NETWORK ADMINISTRATION Rcj2no
NETWORK ADMINISTRATION Rcj2no
MANAGEMENT
STUDENT NAME: ONYANGO STEPHEN
OMONDI
REGISTRATION NUMBER:
CT201/106102/21
COURSE: BACHELOR OF SCIENCE
(COMPUTER SCIENCE)
DATE OF SUBMISSION: 6TH FEBRUARY 2024
INTRODUCTION
A computer network is a telecommunication channel that links a group of
computers so as to allow communication and data transfer between the
systems, the software application and their users. Machines are said to have
a network when a process in one machine can communicate with a process in
another machine. The techniques used to define networks include the use of
various forms of media used for the transmission of signals, the
communication protocols used to organize network traffic, the nature of the
network, network topography and the organizational scope of the
network. Internet is not only the best known but is also the most powerful
computer network.
Networks are often interconnected to form larger networks, with the Internet
being the best-known example of a network of networks. There are many
ambiguities in the literature between a computer network and a distributed
system. The main difference would be the fact that a number of separate
computers appear to their users as one unified coherent system in case of a
distributed system. It has a single model or paradigm that it presents to the
users. This is often done by a layer of software on top of the os called
middleware that implements this model. The World Wide Web is one of the
well-established cases of a distributed system. It is built on top of the Internet
and it is based on a model where the document (web page) is everything.
CONCLUSION
The encoding and the modulation are both required for the proper
transmission and storage of the relevant information.
The technique that should be applied is, therefore, influenced by the nature of
the data, mode of transmission, together with other desirable characteristics
such as noise resistance and spectral efficiency.
TRANSMISSION MEDIA
BACKGROUND OF STUDY
As technology continues to develop, we can only expect more innovations in
transmission media. With higher bandwidths, greater security, and even
weirder forms of transmitted data (such as using lasers or underwater cables)
coming into view,
Historically, the story begins with the telegraph relying on wires to transport
electrical waveforms over distances this was the birth of guided media where
data follows a defined path During the 1900s to 1990s telephone networks
thrived and twisted-pair and coaxial cables took center stage. These provided
much greater bandwidths and paved the way for data communication. Then
wireless evolution was born with the introduction of Radio waves and
microwaves, which brought the age of unguided media, i.e. data transmission
without physical cables.
Depending on the development of technology, we can further innovate in
terms of the transmission media. In the future, we will have higher bandwidth,
better security measures, and even more sophisticated ways of transmitting
data, such as using lasers or underwater cables.
LITERATURE REVIEW
Guided Media:
Twisted-pair cable: However, the studies emphasize its cost-
effectiveness, straightforwardness, and common use in LAN’s (e.g.,
[Onwuka, 2020]). some shortcomings such as interference and low
bandwidth are observed (Stallings, 2016).
Coaxial cable: Its higher bandwidth is the primary topic of the research,
which means that it is a good fit for use as a component of cable
television and early internet networks ([Hafner, 2019]). But due to its
increased size and price, this modality has slowly disappeared ([Held,
2021]).
Fiber optic cable: Large literature are emphasizing its advantages in
connection with speed, bandwidth, and security and as a result, make it
one of the pioneering techniques of high-performance networks and
long-distance communication (Agrawal, 2023, Ouzounova, 2020). Multi-
core fibers are another significant step in the technology of fiber optics
that has been studied as well (Li, 2022).
Unguided Media:
Radio waves: Studies highlight their use for broadcasting, mobile
communication, and long-range networks, pointing out their
adaptability and at large areas of coverage (Rappaport,
2019). But limitations such as interference, security issues, and
differences in available bandwidth by frequency are also
recognized (Geier, 2010).
Conclusions
Factors like distance, bandwidth, security and cost affect the
choice of transmission media. Getting to know these
characteristics is important for designing and deploying reliable
networks. Future trends lean towards hybrid networks, new
materials, and technologies that will extend the limits of data
transmission speed.
LITERATURE REVIEW
The OSI model has seven key layers which are:
1. Physical Layer
This layer deals with he physical transmission of data through
cables, wireless signals or other media
2. Data Link Layer
Ensures reliable data transmission between network devices
over a single physical link
3. Network Layer
This layer is responsible for handling routing data packets
across networks, determining the best path for delivery form
the source to the destination
4. Transport layer
It provides a reliable end-to-end data transfer between
applications on different devices
5. Session layer
This layer establishes, manages, and terminates
communication sessions between applications
6. Presentation layer
This layer deals with data format conversions and
encryption/decryption for different applications
7. Application layer
Application layer provides network services to applications like
file transfer, email and web browsing
Conclusions
Despite not being the underlying structure of the internet, the OSI reference
model continues to hold significant value. Its clear layered approach provides
a fundamental understanding of network communication principles, aids in
education and troubleshooting, and serves as a reference point for analyzing
and designing new network technologies.
