Top-Rated Free Essay

NETWORK TOPOLOGY and policies

Better Essays
NETWORK TOPOLOGY
RAJ KUMAR GADAGOTTI
1632274
INTRODUVTION TO COMPUTER NETWORK SECURITY
MADS 6701 V1
INSTRUCTOR’S NAME: DR. MOHAMAD SHARIFF
FAIRLEIGH DICKINSON UNIVERSITY

NOV 14TH 2014

TABLE OF CONTENTS:
Introduction
Network
Computer network
Topology
Different types of topology
Mesh topology
Star topology
Tree topology
Bus topology
Ring topology
Case study
Problems with the network
Policy
Conclusion
References

NETWORK
A computer network or data network is an information transfers arrange that permits machines to trade information. In computer networks, organized registering gadgets pass information to one another along information associations. Information is moved as bundles. The associations (system joins) between hubs are secured utilizing either link media or remote media. The best-known computer network is the Internet.

Network computer gadgets that start, course and end the information are called system nodes. Nodes can incorporate has, for example, telephones, servers and systems administration fittings. Two such gadgets are said to be organized together when one gadget has the capacity trade data with the other gadget, whether they have an immediate association with one another.

Network computer varies in the physical media used to transmit their signs, the interchanges conventions to sort out system activity, the system 's size, topology and authoritative expectation. As a rule, interchanges conventions are layered on (i.e. work utilizing) other more particular or more general correspondences conventions, aside from the physical layer that straightforwardly manages the physical media.
COMPUTER NETWORK
It is defined as the interconnection of two or more computers. It is done to enable the computers to communicate and share available resources.

TOPOLOGY: In communication networks, a topology is a normally schematic depiction of the plan of a system, including its hubs and associating lines. There are two methods for characterizing system geometry: the physical topology and the coherent (or sign) topology.
1. Mesh topology: Mesh topology has a dedicated point-to-point link of devices.
2. A star topology has a dedicated point-to-point link only to a central controller called hub.
3. A tree topology is also linked to a central hub that controls the traffic to the network.
4. A bus topology is a multipoint topology. One long cable acts as a backbone to link all the devices in the network.
5. A ring topology has a dedicated point-to-point line configuration only with the two devices on either side of it.
CASE STUDY OF KOTAK MAHINDRA BANK:
Kotak Mahindra Bank is the fourth biggest Indian private division bank by business underwriting, headquartered in Mumbai, Maharashtra. The Bank 's enlisted office (headquarter) is spotted at 27bkc, BandraKurla Complex, Bandra East, Mumbai, Maharashtra, India.
In February 2003, Kotak Mahindra Finance Ltd, the bunch 's lead organization was given the permit to bear on saving money business by the Reserve Bank of India (RBI). Kotak Mahindra Finance Ltd. is the first organization in the Indian keeping money history to change over to a bank.
As on June 30, 2014, Kotak Mahindra Bank has in excess of 600 limbs and in excess of 1,100 Atms spread over 354 areas in the nation.

PROBLEMS WITH THE ABOVE NETWORK:
Information can be easily distributed.
As there is no firewall then the entire system or network is damaged.
Increase of new virus.
Personal and company data can be miss-used.
Data connections may be sent to random port numbers.

ARBOR NETWORKS
The organization was established in 2000 when organizers FarnamJahanian and Rob Malan spun out exploration from the University of Michigan. They were joined by understudies Jonathan Arnold, Matthew Smart, and Jonathan Poland to make the establishing group. The organization brought $11 million up in a round of funding. Later, in August 2002, the organization brought an alternate $22 million up in a second round of funding, headed by Thomas Weisel Venture Partners, with members that included Battery Ventures and Cisco Systems, among others. In January 2008, Arbor procured Ellacoya Networks, an organization which gives broadband activity forming items. The procurement was required to build the aggregate addressable business (TAM) for Arbor to $750 million in 2008, and to $1.5 billion before the end of 2009.[6] In March 2009, Arbor worked with 100 Isps to make another system checking framework, called ATLAS 2.0. In October 2009, the organization evaluated that Google paid very nearly nothing for YouTube data transfer capacity, noting that Google most likely utilized dim fiber rather to run the website.

What policy can be used?
1. Information policy: This policy is the situated of all open laws, regulations and approaches that empower, debilitate, or control the creation, use, stockpiling, access, and correspondence and spread of information. It therefore envelops whatever other choice making practice with expansive constitutive deliberations that include the stream of data and how it is processed. There are a few major issues that include data approach. Most conspicuous are open strategy issues concerned with the utilization of data for democratization and commercialization of social life. These issues incorporate, entomb alia, advanced environment, for example, protected innovation, financial regulations, opportunity of declaration, privacy or protection of data, data security, access administration, and controlling how the dispersal of open data happens.
2. Security policy: Security arrangement is a meaning of what it intends to be secure for a framework, association or other element. For an association, it addresses the demands on conduct of its parts and also obligations forced on foes by instruments, for example, entryways, bolts, keys and dividers. For frameworks, the security approach addresses demands on capacities and stream among them, stipulations on access by outside frameworks and enemies including projects and access to information by individuals.
3. Computer use policy: computer use policy is important in above network diagram because every company will have their own privacy and security issues about their data. Because sometimes employees may use unlicensed software which may lead to hack. So because of this type of situations there may be possibility of computer and network misuse.
4. Internet use policy: The Internet Usage Policy is an essential record that must be marked by all representatives after beginning work. The following is a Sample Internet Usage Policy that covers the fundamental purposes of controversy managing Internet and machine use. The strategy can then be customized to the prerequisites of the particular association.

