CS 200 Fundamentals of Information Technology Module 3 Data Communications and Networks Assignment 6
This document summarizes an assignment for a course on data communications and networks. The assignment contains 5 questions: 1) summarizing advantages and disadvantages of peer-to-peer networks and describing 2 examples, 2) explaining how reliable connections are established using unreliable protocols, 3) why employers require VPNs, 4) providing examples of authentication mechanisms, and 5) analyzing the network load of different architectures.
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
98 views
CS 200 Fundamentals of Information Technology Module 3 Data Communications and Networks Assignment 6
This document summarizes an assignment for a course on data communications and networks. The assignment contains 5 questions: 1) summarizing advantages and disadvantages of peer-to-peer networks and describing 2 examples, 2) explaining how reliable connections are established using unreliable protocols, 3) why employers require VPNs, 4) providing examples of authentication mechanisms, and 5) analyzing the network load of different architectures.
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1
CS 200 Fundamentals of Information Technology
Module 3 Data Communications and Networks
Assignment 6
1). You read about Peer-to-peer networks in the online content. Summarize the advantages and disadvantages of P2P (do a little Internet research to answer this question). Describe 2 popular P2P networks. 2). You read about reliable verses unreliable network protocols and you also read about network layers. Since Ethernet and IP are both unreliable protocols how do we establish a reliable connection between two host computers? 3). Why do some employers require employees to use a VPN to connect to corporate networks? 4). Authentication is based on something that a person knows, has, or is. Do some Internet research to determine an example of an authentication mechanism for each of these three criteria. 5). Different network architectures were described in this module to illustrate how networks are used by applications. This question asks you to think about the load (demand) each architecture places on the network. Assume that you are sitting at a personal computer running an application on the network. Complete the following table with whether the load is light, moderate, or heavy for uploads (transfers from your machine into the network) and downloads (transfers from another machine to your machine) on each architecture. Also, add a reason for your choice of load.
Architecture Upload Download Host based Client Based Client Server Multi-tier Peer to Peer
Mathew, Jack - Networking For Beginners - Simple Guide To Study Basic - Advanced Computer Network, Hardware, Wireless, and Cabling. LTE, Internet, and Cyber Security (2021)