Comprehensive Analysis of Data Communication and Network Technology

Verified

Added on  2021/02/21

|7
|1937
|48
Report
AI Summary
This report provides a comprehensive overview of network technology and data communication. It begins with an introduction to the changing landscape of communication and the emergence of broadband technologies like BPL. The report then delves into the application and analysis of network components, including wired and wireless technologies, routers, and optical fiber. It examines network principles, such as the OSI model and various protocols like HTTP and TCP/IP, and discusses the importance of IP addresses and resource sharing. The evaluation section compares different technologies based on bandwidth, range, and security, highlighting the advantages of wireless networks. It also addresses issues related to BPL technology, such as security threats, signal strength limitations, and the lack of standardization. The report concludes by summarizing the key aspects of network technology and its challenges, emphasizing the importance of IEEE standards and the integration of various components to form a functional network. The report also includes references to books, journals, and online resources, providing a solid foundation for understanding data communication and network routing.
Document Page
Data Communication and
Network Routing
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
INTRODUCTION....................................................................................................................1
APPLICATION AND ANALYSIS.........................................................................................1
EVALUATION........................................................................................................................2
CONCLUSION........................................................................................................................4
REFERENCES.........................................................................................................................5
Document Page
INTRODUCTION
In recent times the way of communication is changing. It is because of change in
infrastructure due to technological advancement. With this there is increase in speed of
communication. Now, broadband is used instead of power lines. It is a method in which data is
transmitted at fast rate and to wider frequency (Arioua and et.al., 2016). This technology
provides high rate transmission to long distance. The BPL technology is similar to PLC one. In
this report it is described about network technology and its relationship between components.
Also, issues related to the technology are discussed. Moreover, network principles are explained
along with legislation, regulation, security, etc. of use of network technology.
APPLICATION AND ANALYSIS
A network is build up of various components which are connected to different devices. It
allows to share data and information from one device to another. Network technology is referred
as exchange of data between large information systems. For this there are various types
technology available through which network is created. With change in time the technology is
also advancing. Basically, there are two types of networking technologies. They are wired and
wireless. In that also different concepts and methods exits. Routers can be used to connect
network. It is a small device that is used to forward data packets between computer network.
Routers also manage traffic and then direct data packets in right direction.
Optical fibre is another wireless technology that is used in network. Here, glass and plastic is
used to transmit data (Optical fibre in networking. 2016). It is having a high range and frequency
vary from 10-100 GBPS. Also, the cable is covered from copper which protect it from any
electromagnetic interference. This makes its signal strength is strong.
There are various components in network such as hub, router, switch, gateway, etc. each
component functions are different (Menon, Pathrose and Priya, 2016). These all create an entire
network. A hub connects devices in LAN whereas a gateway is a stopping point of data. So,
these all components are interrelated to each other. For instance, a hub is connected to router
which gives direction to data packet. Furthermore, a router is connected to switch to which data
transfers. In network a firewall protects threats and unauthorised access. It provides security to
network by protecting virus.
In network there are certain principles which are followed. Along with it, some defined
protocols are used. A network works on OSI model in which there are many layers. It starts from
1
Document Page
application to data link layer. The main principle is application and transport layer is used.
Besides this, there has to be two hosts to build a network. The hosts must contain IP address.
Also, host must be connected to each other and follow OSI model. Another principle is there
should be proper naming and addressing of system. Each system that is connected in network
share resources with one another. It enables in smooth flow of data and high range and
frequency. At last the reference model is the principles on basis of which network is created. The
network on this model where there are 7 layers.
Along with principles there are some protocols also which is followed (Sarkar and
Murugan, 2019). They are HTTP, TCP/IP, user diagram protocol, IPV6, etc. these all protocols
define the way in which data is shared, stored, etc. HTTP defines the way how messages are
encrypted, transmitted, etc. Internet protocols are rules and regulations which are set by
government on format of data that is sent over internet. User diagram protocol is use low latency
on connection between applications on internet. Hence, the protocols are used in network to
secure it. In addition it defined the way through which data is encrypted, data packets are
formed, etc. Now, IPv6 version protocol is used in network.
EVALUATION
It can be evaluated that there are many technologies used in network. In present wireless
