Wednesday, June 5, 2019
Advantages And Disadvantages Of Using Networks Computer Science Essay
Advantages And Disadvantages Of Using earningss Computer Science EssayIntroduction to networkComputer network or network is collection of figurers, printers and or so other(a) devices committed with each other through with(predicate) a connection medium and other suitable peripherals. The purpose of the connection is mainly delegate or contribution data, share of resources such(prenominal) as printers, finishs etc. The attached computing machines and devices may be in the same make or goat be Located in different part of the city, country or world. Appropriate connection medium, peripherals, software enable reckoners to transfer, and receive data such as text, pictures, video, sound through electronic ring armor, bear down transfer (ftp-file transfer communications communications protocol), web pages(http -hyper text transfer protocol) etc from one computer to another computer in the network securely.History of networkingThe first idea of computer networking was deve loped by J.C.R Licklider, a computer scientist in 1962. He was later appointed by U.S. Department of Defence at their research project c eithered ARPA (Advanced look into projects agency). ARPA was funding research for developing computer network to MIT. In 1966 first ARPAnet plan for packet switched network unveiled and in 1969 first official computer network was built amongst University of California Lon Angels (UCLA), Stanford Research Institute (SRA), University of California Santa Barbara (UCSB) and University of Utah. The first cognitive content was sent from UCLA to SRI. In 1973 Arpanet goes global University College London and few other European organizations joined the network. In 1982 standardized Internet technology protocols TCP/IP (transmission throw protocol and Internet protocol) were developed which enable meshingworking among single sets of networks efficiently and commercial Internet services started to evolve. In 1991 World Wide Web was developed and Interne t became popular and expanded rapidly including dramatic rise of netmail drug users, text based discussion forum etc.Advantages and Disadvantages of exploitation networksAdvantagesDisadvantagesShare of Expensive ResourcesPrinter, fax machines, modem and other connected resources can be overlap.File and application sharingMajor advantage of network. User can access any file remotely from his computer to another computer with appropriate security measures. Applications similarly can be used without having installed in every computers of the network.Cost saving Sharing application by installing its network version saves cost of umpteen copies of individual application. Sharing devices such as printer, fax etc saves cost.Secured Files and application are password protected in network, which means only authorised person can access it. It is more secured than traditional file organization.SpeedMessage, Data, file can be transferred al to the highest degree instantly to any part of the world.Easy management software program can be installed in legion, also managing and troubleshooting can be performed in server. This eliminates the need of installing and managing software in hundreds of computers in an organization.System trouble innkeepers or connection faults stop accessing files or data. This can lead to loss of data and resources.Security issue data and file can be theft by hacker. This is the main drawback of computer networking. Computer viruses, spyware attack can lead to placement failure, data and resources loss.Expensive Equipment entanglementing equipments are expensive compare to traditional file system and communication method.Answer of criterion P1 (b)Remote AccessRemote access means accessing and using any file or application from a computer to another computer connected in the network. Both computers may located in same building or thousands miles away. Generally files or applications are accessed oer Internet, intranet or LAN with an authen tication process which determine the level of access of the user. For example, a sales staff of Barclays bank accessing loan authorisation database from his home through Internet.IntranetsIntranet is a private computer network mingled with an organization using Internet protocol and tools such and HTTP, file transfer application to share reading or application within the organizations. Typically, authorised users of an organization gain access files or applications in Intranet through a web page with their user realize and password. Staffs of the organizations also maintain internal communication in Intranet via email.Email is accessed via an email client such as Microsoft outlook, Eudora etc. this email clients use POP3 (post office protocol) and SMTP (simple mail transfer protocol) for receiving and sending mail. When an email is sent, the email client connect to the server after providing valid user name and password and verify the forebode of the recipient, if the address is correct it leaves the email on the server. When recipient checks his email, his email client connects to the POP3 server. POP3 server also requires a user