Computers and computer networks

Table of contents

Introduction

OSI layers

  • Physical – Data unit: bit

The Physical Layer defines electrical and physical specifications for devices. It defines the relationship between a device and net, example cable (copper or optical ), pins, hubs, repeaters, network adapters and more.

  • Data Link – Data unit: frame

The Data Link Layer provides the means to transfer data between network device and to detect and possibly correct errors that may occur in the Physical Layer.

  • Network – Data unit: packet

The Network Layer provides the means of transferring data sequences from a host on one network to a destination on a different network, while maintaining the quality of service.

  • Transport – Data unit: segments

The Transport Layer provides transfer of data between end users, providing reliable data transfer services to the upper layers.

  • Session – Data unit: data

The Session Layer controls the connections between computers. It provides for full-duplex, half-duplex, or simplex operation.

  • Presentation – Data unit: data

The Presentation Layer establishes context between Application Layer entities, in which the higher-layer entities may use different syntax and semantics if the presentation service provides a mapping between them.

  • Application – Data unit: data

Network process to application

The Application Layer is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application.

Regenerative repeater

Regenerative repeater is a device which regenerates incoming digital signals and then retransmits these signals on an outgoing circuit. This device is useful because signals in twisted pair cable is degrading then moving long distances. If I am correct than after 100 meters signal is degraded beyond repair, so it is necessary to put router, switch or regenerating repeater. Switches and routers are more important than to give a boost to the signal. Their also are more expensive. Repeater uses transport layer. It is different from other components because it is not doing anything difficult. It receives signal, boost it and send it forward. It is used then there is long cable and signal can seriously degrade.

Bridge

Computer has two different memory types, slow and fast. Fast is managed in upper part of motherboard, and slower – lower part. Both memory managers have special chip where their memory is configured/used accordingly. Between them is bridge. It is very important part which is to ensure computers work. Bridge connects processing memory with storage memory what computer processes could be done. It uses physical layer. It differs from other components because it is just connection between two memory „managers“. Situation with this component is impossible. It is necessary to computer work.

Hub

Hub is a device for connecting multiple devices together and making them act as a LAN. It is just like network switch, but this is the older version. The device is a form of multiport repeater. Hubs was before the switches and there are not good enough anymore. Then hub receives a data packet it isn’t send to computer for witch it belongs, but it is send to all computers, whose are connected to computer. The right one takes it, the others ignores it. If two computers send data at the same time, then collision occur. In other words better use switches, hubs are old and not reliable. It is using physical layer. It different from other components because it is used to connect computers and other devices together into network. The availability of low-priced network switches has largely rendered hubs obsolete but they are still seen in older installations and more specialized applications. To pass data through the repeater in a usable fashion from one segment to the next, the packets and the Logical Link Control (LLC) protocols must be the same on the each segment.

Router

A router is a device that chooses path for data packets across computer networks. Network between end-users is a giant net, where all joint spots are routers. ISP routers usually exchange routing information using the Border Gateway Protocol (BGP). Also called a Provider Edge router, is placed at the edge of an ISP network. The router uses External BGP to EBGP protocol routers in other ISPs. This device is different from other because it is created to ensure data packet travel across network. It is considered a network layer device.

Charlie and Lola

a)

Files must be kept in order at all times. Keeping them spread is not good idea because then needed, they can be hard to find around other files there. And desktop is not a place for “secret” files.

C:/Documents and Settings/Charlie/MySecretFiles/TopSecret.odt

When he press “Save As”, it depends where was his last save. When he has to navigate to his “special” file he have several options. There suppose to be quick buttons which will move directly to My Documents or My Computer. If My Documents is used, then you need to open MySecretFiles folder and than save your file. If My Computer used, then you need to open Local Disk (C:), then Documents and Settings, after that folder Charlie, after that My Documents and finally MySecretFiles. Then you can save your file. I don’t fink what folder MySecretFiles and file TopSecret.odt is so secret after all. When you have something secret don’t call it secret.

b)

This question is tricky one. It depends where is Mary. Because if he would be on the same LAN than Mary can make his printer accessible through LAN and Charlie would be able to print his file from his home. Just he need to order printing through Mary’s printer. But then anyone could print through that printer. Well Charlie’s out of luck. Mary’s is on other LAN, but that is not a problem. To send file to someone else is not very hard. There is several ways to do it:

Skype. This program can be used to talk to someone, to write messages and to send files.

E-mail. Using your mail to create new message, you can attach a file and send it with a message. It is secure because email sites like Yahoo uses secure connection. Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol with the SSL/TLS protocol to provide encrypted communication and secure identification of a network web server.

c)

Well the message start from Charlie’s PC to his wireless device, which forwards it to router. Then it will move across network to Mary’s PC. It will use lots of different network protocols:

  • ARP – Address Resolution Protocol
  • RARP – Reverse Address Resolution Protocol
  • L2F – Layer 2 Forwarding Protocol
  • L2TP – Layer 2 Tunneling Protocol
  • LLDP – Link Layer Discovery Protocol
  • MTP – Message Transfer Part
  • IPv6 – Internet Protocol version 6
  • RIP – Routing Information Protocol
  • NFS – Network File System
  • DNS – Domain Name System
  • FTP – File Transfer Protocol
  • HTTP – Hypertext Transfer Protocol

There is a lot more protocols which will be used at some times but there is no way to name them all. Now I explain the main of these.