technologies are used for data communication. This is because its range is long and with high
frequency data is transmitted at fast speed. Fibre optics is mostly used in network. The main
benefit of using this is there is less interruption in signals. Technologies can be compared on
basis of their application. BPL application is use of lines (Kim, Lee and Jang, 2015). Wireless
network is better than wired one as data packets are transferred with high frequency. The
technologies are evaluated on basis of their bandwidth, range, etc. With advancement in
technology data communication is becoming more complex. It requires long range and effective
technology through which data can be shared within network. However, there is change in
principles and protocols as well. New rules and regulations are included and formed. By this
changes are made in network technology. So, its efficiency and security has improved.
Basically, BPL was used in earlier time to transmit radio signals. It was used in US where
power lines was used to share data. The range and frequency of BPL is low. Thus, it can be used
only for short range. Also, its usability depends on how network technology is implemented and
used. In network technology there are many issues that occurs. It is related to security,
2
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
regulation, etc. besides this, there are some laws that has to be followed by companies in using
network technology (Das, Majumder and Dasgupta, 2016). The main issue in BPL is data
transmitted has to encrypted so that it is not misused. So, if data is not encrypted than BPL
systems can be easily accessed. Moreover, the network may be interrupted due to service attack
on it transmitting stations. Due to this the service may be degraded.
Alongside it, another issue faced is related to signal strength and operating frequency. In
BPL the frequency is limited up to 10-30 MHZ. This is because power lines are act as antennas
and their short radio frequency range is low. So, in this case antennas are installed closed to each
other in power lines. Therefore, if they are separated from each other the signal strength in
network degrades. Moreover, in BPL power lines are noisily as they carry high amount of
energy. So, if there is extra load on lines signal becomes weak.
Threat to data security is also an issue in BPL. This is because as power lines are not
protected with radio frequency signals so this produces electromagnetic interference. So, due to
this data signals varies in power lines (Coutinho and et.al., 2015). This becomes easy to hack
data. Thus, there is lack of data security in it. Apart from it, there is lack of standard to maintain
and install BPL network. Here, vendors use different types of standards such as Belkin, Netgear,
etc. beside this, they have developed their own standards as well. There are many vulnerabilities
in network which highly affect the network. The vulnerability can be occurred due to virus,
network attack, etc. due to this network strength may become weak. It restricts access of
network. Moreover, any defect exploitation allows hacker to continue affecting network. The
system may be exploited adversely.
In establishing a network there are certain standards which needs to be followed. Generally,
IEEE standards are followed. These standards are widely used in networking technologies. The
standards restrict network to carry variable sized packets. In wired IEEE 802.3 is followed and in
wireless IEEE 802.11 and IEEE 802.16 standards are followed (Tanwar, Kumar and Rodrigues,
2015). The main purpose of standard is to establish uniform in methods, processes, practices, etc.
that are involved in network.
There are different applications as well of BPL technology. The web based technology
enables in providing services. A network is formed by integration of components. Networking is
a basic tool through which data in shared. BPL requires a proper infrastructure. It is used to
transmit signals in small area.
3
Document Page
CONCLUSION
From report it can be summarised that there are different types of network technologies
available. It is categorised into two that is wired and wireless. BPL is a technology of using
power lines to transmit data in a network. The technology is used for short range network in a
radio. There are various principles of networking that are connection of two hosts, naming and
sharing of resources, etc. Also, some protocols are used as well that is HTTP, IP, etc. Usually,
IEEE legislation is followed in implementing a network. There are many challenges in using
BPL like lack of set standards, data security, weak signal strength and low frequency.
4
Document Page
REFERENCES
Books and Journals
Arioua, M. and et.al., 2016. Multi-hop cluster based routing approach for wireless sensor
networks. Procedia Computer Science. 83. pp.584-591.
Coutinho, R.W. and et.al., 2015. Geographic and opportunistic routing for underwater sensor
networks. IEEE Transactions on Computers. 65(2), pp.548-561.
Das, D., Majumder, K. and Dasgupta, A., 2016, April. A game-theory based secure routing
mechanism in mobile ad hoc network. In 2016 International Conference on Computing,
Communication and Automation (ICCCA) (pp. 437-442). IEEE.
Kim, H.S., Lee, J. and Jang, J.W., 2015, August. Blemesh: A wireless mesh network protocol for
bluetooth low energy devices. In 2015 3rd International Conference on Future Internet of
Things and Cloud (pp. 558-563). IEEE.
Menon, V.G., Pathrose, J.P. and Priya, J., 2016. Ensuring reliable communication in disaster
recovery operations with reliable routing technique. Mobile Information Systems, 2016.
Sarkar, A. and Murugan, T.S., 2019. Cluster head selection for energy efficient and delay-less
routing in wireless sensor network. Wireless Networks. 25(1), pp.303-320.
Tanwar, S., Kumar, N. and Rodrigues, J.J., 2015. A systematic review on heterogeneous routing
protocols for wireless sensor network. Journal of network and computer applications. 53.
pp.39-56.
Online
Optical fibre in networking. 2016. [online] Available through : <https://www.lifewire.com/fiber-
optic-cable-817874>
5
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]