References
Comer, D. E. (2011). Interworking with TCP/IP: Principles,
Protocols, and Architectures. Addison-Wesley.
Heijden, R. G. van der. (2012). The Internet Architecture. Elsevier.
Forouzan, B. A. (2007). TCP/IP Protocol Suite. McGraw-Hill
Education.
Lamberton, B. (2000). Networking Simplified. Addison-Wesley.
INTERNETWORKING
BRIDGES
BACKGROUND OF STUDY
Bridges are network devices that serve as connector between two or
more Local Area Networks(LANs).In the early 1970s emerging alongside
ethernet technology, bridges addressed the need to expand LANs. In the
modern era with the rise of faster networks , bridges support higher
bandwidths and advanced features like VLANS
CONCLUSION
Bridges primarily connect Local Area Networks (LANs) that share the
same communication language (protocol) at layer 2, like Ethernet.
However, some advanced bridges can translate between different
dialects (protocols) like Ethernet and Token Ring.
Functions of Bridges:
Decide on message forwarding:
Expand networks, minimize local traffic
Modify message headers slightly
Connects two or more LANs
ROUTERS
BACKGROUND OF STUDY
A router is a network device responsible for directing data packets
across diverse paths to there intended destinations .In the early days
routers manually managed message forwarding based on network maps
LITERATURE REVIEW
Routers play a central role in the internet by directing data packets across
networks to their intended destinations. This review explores the existing
literature on routers, examining their history, types, functionalities, and future
trends.
Types of routers
1. Wired and wireless routers
2. Core and edge routers
Significance of routers
1. Efficient data delivery
2. Network Scalability
3. Security and network management
CONCLUSION
REFERENCE
GATEWAYS
BACKGROUND OF STUDY
Gateways act as translators and mediators facilitating communication
between networks with different protocols, mediums or security policies
The early gateways in the early 1970s – 1980s we custom-built,
perfuming basic control conversion and routing traffic between
incompatible networks
Types of gateways
Packet-level gateway – enable communication between networks
with dissimilar structures
Application-level gateways – enforce security and manages access
to resources
Functions of Gateways
1. Routing
2. Security
3. Access Control
4. Network address translation
5. Protocol conversion
CONCLUSION
Gateways represent a dynamic technology adapting to evolving needs,
ensuring data traverses various networks securely and efficiently.
REFERENCES
Huitema, C. (2014). IPv6: The New Internet Protocol. John
Forouzan, B. A. (2007). TCP/IP Protocol Suite. McGraw-Hill Education.
BACKGROUND OF STUDY
Token Bus and Token Ring were two well-known protocols that
dominated the early days of networking in terms of limiting access to
the shared media. Both made use of a token-passing technique to
reduce collisions and guarantee orderly data transfer. This paper
explores their functions, distinctions, historical background, and
eventual demise, providing important insights into the development of
networking protocols.
LITERATURE REVIEW
Token Bus
Virtual Ring on Bus Topology: Token Bus constructed a logical ring
structure on a bus or tree topology in place of a real ring.
Complexities: Handling collisions and preserving the virtual ring
added more complexity.
Scalability: It can accommodate larger networks since it is more
scalable than Token Ring.
Applications: Because it can provide real-time performance, it is
mostly employed in factory automation and process control.
Token Ring
Physical Ring Topology: The token was passed progressively from
one device to the next by those connected in a physical ring.
Simplicity: The actual ring construction made troubleshooting and
operation more straightforward.
Limited Scalability: Mostly utilized in smaller office settings, ring
size hindered scalability.
Popularity: Widely used by IBM, it initially gained popularity
because of its consistency and dependability in terms of
performance.
Similarities and difference
Complexity: Virtual ring management makes the token bus more
difficult.
Scalability: Ring provided simplicity, but Token Bus was more
scalable.
Performance: Token Bus might have more bandwidth, and Ring
could have steady performance.
Cost: Because of cabling and transceivers, token buses are more
expensive.
Applications: A variety of uses motivated by their attributes
CONCLUSION
Although Token Bus and Token Ring represented notable innovations at
the time, their constraints ultimately caused them to fail.