name and password. After logging in email client bring the copy of email message to users computer and generally delete the message from the server. User than read or search email message in his computer.InternetInternet is the largest network in the world. It interconnects world wide networks of organisations, billions of computer users in one single network using Internet protocol (TCP/IP). Internet is a global data communication system with the largest resources of information and services such as World Wide Web, Email, file transfer protocol etc.Email in Internet works using SMTP, POP3, and IMAP. Users use email software or web page email program such as yahoo, hotmail etc for sending and receiving mail. This program connect user to the server for sending and receiving email similarly discussed in Intranet section. In Interne t SMTP server has communication between other SMTP servers in Internet. When an email sent SMTP server check the address and send the mail to recipient email server. Similarly when recipient checks the email using POP3 it does the same as discussed earlier. IMAP (Internet mail access protocol) is more advanced protocol which provides better features than POP3. In IMAP email is kept in the server. User can formulate email in different folders and they stays in the server. It enables users accessing mail from any computer any time as email resides in the server.LANs (Local Area Networks)Network in a limited geographical area such a home, office, school in same building or in different building within short distance. Each connected computer or devices are called node. Currently most wired LAN connects using Ethernet technology.Fig LAN macabre (Wide Area Network) unhinged connects networks over a large geographical area such city, state or over countries. It uses routers and combinatio n of communication channels such as public communication get together, air waves, etc.Fig WANMANs (Metropolitan area network)MANs connect two or more LAN within a same city or town. It normally connects two or more branch of an organisation within the same city using routers, switch, and hub. It often connects through public communication link.Fig MANsNetworked applicationAn application software which can be shared on a network from connected computer by an authorise user. Networked application is normally installed on server of a network, and authorise users of that network (LAN/WAN) can access and work with that application from their workstation. This application utilizes Internet or other network hardware infrastructure to perform useful functions.Answer of Criterion P2Description of Devices/ Hardware/ softwareNumber of unit and unit equipment casualtyPricePerformanceSecurityUtilityWorkstationCOMPAQ Presario CQ5305UK-m Desktop PC with MonitorCPU- Intel Core2 Duo 2.1 GHzOS Wind ows 7.015359538520 work station is connected using netgear switch provides a full duplex very high 100 mbps data transmission speed over a 100baseTX connection with UTP CAT6 cable. dell powerEdge server with Windows server 2008 R2 standard edition gives efficient and secured file sharing and print server functions, remote access, application sharing.Windows server 2008 R2 edition has an increased skill and service with windows 7.0 clients operating system.Microsoft Windows 2008 server R2 edition network OS have enhanced security features to prevent server form hackers, and gives a solid expert environment for networking.Kaspersky Business space security software provides real time protection to the server and work stations against harmful virus, spyware, and other harmful internet treats. its constantly monitor and scan all open or modified files and application. It isolate any infected workstationon the network to prevent the server from organism infected and clean the workstatio n.This LAN will enable the users of this organization share file and information whenever they needed from their work station. They are able to print any document from their printer using network printer. Sharing printers and applications saves companys cost and increased productivity.ServerDELL PowerEdge T110CPU Intel Core i3 2.93 GHzNet OS Windows Server 2008 R2 standard edition + 20 CALs (client access license)11359SwitchNETGEAR JGS524 Gigabit Switch -24 ports1237Cables200 m UTP ( CAT 6 )42ConnectorNetwork connector RJ-452 pack( 25 in a pack)4 each8UPS(UPS provides uninterrupted power supply to the server and prevent server failure due to an event of power cut).APC Smart-UPS 2200VA1588Security SoftwareKaspersky Business Space Security for 20 workstation and 1 windows 2008 server.1 year subscribtion587Answer of Criterion P3Overview of network Operating systemA network operation system is a set of software that control and manages computers, printers and other devices connected in a network. it allows computers to share file and devices connected in the network. It is installed on a computer called server which centrally maintain the network.There are numerous Net OS from different vendors in the market. Among them most popular areWindows NT, Windows Server from Microsoft,UnixNovel Netware from Novel Inc.Apple Share from AppleRegardless of vendors