Midterm Examination Written Responses
Presented in
NET-102 Networking Essentials II
by
Ryan C Dobbs
Baker College of Auburn Hills, Michigan
5/12/14
Dr. Terrance Dillard
Professor
QUESTION 1
In a computer network, switches are devices that are used to connect devices together. Multiple cables can be connected to a switch to enable networked devices to communicate with each other. The role of a switch is to manage the flow of data throughout a network and this process is effective in its role due to the fact that the messages are sent only to the intended target. The media access control (MAC) is the identification that each device connected to the switch carries. By each device having individual IDs this increases the overall effectiveness and security of a network.
Switches operate within the OSI’s layer 2. This is known as the data link layer. The data link layer is responsible for the transfer of data frames from node to node across OSI’s layer one, the physical layer. This allows layers in the upper levels to have transmissions with error checking processes. The data link layer has several responsibilities of its function in the OSI model. The first is link establishment and termination which is where, between two separate nodes, it establishes and terminates the links that connect the two. Layer two also provides traffic control for the frames in transmission.
Network cables are another component that is used in communication between network devices. Cables are used to connect one network device to other via several different connections. The most reliable type of connection between two or more devices is to use a wired connection. These connections can be used to share data and access between servers, PCs, printer...
... middle of paper ...
...plying with this communication, the path of the connection is now going back towards the user, opposite of the original intent.
A ping of death is also another type of dos attack. This type of attack is based on the use of networking devices to send packets of data to many devices instead of one. The amplifier of this attack is the network of system under attack. The ones who send large numbers of IP packets are sending these units with fake address the victim and with the hopes that the system will become bogged down in attempts of communication with the bad address. They also use Ping floods so that by sending the victim too large of an amount of ping packets and the system cannot handle the load. It is very simple to launch and the only goal is to overload the amount that band width can support.
References
Meyers 2012, Managing and troubleshooting Networks
It just doesn't get much simpler than the physical bus topology when it comes to connecting nodes on a Local Area Network (LAN). The most common implementation of a linear bus topology is IEEE 802.3 Ethernet. All devices in a bus topology are connected to a single cable called the bus, backbone, or ether. The transmission medium has a physical beginning and an end. All connections must be terminated with a resistor to keep data transmissions from being mistaken as network traffic. The terminating resistor must match the impedance of the cable.
This research paper is a comprehensive look at DoS attacks, including information about their history and development, how to detect them, and what measures should be taken to prevent large amounts of damage.
...a flood of packets. Therefore, the victim node or sometimes the whole network can get easily paralyzed [24].
Roberts, Richard M. "Network Secrurity." Networking Fundamentals. 2nd ed. Tinley Park, IL: Goodheart-Willcox, 2005. 599-639. Print.
As the internet is becoming faster and faster, an operating system (OS) is needed to manage the data in computers. An Operating system can be considered to be a set of programed codes that are created to control hardware such as computers. In 1985 Windows was established as an operating system and a year earlier Mac OS was established, and they have dominated the market of the computer programs since that time. Although, many companies have provided other operating systems, most users still prefer Mac as the most secured system and windows as it provides more multiple functions. This essay will demonstrate the differences between windows
Last phase is data exchange. In data exchange, client and server exchanges the data by creating one or more data channels. In each channel, flow is control using window space available. There are 3 stages of the life of the channel: open channel, data transfer and close channel. One the channel is open by either of the party, data is transferred and then channel is closed by either of the party [3].
There can be collisions when two nodes want to communicate at the same time on the same bus.
Networks are designed in a number of ways, based on the geographical area, the technology used, user group specific, application based etc. But we can roughly categorize the communication networks in 2 broad categories, based on transmission: Connection-Oriented and Connectionless.
As you know starting a new position can be challenging. Even those that catch on quickly start out with those butterflies of not knowing what to expect. To help our future new hires I propose we develop a training plan to get them acclimated faster and be more prepared. In our world as Network Design Engineers we are expected to hit the ground running and know our environment backwards and forwards. Having a mental image of our world is important but you also have to have top notch troubleshooting skills to help others.
Hidden terminal problem- This problem may occurs when two or more objects sends packets, these packets are not within the direct transmission range of each other. Collide at the common receiver node.
The Open Systems Interconnection (OSI) reference model is essential to the world of computer networking. The model was created in 1977 by the International Standards Committee, in response to a difficulty that was facing computer networkers at the time (Shelly, Cashman, and Serwatka 142). In order to understand the difficulty, one must first realize that computer networks consist of computer hardware, the software that is to be used in conjunction with this hardware, and the medium (such as wiring or cabling) that will interconnect the computing devices that are in the network. The computer networker’s job is to determine which hardware, software, and medium types will create the network that will best suit his client’s needs. Then, the networker must combine these elements into a functional system of interconnected computers (Fortino and Villeneuve 112). It was in attempting this latter task that the computer networker of the late 1970s often found himself in a pickle. The problem was that each vendor of computing equipment had developed his own unique set of products; products that were incompatible with the products of other vendors. This incompatibility made it very difficult for a computer networker to combine the various network components into an operational computer network (Stamper 27).
... middle of paper ... ... TCP/IP operates at levels 3 and 4 of the OSI model.
Local Area Networks also called LANs have been a major player in industrialization of computers. In the past 20 or so years the worlds industry has be invaded with new computer technology. It has made such an impact on the way we do business that it has become essential with an ever-growing need for improvement. LANs give an employer the ability to share information between computers with a simple relatively inexpensive system of network cards and software. It also lets the user or users share hardware such as Printers and scanners. The speed of access between the computers is lighting fast because the data has a short distance to cover. In most cases a LAN only occupies one or a group of buildings located next to each other. For larger area need there are several other types of networks such as the Internet.
Linux is a Unix clone written from scratch by Linus Torvalds with assistance from a loosely-knit team of hackers across the Net. It aims towards POSIX compliance. It has all the features expected in a modern fully-fledged Unix, including true multitasking, virtual memory, shared libraries, demand loading, shared copy-on-write executables, proper memory management and TCP/IP networking.
In Local Area Network(LAN), Ethernet is a physical and data link layer technology. used to connect more than one computer systems to form LAN that comes with protocols that can control the passing information and to avoid two or more systems transmit simultaneous. Ethernet cable made up of several coaxial wire. The function of Ethernet is to deliver data between computers on the Internet.