3-2 Activity Network Configuration Model PDF

Title 3-2 Activity Network Configuration Model
Author Tkeyah Swilley
Course Fundamentals of Information Technology
Institution Southern New Hampshire University
Pages 1
File Size 33.1 KB
File Type PDF
Total Downloads 92
Total Views 144

Summary

Download 3-2 Activity Network Configuration Model PDF


Description

Network Configuration Model Guidelines and Rubric T’Keyah Swilley 1. IP address is defined as a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network. DNS is a domain name system it associates various information with domain names assigned to each of the participating entities. The importance of both of these is very high on the priority level. The DNS will help find the IP address that matches the domain name. Which means that the browser can reach the correct server and retrieve the website and its content. 2. The server is a computer program that manages access to a centralized resource or service in a network. The client is a desktop computer or workstation that is capable of obtaining information and applications from a server. With server and client both working together these are important because they make it easier to protect data with access controls that are enforced by security policies. 3. VPN – stands for virtual private network. This enables users to send and receive data across a shared or public network as if their computing devices that are directly connected to the private network. 4. Firewalls – a program or system put in place for security purposes. The firewalls establish a barrier between a trusted network and an untrusted network such as the internet. 5. LANs and WANs - Local network area and Wide area network. These are two devices connected together, although LANs can be completely private and WANs are built by using leased public networks to connect multiple LAN’s together. The scenario that I chose was the one about Justin having a small photography business that he operates from his home. I chose this one because it seemed to be the least complicated. I instantly took a page from my own experience when I had to set up my own internet and cable at home. In the graph that I was able to build, I started with a cable modem, and had connected a wireless router to it so that the wire access point could be shared through the following devices; since Justin has a laptop that would need access to the internet that is part of the reason why the access point was implemented. The desktop PC, connected to the cable modem to be able to access the internet, as well as the firewall being used as an input device to secure date and information across the PC and wireless modem. The printer is used as an output device on the desktop PC, the IP phone is directly connected into the cable modem – that means that if in fact the internet is down so will the IP phone. These are less complicated components but these are the tools and steps to take in order to ensure that Justin will have the proper functionalities of his network....


Similar Free PDFs