Friday, April 5, 2019

Advantages And Disadvantages Of Using Networks Computer Science Essay

Advantages And Disadvantages Of utilise Networks Computer Science EssayIntroduction to intercommunicateComputer network or network is assembling of estimators, scrapeers and other devices binded with each other through a relateion medium and other able peripherals. The purpose of the connection is mainly conduct or shargon selective information, share of resources such(prenominal) as printers, applications and so forth The connected computers and devices may be in the uniform building or send packing be rigid in opposite part of the city, country or world. Appropriate connection medium, peripherals, computer software enable computers to transfer, and pick up selective information such as textbook pas seul, pictures, image, sound through net air, filing cabinet transfer (ftp- institutionalise transfer colloquys protocol), web pages(http -hyper text transfer protocol) and so forthfrom one computer to another computer in the network securely.History of networki ngThe first creative thinker of computer networking was developed by J.C.R Licklider, a computer scientist in 1962. He was later appointed by U.S. Department of Defence at their research project called ARPA (Advanced Research projects agency). ARPA was funding research for developing computer network to MIT. In 1966 first ARPAnet plan for packet switched network unveiled and in 1969 first authorized computer network was built between University of California Lon Angels (UCLA), Stanford Research Institute (SRA), University of California Santa Barbara (UCSB) and University of Utah. The first nitty-gritty was sent from UCLA to SRI. In 1973 Arpanet goes global University College London and few other European organizations joined the network. In 1982 standardize mesh technology protocols TCP/IP (transmission control protocol and internet protocol) were developed which enable internetworking among adept sets of networks efficiently and commercial Internet services started to evolve . In 1991 World Wide Web was developed and Internet became popular and expanded rapidly including dramatic rise of email exploiters, text based discussion gathering and so forthAdvantages and Disadvantages of apply networksAdvantagesDisadvantagesShare of pricey ResourcesPrinter, fax machines, modem and other connected resources displace be shared. bill and application sharingMajor advantage of network. User can admission charge code whatsoever file distantly from his computer to another computer with appropriate protective covering measures. Applications also can be social functiond without having installed in every computers of the network.Cost saving Sharing application by installment its network version saves court of m whatsoever copies of individual application. Sharing devices such as printer, fax etceteraterasaves cost.Secured Files and application are password defend in network, which means only charge person can accession it. It is more secured than tra ditional file administration of rules.SpeedMessage, Data, file can be transferred al close to instantly to any part of the world.Easy watchfulnessSoftware can be installed in server, also managing and troubleshooting can be performed in server. This eliminates the need of installing and managing software in hundreds of computers in an organization.System failureServers or connection faults stop accessing files or data. This can lead to loss of data and resources. guarantor issue data and file can be theft by hacker. This is the main drawback of computer networking. Computer viruses, spyware attack can lead to system failure, data and resources loss.Expensive EquipmentNetworking equipments are expensive compare to traditional file system and communication method.Answer of criterion P1 (b) irrelevant AccessRemote access means accessing and using any file or application from a computer to another computer connected in the network. Both computers may located in same building or thou sands miles away. Generally files or applications are accessed over Internet, intranet or LAN with an authentication edge which determine the level of access of the substance abuser. For example, a sales staff of Barclays bank accessing loan authorisation database from his blank space through Internet.IntranetsIntranet is a private computer network between an organization using Internet protocol and tools such and HTTP, file transfer application to share information or application within the organizations. Typically, authorised users of an organization gain access files or applications in Intranet through a web page with their user name and password. Staffs of the organizations also maintain internal communication in Intranet via email.Email is accessed via an email client such as Microsoft outlook, Eudora etc. this email clients use POP3 (post office protocol) and SMTP (simple mail transfer protocol) for receiving and sending mail. When an email is sent, the email client connect to the server after providing valid user name and password and verify the sell of the recipient, if the address is correct it leaves the email on the server. When recipient checks his email, his email client connects to