0% found this document useful (0 votes)
31 views

Assignment Cisco 2

The document discusses several key aspects of networking including differences between copper and fiber optic cables, importance of fault tolerance, scalability, quality of service (QoS), and security. To achieve fault tolerance, techniques mentioned are redundancy, failover clustering, and minimizing downtime. Scalability can be ensured through cloud computing, virtualization, and modular design. QoS techniques include buffer management, traffic classification, and policy-based QoS. Network security aims to protect infrastructure and information, with techniques such as firewalls, encryption, and regular software updates.

Uploaded by

sethkartikeya08
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

Assignment Cisco 2

The document discusses several key aspects of networking including differences between copper and fiber optic cables, importance of fault tolerance, scalability, quality of service (QoS), and security. To achieve fault tolerance, techniques mentioned are redundancy, failover clustering, and minimizing downtime. Scalability can be ensured through cloud computing, virtualization, and modular design. QoS techniques include buffer management, traffic classification, and policy-based QoS. Network security aims to protect infrastructure and information, with techniques such as firewalls, encryption, and regular software updates.

Uploaded by

sethkartikeya08
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Assignment – 2

1. Enlist all the differences between Copper and Fibre Optic Network Cables. Describe
the advantages and disadvantages of the same.

Copper Network Cables:

 They are made of copper wires, which are good conductors of electricity.
 They are flexible and can be easily bent and twisted.
 These kinds of cables are relatively easy to install and are widely used in various
applications.

Advantages:

 Copper cables are generally cheaper than fiber optic cables.


 They are compatible with a wide range of devices and networking equipment.
 They are very low maintenance as compared to fiber optic wires.
Disadvantages:

 They are vulnerable to interference, especially in areas with a lot of electronic


devices.
 They have distance limitations, especially for high-speed data transmission.
 Also, they have a limited transmission distance, usually up to 100 meters without
signal amplification.

Fiber Optic Network Cables:

 They are made of thin strands of glass or plastic that transmit data as light signals.
 They transmit data using light signals, providing higher data transfer speeds.
 Light uses a phenomenon called Total Internal Reflection to transmit data.
Advantages:

 These cables offer incredibly high data transfer speeds, making them ideal for high-
bandwidth applications like video streaming and online gaming.
 They transmit data over long distances without signal degradation.
 Unlike copper wires these are immune to interferences.
Disadvantages:

 They are fragile and more delicate than copper wire thus making them prone to
damage.
 Their installation and maintenance cost are way more than that of copper wire.
 They have very limited use in the industry.
2. Explain the importance of Fault tolerance in Networking and enlist a few techniques
you will use to achieve it.

A fault-tolerant network minimizes the impact of failures by restricting the number of


devices affected. To ensure fault tolerance, multiple paths are necessary. Reliable networks
achieve redundancy through packet switching, where traffic is divided into packets and sent
over the network. Each packet can potentially follow a unique path to reach its destination.
This flexibility is not achievable in circuit-switched networks, which create fixed connections
for communication.

Techniques:

 Redundancy: One of the most common techniques is to introduce redundancy in


critical network components such as servers, switches, and routers. Redundant
systems act as backups that can take over if the primary system fails.
 Failover Clustering: Servers in a failover cluster are interconnected in such a way that
if one server fails, another server in the cluster automatically takes over the workload
and ensures that the server never stops.
 Minimizing Downtime: Fault tolerance mechanisms reduce downtime significantly.
Instead of waiting for technicians to diagnose and fix the problem, the network can
automatically switch to backup systems, minimizing the impact on users.

3. Explain the importance of Scalability in Networking and enlist a few techniques you
will use to achieve it.

A scalable network can effortlessly accommodate new users and applications without
affecting the performance of existing services for current users. Network designers adhere to
established standards and protocols to ensure the scalability of networks.

Techniques:

 Cloud Computing: Cloud services provide scalable resources whenever wanted. By


migrating certain services and data to the cloud, businesses can easily scale their
network infrastructure based on usage requirements.
 Virtualization: Virtualization allows the creation of virtual instances of servers,
storage, and network resources. It allows efficient use of physical resources and
shortens the process of scaling up by creating new virtual instances.
 Modular Design: Building the network infrastructure in a modular way allows easy
addition or removal of modules or components. This modular approach abridges
upgrades and expansions.

4. Explain the importance of Quality of Service in Networking and enlist a few


techniques you will use to achieve it.

Quality of Service (QoS) in networking refers to the ability to provide different levels of
service to different types of network traffic, ensuring that critical applications and users
receive priority and consistent performance. QoS is essential because it allows networks to
meet specific service requirements, ensuring a better user experience, especially for real-
time applications like voice and video calls. Voice and live video transmissions demand
exceptional service quality. Ever experienced a live video with frequent interruptions? This
occurs when bandwidth demand exceeds availability – a situation resolved by configuring
Quality of Service (QoS). QoS is crucial for ensuring consistent content delivery. By
implementing a QoS policy, routers efficiently handle data and voice traffic flow.

Techniques:

 Buffer Management: Buffers briefly store packets during periods of network


congestion. Effective buffer management ensures that high-priority packets are
processed first, minimizing delays for critical traffic.
 Traffic Classification: Network traffic is categorized based on application type or user
priority. Packets are classified into different classes, allowing the network to treat
them differently based on their importance.
 Policy-Based QoS: We can define policies that dictate how different types of traffic
should be handled. These policies ensure that QoS rules are consistently applied
across the network.

5. Explain the importance of Security in Networking and enlist a few techniques you will
use to achieve it.

Security in networking is paramount because it safeguards sensitive data, ensures user


privacy, and protects against cyber threats and attacks. A secure network is crucial for
maintaining the integrity, confidentiality, and availability of information.
There are two primary aspects of network security that demand attention:

Network Infrastructure Security:

 Focuses on safeguarding the network components and architecture.


 Involves measures to prevent unauthorized access to devices and resources.
 Encompasses physical security practices to protect network devices from physical
tampering or theft.
Information Security:

 Concentrates on protecting the data transmitted over the network.


 Involves ensuring the confidentiality, integrity, and availability of the information
being transmitted.
The Three Goals of Network Security:
Confidentiality:

 Ensures that only the intended recipients can access and read the transmitted data.
 Prevents unauthorized users from intercepting and understanding sensitive
information.

Integrity:

 Provides assurance that the data remains unaltered and intact during transmission.
 Guards against unauthorized modifications, ensuring the received data matches the
sender's original message.
Availability:

 Guarantees timely and reliable access to data for authorized users.


 Ensures that network resources and services are accessible when needed, without
disruption or delay.

Techniques:
1) Firewalls: Firewalls monitor and control incoming and outgoing network traffic based
on predetermined security rules. They act as a barrier between a trusted internal
network and untrusted external networks, preventing unauthorized access.
2) Encryption: Encryption algorithms transform data into a secure format that can only
be read by authorized users with the decryption key. This ensures that even if data is
intercepted, it remains confidential and secure.
3) Regular Software Updates: Keeping software, including operating systems and
applications, up-to-date with the latest security patches and updates helps in
addressing known vulnerabilities and protects against exploitation by malware and
hackers.

You might also like