Cynthia Cheruto
Cynthia Cheruto
Cynthia Cheruto
UNIT CODE:COMP101
TASK:ASSIGNMENT THREE
COMPUTER NETWORKS
Explain the different types of computer networks, including LAN, WAN, MAN, and PAN, and describe
their typical use cases.
: A LAN is a network that covers a small geographic area, like a single building or a group of closely
situated buildings. It’s primarily used to connect personal computers, printers, and other devices so they
can share resources and communicate with one another efficiently. Think of it as the digital nerve center
of your workplace or home.
Use Case: The Internet, large companies with offices in multiple locations.
A WAN spans a large geographic area, such as cities, countries, or even continents. The Internet is the
most notable example of a WAN. It’s used to connect multiple LANs, allowing communication and data
transfer over long distances. Companies use WANs to ensure their branches around the globe stay
connected.
: A MAN covers a larger area than a LAN but a smaller area than a WAN. It’s typically used to connect
multiple LANs within a city or a large campus, facilitating high-speed connectivity for data and resource
sharing. It’s like an extended version of a LAN, optimized for a broader, metropolitan range.
Personal Area Network (PAN)
Description: A PAN is a network used for connecting devices within the range of an individual person,
typically within a few meters. Examples include Bluetooth-enabled devices, such as a smartphone
connected to a smartwatch or wireless headphones.
Discuss the OSI (Open Systems Interconnection) model and its seven layers, explaining the role and
functionality of each layer in computer networking.
Physical Layer
Functionality: This layer involves the transmission of raw data bits over a physical medium, such as
cables or radio waves. It handles aspects like signal timing, voltage levels, and data rates.
Functionality: This layer is responsible for node-to-node data transfer and error detection/correction. It
frames data packets and handles MAC (Media Access Control) addresses to ensure that data reaches the
correct device on the network.
Network Layer
Functionality: This layer determines the best physical path for data to travel across networks. It uses IP
(Internet Protocol) addresses to identify and route data packets to their destination.
Transport Layer
Functionality: This layer provides reliable data transfer between host systems. It manages data
segmentation, reassembly, error recovery, and flow control. Protocols like TCP (Transmission Control
Protocol) and UDP (User Datagram Protocol) operate at this layer.
Session Layer
Functionality: This layer establishes, manages, and terminates connections between applications. It
handles session checkpoints and recovery, ensuring that data can continue from the last checkpoint in
case of interruption.
Presentation Layer
Functionality: This layer is responsible for data translation, encryption, and compression. It ensures that
data is in a readable format for the application layer, regardless of differences in data formats between
different systems.
Application Layer
Functionality: This layer provides network services directly to end-user applications. It includes protocols
like HTTP, FTP, and SMTP, enabling functions like web browsing, file transfers, and email
communication.
Analyze the differences between wired and wireless networking technologies, focusing on their
advantages, disadvantages, and applications.
Wired Networking
Advantages
- Speed:Typically faster than wireless connections, especially with high-speed cables like Ethernet.
- Security: More secure as data travels through physical cables, making it harder to intercept.
- Latency: Lower latency, which is crucial for activities like gaming and video conferencing.
Disadvantages
-Mobility: Limited mobility as devices need to be physically connected.
Applications
Wireless Networking
Advantage:
- Mobility: Allows devices to connect from anywhere within the coverage area, enhancing mobility.
Scalability: Adding new devices is simple and doesn't require additional wiring.
Disadvantages
Interference: Prone to interference from other wireless devices and obstacles like walls.
Security: Potentially less secure; can be susceptible to hacking if not properly secured.
Speed: Generally slower than wired connections, though advancements in Wi-Fi technology are closing
the gap.
Applications:
Home Networks: Providing flexibility and easy connectivity for various devices.
Public Wi-Fi: Offering internet access in cafes, airports, and other public places.
IoT Devices: Connecting smart home devices like thermostats and security cameras.
Evaluate the role of network protocols, such as TCP/IP, in ensuring reliable communication across the
internet.
Functionality: TCP breaks data into packets, sends them to the destination, and ensures they are
reassembled in the correct order. It handles error detection and retransmission of lost packets. This
makes it ideal for applications where data integrity is crucial, like web browsing, email, and file transfers.
IP (Internet Protocol)
Functionality: IP is responsible for delivering packets to the correct address. It assigns IP addresses to
devices and routes packets across multiple networks to reach their destination. It operates on a best-
effort delivery model, meaning it doesn't guarantee packet delivery, order, or integrity—these tasks are
managed by higher-level protocols like TCP.
Together: TCP/IP
Functionality: When combined, TCP and IP ensure that data is reliably sent and received between
devices over the internet. IP handles the addressing and routing, while TCP manages the data integrity
and order.
Examine the concept of network security, including common threats such as DDoS attacks, man-in-
the-middle attacks, and packet sniffing, and discuss mitigation strategies.
Common Threats
Overwhelms a system, service, or network with a flood of internet traffic, causing it to slow down or
crash.
Mitigation Strategies
- Traffic Filtering: Use firewalls and intrusion detection systems to filter out malicious traffic.
Load Balancing: Distribute traffic across multiple servers to manage the load.
DDoS Protection Services: Employ specialized services that can detect and mitigate DDoS attacks.
An attacker intercepts and potentially alters communication between two parties without them
knowing.
Mitigation Strategies
Public Key Infrastructure (PKI): Implement digital certificates to verify the identity of communicating
parties.
3. Packet Sniffing
Description: An attacker captures data packets traveling over a network to extract sensitive information.
Mitigation Strategies
-Network Segmentation: Divide the network into segments to limit the scope of packet sniffing.
- Access Controls: Implement strict access controls to restrict who can access the network.
Mitigation Strategies
Firewalls and Antivirus Software: Deploy firewalls to block unauthorized access and antivirus software to
detect and remove malware.
Regular Updates and Patches: Keep software and systems up to date to protect against known
vulnerabilities.
User Education: Train users to recognize phishing attempts and other social engineering attacks.
Intrusion Detection and Prevention Systems (IDPS): Monitor network traffic for suspicious activity and
respond to potential threats.
Incident Response Plan: Develop and regularly update an incident response plan to quickly address
security breaches.