3-2 activity PDF

Title 3-2 activity
Author Jacob Sisk
Course IT-200
Institution Southern New Hampshire University
Pages 3
File Size 109.4 KB
File Type PDF
Total Downloads 66
Total Views 142

Summary

3-2 Activity...


Description

Jacob Sisk Jason Proske, MSIT IT-200 22 January 2021 3-2 Activity: Network Configuration Model 1. Define the following IT concepts, and describe their role and importance within a network: 

IP address and DNS: An IP address is the numbered address that identifies a device on the Internet. The most common format is IPv4 and it looks something like this; “67.43.14.98”. Typing an IP in the search bar goes straight to that website on the Internet. DNS or Domain Name System is the process of converting alphabetic URLs to IP addresses. For example, typing www.website.com converts that to the websites IP in the browser. This works vice versa. Typing the IP address such as “64.73.54.45” will take you directly to the desired website.



Server and client: A server is a computer system that provides data to other devices. It can be over a local area network (LAN) or a wide area network (WAN) over the internet. The clients of the server refer to the devices that access the server and pull the information off it. This can be a computer, tablet, smartphone or any other device that can use the server.



VPN: A VPN is a “Virtual Private Network”. A VPN is used to tunnel through a WAN on the internet. This makes the location anonymous and scrambles the data to make it private.



Firewalls: A firewall is a barrier between a system or network and outside connections. It filters out the bad data and lets the good stuff through. Firewalls can be made from hardware or software. Think of it as a bar with a bouncer, letting good stuff in but keeping bad stuff out.



LAN and WAN: LAN, or Local Area Network, is a network comprised of devices all in a central location. They can be wired or wireless, sometimes both. WAN, or Wide Area Network, are almost the same as a LAN but it covers a bigger area. They can also be a system of LANs that are connected. They are not limited to a single location.

2. I will be choosing Justin Altuve’s small photography business for my model.

3.

My model is based off Justin Altuve’s small business out of his home. His cable modem receives the internet connection, which goes through the firewall, blocking suspicious data from passing into his router. In small businesses, security is very important because you do not have access to the kinds of protection that big companies have. The modem’s connection runs through the firewall to his wireless router. The Desktop PC, IP Phone, Laptop and printer are wired directly to the router for connection. The digital camera connects to the laptop and puts data from it on to the device. This layout has everything Justin needs to run a successful business safely and efficiently....


Similar Free PDFs