logo

Networking Security Assignment

   

Added on  2021-05-27

6 Pages1409 Words38 Views
Networking SecurityStudent NameAffiliationDate

Introduction. Network security is the process of controlling unauthorized and malicious access to a network and the data being transmitted through the network. The malicious activities include access to, modification and misuse of transmitted data. The process of network security includes policies, principles, practices and activities directed towards protection of the network. Management and control of the network is the responsibility of a network administrator. Access to the network is controlled through user identification techniques suchas allocation of identification codes or numbers and a password. The network is divided into different layers which share or have different network security vulnerabilities. In this topic, the application, internet and physical layers of network security are discussed. Application layer. The application layer of a network allows the user to interact with the different services that are available on the network. These services include browsing, emailing and social networks. The applications contained in the application layer are installed into user devices and have access to the internet through the network. Such applications also enable theprocesses of network sharing which include printer sharing. The application is categorized differently according to architecture. The server-client architecture: the client accesses services from the server through authentication. The client is the user of application. The server provides the services while client acts as the consumer of the services provided. Peer-peer architecture: the connected devices interchange information across the network and have no defined server nor client computer. However, in this design of application layer, either computer can act in the capacity of the server to the other connected computer. The application layer can be grouped further into the host-based and cloud-based architectures. The application layer was described using examples of the web browser and email client. The discussion reviewed the different network protocols.

The internet layer. The internet layer topic introduces the Address Resolution Protocol. The ARP definesthe MAC address of the connected device while on the LAN. Some commands and examples of the ARP are discussed. The ARP cache content can be observed through the arp-a command. When an entry is to be deleted, the command arp-d ip is used. The ip is the true address of the entry to be deleted. To make deletions of all the entries, arp-d* is used. This commands were demonstrated on Linux and the data link layer reviewed. The network layer transmits communication from one host to the other. Ip addresses are used in the layer in forms of ipv4 and ipv6. Physical layer. This layer includes multiplexing, Manchester encoding, transmission media and the data flow comprising of analog and digital data. The physical layer forms the interconnectionin a network of all the computers and the devices. In digital computers, data is stored and processed in digital formats in texts and programs or other forms. Analog data can be interchanged into digital and analogue formats during transmission. Analog data includes voice. In the Manchester encoding, binary values are represented by the transition of the bits in periods. Data flow through a network is through simplex, half duplex and full duplex. Simplexdata flow involves transmission of data only on a single path in one direction. Half duplex data flow is the transmission of data in both directions but in one direction at a time. Full duplex allows the flow of data in both directions at the same time. Data channels are divided into several channels to allow multiple transmission of datasets through multiplexing. Multiplexing includes frequency division, wavelength division andtime division multiplexing. Transmission media are physical entities of the network that transfer data from one device to another or host to another host. The transmission media include cables such as

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network and Security: Layers, Multiplexing, and Error Control Mechanisms
|4
|1235
|455

Network And Security Student Name Affiliation Date Introduction
|4
|937
|229

Networking and Security - Application, Internet, and Physical Layer
|5
|1001
|106

Report on Android Operating System - EECS 571
|13
|2007
|258

IT Infrastructure
|14
|1759
|264

Networking and Security ITECH1102
|5
|829
|27