Nt1330 Unit 3 Assignment 1

Improved Essays
¥ 1. An IP address is an identifier for devices on a TCP/IP network. Usually, an IP address could be assigned using a 32-bit numeric address written as four numbers separated by periods. Each number can go from being zero to 255. For example, 1.160.10.240 could be an IP address. Although IP address can be static or dynamic. A static IP address stays the same and it is a permanent Internet address. On the other hand, a dynamic IP address is a temporary address that is assigned each time a computer or device accesses the Internet, and DNS is used to it make easy to read or remember hostnames like www.it200class.com
¥ 1.2 Server and Client is a network architecture in which each computer or process on the network is either a client or a server.
…show more content…
VPNs are most often used by corporations to protect sensitive data being compromised by hackers.
¥ 1.4 Firewalls A firewall is a network security system, either hardware- or software-based, that uses rules to control incoming and outgoing network traffic. A firewall acts as a barrier between a trusted network and an untrusted network. A firewall controls access to the resources of a network through a positive control model. This means that the only traffic allowed onto the network is defined in the firewall policy, and all other traffic is denied.
¥ 1.5 LAN versus WAN LAN, which stands for local area network, and WAN, which stands for wide area network, are two types of networks that allow for interconnectivity between computers. As the naming conventions suggest, LANs are for smaller, more localized networking than in a home, business, school, etc. WANs cover larger areas, such as cities, and even allow computers in different nations to connect. LANs are typically faster and more secure than WANs, but WANs enable more widespread connectivity. And while LANs tend to be owned, controlled and managed in-house by the organization where they are deployed, WANs typically require two or more of their constituent LANs to be connected over the public Internet or via a private connection established by a third-party telecommunications

Related Documents

  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    13. What is a firewall and how do firewalls ensure my PC? A firewall is programming projects or equipment used to search out programmer's infections and worms that attempt to get to your PC utilizing the web. Firewalls shield your PC against spyware, adware and malware.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Strategic Competitive Advantage Bell Canada has following strategic competitive advantage: • Private network – Private network helps small business to run faster internet and hassle free from all other networks. • Bell Connectivity services – It help small businesses to send, store and receive data faster from the Bell network. • Bell total connect – It help small business to connect mobility, telephone, internet, TV, etc. with a single server. • Bell Canada is offering 4G LTE network for small business, which fasten internet access.…

    • 190 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Remote access is the one which helps us to get access to a computer or network form a remote distance. In many organizations branch offices, telecommuters, and people who are traveling may need access to the corporation’s network. Home clients gain admittance to the internet through remote access to an Internet Service provider(ISP). Dial-up association through work area, scratch pad, or handled PC modem over general phone lines is a typical technique for remote access. Remote access is additionally conceivable utilizing a committed line between a PC or a remote neighborhood and the central or main corporate local area network.…

    • 354 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Firewalls can be deployed on a machine, router, or LAN switch for service, direction, user, and behavior control. The firewall categories are: packet filtering firewall, which is beneficent in controlling the Internet Protocol (IP) address spoofing, source routing, and tiny fragments attacks; stateful inspection firewalls; application level gateways; and circuit level gateways. Similarly, the IPS systems are either host-based or network-based. Host-based IPS is used to protect against the modification of system resources, exploits related to privilege-escalation and buffer-overflow, e-mail contact list access, and directory lookup. On the other hand, the network-based IPS is used for identifying malicious network packets, and assists in pattern and stateful matching, and protocol, traffic, and statistical anomaly prevention (Stallings, & Brown,…

    • 1380 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Apple Pay Case

    • 2522 Words
    • 11 Pages

    An increase in consumer devices such as E-book readers, TVs and cable set-top boxes, cameras that also use the internet. d) Transportation, which saw 1.1 billion automobiles in 2010 These factors has led to a rapid decline in available addresses for IPv4. Several methods were implemented in order save the remaining addresses. One of them included the use of Network Address Translation. NAT provides a method of allowing several addresses to be connected to the internet through a public IP address.…

    • 2522 Words
    • 11 Pages
    Great Essays
  • Great Essays

    Proposal for Security Software Name: Jamonte Reed Institution: University of Maryland University College Proposal for Security Software Owing to the cybercrimes threats attempted on Advanced Research Company, it is recommended that the executive should make plans to acquire security software that will protect confidential corporate data from external access. Past events have demonstrated that companies are not secure from cyber attacks owing to the ones that the company has experienced and the recent one that involved a major competitor. In this study, attention is accorded to a description of the recommended security software and its benefits to the company.…

