StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Characteristics of Networks Types - Assignment Example

Cite this document
Summary
The paper "Characteristics of Networks Types" tells that an individual traveling with a laptop, a personal digital assistant also referred to as (PDA), and a portable printer could just connect and interconnect them without having to plug anything in, by applying some wireless device or cable. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
Characteristics of Networks Types
Read Text Preview

Extract of sample "Characteristics of Networks Types"

The paper discusses the kind of network of personal area network that could also be interconnected lacking wires to the Internet or other even networks.

To a larger extent, this is true. Unlike other types of networks that are specifically fixed to an office location network-wise, metropolitan area network span to the furthest boundary of a city. A metropolitan area network (MAN) can be referred to as a network that interconnects users in a geographic area or region larger than a large local area network (WAN) can cover but at the same time smaller than a wide area network (WAN can cover. The statement is further true as the term MAN` is applied to the interconnection of the networks in a city into a single larger network.

List the OSI layer that performs each of the following functions:


  1. data compression


presentation layer,

  1. multiplexing

session layer

  1. routing


 Networking layer

  1. definition of a signal’s electrical characteristics

 Physical layer

  1. e-mail

Application layer


f. error detection  

 Data link layer

  1. end-to-end flow control

 Transport layer.

For each function in the previous exercise, list the

TCP/IP protocol suite layer that performs that

function.


You are sending and receiving text (instant) mes-

sages (IMs) with a friend. Is this IM session a logical connection or a physical connection? Explain your answer

when sending an instant text it is a logical connection as immediate feedback is expected.

an important concept is the understanding of the link between the sender and the receiver of communication.

Chapter 5 Data security

1          Explain the differences between a database user and an application user.

            A database user also referred to as a traditional user is an individual who is associated with passwords and schemas. For instance, an application or a person that logs onto the database uses a database user (schema) as well as a password. Database users are, therefore, able to create heavyweight sessions to the schemas that they are associated with.

An application user, on the other hand, can be an autonomous application process or a person that accesses information or data in the database. Unlike database users, application users do not own database schemas. However, they are able to create application sessions to databases via the middle tier. They are also able to create heavyweight database sessions via direct connection to the database.

  1. Explain the difference between database roles and application roles.

A database role is traditionally imagined to be a set of database privileges that applications, database users, or other database roles are granted. Database roles serve as intermediaries that map database privileges to database applications and users.

On the other hand, an application user is often regarded as a set of application-define privileges associated with it and it is only granted to application users or to other application roles. An application role uses an access control list (ACL) instead of a database grant. It is the ACL that maps the application privileges to roles or users. Application roles cannot be granted to database roles.

  1. What are the differences between client/server and web-based applications?

Client/server application follows two-tier architecture (front-end and backend.) while a web-based application follows three-tier architecture (Browser, web server, and DB server). Web-based applications are mainly used in internet areas while client/server applications are in intranet areas.

A client/server application involves one server and one or many client applications while a web-based application is a type of client/server application hosted on the web server and then accessed over the internet. It is often difficult to test scripting problems in client/server applications whereas is it easier for web-based applications to test scripting problems in. Changes regarding scripting cannot reflect in client/server applications however in web-based applications it reflects at the moment only.

 

  1. Give an example of why data encryption is needed and when you would use encryption.

Data encryption is the coding of information to make it unreadable by anyone not authorized other than those individuals who possess special knowledge to change the information back to a readable form. Data encryption is needed security to protect confidential data or information that anyone else is not supposed to access.

Encryption is used by businesses to protect corporate secrets; individuals use it to guard against identity theft by protecting personal information, and governments often use it to secure their classified information. It can also be used to ensure or facilitate secret communication, particularly for governments, individuals, and businesses. Encryption is used when very confidential data is in transit, those being transferred through networks. It is also used when very confidential data is at rest (stored) such as files on storage devices and computers.

 

  1. Which layer of the OSI model implements security in a Web application?

The OSL model layer that implements security in a web application is definitely the application layer (layer seven) since it is the main interface that permits user-application interaction. Everything that takes place in this layer is application-specific. The application layer provides application services for e-mail, file transfer as well as other network software services making it the best layer to implement security.