all Net OS works by providing following functions and services to the client and serverFile and print sharingAccounts administrations for usersSecuritySome basic features of a network operating system are-Add , remove and modify users, workstations, devices in the networkAdd, Remove and configure application software to be used and shared by the users on the networkControl and manage users and their accessAllow and control users to share data, application and devices such as printer, fax etc.Allows users to transfer data from one computer to another computer in the networkMange security and privilege.Security I mplications of network useThe computer connected in a network is vulnerable to intruder such as hackers and intrusion programs. Also virus, malware, spyware, worms on the network attack the system. Those attacks may results valuable information theft, system failure and data loss or even irrecoverable damages to the system. Intruder gain access and control of the system by using some methods as described below-Back door and remote administered programSpam emailEmail virusTrojan Horse programHidden filesTo keep the system secure there are some security measure should be taken.System needs to be password protected, password should be changed regularly and shouldnt be disclosed to anyoneSystem should have latest software update.Antivirus, firewall, anti spyware should be installed and should be updated regularly.Suspicious email shouldnt be opened.File or program shouldnt be opened from unknown sourcesDisable hidden file extensionDisconnect from network when pc is not in use.Software L icensing IssuesSoftware licensing is an agreement between user and software manufacturer. software using conditions and distribution limitations. Software is intellectual property and protected by copyright laws. When a software is obtained from any sources users enters into some legal bindings set out by the manufacturer or distributor on how this software may be used. These includes but not limited to poesy of users, distribution rights and limitation, resale rights and limitations, reproduction and modification limitations etc. Most of the commercial software comes with license when purchased off the selves. Some software license is bundled with specific hardware or new system, call OEM License. There are different categories of software license-Propitiatory Software own by a company or individuals and not go off or open sourced. Redistribution or reproduction is generally not allowed or limitedFreeware and Open source software Generally free and permits user to modify, manifo ld and distribute according to their own preferenceShareware, Trial ware is propitiatory software but provided free to user to use for a limited layover of time for testing. Reproduction is not permitted but distribution may be permitted with certain conditionsConstrains on Capacity and performanceEvery Network has limited readiness of transferring and receiving data. this capacity (bandwidth) depends on the several factors such as device and medium used, price etc. each users of a network share the bandwidth and everyone is effecting the performance of the network. For example, if user sends a very large video or animation file to another computer in the network which most likely to use most of the capacity of the network, which will make the network very slow to other users. Thus performance is affected, in some cases packet or data losses may occur due to overloading of network. When a packet is lost, retransmission of packets attempted and this cause delay of receiving and se nding data.Answer of Criterion P5Relationship of Various Protocols, devices of network with OSI-7 mould modelApplication(Layer 7)Http-Hyper text Transfer ProtocolTelnetFTP- File transfer protocolPresentation(Layer 6Jpeg, Gif, avi, mov, mpeg etcSession(Layer 5)NetBios Names, RPC, AppleTalk, WinsockTransport(Layer 4)TCP, UDP,SPXNetwork(Layer 3)IP, IPX, AppleTalk DDPRouterData link(Layer 2)Frame Relay, HDLC, ATM, IEEE 802.3/802.2/802.5 EthernetSwitch, BridgePhysical story(Layer 1)Ethernet, 802.3, 802.5, Token ringRepeater, HubEthernet Most commonly used protocol for LAN. Ethernet fits into the Data link layer and Physical layer of OSI model and deal with the hardware of the network. it define about the type of media, connectors, characteristics, use of wires, shape of connectors etc.HDLC High-level Data link Control used for point-to-point WAN link.TCP/IP Transmission Control Protocol/ Internet protocol. These pair of protocol allows one network to communicate with another by creatin g logical address, part of large data into small packets, data encapsulation, error recovery etc.UDP User datagram Protocol. Transmit data from one host to another without establishing a preliminary connection. It simply transmits data without knowing if the data is transmitted correctly thus unreliable.ICMP Internet Control Message Protocol carry error recovery data, control data such as destination unreachable, echo request, etc between two hostHttp Hyper text transfer protocol,FTP File transfer protocolSMTP truthful mail transfer protocol
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.