The Importance Of Firewall

Great Essays
1.10 FIREWELL:
Firewall is a physical security device that cleaned in specs traffic coming from one network to a different network. A firewall is a system that implements an access control policy among two networks.
Example:
“Allows: http, mails etc. Keeps out: intruders, denial of services attacks etc.”

1.10.1 Firewall work: The protocol that computers use to be in touch on the internet is called TCP/IP.
Each computer on the Internet has a only one of its kind internet protocol and each computer has a run of ports used to be in touch with other computers
“Ex: http (web pages) – port 80 FTP (file) – port 21”
1.10.2 Need of firewall:
We require a firewall if we have a network (called a trusted network) which is linked to any other network (called an entrusted network) which does not fit in to us (like the internet)
Security it will discontinue most hackers from in advance access to the networks.
A firewall can do something
…show more content…
For example:
One computer in Canada and second one in New Zealand
TCP/IP is also defining that how can data format and also give IP address to that data. It is also decide route of data means it’s also work with the help of router give path to data one computer to other computer.

1.11 DHCP (Dynamic Host Configuration Protocol) :
Whenever we want to configure a network we have to assign IP address to all computers in our network. If we are creating small network it is easy to assign an IP address manually but if we want to develop a large network we can assign IP address with the help of DHCP server. DHCP server provides automatically IP address to all computers and other information such as default gateway and DNS server address to the computers.
Now we assign IP address we have two options
1. Obtain an IP address automatically
This option we select when we create a large network.

2. Use the following IP address In this option we have three sub

Related Documents

  • Improved Essays

    15 Jan.). It seems that it will help launch onto what we call the internet an accessible through this appliance it has the capable ability to sort all kinds of data packets that have each find the one thing you need out an infinite amount of networks("History of the Router | EHow." Subscribe…

    • 1350 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The IP addresses can change and are often assigned by the DHCP server. Data link layer – Mac Addresses are used to identify which hardware is the sender and which is the receiver. All hardware items have a MAC address. For example: a switch, a computer, and a hub would all have their own MAC address and that address is permanent to each individual device. 2.…

    • 766 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Ntc300 Unit 1

    • 1895 Words
    • 8 Pages

    Hampshire College for example was able to place layer three capable devices at the head-end wiring closet of every major building and effectively create highly controllable sub networks. This allows the College to route traffic to different ISP’s based on network ID addressing or do things like control access to certain networks with access control lists. This design is possible using public addressing, but the ability to quickly roll out experimental address spaces, for testing is a valuable function made possible by private addresses. NAT If this addressing is private and publicly un-routable, then how do we get traffic across the Internet? We can use a method called Network Address Translation to assign routable addresses to non-routable addressed traffic.…

    • 1895 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    1. Read the paper; http://www.garykessler.net/library/tcpip.html. Based on this paper (supplement as needed with other material from the Internet), please answer the following. Solution:  Define ARP – one sentence summary is sufficient ARP is an acronym for Address Resolution Protocol which is a network layer protocol used to convert or map IP address into physical address like MAC address.  Explain the difference between network and machine addresses A network address is a unique address which is used as identifier for a node/computer on a network which is internet or intranet.…

    • 1622 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Run the ipconfig command to analyze the IP address and subnet that gives the addressing schema for the network. 2. What information can you retrieve from the Domain Name System (DNS)? From the DNS, the following information can be retrieved a. Number of servers and workstations deployed on the network.…

    • 648 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Internet Importance

    • 780 Words
    • 4 Pages

    TCP/IP is the primary communication language or also known as the protocol of the Internet. When you are permitted first hand access to the Internet, your computer is provided with a copy of the TCP/IP program .It can also be used as a communications procedure in a secure network like an Internet or Extranet. TCP sends data in a form that appears to be transferred in a character-by-character fashion, rather than as separate packets. Next, we will be discussing the Importance of Protocols in Internet Services. Simultaneously millions of people around the world use the Internet and the Internet protocols are used to send data from one computer to another.…

    • 780 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    The web browser acting alone cannot send a request for that web address directly; it needs help. Which of the following components on that user’s PC likely help the web browser? (Choose two answers.) C. The operating system on the PC D. The PC’s NIC 11. A user grabs his smart phone, opens a web browser, taps the www.certskills.com/books web address, and taps the button to load this web page.…

    • 1494 Words
    • 6 Pages
    Great Essays
  • Great Essays

    POP3 is designed to delete them off the server, unless, the user opts not to delete the email then the POP3 will download the email every time the users opens it. IMAP is another protocol which is the Application Layer Internet protocol. This allows the user to access the mail server, this happens when the user signs up to the mail server. For example, when users sign up to BT Mail they are accessing the IMAP protocol to send and receive emails. The current IMAP is version 4 revision 1 and this is defined as RFC 3501.…

    • 1440 Words
    • 6 Pages
    Great Essays
  • Great Essays

    The protocols also include provisions that permit it to function on most lower-level forms of technology, such as LANs, wireless LANs and WANs of various sorts. This enables people to mix and match a variety of different underlying networks and connect them all using TCP/IP. • Scalability: The TCP/IP protocols have proven to be extremely scalable over the years. As the internet has grown from a few servers to millions of hosts, the core of TCP/IP is nearly the same as it was about 25 years ago. The only changes having been made are the ones required to support the growth of the internet and are done as a part of the TCP/IP development process.…

    • 1545 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Internet Case Study

    • 789 Words
    • 4 Pages

    The internet connects computers and devices through cables, satellites etc. to a global network of modems, switches and routers, while the web utilises internet, through software in the form of browsers, to disseminate the data sent through it. The internet sends pages in the form of data but without the web and HTTP the hyperlinked pages cannot be read (Johnson, 1995, p. 109). Johnson also maintains that although the World Wide Web is dependent on the internet for its existence, the internet supports many other protocols, for example File Transfer Protocol and Simple Mail Transfer Protocol and doesn’t require the web to exist. Svantesson (2006, p. 344) observes that both the internet and the web are “widely recognized…

    • 789 Words
    • 4 Pages
    Improved Essays