logo

Analysis of Network Security

   

Added on  2022-11-28

7 Pages2129 Words397 Views
 | 
 | 
 | 
Running head: NETWORK AND SECURITY
NETWORK AND SECURITY
Name of the Student
Name of the Organization
Author Note
Analysis of Network Security_1

NETWORK SECURITY1
Analysis of Week 1
A network of computer is basically a network of telecommunication which is capable
of allowing various computers to greatly exchange data. Some of types of the exchange of
data will be involving eBay, Email, Skype, Netflix video and so on. Some of the devices
which are included in the exchange of eBay will be involving the home personal computer,
the web server of eBay, the server of PayPal, Bank Servers and so on. This specific course is
known to be dealing with various technologies of networking and properly investigate the
procedure of the working of networking. It has been known that there are four kinds of
number system that will be utilised in the networking (Marth et al., 2015). They are Decimal,
Hexadecimal, Octal and Binary. They possess their respective areas of usage. Decimal will be
representing all the quantities and the addresses of IPv4 and Binary is actually how data will
be actually stored within the systems of computer. Binary can also be utilised for
investigating each and every bits individually in the data. On the other hand, Hexadecimal
will be representing all the huge quantities.
Analysis of Week 2
There is a proper discussion regarding the operation of the basic hardware of
networking involving the Network Interface Card and Hubs. There is an investigation
regarding all the various kinds of network of home, network of campus and the Internet.
There is even an investigation regarding both the models of reference involving the Internet
Model and the Reference Model of OSI. There is a well differentiation in between the
switches of circuit and the packet switched network. It has been observed that in the networks
which are circuit switched, a channel which is dedicated has been established prior to the
specific data which is being sent. One of the best example will be the POTS or the Plain Old
Telephone System (Owens et al., 2019). During the time of 1960’s the specific concept of the
Analysis of Network Security_2

NETWORK SECURITY2
switching very small data blocks have been well conceived in both UK as well as USA
independently. A well concept regarding ARPANET, IMPs and fragmentation have been
well developed. It has been known that packet switching is utilised on all the smaller home
networks, larger networks ad also upon the internet as well.
Analysis of Week 3
There is a proper introduction of the Application Layer of the specific Internet Model.
It has been known that there are a number of application architectures which will be
involving the client or the server, peer to peer, based upon host and lastly the architectures of
cloud. A well description has been obtained regarding how the services provided by the
internet can be a specific kind of source of a monetary value which will be hugely
considerable. Some of the common applications of the internet will be involving the web
browser and the other applications which are mostly network enabled will be including the
Email Client, services of File transfer and all the various apps of phone (Veletsianos &
Shepherdson, 2016). Application layer protocols are capable of establishing a number of
consistent rules in between the receiver and the sender and they will be actually specifying
how the data within messages will be structured and the kinds of message that will be sent in
between the generating sourcing and the ultimate destination. It has been observed that the
ultimate aim of networking is to making it sure that the data which will be sent it either of the
direction will be arriving intact (Bannuru et al., 2015). The procedure has been also
understood regarding the interaction between the applications of both the server as well as the
client.
Analysis of Week 4
The Data Link is actually responsible for developing a communication in between two
different machines that will be linked to the same network. This specific network may be
Analysis of Network Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents