Saturday, June 8, 2019

Secure Networking Technologies Essay Example | Topics and Well Written Essays - 2000 words

Secure Net work Technologies - Essay ExampleFurthermore the paper would also state the methods to mitigate the effects of these threats that have been suggested by various authors and experts. The results of the enquiry have proven a few things. The first finding is that switches and routers are virtually of the safest twirls that are used to have-to doe with two different engagements or different articulations of a network. Other than that firewalls must always be obtained from authentic vendors, as there are individuals who disguise malware in the form of firewalls to gain access to personal computers. The third finding is regarding IDPS. These systems are relatively new and more research needs to be carried out before these systems are perfected and made available for use by the mass population. Securing Networks Introduction The invention of internet brought with it fivefold opportunities. Internet helped people share, store and manage data in a completely new way. Access to data became easier and faster than ever before. Where many saw internet as a tool to benefit mankind others saw the internet as a tool to gain unauthorized access to hole-and-corner(a) data. ... Moreover this paper would also suggest various methods with which these threats and vulnerabilities could be mitigated. Network switches and routers Main features and functions Switch is a device used for the purposes of telecommunication that connects various network parts of a network to each other or connects a particular device to the network. A switch receives signals from a particular device and sends those signals to the device for which they were meant. This is one of the reasons why switches are more popular than hubs. Switches are crucial to the working of Local Area Networks (LAN) with a number of switches being a part of an average sized LAN topology (DiMarzio, 2001). The switch creates a different collision domain for every port on the network by working at the data link la yer of the OSI model. That means that conversations between two different pairs of users would not be hindered with the use of a switch. Using a spacious duplex channel the two different pairs of users can even communicate with each other (DiMarzio, 2001). Routers on the other hand are used to connect two or more than two different networks to each other. Once the router receives the data packet it reads the get across on the packet that informs the router where the packet has to go. Once the address is extracted the router uses its routing table to determine the network address of the packets destination. Form the above stated functions one can say that the router directs all the traffic on the network. The process of directing a data packet continues until the packet reaches the node it was meant for (The TCP/IP Guide, 2005). When more than one router is used to

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.