Classification of networks, Computer Network Security

Assignment Help:

 

Computer networks are defined by four factors which are as given below:

1) NETWORK SIZE:

According to the size of networks.

1) Local Area Network ( LAN)

2) Wide Area Network   (WAN)

 

In LAN network has the smaller area like a room a building or a floor.

In WAN, network has larger areas like countries & cities. Internet also is a Wide Area

Network.

WAN & LAN are compared by the speed of security, bandwidth and latency, billing, transmission, reliability, management and their standards.

 

2) NETWORK CONNECTIVITY:

Networks are also defined by connectivity in which two topologies are illustrated.

a) Point-to-Point

b) Broadcast

 

3) BY MEDIUM:

The types of networks is also based on the Medium of transmission.

Mediums of transmission are shown below:

 

  • Copper wire
  • Co-axial cable
  • Optical fiber
  • Radio waves

 

All these mediums different from each other with respect different parameters. These variables are speed of transmission, range of the transmitter and receiver computer, sharing of topology, information, installation & maintenance reliability and costs. The range of radio waves will be much more than an optical fiber wire. Similarly other mediums different from each other and appropriate medium is checked for the sake of transmission.

4) BY MOBILITY:

The networks are also divided according to their mobility.

In this respect there are two kinds of networks.

  • Fixed networks
  • Mobile networks

In these days mobile networks are the latest case. Mobile networks have been started in the last decade. In this regard there are some cause which are attached with the mobility of networks which are as given:

  • tracking and Location
  • Semi persistent connections
  • Complex billing and administration as machines and users move around the network

 

 


Related Discussions:- Classification of networks

Define shift operation, SHIFT OPERATION:  This operation replaced all...

SHIFT OPERATION:  This operation replaced all bits to the left one position. For example in the diagram below a 16-bit CRC hardware is given, which needs three Exclusive OR (

Innovative nature of triple key management, Innovative nature of triple key...

Innovative nature of triple key management The triple key management scheme provides secure services by combining different techniques whic contribute to the security and priv

Difference between a class profile and a child profile sheet, QUESTION ...

QUESTION (a) Mention two attitudes of a carer towards an inspector that could lead to negative outcomes (b) Give two performance indicators of Early Childhood Education that

Define parity bit, PARITY BIT: A parity bit is an extra bit transmitt...

PARITY BIT: A parity bit is an extra bit transmitted with data item select to give the resulting bit odd or even parity. For example an even parity data packet 10100001 has p

Ipv6 base header format, IPV6 BASE HEADER FORMAT: It has less informat...

IPV6 BASE HEADER FORMAT: It has less information than IPV4 message header. Next header shows to first extension message header. Flow label is partitioned into a TRAFFIC CLASS

Attacks on wireless network, Q. Attacks on wireless network WSN are vul...

Q. Attacks on wireless network WSN are vulnerable to attacks which compromise the integrity of the WSN nodes by decreasing the nodes' fault tolerance capabilities, data distrib

Udp encapsulation, UDP ENCAPSULATION As given in the figure below, UDP...

UDP ENCAPSULATION As given in the figure below, UDP packet is included in IP datagram and the IP datagram is then attached in the Frame.

Policy management-information security, POLICY MANAGEMENT Policies should...

POLICY MANAGEMENT Policies should be managed as they constantly change. Good policy development and maintenance make a more resilient organization. All policies undergo tremendou

Ip datagram header format, IP DATAGRAM HEADER FORMAT:  It is given in...

IP DATAGRAM HEADER FORMAT:  It is given in the figure below:   In the table: VERS denotes the version of IP. H.LEN denotes the header length in units of

Functional areas in network management, Question 1 a) Explain how CSMA...

Question 1 a) Explain how CSMA/CD works. b) Describe the term "exponential back-off". c) Describe the differences between "circuit switching" and "packet switching". d) Th

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd