This article discusses computer networking and security, including types of data exchange, devices involved in eBay exchange, talk tools in data exchange, number systems in networking, switching, packet-switched networks, network devices, the Internet model (TCP/IP), and the Open Systems Interconnection (OSI) model.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: NETWORK AND SECURITY1 Network and Security Student’s Name University Affiliation
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2 Network and Security A computer network can be defined as a telecommunication network which facilitates data exchange between computers while computer networking is an engineering discipline that focuses on studying and analyzing the process of communication among various devices and systems that are connected, or networked together to share information and system resources (Alkhatib, & Baicher, 2012). Types of data exchange include; eBay, phone calls with Viber, Skype, email, google search query among others (Lubacz, Mazurczyk, & Szczypiorski, 2014). Cat 6 network cable, which is blue, has pairs of wires twisted together and the number of twists per distance should be correct. Engineers should connect specific wires to the specified connector pins. Devices Involved In Ebay Exchange. Home personal accounting. eBay web server. Communications hardware between my personal computer and eBay. Paypal server. Servers at bank. Talk Tools in Data Exchange. Wireshark- this protocol analyzer captures plain text passwords and also analyses network traffic. Virtualization tools Windows calculator- used for working with binary numbers. Linux networking tools.
3 Windows networking tools. Number Systems in Networking Decimal to represent quantities and IPv4 addresses Binary shows how data is stored in computer systems. Hexadecimal represent large quantities and IPv6. Octal give Linux permissions. From the notes we find that decimal number system has an advantage that is, they are more useful and less confusing than decimal and they are more appropriate (Dimakis, Godfrey, Wu, Wainwright, & Ramchandran, 2010). When working with different number systems you should realize that the different number systems simply represent the same quantity in different ways. Decimal number system has a universal use for representing quantities. Information stored and transmitted by digital computers is stored in binary. Each digit in binary is either 0 or 1. Switching In Circuit-switched networks, a dedicated channel is established prior to data being sent. The plain old telephone system as used in many businesses and homes the best example of a circuit switched network is. Once the circuit is established, you and the other person are connected by a wire. Packet Switched Networks. US defense forces used packet switched network packets to route around the bombed area but they could not use circuit switched communication because the bombs could destroy the phone line. Advanced research projects agency network (ARPANET) was an early packet-
4 switched network that incorporated both packet switching and TCP/IP protocols (Das et al, 2010, March). An Interface Message Processors (IMPs) was the first implementation of a device that could perform operations done by routers. Packet switching relies on the fragmentation and reassembly of packets. Large messages at the source must be broken up into manageable sized packets for transportation to the destination, each packet free to find its own way (Das et al, 2010, March). Damaged packets or network congestion can cause packets to be lost or delivered out of sequence and some mechanisms to deal with such events. Packet switching is used on small home networks, larger networks, on the internet and mobile telephone systems. These devices are connected using 2 or more devices to facilitate networking which also need network interface cards such as Ethernet NIC, WiFi, Bluetooth etc (Farrington, et al, 2011). Network Devices 1.Switches 2.Routers are devices that allow one network to communicate with at least one other network and hence require multiple NICs. They regenerate packets to their destinations. Their connectivity is simple, and data transmitted is encrypted. Campus network can be divided into multiple sub-networks.it has various servers in each subnet. The user devices in campus network include personal computers, printers, phone, and scanners in each subnet (Changjin, Hua, Qi, & Xiang, 2011).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
5 Internet is a computer network linking smaller computer worldwide. Each network on the internet is identified by a unique network ID which allows traffic to traverse intermediary network. The Internet Model (TCP/IP) This model gives us a framework with which to understand how networking works from a TCP/IP perspective (Alani, 2014). This model has five layers which include: Application layer Transport layer- provides packet reassembly and reliable data transfers. TCP operates in this layer. Internet layer Data link layer Physical layer The Open Systems Interconnection (OSI) model It defines a theoretical networking framework to explain networking in seven layers (Bora, Bora, Singh, & Arsalan, 2014). 1.The Application Layer This layer allows user to interact with the internet by providing user interfaces (Bora, Bora, Singh, & Arsalan, 2014). User applications allows many services and devices on the internet and on our local network. Categories of interaction are: Client/server architecture- clients can be web clients, email clients who request services of servers, for example, requesting files from file servers. Servers waits for client requests
6 and responds to them. The client is a consumer of services while the server is the provider. Peer to peer architectures- here all peers can share resources and can also access any shared resource. Host-based architectures. Cloud-based architectures which has platform, infrastructure, and software as a service. Internet application. Web browsers which allow us to view web pages. Email client to compose, send and read emails. File transfer services to allow downloading of all sorts of files. According toChen,Roughgarden, & Valiant, (2010),network protocols are set of rules which must be strictly adhered to for network communication to succeed. Role of the Protocols Establish consistent rules between sender and receiver. Specify how data inside messages is structured. Handle message dialogue. 2.Physical Layer. It coordinates the mechanical and electrical specifications of the interface and transmission media. Types of data transmitted are analog and digital data. Digital data store information in digital format and bits of either zero or one. Analog data is continuous in nature. Transmission media is either digital or analog (Sohrabi, & Yu, 2015, April).).
7 Point to point circuits are connection between two devices while multipoint circuits share media with multiple device. Types of data flow are categorized according to the way data flows. They include simplex, half-duplex and full duplex system. Multiplexing is used to divide up a communications channel to transmit multiple conversations at once (Pellauer, Adler, Kinsy, Parashar, & Emer, 2011, February). Methods of multiplexing Time division multiplexing Frequency division multiplexing Wavelength division multiplexing Transmission medium is the medium for transmission of data and information. Commonly known media are optical cable, coaxial cable, twisted pair cables, microwave, and infrared. 3.Data Link Layer This layer only communicates with devices on its local network. It is the interface between the network layer and physical layer. It is divided into: i.Logical link layer which allows IPv4 and other protocol transactions concurrently. ii.Mac access control which sends traffic to the network media and receives traffic. Network cards are smart cards which are used to filter traffic by inspecting every packet. It also checks errors (Duflot, Perez, & Morin, 2011, September). Media access control is concerned with arbitrating access to the network. They are divided into controlled and contention based access. Data link is only responsible for exchanging data between two locally connected devices.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
8 4.Internet Layer The role of this layer is to deliver network traffic from one host to another. It is all about IP addressing and associated routing. Every device on IP network requires an IP address which uniquely identify a device from others on the internet (Stanley, Shai, Taylor, & Mucha, 2016). There are two versions of IP addresses which are: IPv4 which are 32 bits long. IPv6 which are 128 bits long and is the newest version of the internet protocol. IPv6 is expressed by use of hexadecimal. Devices get IP addresses either manually or automatically. IP address has network bits that are common to all hosts on an IP network and node bits that specify a particular host on that network. IP addresses can also be private or public. Public can communicate on the internet while private cannot travel on the internet and are discarded by routers (Stanley, Shai, Taylor, & Mucha, 2016). Private ranges are:10.0.0.0/8 – 10.255.255.255 172.16.0.0/12 – 172.31.255.255 192.168.0.0 – 192.168.255.255 Routers move packets to their destination. They require routing table of the internetwork to decide which route to use. They communicate with one another to ensure all routers know the changes made in the network. Internet Assigned Numbers Authority (IANA) is a company body which names internet domains.
9 5.Transport Layer This layer breaks up large streams of data into small segments to enable easy handling and access to the network in a process known as segmentation. These segments are then reassembled in the format in which they were sent or in the format they were delivered. Identification of application is done here by allocating them a port number. A socket identifies where transport layer ends. According toAlani, (2014), UDP is a connectionless protocol for transport services which is good for video and audio streaming. The UDP header clearly shows the port numbers of source and destination. TCP is a connection-oriented protocol for reliable delivery of data but it is slower than UDP. Timers are put by TCP to detect segments which are lost but it can lead to duplication of segments. Flow control balances flow of data for slow receivers from fast senders. Three-Way Handshake of TCP Connections Facilitates two ends of a connection. Server responds to the client. Client approves the response.
10 References Alani, M. M. (2014). TCP/IP model. InGuide to OSI and TCP/IP models(pp. 19-50). Springer, Cham. Alkhatib, A. A. A., & Baicher, G. S. (2012). Wireless sensor network architecture. InInternational Conference on Computer networks and Communication Systems (ICNCS 2012)(Vol. 35, pp. 11-15). Bora, G., Bora, S., Singh, S., & Arsalan, S. M. (2014). OSI reference model: An overview.International Journal of Computer Trends and Technology (IJCTT),7(4), 214-218. Changjin, J., Hua, T., Qi, H., & Xiang, Z. (2011). Discussion on application of desktop virtualization technology in campus network [J].Experimental Technology and Management,5, 033. Chen, H. L., Roughgarden, T., & Valiant, G. (2010). Designing network protocols for good equilibria.SIAM Journal on Computing,39(5), 1799-1832. Das, S., Parulkar, G., McKeown, N., Singh, P., Getachew, D., & Ong, L. (2010, March). Packet and circuit network convergence with OpenFlow. InOptical Fiber Communication Conference(p. OTuG1). Optical Society of America. Dimakis, A. G., Godfrey, P. B., Wu, Y., Wainwright, M. J., & Ramchandran, K. (2010). Network coding for distributed storage systems.IEEE transactions on information theory,56(9), 4539-4551.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
11 Duflot, L., Perez, Y. A., & Morin, B. (2011, September). What if you can’t trust your network card?. InInternational Workshop on Recent Advances in Intrusion Detection(pp. 378-397). Springer, Berlin, Heidelberg. Farrington, N., Porter, G., Radhakrishnan, S., Bazzaz, H. H., Subramanya, V., Fainman, Y., ... & Vahdat, A. (2011). Helios: a hybrid electrical/optical switch architecture for modular data centers.ACM SIGCOMM Computer Communication Review,41(4), 339-350. Lubacz, J., Mazurczyk, W., & Szczypiorski, K. (2014). Principles and overview of network steganography.IEEE Communications Magazine,52(5), 225-229. Pellauer, M., Adler, M., Kinsy, M., Parashar, A., & Emer, J. (2011, February). HAsim: FPGA- based high-detail multicore simulation using time-division multiplexing. InHigh Performance Computer Architecture (HPCA), 2011 IEEE 17th International Symposium on(pp. 406-417). IEEE. Sohrabi, F., & Yu, W. (2015, April). Hybrid digital and analog beamforming design for large- scale MIMO systems. InAcoustics, Speech and Signal Processing (ICASSP), 2015 IEEE International Conference on(pp. 2929-2933). IEEE. Stanley, N., Shai, S., Taylor, D., & Mucha, P. J. (2016). Clustering network layers with the strata multilayer stochastic block model.IEEE transactions on network science and engineering,3(2), 95-105.