Conclusion : My paper explains completely about different types of topologies that are useful for any network diagram to build in a proper way. From the above case study it shows that there is no proper network structure and there is no firewall also. With the help of Arbor Company they came out of this situation. They had introduced new software to overcome traffic problems. So for every company they need certain policies to be successful.

References:
1. Banerjee, S., Jain, V., Shah, S., "Regular multichip logical topologies for light wave networks", Communications Surveys & Tutorials, IEEE, On page(s): 2 - 18 Volume: 2, Issue: 1, First Quarter 1999
2. Odessa.C.(2012). “ Computer Network Diagrams”. Retrieved from http://www.conceptdraw.com/samples/network-diagram

References: 1. Banerjee, S., Jain, V., Shah, S., "Regular multichip logical topologies for light wave networks", Communications Surveys & Tutorials, IEEE, On page(s): 2 - 18 Volume: 2, Issue: 1, First Quarter 1999 2. Odessa.C.(2012). “ Computer Network Diagrams”. Retrieved from http://www.conceptdraw.com/samples/network-diagram

You May Also Find These Documents Helpful

  • Satisfactory Essays

    A network is a group of two or more computer systems that are linked together.…

    • 492 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 9 Final Paper

    • 432 Words
    • 2 Pages

    A network is what gives the user the ability to transfer information between other computers (de Arazoza, 2015).…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 1 BIS221

    • 536 Words
    • 3 Pages

    Networks are multiple computers linked together. It allows to share resources like softwares and printers.…

    • 536 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bus 210 - Appendix E

    • 346 Words
    • 2 Pages

    |Network computers |Network computers means a series (more than one) of computers that can communicate to |…

    • 346 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Best Essays

    Peterson, L. L., & Davie, B. S. (2011). Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking). Morgan Kaufmann.…

    • 968 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    Computer network: A combination of many components that work together so that many different devices can communicate.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Exercise 1

    • 617 Words
    • 2 Pages

    The purpose of a Network is to share data. To make this possible, you have to be able to connect to other computers. To make this enticing to people to want to take advantage of this technology, it has to be simple not so complex. This sounds a little difficult to understand as far as a qualified answer, but to sum things up that is it. The question to ask and that many people don’t consider is how data is transferred from one computer to another computer?…

    • 617 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Management Studies

    • 2208 Words
    • 9 Pages

    1. Term used to denote the existence of information of an electronic network of linked computer…

    • 2208 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Intro in Graph Theory

    • 3682 Words
    • 15 Pages

    that they can interchange information. Given a collection of computers, we would like to describe this linkage in fairly clean terms so that we can answer questions such as “How can we send a message from computer A to computer B using the fewest possible intermediate computers?”…

    • 3682 Words
    • 15 Pages
    Good Essays
  • Satisfactory Essays

    |Network computers |Network computers are computers that are linked together in a network for better |…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It230 Wk1 Checkpoint

    • 576 Words
    • 3 Pages

    Within a network consists of a model that interlinks computers with one another by its methods and protocols, this model is known as the “Open Systems Interconnection (OSI) model”, (2010. PP.28). It is a framework that defines and dissects its methods protocols into another model consisting of seven different layers. Each different layer increases from one layer to the next, all in which rely on the services the lower level provides to the next until data becomes present upon viewing a computer screen. Seven layers defining the “seven-layer model”, (2010. PP.28), are: physical, data-link, network, transport, session, presentation, and application. Each consists of different functions and purposes.…

    • 576 Words
    • 3 Pages
    Good Essays
  • Best Essays

    white paper template 1

    • 963 Words
    • 4 Pages

    Peterson, L. L., & Davie, B. S. (2011). Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking). Morgan Kaufmann.…

    • 963 Words
    • 4 Pages
    Best Essays
  • Satisfactory Essays

    A computer network, or simply a network is a collection of computers and other hardware components interconnected by communication channels that allow sharing of resources and information .where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network. Networks may be classified according to a wide variety of characteristics, such as the medium used to transport the data, communications protocol used, scale, topology and organizational scope.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Network Design Models

    • 392 Words
    • 2 Pages

    Computer networks consist of communications, media, devices, and software need to connect two or more computer systems or devices. Networks are able to transmit and receive information to improve organizational effectiveness and efficiency.…

    • 392 Words
    • 2 Pages
    Satisfactory Essays