Computer Networks
Computer Networks
Bus Topology:
Advantages:
Simple and inexpensive to set up.
Well-suited for small networks with minimal traffic.
Easy to add or remove devices.
Disadvantages:
Advantages:
Robust and scalable; adding or removing devices is easy without affecting the rest
of the network.
If one cable or device fails, it doesn't affect the rest of the network.
Easy to identify and isolate issues.
Disadvantages:
Requires more cabling than a bus topology.
If the central hub or switch fails, the entire network goes down.
Can be more expensive due to the need for a central device.
Ring Topology:
Advantages:
Fairly easy to install and manage.
Even data distribution, as each device has exactly two neighbors.
Works well for networks with consistent traffic patterns.
Disadvantages:
If one device or cable fails, the entire network can be disrupted.
Adding or removing devices can be more complex than in star or bus topologies.
Not suitable for networks with variable traffic loads.
Mesh Topology:
Advantages:
High redundancy; if one path fails, alternative routes are available, making it
highly reliable.
Can handle heavy traffic and is scalable.
Provides better privacy and security due to limited access to other devices' data.
Disadvantages:
Expensive and complex to install and manage due to the large number of connections.
Requires a lot of cabling and maintenance.
Overkill for small networks with low traffic.
2. TCP/IP Protocol Suite: Write a detailed report on the TCP/IP protocol suite,
including its
layers, key protocols, and their functions in network communication.
The TCP/IP protocol suite is typically described using a four-layer model, though
it can be mapped to the more widely recognized OSI (Open Systems Interconnection)
model, which has seven layers. The TCP/IP model includes the following layers:
Function: This layer deals with the physical connection between devices on a local
network and is responsible for hardware addressing, such as MAC (Media Access
Control) addresses. It ensures that data is properly framed for transmission over
the network medium.
Protocols: Ethernet, Wi-Fi (802.11), PPP (Point-to-Point Protocol).
Internet Layer:
Function: The Internet Layer is responsible for routing packets of data between
different networks and subnets. It uses logical addressing (IP addresses) to
identify devices and determine the best path for data to reach its destination.
Protocols: IP (Internet Protocol), ICMP (Internet Control Message Protocol), ARP
(Address Resolution Protocol).
Transport Layer:
IP (Internet Protocol):
Function: IP is responsible for addressing and routing packets of data so that they
can travel across networks and reach their intended destination. It is versioned as
IPv4 and IPv6, with IPv6 addressing the issue of IPv4 address exhaustion.
TCP (Transmission Control Protocol):
Function: HTTP is the protocol used for transmitting web pages and data over the
World Wide Web. It enables browsers to request and display web content from web
servers.
FTP (File Transfer Protocol):
Function: SMTP is used for sending and relaying email messages between mail
servers. It is responsible for the transmission of email across the internet.
DNS (Domain Name System):
Function: DHCP automates the process of assigning IP addresses, subnet masks, and
other network configuration parameters to devices on a network, making it easier to
manage IP allocations.
ICMP (Internet Control Message Protocol):
Malware: Malicious software, such as viruses, worms, Trojans, and ransomware, can
infect devices and networks, leading to data loss or theft, system disruption, or
unauthorized access.
Insider Threats: Employees or authorized users with malicious intent can pose
significant security risks by stealing data, intentionally causing harm, or leaking
sensitive information.
Firewalls:
Function: Firewalls act as a barrier between a network and potential threats. They
filter incoming and outgoing traffic based on predefined security rules.
Mitigation: Configure firewalls to allow only necessary traffic, block known
threats, and regularly update rule sets. Use both hardware and software firewalls
for layered protection.
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS):
Function: IDS and IPS monitor network traffic for suspicious activities or
patterns. IDS detects threats, while IPS takes action to block or mitigate them.
Mitigation: Deploy IDS/IPS solutions to detect and respond to network anomalies.
Keep signatures and rules up to date to defend against emerging threats.
Encryption Protocols (SSL/TLS, VPNs):
Function: Keep operating systems, software, and firmware up to date with security
patches to address known vulnerabilities.
Mitigation: Establish a patch management process that routinely identifies, tests,
and deploys security updates.
Employee Training and Awareness:
Function: Educate employees and users about security best practices, social
engineering tactics, and the importance of cybersecurity.
Mitigation: Conduct security awareness training, simulate phishing attacks, and
encourage reporting of suspicious activities.
Backup and Disaster Recovery:
Function: Regularly back up critical data and develop a disaster recovery plan to
restore network operations in case of an incident.
Mitigation: Implement automated backups and periodically test the restoration
process to ensure data recovery.
Network Segmentation:
Function: Divide the network into segments to limit lateral movement by attackers.
Implement stricter security controls for sensitive segments.
Mitigation: Use firewalls and access controls to enforce segmentation, limiting
access between segments based on need.
Security Monitoring and Incident Response:
Function: Continuously monitor network traffic for anomalies and respond promptly
to security incidents to minimize damage.
Mitigation: Deploy security information and event management (SIEM) systems,
conduct incident response drills, and establish an incident response team.