Top-Rated Free Essay
Preview

NETWORK TOPOLOGY and policies

Better Essays
1111 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NETWORK TOPOLOGY and policies
NETWORK TOPOLOGY
RAJ KUMAR GADAGOTTI
1632274
INTRODUVTION TO COMPUTER NETWORK SECURITY
MADS 6701 V1
INSTRUCTOR’S NAME: DR. MOHAMAD SHARIFF
FAIRLEIGH DICKINSON UNIVERSITY

NOV 14TH 2014

TABLE OF CONTENTS:
Introduction
Network
Computer network
Topology
Different types of topology
Mesh topology
Star topology
Tree topology
Bus topology
Ring topology
Case study
Problems with the network
Policy
Conclusion
References

NETWORK
A computer network or data network is an information transfers arrange that permits machines to trade information. In computer networks, organized registering gadgets pass information to one another along information associations. Information is moved as bundles. The associations (system joins) between hubs are secured utilizing either link media or remote media. The best-known computer network is the Internet.

Network computer gadgets that start, course and end the information are called system nodes. Nodes can incorporate has, for example, telephones, servers and systems administration fittings. Two such gadgets are said to be organized together when one gadget has the capacity trade data with the other gadget, whether they have an immediate association with one another.

Network computer varies in the physical media used to transmit their signs, the interchanges conventions to sort out system activity, the system 's size, topology and authoritative expectation. As a rule, interchanges conventions are layered on (i.e. work utilizing) other more particular or more general correspondences conventions, aside from the physical layer that straightforwardly manages the physical media.
COMPUTER NETWORK
It is defined as the interconnection of two or more computers. It is done to enable the computers to communicate and share available resources.

TOPOLOGY: In communication networks, a topology is a normally schematic depiction of the plan of a system, including its hubs and associating lines. There are two methods for characterizing system geometry: the physical topology and the coherent (or sign) topology.
1. Mesh topology: Mesh topology has a dedicated point-to-point link of devices.
2. A star topology has a dedicated point-to-point link only to a central controller called hub.
3. A tree topology is also linked to a central hub that controls the traffic to the network.
4. A bus topology is a multipoint topology. One long cable acts as a backbone to link all the devices in the network.
5. A ring topology has a dedicated point-to-point line configuration only with the two devices on either side of it.
CASE STUDY OF KOTAK MAHINDRA BANK:
Kotak Mahindra Bank is the fourth biggest Indian private division bank by business underwriting, headquartered in Mumbai, Maharashtra. The Bank 's enlisted office (headquarter) is spotted at 27bkc, BandraKurla Complex, Bandra East, Mumbai, Maharashtra, India.
In February 2003, Kotak Mahindra Finance Ltd, the bunch 's lead organization was given the permit to bear on saving money business by the Reserve Bank of India (RBI). Kotak Mahindra Finance Ltd. is the first organization in the Indian keeping money history to change over to a bank.
As on June 30, 2014, Kotak Mahindra Bank has in excess of 600 limbs and in excess of 1,100 Atms spread over 354 areas in the nation.

PROBLEMS WITH THE ABOVE NETWORK:
Information can be easily distributed.
As there is no firewall then the entire system or network is damaged.
Increase of new virus.
Personal and company data can be miss-used.
Data connections may be sent to random port numbers.

ARBOR NETWORKS
The organization was established in 2000 when organizers FarnamJahanian and Rob Malan spun out exploration from the University of Michigan. They were joined by understudies Jonathan Arnold, Matthew Smart, and Jonathan Poland to make the establishing group. The organization brought $11 million up in a round of funding. Later, in August 2002, the organization brought an alternate $22 million up in a second round of funding, headed by Thomas Weisel Venture Partners, with members that included Battery Ventures and Cisco Systems, among others. In January 2008, Arbor procured Ellacoya Networks, an organization which gives broadband activity forming items. The procurement was required to build the aggregate addressable business (TAM) for Arbor to $750 million in 2008, and to $1.5 billion before the end of 2009.[6] In March 2009, Arbor worked with 100 Isps to make another system checking framework, called ATLAS 2.0. In October 2009, the organization evaluated that Google paid very nearly nothing for YouTube data transfer capacity, noting that Google most likely utilized dim fiber rather to run the website.

What policy can be used?
1. Information policy: This policy is the situated of all open laws, regulations and approaches that empower, debilitate, or control the creation, use, stockpiling, access, and correspondence and spread of information. It therefore envelops whatever other choice making practice with expansive constitutive deliberations that include the stream of data and how it is processed. There are a few major issues that include data approach. Most conspicuous are open strategy issues concerned with the utilization of data for democratization and commercialization of social life. These issues incorporate, entomb alia, advanced environment, for example, protected innovation, financial regulations, opportunity of declaration, privacy or protection of data, data security, access administration, and controlling how the dispersal of open data happens.
2. Security policy: Security arrangement is a meaning of what it intends to be secure for a framework, association or other element. For an association, it addresses the demands on conduct of its parts and also obligations forced on foes by instruments, for example, entryways, bolts, keys and dividers. For frameworks, the security approach addresses demands on capacities and stream among them, stipulations on access by outside frameworks and enemies including projects and access to information by individuals.
3. Computer use policy: computer use policy is important in above network diagram because every company will have their own privacy and security issues about their data. Because sometimes employees may use unlicensed software which may lead to hack. So because of this type of situations there may be possibility of computer and network misuse.
4. Internet use policy: The Internet Usage Policy is an essential record that must be marked by all representatives after beginning work. The following is a Sample Internet Usage Policy that covers the fundamental purposes of controversy managing Internet and machine use. The strategy can then be customized to the prerequisites of the particular association.

