Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Understanding Networks: Types, Principles, Protocols, and Devices, Essays (high school) of Law

An overview of computer networks, discussing various network types such as LAN and WAN, networking principles, protocols like TCP/IP and HTTP, and devices like routers and switches. It also covers network solutions and their benefits and drawbacks.

Typology: Essays (high school)

2021/2022

Uploaded on 12/26/2022

viet-anh-6
viet-anh-6 🇻🇳

2 documents

1 / 47

Toggle sidebar

Related documents


Partial preview of the text

Download Understanding Networks: Types, Principles, Protocols, and Devices and more Essays (high school) Law in PDF only on Docsity! PROGRAM TITLE: BTEC COMPUTING UNIT TITLE: NETWORKING ASSIGNMENT NUMBER: 1 ASSIGNMENT NAME: Consulting and Implementing Networl Design of BKACAD Company SUBMISSION DATE: 15/08/2022 DATE RECEIVED: 20/11/2022 TUTORIAL LECTURER: TRAN HOANG BACH WORD COUNT: …………………………………………….. STUDENT NAME: CHU THANH THUONG STUDENT ID: BKC13205 MOBILE NUMBER: 0399310282 Summative Feedback: Internal verification: II. Theory 1. Activity 1 1.1. Overview of your report Networking is the electronic connection of computers for the purpose of sharing information. Files, programs, printers, and software are examples of common information exchanged across a network. The benefit of networking may be seen clearly in terms of security, efficiency, manageability, and cost-effectiveness since it allows users to collaborate in a variety of ways. The network infrastructure is made up of physical components such as computers, hubs, switches, routers, and other devices. These are the gadgets that help to move data from one location to another by utilizing various technologies such as radio waves and cables. These are the gadgets that help to move data from one location to another by utilizing various technologies such as radio waves and cables. There are several network kinds available in the networking industry, with the most prominent being Local Area Networks (LAN) and Wide Area Networks (WAN) (WAN). A LAN network is composed of two or more computers that are linked together across a short distance, typically at home, business buildings, or schools. A network called a wide area network (WAN) typically spans the whole planet in addition to towns and nations. A WAN can be created by connecting many large LANs together. As there are several devices linked to the network, it is crucial to prevent data collision when these devices seek to use the data channel at the same time. Network collision detection and prevention are done using a set of rules known as Carrier Sense Multiple Access/Collidation detection. 1.2. Explanation of: 1.2.1. Networking principles, protocols, and devices, including the benefits and limitations of networking solutions. (Show the benefits and disadvantages of network topology models) - Networking principles: + Principle 1: Understand the user’s requirements.  Understand your fundamental network needs.  Create networks for a roaming user base.  Design services to be accessed wider than your own department.  Designed for web-sharing organizations to share the network of the site.  Consider data mobility (3G, 4G) as an alternative data transport mechanism.  Can support your users. + Principle 2: Use services to protect your data, not rely on the network.  Understand the threat.  Design protects services as close to service as possible.  Publish routes by default.  Encryption without compromising performance.  Protect your network.  Your security layer. + Principle 3: Designed for continuous and flexible work.  Use open standards.  Maximize the use of goods and services.  Consolidate data network usage and move to IP-based technologies.  Publish DNS names.  Remove technical barriers to access between governments.  Join to provide resilience. - Protocol: A protocol is a collection of recognized rules that describe how to format, send, and receive data so that computer network devices ranging from servers and routers to endpoints may communicate with one another, independent of architecture, design, or underlying standards. Across all network levels, network protocols divide bigger processes into smaller, distinct roles and activities. One or more network protocols will handle operations at each network layer throughout the exchange under the standard model, often known as the OSI model. A protocol suite is a collection of network protocols that are linked together. The TCP/IP suite consists of a number of protocols that sit on top of layers that work together to link the internet, such as the data layers, network layers, transport layers, and application layers, including: + Transmission Control Protocol (TCP) + User Datagram Protocol (UDP) + Internet Protocol (IP) + In addition, there are other additional network protocols such as: Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP)..., each of which defines set of rules for exchanging and displaying information. - Device: Basic network equipment includes 6 main types: Repeater, Hub, bridge, Switch, Router and Gateway - Networking solutions: Local Area Networks (LANs) are often used in businesses to link all individuals in the same place to the Internet using a single Internet connection. All Internet-capable devices are set up as LAN nodes and can connect to the Internet through a separate PC. Computers in the LAN are also used to link office workstations in order to enable printer access. However, LAN computer networks only cover a relatively small region within a single building.  The Star Network connects all stations via a central device that receives signals from stations and transfers them to the destination station. The central device might be a hub, switch, router, or central server, depending on the purpose of the network request. The star network paradigm aids in the establishment of point-to-point linkages via the central station and equipment.  