    • 1226 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    The power of the router is that it can “determine the next network point to which a packet should be forwarded toward its destination.” (Rhodes, 2006) This kind of decision-making ability for where to send packets is what allows computers on a LAN to communicate with each other and with the internet or company intranet. These routers are often multi-function devices, and can serve as gateways and hardware firewalls in addition to the routing.…

    • 879 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    The Rise Of Ipv6 Analysis

    • 1980 Words
    • 8 Pages

    Originally, the Department of Defense researched and developed some of the core principles that gave birth to the internet as it is known today. In the beginning it was called the Advanced Research Projects Agency Network or ARPANET. When the ARPANET transitioned to the internet, “from network control protocol (NCP) to TCP/IP” (Yannakogeorgos 105). TCP and IP are separate protocols used in conjunction,“to connect with other computers on the Internet or other networks” (Yannakogeorgos 107), with the Internet Protocol version four or IPv4 being what is currently in wide use. An IPv4 or IPv6 address is a unique address or name that devices use while accessing the…

    • 1980 Words
    • 8 Pages
    Superior Essays
  • Great Essays

    Transmission Control Protocol/Internet Protocol (TCP/IP) are a suite of protocols designed for large-scale internetworks that span LAN and WAN environments. TCP/IP are communication protocols that are used to handle traffic on the internet and other networks. The two most important protocols are the Transmission Control Protocol (TCP) and the Internet Protocol (IP). These are today the standard networking protocols and were created from a synthesis of a number of earlier developments in the 1960’s and 1970’s. TCP/IP protocols were developed in the early 1970’s by scientists Vint Cerf and Bob Kahn.…

    • 1545 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Unit 7 Computer Networks

    • 1172 Words
    • 5 Pages

    Computer networks LAN – Is a Local Area Network which is a computer network that covers a small area which is sometimes a single room, an office building or a group of buildings. A local area network can be connected with others over a distance for example a telephone line, a radio or a mobile phone call, as a LAN is a network that covers the geographic distance that also involves internet links. A system of LANs that are all connected together is called a WAN, which is a wide area network. http://www.webopedia.com/TERM/L/local_area_network_LAN.html WAN – is a Wide Area network, this is when a computer network that is connected in a large geographical area is known as a WAN, which is when two or more LANs are connected together. These are through…

    • 1172 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Ethernet Network Essay

    • 1231 Words
    • 5 Pages

    Next to each network component is an Internet Protocol (IP) address. Each IP consists of four number whose value can range from 0 to 255. This four numbers are separated by period marks (WhatIsMyIPAddress.com, 2000-2016). No number can be repeated on the same LAN sharing the same subnet mask making it an effective way of uniquely ‘naming’ each component in the network.…

    • 1231 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    As name suggests it is used to dynamically assigning the IP address to network machines .So, we don’t need to assign IP manually. DHCP protocol is used by networking equipment’s. e.g. routers. How DHCP works:- Dynamic IP address will be generated and assigned from pool of network. It assigns that IP address which are expired.…

    • 1622 Words
    • 7 Pages
    Great Essays
  • Great Essays

    IPv6 The internet was invented around the early 1960s with the research of Packet switching. What they called ARPANET led to the development of the internetworking, where multiple networks could be join together over to create a network of networks. IP defined by RFC791 was the first widely used version of the internet protocol. This was known as version four, this would make you think that there were three other version of IP before this version however there really was not.…

    • 1524 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    TANAPA Case Study

    • 1063 Words
    • 5 Pages

    1. INTRODUCTION Tanzania National Parks (TANAPA) is a parastatal organization established by an Act of Parliament, The National Parks Act, Cap 282, of the Revised Laws Edition, 2002 The mandate of the organization is “Conservation” which is sustained by the revenue generated through tourism. TANAPA consists of fifteen (15) National parks centrally managed from Headquarters in the Arusha region namely Arusha NP, Gombe Stream NP, Katavi NP, Mount Kilimanjaro NP, Kitulo Plateau NP, Mahale Mountains NP, Lake Manyara NP, Mikumi, Ruaha NP, Mkomazi NP ,Rubondo Island NP, , Tarangire NP ,Saadani NP, Serengeti NP and Udzungwa Mountains NP. 1.1.…

    • 1063 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    These type of devices include routers, firewalls, gateways, switches, hubs, to create the local area networks. Network devices allow computers to talk to other computers outside of their network or LAN. The LAN or “local area network” is a network that connects computer and devices that are in a limited are such as a home, school and/or office building.…

    • 722 Words
    • 3 Pages
    Improved Essays