Conclusion : My paper explains completely about different types of topologies that are useful for any network diagram to build in a proper way. From the above case study it shows that there is no proper network structure and there is no firewall also. With the help of Arbor Company they came out of this situation. They had introduced new software to overcome traffic problems. So for every company they need certain policies to be successful.

References:
1. Banerjee, S., Jain, V., Shah, S., "Regular multichip logical topologies for light wave networks", Communications Surveys & Tutorials, IEEE, On page(s): 2 - 18 Volume: 2, Issue: 1, First Quarter 1999
2. Odessa.C.(2012). “ Computer Network Diagrams”. Retrieved from http://www.conceptdraw.com/samples/network-diagram

References: 1. Banerjee, S., Jain, V., Shah, S., "Regular multichip logical topologies for light wave networks", Communications Surveys & Tutorials, IEEE, On page(s): 2 - 18 Volume: 2, Issue: 1, First Quarter 1999 2. Odessa.C.(2012). “ Computer Network Diagrams”. Retrieved from http://www.conceptdraw.com/samples/network-diagram

You May Also Find These Documents Helpful

  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Satisfactory Essays

    Bus 210 - Appendix E

    • 346 Words
    • 2 Pages

    |Network computers |Network computers means a series (more than one) of computers that can communicate to |…

    • 346 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Interconnection (OSI) Model - is a conceptual and logical layout that defines network communication used by systems open to interconnection and communication with other systems.…

    • 559 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Computer network: A combination of many components that work together so that many different devices can communicate.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Peterson, L. L., & Davie, B. S. (2011). Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking). Morgan Kaufmann.…

    • 968 Words
    • 5 Pages
    Best Essays
  • Good Essays

    Networking is everywhere one of the main benefits is that we can share devices such as printers, scanners, CD-ROM drives and many more. Also, we can connect to networks as Meyers (2003, p3) said “one network can be connected to another network and become a more powerful tool because of the great resources”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Exercise 1

    • 617 Words
    • 2 Pages

    There is a physical connection running between two computers that want to connect. This is made possible because phone lines that run from houses to switches to other houses that the phone company lets dial to each other. Or another alternative it could be network cables going to hubs and other computers. Also, it could be cable lines running to fiber optic lines, through routers. And lastly it could be radio waves that computers can broadcast and receive.…

    • 617 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It230 Wk1 Checkpoint

    • 576 Words
    • 3 Pages

    Within a network consists of a model that interlinks computers with one another by its methods and protocols, this model is known as the “Open Systems Interconnection (OSI) model”, (2010. PP.28). It is a framework that defines and dissects its methods protocols into another model consisting of seven different layers. Each different layer increases from one layer to the next, all in which rely on the services the lower level provides to the next until data becomes present upon viewing a computer screen. Seven layers defining the “seven-layer model”, (2010. PP.28), are: physical, data-link, network, transport, session, presentation, and application. Each consists of different functions and purposes.…

    • 576 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Week 1 BIS221

    • 536 Words
    • 3 Pages

    Networks are multiple computers linked together. It allows to share resources like softwares and printers.…

    • 536 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3350 Unit 4

    • 572 Words
    • 3 Pages

    * Discuss the inter-dependence of workstation hardware(network card, cabling; permissions; system bus; local-system architecture eg memory, processor, I/O devices) with network components.(P6,M3)…

    • 572 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1210

    • 4443 Words
    • 28 Pages

     Identify the primary needs for computer networks and network applications.  Draw the four major physical network topologies: bus, star, ring, and mesh. 3 Computer Networking …

    • 4443 Words
    • 28 Pages
    Powerful Essays
  • Best Essays

    white paper template 1

    • 963 Words
    • 4 Pages

    Peterson, L. L., & Davie, B. S. (2011). Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking). Morgan Kaufmann.…

    • 963 Words
    • 4 Pages
    Best Essays
  • Better Essays

    The question about physician-assisted suicide in many societies around the world remains difficult, except some European countries such as Belgium and the Netherlands, and some states in USA - Oregon, Washington and Montana where this former restriction was legalized. Nowadays, other countries and the rest of states in the U.S. facing dilemma rather to leave PAS illegal, or change existing law into legal practice. In “Introduction” of the book Ethical Issues in Modern Medicine by Bonnie Steinbock, John D. Arras, and Alex John London, a fictional Dr. Deborah Brody raises the problem of her ill patient, Mr. Lasken, who asked the doctor to help him relieve his sufferings through a lethal injection. Dr. Brody opened…

    • 2039 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    W IN N W K I R O R U U H O YO O AL .…

    • 292 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Logical and physical network designs are critical components in the successful development and implementation of today 's networks and allow for the proper planning and structuring bettering enhancing the concept associated with networks. In order to better understand how the two concepts of a logical design and physical design work hand-in-hand, let 's first look at what the concepts entail.…

    • 816 Words
    • 4 Pages
    Good Essays

Related Topics