Friday, October 4, 2019

Secure Networking Technologies Essay Example | Topics and Well Written Essays - 2000 words

Secure Networking Technologies - Essay Example Furthermore the paper would also state the methods to mitigate the effects of these threats that have been suggested by various authors and experts. The results of the research have proven a few things. The first finding is that switches and routers are some of the safest devices that are used to connect two different networks or different parts of a network. Other than that firewalls must always be obtained from authentic vendors, as there are individuals who disguise malware in the form of firewalls to gain access to personal computers. The third finding is regarding IDPS. These systems are relatively new and more research needs to be carried out before these systems are perfected and made available for use by the mass population. Securing Networks Introduction The invention of internet brought with it multiple opportunities. Internet helped people share, store and manage data in a completely new way. Access to data became easier and faster than ever before. Where many saw internet as a tool to benefit mankind others saw the internet as a tool to gain unauthorized access to private data. ... Moreover this paper would also suggest various methods with which these threats and vulnerabilities could be mitigated. Network switches and routers Main features and functions: Switch is a device used for the purposes of telecommunication that connects various network parts of a network to each other or connects a particular device to the network. A switch receives signals from a particular device and sends those signals to the device for which they were meant. This is one of the reasons why switches are more popular than hubs. Switches are crucial to the working of Local Area Networks (LAN) with a number of switches being a part of an average sized LAN topology (DiMarzio, 2001). The switch creates a different collision domain for every port on the network by working at the data link layer of the OSI model. That means that conversations between two different pairs of users would not be hindered with the use of a switch. Using a full duplex channel the two different pairs of users ca n even communicate with each other (DiMarzio, 2001). Routers on the other hand are used to connect two or more than two different networks to each other. Once the router receives the data packet it reads the address on the packet that informs the router where the packet has to go. Once the address is extracted the router uses its routing table to determine the network address of the packet’s destination. Form the above stated functions one can say that the router directs all the traffic on the network. The process of directing a data packet continues until the packet reaches the node it was meant for (The TCP/IP Guide, 2005). When more than one router is used to

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.