9
|2035
|33

Network and Security
|12
|2470
|300