Wide Area Network

Read Complete Research Material

WIDE AREA NETWORK

Wide Area Network



Wide Area Network

Local Area Network Security

Topology Design for Best HQ Sites

The internet has a wide range of hazards which can have adverse effects on the data piracy and theft. Your data is not safe until you have a security plan setup in your computer or the topology you are using has all the security policies intact and implemented on the network.

DESIGN Topologies

We consider three different aspects when considering a topology:

The physical topology, which is the actual layout of the host and cables (the media) in the network.

The logical topology of a network is how hosts communicate through the medium. The two most common types of logical topologies are broadcast (Ethernet) and token passing (Token Ring).

Broadcast topology simply means that each host sends its data to all other hosts on the network medium. The stations do not follow any order to use the network, the order is the first in, first served. This is how Ethernet works.

Token passing controls access to the network by transmitting electrical token sequentially to each host. When a host receives the token, it means that the host can send data over the network. If the host has no data to send, it passes the token to the next host and the process repeats.

Mathematical topology, where maps of nodes and links often form patterns.

Let's see then major topology models. The term network topology refers to the physical location of computers, cables and other network components. Topology is a term used many professionals when referring to the basic design of a network. Other terms used to define a network design are:

Physical location

Design

Diagram

Map

The choice of a topology over another will have a strong impact on:

The type of equipment that the network needs

The capabilities of this equipment

Network development

The way the network is managed

Knowing about the different topologies, you get to understand more about the capabilities of different types of networks.

For computers to share files and transmit power between them have to be connected. Most networks use a cable to connect one computer to another, to make this possible.

However, this is not as simple as connecting a cable from one computer to another. Different cable types require different types of arrangements.

For a well-functioning network topology, requires a previous design. For example, a particular topology can determine the type of cable needed and as the wiring runs through the floor, walls and ceiling.

Different Network Topologies

The five basic topologies are:

BUS

STAR

RING

MESH

TREE

These topologies may be combined in a variety of more complex hybrid topologies and hence to provide more advantages and in the security policy.

Securing Routers and Switches in a LAN Topology

It is advisable to determine your organizational needs and the type of security that best suits your needs before deploying a machine in a production environment or connecting your network to the Internet. However, this page presents a brief overview of the development of security policies for hardware and physical networks. Important factors to consider include how computing needs and connectivity requirements are integrated into the overall security ...
Related Ads