Wednesday, April 17, 2019

Secure Networking Technologies Essay Example | Topics and Well Written Essays - 2000 words

Secure Ne cardinalrking Technologies - Essay ExampleFurthermore the root word would also state the methods to mitigate the effects of these threats that have been suggested by various authors and experts. The results of the research have be a few things. The first finding is that switches and routers are some of the safest inventions that are apply to connect two polar networks or different parts of a network. Other than that firewalls must always be obtained from current vendors, as there are individuals who disguise malware in the form of firewalls to gain annoy to personal computers. The thirdly finding is regarding IDPS. These systems are relatively virgin and more research needs to be carried out in advance these systems are perfected and made available for use by the mass population. Securing Networks Introduction The invention of net income brought with it multiple opportunities. Internet helped people share, store and manage data in a completely new way. Access to data became easier and faster than ever before. Where many saw internet as a pecker to benefit mankind others saw the internet as a tool to gain unauthorized access to private data. ... Moreover this paper would also suggest various methods with which these threats and vulnerabilities could be mitigated. Network switches and routers Main features and functions hurl is a device used for the purposes of telecommunication that connects various network parts of a network to apiece other or connects a particular device to the network. A switch receives signals from a particular device and sends those signals to the device for which they were meant. This is one of the reasons why switches are more popular than hubs. Switches are crucial to the working of topical anesthetic Area Networks (LAN) with a number of switches being a part of an average sized LAN regional anatomy (DiMarzio, 2001). The switch creates a different collision domain for every port on the network by working at the data link layer of the OSI model. That means that conversations between two different pairs of users would non be hindered with the use of a switch. Using a full duplex channel the two different pairs of users can even communicate with each other (DiMarzio, 2001). Routers on the other hand are used to connect two or more than two different networks to each other. Once the router receives the data software system it reads the call in on the packet that informs the router where the packet has to go. Once the address is extracted the router uses its routing table to determine the network address of the packets destination. Form the above stated functions one can say that the router directs all the duty on the network. The process of directing a data packet continues until the packet reaches the node it was meant for (The TCP/IP Guide, 2005). When more than one router is used to

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.