3-2 Network Configuration Model PDF

Title 3-2 Network Configuration Model
Course Fundamentals of Information Technology
Institution Southern New Hampshire University
Pages 2
File Size 129 KB
File Type PDF
Total Downloads 86
Total Views 154

Summary

Download 3-2 Network Configuration Model PDF


Description

IT-200 3-2 Network Configuration Model











IP address and DNS-An IP address is an address assigned to any computer (including servers) to identify it on a given network. A DNS address is a Domain Name Service which is used to convert alphabetic references into a server's IP address generally for hosting services. (teamtreehouse.com, 2015) They are important within the network since they are used in switching and routing data within a network to determine the host or specific device. Server and Client-A server is a computer that provides data to other computers. It may serve data to systems on a local area network (LAN) or a wide area network (WAN) over the Internet. Many types of servers exist, including web servers, mail servers, and file servers. (Techterms.com, 2014) A client is a piece of computer hardware or software that accesses a service made available by a server. The server is often (but not always) on another computer system, in which case the client accesses the service by way of a network. It is important within a network because of interconnectivity, connecting to devices for information to be shared. VPN-A virtual private network (VPN) gives you online privacy and anonymity by creating a private network from a public internet connection. VPNs mask your internet protocol (IP) address so your online actions are virtually untraceable. Surfing the web or transacting on an unsecured Wi-Fi network means you could be exposing your private information and browsing habits. That’s why a virtual private network, better known as a VPN, should be a must for anyone concerned about their online security and privacy. The encryption and anonymity that a VPN provides helps protect your online activities: sending emails, shopping online, or paying bills. VPNs also help keep your web browsing anonymous. (us.norton.com) Firewalls-In computing, a firewall is a network security system that monitors, and controls incoming and outgoing network traffic based on predetermined security rules. The importance of a firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet. (Wikipedia) LAN and WANs-A LAN (local area network) is a group of computers and network devices connected, usually within the same building. ... A WAN connects several LANs and may be limited to an enterprise (a corporation or an organization) or accessible to the public. (kb.iu.edu, Jan 18, 2018) The biggest advantage of a WAN is that it allows for a much larger and more intricate network. (network-support.com) If you don’t have either one of theses than you can’t communicate with each other in networking.

IT-200 3-2 Network Configuration Model

The network topology I decided to use for Justin’s photography business is a Star LAN with wireless capabilities. The peripherals that will be included in network are mouse, keyboard, digital camera (input devices) and monitor, printer (output devices). The configuration you will see shows a modem, firewall, wi fi router, desktop pc, printer, ip phone, laptop, and a digital camera. The central connection point will be the router using ethernet cable. The modem will be connected to the internet, sending signal through firewall to the router for added security. The wi fi router stores IP addresses for each equipment that you are using. The digital camera will use usb port to be used on laptop or PC for downloading photos. The IP phone and printer will be available anywhere on LAN. While surfing the web on Laptop I will used my VPN. The encryption and anonymity that a VPN provides helps protect company online activities....


Similar Free PDFs