Cynthia Cheruto

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

NAME :cheruto Cynthia

REG NO: As14/00057/23

UNIT: COMPUTER STUDIES

UNIT CODE:COMP101

COURSE: bachelor of arts kiswahili

TASK:ASSIGNMENT THREE

COMPUTER NETWORKS

 Explain the different types of computer networks, including LAN, WAN, MAN, and PAN, and describe
their typical use cases.

Local Area Network (LAN)

Use Case: Office buildings, schools, homes.

: A LAN is a network that covers a small geographic area, like a single building or a group of closely
situated buildings. It’s primarily used to connect personal computers, printers, and other devices so they
can share resources and communicate with one another efficiently. Think of it as the digital nerve center
of your workplace or home.

Wide Area Network (WAN)

Use Case: The Internet, large companies with offices in multiple locations.

A WAN spans a large geographic area, such as cities, countries, or even continents. The Internet is the
most notable example of a WAN. It’s used to connect multiple LANs, allowing communication and data
transfer over long distances. Companies use WANs to ensure their branches around the globe stay
connected.

. Metropolitan Area Network (MAN)

Use Case: Cities, large campuses.

: A MAN covers a larger area than a LAN but a smaller area than a WAN. It’s typically used to connect
multiple LANs within a city or a large campus, facilitating high-speed connectivity for data and resource
sharing. It’s like an extended version of a LAN, optimized for a broader, metropolitan range.
Personal Area Network (PAN)

Use Case Individual use, connecting personal devices.

Description: A PAN is a network used for connecting devices within the range of an individual person,
typically within a few meters. Examples include Bluetooth-enabled devices, such as a smartphone
connected to a smartwatch or wireless headphones.

 Discuss the OSI (Open Systems Interconnection) model and its seven layers, explaining the role and
functionality of each layer in computer networking.

Physical Layer

Role: Deals with the physical connection between devices.

Functionality: This layer involves the transmission of raw data bits over a physical medium, such as
cables or radio waves. It handles aspects like signal timing, voltage levels, and data rates.

Data Link Layer

Role: Ensures reliable data transfer.

Functionality: This layer is responsible for node-to-node data transfer and error detection/correction. It
frames data packets and handles MAC (Media Access Control) addresses to ensure that data reaches the
correct device on the network.

Network Layer

Role: Manages data routing and forwarding.

Functionality: This layer determines the best physical path for data to travel across networks. It uses IP
(Internet Protocol) addresses to identify and route data packets to their destination.

Transport Layer

Role: Ensures end-to-end communication and data integrity.

Functionality: This layer provides reliable data transfer between host systems. It manages data
segmentation, reassembly, error recovery, and flow control. Protocols like TCP (Transmission Control
Protocol) and UDP (User Datagram Protocol) operate at this layer.
Session Layer

Role: Manages sessions and controls dialogues.

Functionality: This layer establishes, manages, and terminates connections between applications. It
handles session checkpoints and recovery, ensuring that data can continue from the last checkpoint in
case of interruption.

Presentation Layer

Role: Translates data between the application and network.

Functionality: This layer is responsible for data translation, encryption, and compression. It ensures that
data is in a readable format for the application layer, regardless of differences in data formats between
different systems.

Application Layer

Role: Interfaces with the user and applications.

Functionality: This layer provides network services directly to end-user applications. It includes protocols
like HTTP, FTP, and SMTP, enabling functions like web browsing, file transfers, and email
communication.

 Analyze the differences between wired and wireless networking technologies, focusing on their
advantages, disadvantages, and applications.

Wired Networking

Advantages

- Reliability Offers stable and consistent connections, less prone to interference.

- Speed:Typically faster than wireless connections, especially with high-speed cables like Ethernet.

- Security: More secure as data travels through physical cables, making it harder to intercept.

- Latency: Lower latency, which is crucial for activities like gaming and video conferencing.

Disadvantages
-Mobility: Limited mobility as devices need to be physically connected.