 

 

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Networking and data security Assignment Example | Topics and Well Written Essays - 1000 words”, n.d.)
Networking and data security Assignment Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1677117-networking-and-data-security
(Networking and Data Security Assignment Example | Topics and Well Written Essays - 1000 Words)
Networking and Data Security Assignment Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1677117-networking-and-data-security.
“Networking and Data Security Assignment Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1677117-networking-and-data-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Characteristics of Networks Types

Comparison of the Random Network and the Scale-Free Network Proposed by Barabasi and Albert

The author of this paper "Comparison of the Random Network and the Scale-Free Network Proposed by Barabasi and Albert" compares random networks to scale-free networks according to the type of connectivity and the degree distribution inherent in these network models.... Examples of Random networks and Scale-Free networks are provided here, and the paper goes ahead to discuss the areas and the extent to which these models offer an accurate representation of real-world networks, with the aid of some examples....
18 Pages (4500 words) Essay

Network Management Issues

In terms of geographic breadth, MANs are larger than local-area networks (LANs), but smaller than wide-area networks (WANs).... They will often provide means for internetworking of local networks.... Metropolitan area networks can span up to 50km, devices used are modem and wire/cable ... Using DQDB, networks can be up to 30 miles long and operate at speeds of 34 to 155 Mbit/s....
24 Pages (6000 words) Essay

Network Governance: Opportunities and Challenges

Here, information and communication technologies are interconnected with the socio-organizational and physical networks causing new hazards to grow exponentially along with productive forces.... The paper "Network Governance: Opportunities and Challenges" highlights the manner by which network society has emerged and how it defined the currently changing reality which calls for a new kind of governance and management with particular emphasis on how network governance can provide opportunities and challenges in addressing the problems of the rapidly changing world....
8 Pages (2000 words) Essay

Wireless LAN: Traffic and Congestion Control

The studies try to analyze macro characteristics of wireless LANs such as overall usage, traffic characteristics, user mobility, and application mix.... The transport layer consists of two main types of protocols, these are TCP and UDP.... The study is mainly focused on providing an analysis of traffic and congestion control on Wireless LAN networks using various research methods and tools.... Various studies have been conducted in a number of Campus networks to measure network traffic using different approaches....
3 Pages (750 words) Case Study

Network Operating Systems Past and Present

Computer networks are getting larger every day.... This has therefore led to the need to have network operating systems which will manage the networks that are growing by the day (Howard, 2004).... This paper will look cover the evolution and the extent in which network operating systems that are used in computer networks today (Thomas, Schantz, & Forsdick, 2008).... ith the growing need to have a networked environment in the workplace today, there has also been the need to have computer networks and thus the growth and popularity of operating systems that will manage these networks....
9 Pages (2250 words) Essay

Fundamentals of Network Security

here can be different types of networks, internal which are private and for exclusive use, or external like the internet which can be accessed and used by all.... All types of networks however are now threatened with violating and harmful parties who seek personal benefit from the manipulation of data and process on the networks.... The World Wide Web one of the largest networks at present is growing in terms of its importance for business operations as well as providing technical support to the economy....
15 Pages (3750 words) Coursework

Cloud Computing Security

Users are often identified through their attributes or characteristics instead of predefined identities.... "Cloud Computing Security" paper identifies various cloud computing models, security and risk concerns, and methods of addressing the security issues for financial institutions....
8 Pages (2000 words) Term Paper

Complexity and Network Thinking

Marketing practices can benefit from network thinking, which brings together diverse capabilities of the marketing network members while employing new information and communication technologies to create marketing networks.... Indeed, marketing networks emphasize relationship marketing, which is the paradigm shift in marketing needed to capture and retain markets in a highly competitive and volatile business environment.... Relationship marketing leverages word-of-mouth as a basis of natural networks among individuals in combination with social media technologies to create marketing networks that overcome geographical and cultural barriers....
12 Pages (3000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us