CS 1010 Unit III Homework Assignment

Unit III Homework Assignment

1. a. Identify four network classifications, define them, and list the advantages and disadvantages in this table. Fill in the provided template.

Network Classifications Definitions Advantages Disadvantages
1. PAN Personal Area Network- This is a close range network that could be used to pair devices without a wired connection such as phones, cameras, or a copy machine. Easily portable from one work area to another. Secure as all information on devices are only shared with the authorized personnel. Costly (tablets, laptops, smartphones). Small network area.
2.LAN Local Area Network- These networks cover the span of a building or home office connecting all devices within that building, these can be wired or wireless. Ability to work together, network and hardware sharing is cost effective, Sharing data can increase productivity, convenient, provides access to peripheral devices such as printers and projectors. When there are Malfunctions you cannot access typical resources, more vulnerable to unauthorized access, vulnerable to malicious code such as worms and trojan horses. Once a threat penetrates the network, all computers are at risk.
3.MAN Metropolitan Area Network- Are the network capabilities offered by comcast, AT&T, and other local providers that can span 50 miles offering voice & data transmission. Networks for large areas (e.g. a city). Provides support to the larger WANs’. Susceptible to hackers. Can be spotty when moving from city to city.
4.WAN Wide Area Network- Cover large geographical areas, the largest WAN is the internet. WAN can connect many smaller networks from various providers. Centralizes IT infrastructure, boosts your privacy, increases bandwidth, Guarantees uptime, cuts cost, and increases profits. High setup costs, security concerns, higher amount of maintenance issues.
  • b. Sketch/draw the four different networks. Use whatever tools are necessary to make your drawings. In addition to any sketch tools that you may have on your computer, Word offers Shapes and SmartArt in the toolbar, both of which may be helpful in illustrating networks.

2. List six protocols that are used on the Internet and what they are used for.

Protocols Description/Use
1. Transmission Control Protocol (TCP) Provides host-to-host connectivity at the Transport Layer of the Internet model.
2. User Datagram Protocol (UDP) Provides checksums for data integrity, and port numbers for addressing different functions at the source and destination of the datagram.
3. Internet Control Message Protocol (ICMP) Used by network devices, including routers, to send error messages and operational information.
4. Hypertext Transfer Protocol (HTTP) Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text. HTTP is the protocol to exchange or transfer hypertext. HTTP is the foundation of data communication for the World Wide Web.
5. Post Office Protocol (POP) Is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection.
6. File Transfer Protocol (FTP) Is a standard network protocol used for the transfer of computer files between a client and server on a computer network.

3.Make a timeline of events associated with the evolution of the Internet

The Internet was started in 1957 when the Russians launched Sputnik, the first artificial earth satellite. In response to this, the U.S. government decided to develop its technical infrastructure. Out of this period of development came the Advance Research Projects Agency. ARPA’s goal was to create a system in which a network was created to help scientists communicate between their research computers. Out of this was created the ARPA net in 1969, which connected computers at UCLA, and other universities. The National Science Foundation used ARPA net in 1985 to create a larger network linking LANs at each site. The connection of two or more networks created an internetwork, from which comes the term internet. As this network expanded, it adopted the upper case I, becoming the Internet. The first users of the internet used primitive command line interfaces mostly to send email, transfer files, and run experimental programs requiring a network of several computers to operate. Before the development of search engines, users had to rely on emails and word of mouth to learn of data locations. Finally, in the early 1990s, software was developed to provide user-friendly tools such as search engines to make the Internet accessible to the masses for a small monthly subscription fee. Today the Internet is huge. There are over 500 million nodes being accessed by over 1 billion users. An estimate of internet traffic is one exabyte of data passing through the ‘net every day. There are several different providers now, with Google being the most popular, just ahead of Yahoo.

4. For this essay, you are going to be using the information tool, Wikipedia, briefly to find original sources on the subject of cloud computing. I want you to verify two references in Wikipedia, and write a 200-word essay on any aspect of cloud computing that you want. Look on page 290 of your textbook for some helpful hints.

Keep in mind that you will be using references found in the Wikipedia article, and you do NOT cite Wikipedia. You are using this as a research tool to drill down to find the factual sources.

Keep in mind that CSU has a strict policy against using Wikipedia as a source in assignments. If you would like to view the policy, it is available in the CSU Online Library under the “Research Tools” link.

All references and citations used must be in APA style.

Place an Order

Plagiarism Free!

Scroll to Top