Installation:Can be cumbersome and expensive to install, especially in large spaces.

- Scalability: Adding new devices requires additional cables and ports.

Applications

Offices: Where stable and high-speed connections are essential.

-Data Centers: To handle large amounts of data transfer.

- Gaming: To ensure minimal lag and high performance.

Wireless Networking

Advantage:

- Mobility: Allows devices to connect from anywhere within the coverage area, enhancing mobility.

Installation: Easier and cheaper to install, no physical cables required.

Scalability: Adding new devices is simple and doesn't require additional wiring.

Disadvantages

Interference: Prone to interference from other wireless devices and obstacles like walls.

Security: Potentially less secure; can be susceptible to hacking if not properly secured.

Speed: Generally slower than wired connections, though advancements in Wi-Fi technology are closing
the gap.

Reliability: Can suffer from connection drops and instability.

Applications:

Home Networks: Providing flexibility and easy connectivity for various devices.

Public Wi-Fi: Offering internet access in cafes, airports, and other public places.

IoT Devices: Connecting smart home devices like thermostats and security cameras.
 Evaluate the role of network protocols, such as TCP/IP, in ensuring reliable communication across the
internet.

TCP (Transmission Control Protocol)

Role: Ensures reliable, ordered, and error-checked delivery of data.

Functionality: TCP breaks data into packets, sends them to the destination, and ensures they are
reassembled in the correct order. It handles error detection and retransmission of lost packets. This
makes it ideal for applications where data integrity is crucial, like web browsing, email, and file transfers.

IP (Internet Protocol)

Role: Handles addressing and routing of packets.

Functionality: IP is responsible for delivering packets to the correct address. It assigns IP addresses to
devices and routes packets across multiple networks to reach their destination. It operates on a best-
effort delivery model, meaning it doesn't guarantee packet delivery, order, or integrity—these tasks are
managed by higher-level protocols like TCP.

Together: TCP/IP

Role: Provides end-to-end data communication across the internet.

Functionality: When combined, TCP and IP ensure that data is reliably sent and received between
devices over the internet. IP handles the addressing and routing, while TCP manages the data integrity
and order.

 Examine the concept of network security, including common threats such as DDoS attacks, man-in-
the-middle attacks, and packet sniffing, and discuss mitigation strategies.

Common Threats

DDoS (Distributed Denial of Service) Attacks

Overwhelms a system, service, or network with a flood of internet traffic, causing it to slow down or
crash.

Mitigation Strategies
- Traffic Filtering: Use firewalls and intrusion detection systems to filter out malicious traffic.

Load Balancing: Distribute traffic across multiple servers to manage the load.

DDoS Protection Services: Employ specialized services that can detect and mitigate DDoS attacks.

Man-in-the-Middle (MitM) Attacks

An attacker intercepts and potentially alters communication between two parties without them
knowing.

Mitigation Strategies

Encryption: Use protocols like HTTPS to encrypt data in transit.

Public Key Infrastructure (PKI): Implement digital certificates to verify the identity of communicating
parties.

VPN: Use Virtual Private Networks to secure communication channels.

3. Packet Sniffing

Description: An attacker captures data packets traveling over a network to extract sensitive information.

Mitigation Strategies

- Encryption: Encrypt data to make it unreadable to unauthorized users.

-Network Segmentation: Divide the network into segments to limit the scope of packet sniffing.

- Access Controls: Implement strict access controls to restrict who can access the network.

Mitigation Strategies

Firewalls and Antivirus Software: Deploy firewalls to block unauthorized access and antivirus software to
detect and remove malware.

Regular Updates and Patches: Keep software and systems up to date to protect against known
vulnerabilities.

User Education: Train users to recognize phishing attempts and other social engineering attacks.
Intrusion Detection and Prevention Systems (IDPS): Monitor network traffic for suspicious activity and
respond to potential threats.

Incident Response Plan: Develop and regularly update an incident response plan to quickly address
security breaches.

You might also like