  1. Internet Protocol version 6 (IPv6) is a version of the Internet Protocol (IP) which was designed to succeed his predecessor Internet Protocol version 4 (IPv4). The Internet operates by transferring data packets that are guided across networks as specified by the Internet Protocol.
  2. The Domain Name System (DNS) is a naming system built on a database, or any resource connected to the Internet or a private network. Most importantly, it translates domain names known to users into the IP addresses for the purpose of locating and addressing these devices worldwide.
  3. File Transfer Protocol (FTP) is a standard network protocol used to copy a file from one host to another over a Transmission Control Protocol based network, such as the Internet.
  4. The Hypertext Transfer Protocol (HTTP) is a networking protocol for using information systems. HTTP is the foundation of data communication for the World Wide Web.

These four protocols is the main ones to let Charlie’s message to reach Mary. The Hypertext Transfer Protocol will enable Charlie to use internet. Domain Name System protocol will found email site Charlie’s using. File Transfer Protocol will ensure files movement from host to host. That can be Charlie to Mary, or Charlie to email site and email site to Mary. Internet Protocol version 6 guides data packets across network. Charlie’s file will newer be send like it is. It will be divine in several (or thousands) data packets and send to destination.

d)

Lora and Lotta are not hackers. Then it comes to intercept data transfer there three levels of security. Highest level is fiber wire. Light comes through it so to hack it you have to cut it and it will be detected. The middle level of security is twisted pair cable. The little device can be attached to cable and it will read all data coming through. The lowest security is wireless LAN or WLAN, or wireless local area network. When transmission is send through air anyone can access it (with high hacking skills and extremely expensive equipment).

Lotta is very good with computers, what about hacking and network. Neither of girls don’t have skills. And normally messages are encrypted due to use of HTTPS. He can also put a password on a file (if possible). Or he can compress file to archive with password (rar, zip, 7z).

e)

Well first of all Soren Lorensen is IMAGINARY. He can’t do anything. He knows what Lora knows. If he will try to help Lora just keep pressing random buttons he shows and she definitely end up formatting her hard drive. She better have imaginary friend Smarty Hacker.

References

  1. JAVVIN network management & security (no date) OSI 7 layers Model of Network Communication (Online). Available from:
  2. http://www.javvin.com/osimodel.html (Accessed 06th April 2011)
  3. Internet Society (no date) IPv6 [Online]. Available from:
  4. http://www.isoc.org/internet/issues/ipv6.shtml (Accessed 06th April 2011)
  5. Webopedia (no date) What is DNS[Online]. Available from:
  6. http://www.webopedia.com/TERM/D/DNS.html (Accessed 06th April 2011)
  7. Webopedia (no date) What is HTTP[Online]. Available from:
  8. http://www.webopedia.com/TERM/H/HTTP.html (Accessed 06th April 2011)
  9. About.com Personal Web Pages (no date) FTP – What Is It and How Do I Use It (Online). Available from:
  10. http://personalweb.about.com/od/ftpfileuploadprograms/a/01ftp.htm (Accessed 06th April 2011)

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with MyStudyWriters
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
Testimonials
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
English 101
IThank you
Customer 452631, April 6th, 2021
Human Resources Management (HRM)
excellent job
Customer 452773, June 25th, 2023
History
Don't really see any of sources I provided, but elsewise its great, thank you!
Customer 452697, May 8th, 2021
FIN571
excellent
Customer 452773, March 15th, 2024
Humanities
Thank youuuu
Customer 452729, May 30th, 2021
Business and administrative studies
Thank you
Customer 452773, March 19th, 2023
business
Great job
Customer 452773, February 13th, 2023
Business and administrative studies
Thank you for your hard work and effort. Made a 96 out of 125 points Lacked information from the rubic
Customer 452773, October 27th, 2023
Human Resources Management (HRM)
excellent
Customer 452773, July 11th, 2023
Management
Love this writer!!! Great work
Customer 452597, April 5th, 2021
Leadership Studies
excellent job
Customer 452773, July 28th, 2023
Social Work and Human Services
Great work I would love to continue working with this writer thought out the 11 week course.
Customer 452667, May 30th, 2021
11,595
Customer reviews in total
96%
Current satisfaction rate
3 pages
Average paper length
37%
Customers referred by a friend
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat
Close

Sometimes it is hard to do all the work on your own

Let us help you get a good grade on your paper. Get professional help and free up your time for more important courses. Let us handle your;

  • Dissertations and Thesis
  • Essays
  • All Assignments

  • Research papers
  • Terms Papers
  • Online Classes
Live ChatWhatsApp