Thursday, December 5, 2019

Basic Computer Networking

Question: Discuss about the Article for Basic Computer Networking? Answer: Definitions and Roles: IP Address and DNS: IP address is the unique string having numbers where full stops make the separation. The string identifies each computer through usage of Internet Protocol for communicating through network. The IP address is a numeric label that assigns to the computer and printer participating in the network that uses the IP for the purpose of communication. The IP address has two primary functions, i) identification of the host or network interface and ii) addressing of the location. In generally the IP addresses are used by the router devices to forward messages from one computer to other on the internet [1]. The router plays a role in a telephone switch that makes a connection between the dialed number and the caller. If a message passes through the web, it breaks down into the pieces, termed as packets where each and every packet goes through its route. The header of each packet contains the IP address information. The computer sends the packet along with the source intellectual property and destination IP address to the receiving computer. The routers do the necessary reading of the destination and source IP address in the packets and forward them in accordance. The Domain Name Servers (DNS) are the phone books equivalent in the terms of networking [2]. The DNS usually maintains the directory of the names of the domain and eventually converts them into the IP addresses. The necessity behind DNS is that though the users can be able to remember the names of the area, the machines, and the computers frequently access the websites through the help of IP addresses only. The DNS gives the resolution for the name for Networks of TCP / IP. It makes possible to the client computers users for using names in the place of numeric IP addresses for the identification of hosts [3]. The client computer typically forwards the name of the host at remote locations to the DNS server, that eventually responds with the related IP address. Server and Client The Server is the computer program or a computer that has the responsibility for managing the access to a centralized service or resource in a network. In the technical terms, the server is the example of a computer program that has the power to accept and respond to the requests made by the other programs [4]. In general, it can be said that any device that runs the server software termed as the server. The server describes the primary function or use of a computer. The computer is a dedicated one which will perform a single function highly employed in an organization. In other cases, it can play several roles if each part used in a very gentle manner. The server provides the users in an organization to access the resources such as websites, printers or files attached to the other computers. VPN The Virtual Private Network or VPN is the procedure for the addition of privacy and security in the public and private networks [5]. It looks similar to the internet and the WiFi Hotspots. Large corporate houses usually use the VPNs for the protection of the data which are very sensitive. It makes the extension of the private network through the network of public nature such as the internet. It gives the users the ability to received and send the data through the public networks of shared nature [6]. It acts just like their devices of computing are connected directly to the private network. The creation of a VPN can take place with the help of the establishment of a virtual point to point connection through the use of dedicated connections, protocols of virtual tunneling. Firewall The firewall is the security system in a network, either based on hardware or software, which normally has a control on the outgoing and incoming traffic on the network by a set of rules. It is a system that gets designed for prevention of unauthorized access to a private network. The firewall has the responsibility to act as a point of demarcation in the network as all the communication should go through it [7]. The firewall also grants or rejects the access of the traffic. It, therefore, enforces access controls by the help of a positive control model. The firewall has the power to block the traffic, which intended for the particular IP addresses. It has two network interfaces, one for external and the other one for internal. The purpose of it is to control the traffic that will be allowed to traverse from one side to another [8]. The firewall also protects the network from threats of denial of service attacks. LAN vs. WAN LAN denotes the Local Area Network. It refers to the system that is widely accessible to the entire internet. The example of a LAN is the network in the office or at home. WAN implies the Wide Area Network that is an extension of a LAN. WAN is meant to be the internet as a whole [9]. The term WAN is used to describe a vast network. The LAN is a network of computers that span in a small area. It confines to a single room or building. The LAN can get connected to the other LANs through the lines of the telephone and the radio waves. On the other hand, WAN is a network of telecommunications or network of computers that extends through a distance of a large geographical area [10]. It can establish through the circuits of leased telecommunications. Summary describing the home network configuration provided If two or more computers get linked together, then a home network gets set up. If the networking set up gets configured, then the computers and other devices are connected to the internet for sharing files and devices such as printers. A network also makes possible for information flow from one computer to the other [11]. A connection of cable modem with cable outlet will be at first for configuring a home network. Then a router will be used to connect the cable modem and make the distribution of the signal to the multiple devices for connection sharing. It will also share the printers and files. The protection of the home network and data from the outsiders will get ensured as the router will be responsible for acting as the firewall [12]. The Ethernet and the Wifi network can be used to connect the computers to the home network. References Barabasi, Albert-Laszlo, and Jennifer Frangos.Linked: the new science of networks science of networks. Basic Books, 2014. Hayes, Jeremiah.Modeling and analysis of computer communications networks. Springer Science Business Media, 2013. Kim, Hyojoon, and Nick Feamster. "Improving network management with software defined networking."Communications Magazine, IEEE51, no. 2 (2013): 114-119. Null, Linda, and Julia Lobur.The essentials of computer organization and architecture. Jones Bartlett Publishers, 2014. Patterson, David A., and John L. Hennessy.Computer organization and design: the hardware/software interface. Newnes, 2013. Robertazzi, Thomas G.Computer networks and systems: queueing theory and performance evaluation. Springer Science Business Media, 2012. Sterbenz, James PG, Egemen K. Cetinkaya, Mahmood A. Hameed, Abdul Jabbar, Shi Qian, and Justin P. Rohrer. "Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation."Telecommunication systems52, no. 2 (2013): 705-736. White, Curt.Data communications and computer networks: A business users approach. Cengage Learning, 2015. [1] Patterson, David A., and John L. Hennessy.Computer organization and design: the hardware/software interface. Newnes, 2013. [2] White, Curt.Data communications and computer networks: A business users approach. Cengage Learning, 2015. [3] Hayes, Jeremiah.Modeling and analysis of computer communications networks. Springer Science Business Media, 2013. [4] Kim, Hyojoon, and Nick Feamster. "Improving network management with software defined networking."Communications Magazine, IEEE51, no. 2 (2013): 114-119. [5] Barabasi, Albert-Lszl, and Jennifer Frangos.Linked: the new science of networks science of networks. Basic Books, 2014. [6] Robertazzi, Thomas G.Computer networks and systems: queueing theory and performance evaluation. Springer Science Business Media, 2012. [7] Sterbenz, James PG, Egemen K. Cetinkaya, Mahmood A. Hameed, Abdul Jabbar, Shi Qian, and Justin P. Rohrer. "Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation."Telecommunication systems52, no. 2 (2013): 705-736. [8] Null, Linda, and Julia Lobur.The essentials of computer organization and architecture. Jones Bartlett Publishers, 2014. [9] Patterson, David A., and John L. Hennessy.Computer organization and design: the hardware/software interface. Newnes, 2013. [10] White, Curt.Data communications and computer networks: A business users approach. Cengage Learning, 2015. [11] Hayes, Jeremiah.Modeling and analysis of computer communications networks. Springer Science Business Media, 2013. [12] Kim, Hyojoon, and Nick Feamster. "Improving network management with software defined networking."Communications Magazine, IEEE51, no. 2 (2013): 114-119.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.