the POP3 server. POP3 server also requires a user name and password. After logging in email client bring the copy of email message to users computer and generally delete the message from the server. User than read or search email message in his computer.InternetInternet is the largest network in the world. It interconnects world wide networks of organisations, billions of computer users in one single network using Internet protocol (TCP/IP). Internet is a global data communication system with the largest resources of information and services such as World Wide Web, Email, file transfer protocol etc.Email in Internet works using SMTP, POP3, and IMAP. Users use email software or web page email course such as yahoo, hotmail etc for sending and receiving mail. This pro gram connect user to the server for sending and receiving email similarly discussed in Intranet section. In Internet SMTP server has communication between other SMTP servers in Internet. When an email sent SMTP server check the address and send the mail to recipient email server. Similarly when recipient checks the email using POP3 it does the same as discussed earlier. IMAP (Internet mail access protocol) is more advanced protocol which provides better features than POP3. In IMAP email is kept in the server. User can organise email in different folders and they stays in the server. It enables users accessing mail from any computer any time as email resides in the server.LANs (Local Area Networks)Network in a circumscribed geographical area such a home, office, school in same building or in different building within short distance. Each connected computer or devices are called node. Currently most wired LAN connects using Ethernet technology.Fig LANWAN (Wide Area Network)WAN conne cts networks over a large geographical area such city, state or over countries. It uses routers and combination of communication conduct such as public communication link, air waves, etc.Fig WANMANs (Metropolitan area network)MANs connect two or more LAN within a same city or t accept. It unremarkably connects two or more branch of an organisation within the same city using routers, switch, and hub. It practically connects through public communication link.Fig MANsNetworked applicationAn application software which can be shared on a network from connected computer by an authorise user. Networked application is normally installed on server of a network, and authorise users of that network (LAN/WAN) can access and work with that application from their work ship. This application utilizes Internet or other network computer hardware infrastructure to perform useful functions.Answer of Criterion P2 definition of Devices/ Hardware/ softwareNumber of unit and unit pricePricePerformanceS ecurity serviceWorkstationCOMPAQ Presario CQ5305UK-m Desktop PC with MonitorCPU- Intel Core2 Duo 2.1 GHzOS Windows 7.015359538520 work station is connected using netgear switch provides a full duplex very high 100 mbps data transmission speed over a 100baseTX connection with UTP CAT6 cable. Dell strengthEdge server with Windows server 2008 R2 standard edition gives efficient and secured file sharing and print server functions, remote access, application sharing.Windows server 2008 R2 edition has an change magnitude efficiency and service with windows 7.0 clients operating system.Microsoft Windows 2008 server R2 edition network OS have enhanced tri furthere features to prevent server form hackers, and gives a solid dependable environment for networking.Kaspersky Business space security software provides real time protection to the server and work stations against disadvantageous virus, spyware, and other harmful internet treats. its constantly monitor and scan all open or modifie d files and application. It isolate any infected workstationon the network to prevent the server from being infected and clean the workstation.This LAN pass on enable the users of this organization share file and information whenever they needed from their work station. They are able to print any document from their printer using network printer. Sharing printers and applications saves companys cost and increased productivity.Serverdell PowerEdge T110CPU Intel Core i3 2.93 GHzNet OS Windows Server 2008 R2 standard edition + 20 CALs (client access license)11359SwitchNETGEAR JGS524 Gigabit Switch -24 ports1237Cables200 m UTP ( CAT 6 )42 connectorNetwork connector RJ-452 pack( 25 in a pack)4 each8UPS(UPS provides uninterrupted power supply to the server and prevent server failure due to an event of power cut).APC Smart-UPS 2200VA1588Security SoftwareKaspersky Business Space Security for 20 workstation and 1 windows 2008 server.1 year subscribtion587Answer of Criterion P3Overview of network Operating systemA network operation system is a set of software that control and manages computers, printers and other devices connected in a network. it allows computers to share file and devices connected in the network. It is installed on a computer called server which centrally maintain the network.There are many Net OS from different vendors in the market. Among them most popular areWindows NT, Windows Server from Microsoft,Unix invigorated Netware from Novel Inc.Apple Share from AppleRegardless of vendors all Net OS works by providing following functions and services to the client and serverFile and print sharingAccounts administrations for usersSecuritySome staple features of a network operating system are-Add , remove and modify users, workstations, devices in the networkAdd, reverse and configure application software to be used and shared by the users on the network subordination and manage users and their accessAllow and control users to share data, application a nd devices such as printer, fax etc.Allows users to transfer data from one computer to another computer in the networkMange security and privilege.Security Implications of network useThe computer connected in a network is vulnerable to intruder such as hackers and intrusion programs. Also virus, malware, spyware, worms on the network attack the system. Those attacks may results valuable information theft, system failure and data loss or even irrecoverable damages to the system. Intruder gain access and control of the system by using some methods as described below-Back door and remote administered programSpam emailEmail virusTrojan Horse programHidden filesTo grip the system secure there are some security measure should be taken.System take to be password protected, password should be changed regularly and shouldnt be disclosed to anyoneSystem should have current software update.Antivirus, firewall, anti spyware should be installed and should be updated regularly.Suspicious email shouldnt be opened.File or program shouldnt be opened from unknown sourcesDisable hidden file extensionDisconnect from network when pc is not in use.Software Licensing IssuesSoftware licensing is an agreement between user and software manufacturer. software using conditions and distri exclusivelyion limitations. Software is intellectual property and protected by copyright laws. When a software is obtained from any sources users enters into some legal bindings set out by the manufacturer or distributor on how this software may be used. These includes but not limited to numbers of users, distribution rights and limitation, resale rights and limitations, comeback and modification limitations etc. Most of the commercial software comes with license when purchased off the selves. Some software license is bundled with specific hardware or new system, call OEM License. There are different categories of software license-Propitiatory Software own by a company or individuals and not free or open sourced. Redistribution or reproduction is generally not allowed or limitedFreeware and Open source software Generally free and permits user to modify, reproduce and distribute according to their own preferenceShareware, Trial ware is propitiatory software but provided free to user to use for a limited period of time for testing. Reproduction is not permitted but distribution may be permitted with certain conditionsConstrains on Capacity and murderEvery Network has limited capacity of transferring and receiving data. this capacity (bandwidth) depends on the several factors such as device and medium used, price etc. each users of a network share the bandwidth and everyone is effecting the performance of the network. For example, if user sends a very large video or animation file to another computer in the network which most likely to use most of the capacity of the network, which will make the network very slow to other users. Thus performance is affected, in some cases packet or data losses may occur due to overloading of network. When a packet is lost, retransmission of packets attempted and this cause delay of receiving and sending data.Answer of Criterion P5Relationship of Various Protocols, devices of network with OSI-7 classed modelApplication(Layer 7)Http-Hyper text Transfer ProtocolTelnetFTP- File transfer protocol founding(Layer 6Jpeg, Gif, avi, mov, mpeg etcSession(Layer 5)NetBios Names, RPC, AppleTalk, WinsockTransport(Layer 4)TCP, UDP,SPXNetwork(Layer 3)IP, IPX, AppleTalk DDPRouterData link(Layer 2)Frame Relay, HDLC, ATM, IEEE 802.3/802.2/802.5 EthernetSwitch, Bridge somatic layer(Layer 1)Ethernet, 802.3, 802.5, Token ringRepeater, HubEthernet Most commonly used protocol for LAN. Ethernet fits into the Data link layer and Physical layer of OSI model and deal with the hardware of the network. it define about the type of media, connectors, characteristics, use of wires, shape of connectors etc.HDLC High-level Data link run across used for poin t-to-point WAN link.TCP/IP Transmission Control Protocol/ Internet protocol. These pair of protocol allows one network to communicate with another by creating limpid address, segmentation of large data into small packets, data encapsulation, error recuperation etc.UDP User datagram Protocol. head data from one host to another without establishing a prior connection. It simply transmits data without knowing if the data is transmitted correctly thus unreliable.ICMP Internet Control Message Protocol carry error recovery data, control data such as destination unreachable, echo request, etc between two hostHttp Hyper text transfer protocol,FTP File transfer protocolSMTP Simple mail transfer protocol

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.