JOYLYNE CHEPNGETICH
CB22/00045/24
Assignment 3
A. Types of Computer Networks:
1. LAN (Local Area Network):
- A LAN is a network that connects devices within a limited geographical area, such as a home, office,
or school.
- LANs are typically used for personal or small-scale networking, where the distance between the
connected devices is relatively short.
- Examples of LANs include home networks, small office networks, and campus networks.
- LANs are often wired, using Ethernet cables to connect devices, but they can also be wireless, using
Wi-Fi technology.
2. WAN (Wide Area Network):
- A WAN is a network that connects devices across a larger geographical area, such as a city, country,
or even the entire world.
- WANs are used for larger-scale networking, where the distance between the connected devices is
much greater than in a LAN.
- Examples of WANs include the internet, national and international telephone networks, and large
corporate networks.
- WANs are typically connected using a combination of wired and wireless technologies, such as fiber
optic cables, satellite links, and cellular networks.
3. MAN (Metropolitan Area Network):
- A MAN is a network that connects devices within a metropolitan area, such as a city or town.
- MANs are typically used for medium-scale networking, where the distance between the connected
devices is greater than in a LAN but less than in a WAN.
- Examples of MANs include city-wide Wi-Fi networks and cable TV networks.
- MANs are often a combination of wired and wireless technologies, using a mix of fiber optic cables,
coaxial cables, and wireless networks.
4. PAN (Personal Area Network):
- A PAN is a network that connects devices within a personal area, such as a single room or building.
- PANs are used for personal or small-scale networking, where the distance between the connected
devices is very short.
- Examples of PANs include Bluetooth connections between smartphones, laptops, and other personal
devices.
- PANs are typically wireless, using short-range wireless technologies like Bluetooth or Zigbee.
B. OSI (Open Systems Interconnection) Model:
The OSI model is a conceptual framework that describes the functions of a computer network in seven
layers:
1. Physical Layer: Defines the physical characteristics of the network, such as the type of cables,
connectors, and signaling used.
2. Data Link Layer: Provides error-free transfer of data between adjacent network nodes.
3. Network Layer: Responsible for the routing and forwarding of data between different network
segments.
4. Transport Layer: Ensures the reliable and efficient transfer of data between end systems.
5. Session Layer: Manages the establishment, maintenance, and termination of communication sessions.
6. Presentation Layer: Responsible for the formatting and presentation of data.
7. Application Layer: Provides the the user and the network, and supports various network services.
C. Wired vs. Wireless Networking:
Wired Networking:
- Advantages: Higher bandwidth, more reliable, less interference, better security.
- Disadvantages: Requires physical cables, more expensive, less flexible.
- Applications: Corporate networks, data centers, industrial environments.
Wireless Networking:
- Advantages: No need for physical cables, more flexible, easier to install, lower cost.
- Disadvantages: Lower bandwidth, more susceptible to interference, less secure, shorter range.
- Applications: Home networks, mobile devices, public Wi-Fi networks.
D. Network Protocols and TCP/IP:
Network protocols are a set of rules and standards that define how data is transmitted and received
across a network. The most widely used network protocol is the Transmission Control Protocol/Internet
Protocol (TCP/IP).
TCP/IP is responsible for:
- Addressing and routing data packets
- Breaking data into smaller packets for transmission
- Ensuring reliable and efficient delivery of data
- Controlling the flow of data and error detection
E. Network Security:
Common Network Threats:
- DDoS (Distributed Denial of Service) attacks: Overwhelm a network or website with excessive traffic,
causing it to become unavailable.
- Man-in-the-middle attacks: Intercept and modify data transmitted between two parties without their
knowledge.
- Packet sniffing: Monitor and capture data packets transmitted over a network.
Mitigation Strategies:
- Implementing firewalls and intrusion detection systems
- Using strong encryption and authentication mechanisms
- Regularly updating and patching software and systems
- Employing redundancy and backup solutions
- Educating users about safe network practices