Classification of networks, Computer Network Security

Assignment Help:

 

Computer networks are defined by four factors which are as given below:

1) NETWORK SIZE:

According to the size of networks.

1) Local Area Network ( LAN)

2) Wide Area Network   (WAN)

 

In LAN network has the smaller area like a room a building or a floor.

In WAN, network has larger areas like countries & cities. Internet also is a Wide Area

Network.

WAN & LAN are compared by the speed of security, bandwidth and latency, billing, transmission, reliability, management and their standards.

 

2) NETWORK CONNECTIVITY:

Networks are also defined by connectivity in which two topologies are illustrated.

a) Point-to-Point

b) Broadcast

 

3) BY MEDIUM:

The types of networks is also based on the Medium of transmission.

Mediums of transmission are shown below:

 

  • Copper wire
  • Co-axial cable
  • Optical fiber
  • Radio waves

 

All these mediums different from each other with respect different parameters. These variables are speed of transmission, range of the transmitter and receiver computer, sharing of topology, information, installation & maintenance reliability and costs. The range of radio waves will be much more than an optical fiber wire. Similarly other mediums different from each other and appropriate medium is checked for the sake of transmission.

4) BY MOBILITY:

The networks are also divided according to their mobility.

In this respect there are two kinds of networks.

  • Fixed networks
  • Mobile networks

In these days mobile networks are the latest case. Mobile networks have been started in the last decade. In this regard there are some cause which are attached with the mobility of networks which are as given:

  • tracking and Location
  • Semi persistent connections
  • Complex billing and administration as machines and users move around the network

 

 


Related Discussions:- Classification of networks

Short term scheduler, Short term Scheduler function , also shown as a disp...

Short term Scheduler function , also shown as a dispatcher runs most frequently, and creates the finest-grained decision of which program could run next. This scheduler is called

Ids deployment overview, IDS Deployment Overview The decision regarding ...

IDS Deployment Overview The decision regarding control strategies, decisions about where to locate elements of intrusion detection systems is an art in itself. Planners should s

Develop a completely secure wsn based on the triple key, Q. Develop a compl...

Q. Develop a completely secure WSN based on the triple key? Wireless network is the most vulnerable type of network to security attack. Unauthorized access to wireless network

CS, Discuss how developers should apply the following countermeasures to im...

Discuss how developers should apply the following countermeasures to improve the security of their code:

Function of key secrecy and algorithm secrecy in security, What is the func...

What is the function of key secrecy and algorithm secrecy in security?  Algorithm Secrecy is explained as follows: ‘Algorithm secrecy’ is a method of keeping an algorithm

Define half-duplex, A  half-duplex (HDX) system gives communication in b...

A  half-duplex (HDX) system gives communication in both directions, but only one direction at a time. Hardly, once a party stats receiving a signal, it must need for the transmi

Cyclic redundancy check (crc), CYCLIC REDUNDANCY CHECK (CRC) To activa...

CYCLIC REDUNDANCY CHECK (CRC) To activate a network system to check move error without increasing the amount of information in every packet another most successful method is m

Access control matrix, You are provided with 3000 sample keystrokes for 5 u...

You are provided with 3000 sample keystrokes for 5 users mentioned above. You can find this data using the ‘Lab 2 User Data' link in the ‘Lab 2' folder on Blackboard. Please note t

Develop a preliminary simulation model, Question: (a) State the strong ...

Question: (a) State the strong law of large numbers. (b) Data have been collected on response times (in minutes) at a fire station. The data are 2:7 1:8 0:8 1:4 1:2 (i

Describe briefly an artificial intelligent technique, Question : (a) W...

Question : (a) What is an IDS and what is the basic problem it faces which can be solved by Artificial Intelligence. (b) Identify and describe briefly an Artificial Intell

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd