Basic Network Configuration PDF

Title Basic Network Configuration
Author Bruna Alves
Course Fundamentals of Information Technology
Institution Southern New Hampshire University
Pages 3
File Size 82.8 KB
File Type PDF
Total Downloads 1
Total Views 147

Summary

In this article I describe, IP, DNS, Client and Serve, VPN, Firewall , LANs and WLANS as as summary...


Description

1 IT-200-J5159 Network Configuration Model

Network Configuration Model Southern New Hampshire University

2 IT-200-J5159 Network Configuration Model

Definitions

1. Internet Protocol (IP) Address and Domain Name System (DNS): An IP address is a unique

identity of a device defined by numbers or characters when connected to a network. It helps connecting a device to other devices in a local network or worldwide. Within the IP, there are 2 versions IPv4 and IPv6, and DNS supports both protocols. To start, the fourth version is called IPv4. It is configured in a numerical value, such as 192.0.2.126. IPv4 was brought into action in early 1980’s. This version used a 32-bit number format that is divided into 4 eight-bit binary numbers that are separated by decimal point. The IP address is classified into 2 parts: network and host. The first section (192.0) identifies the network that the device is connected to. The second section (2.126) identifies the host, which identifies the machine in a network. Each section supports a number from 0 to 255, which means that are a limited amount of IPv4 available to be used which is why the sixth version is now in use. IPv6 was designed to accommodate the increasing demand for IP addresses, considering how many devices are out there now. First, one of the differences between both versions is the capacity, given that the IPv4 was limited. The new version uses a 128-bit number format that is broken down by 2 parts of 64-bit for network and host. Second, IPv6 address is identified as 8 groups of 4 hexadecimal digits using a colon to separate them For example, 2004:0cb8:82a3:08d3:1319:8a2e:0370:7334. DNS is a directory of names that matched the IP addressed. Similar to a contact list on your phone, where you select the name of the person you wish to call instead of typing in their numbers or email address. DNS helps navigate to a website with more efficiency without trying to remember numbers. 2. Server and client: A client is defined as individual devices that communicates with a server.

For example, it can be desktop, printers, cell phones and more. A server can be a computer or a system that will provide resources, data, or services to clients over a network. A server also has a task to verify the identity from the client to ensure it has permission to access the data or request the resource. There are many types of servers including, file servers, print services, application servers, proxy servers, mail serves. 3. Virtual Private Network (VPN): When using a public network, VPN provides the opportunity to establish a protected network connection by encrypting the network connection and makes your identity unrecognizable, making it harder to track and steal online data. In other words, VPN works like a filter that turns your data into “nonsense” which makes the data useless if someone were able to get access to it. VPNs were first used by companied in the early 2000s and it wasn’t until about ten years after due to a flood of security breach, that the market started to pick up. There are three main types of VPNs: SSL VPN, Site-to-site VPN and Client-to-Server VPN. SSL VPN is used in scenarios where employees of a company would like access if they were working from home. For example, the only prerequisite is HTLM-5-capable browser, which calls up the login page of the company. Once the username and password are entered, employee’s will gain access. Site-to-site VPN are handy if a company has multiple locations with their own local area network that is connected to the Wide Area Network. With that being said, it is mostly used in large companies to

3 IT-200-J5159 Network Configuration Model communicate between departments, but it does not offer the same flexibility as the SSL VPNs. Lastly, Client-to-Server VPN is almost like connecting a work computer to a home computer through a cable, making it possible for employees to use the company’s network at home using a secure connection, providing a feeling of being in the office. Its only requirement is that the user does not connect to the internet via their own internet service provider and instead connects directly through the VPN provider. 4. Firewall: Firewall is a barrier between an external source, such as the internet and the internal network. It permits or blocks data based on a set of security rules. Firewall can be software or a hardware. The hardware is an equipment installed between network and gateway. On the other hand, the software is a program that is installed on a computer to monitor the port traffic. 5. LANs and WANs: Local Area Network (LAN) can be a combination of wire and wireless networks, or the individual connection of devices within a local location. LAN are usually limited to small areas such as a small business or a home connecting all of the devices to a single area. As a benefit, devices can share files, print to shared printers and so on. On the other hand, Wide Area Networks (WAN) is a combination of multiple LANs connection. A large company with multiple branches, will have a LAN on each location that are connected as part of the same network to share corporate resources and communications....


Similar Free PDFs