Hierarchical Topology: This architecture is similar to an extended star network, except instead of connecting to a hub or switch, the network is attached to a device that monitors network traffic. The system's workstations are organized into levels based on their role. The capacity to centrally control devices in a decentralized network improves system security. Its downside is that it is costly owing to the large number of concentrators used. + Wide Area Networks (WAN) are the broadest and most extensive computer networks available today, encompassing MAN and LAN networks. WANs may link devices from all over the world via satellite technology, fiber optic cables, and power connections. WAN is a commonly used network because it possesses many advantages as follows: The WAN maintains tight control over user access. The WAN network provides excellent information security. WANs can simply and swiftly store and distribute massive volumes of data. The signal's transmission capability is quite broad, and it is not restricted.  Dedicated Connection: This is a persistent link that connects one device to another. Dedicated connections are reliable and fast, but they may be costly. If you rent a line from a WAN service provider, you must pay for the connection even if you do not utilize it. Furthermore, because dedicated lines only link two sites, the number of lines required will exponentially increase the number of locations to be connected. For example, if you wish to link two places, you just need one line, while connecting four locations requires up to six lines. Features of dedicated connection: Always available Use a WAN service provider's subscriber line More expensive than other WAN solutions Use separate connections between points Use a dedicated connection when: There is a high volume of data circulating through the LAN Need to connect often There are few places that need to connect with each other  Circuit-switched network: Switched networks enable you to use shared lines instead of leased lines (a dedicated connection). Switched networks are bidirectional, allowing dial-in and dial-out connections. When you use a switched network: The computer dials up the line and the connection is established. The receiving computer transmits the confirmation and locks the line. The data is sent by the computer transmitting the data through the established connection. After the data transfer is complete, the link is made available to other users. Switched virtual circuits are used in switched networks (SVCs). A sequence of electrical switches establishes a dedicated data line at the start of the transmission. This confidential route will be maintained till the conversation is completed). A switched network is the public telephone system. When you make a phone call, the PSTN employs switches to establish a physical, direct, and dedicated connection for the duration of the conversation. When you hang up the phone, the switches make the line available to other users. Computers linked to a network operate in a similar manner. When the computer calls into the network, a temporary dedicated way via the network is formed, and data is routed through this temporary dedicated path.  Packet-swiched: A leased line or a temporary dedicated line is not required for packet-switched networks. Instead, the message routing is built dynamically as the data passes through the network. A packet-switched connection is one that is always active. This means you won't have to worry about connecting or keeping lines private. Each packet contains all of the information required to reach the destination. Packet-switched networks have the following characteristics: Messages are subdivided into little components known as packets. Over the internet, packets are delivered separately (possibly by different routes) At the destination, the packages are reassembled in their original sequence. The default sender and recipient see the connection as permanent (no dial-up required) Permanent virtual circuits are used in packet-switched networks (PVCs). Although PVC is similar to a dedicated, direct connection, the path that each packet takes on the internet might vary. + Global Area Network (GAN): This is a network that connects many different computers from different continents. The telecommunications network connects the GAN in the same way as it connects the WAN. Furthermore, satellite is responsible for GAN connectivity. Advantages:  The second form is shared bandwidth, which means that the bandwidth is shared by many other servers from a single bandwidth plan. It depends on your consumption to determine how much you need to be shared, but it is normally less than 100 Mbps because it must be shared by a large number of people. As a result, it is only appropriate for services with limited capacity.  The third kind is dedicated bandwidth, which is the most often used type nowadays since it does not need to be limited in the quantity of transmission, it does not need to be shared like the previous bandwidths, and it is, of course, more expensive than the other two types of bandwidth. information provided above. + The impact of bandwidth on the internet: As you may be aware, bandwidth indicates the rate at which data may be accessed, enabling a certain quantity of information to pass through. So, what if we run out of bandwidth? Obviously, the website is unavailable. And, you know, the implications are not to be considered... Visitors are likely to leave the site because why should they wait when there are numerous other sites that offer identical service content. If your website is a commercial website, selecting the appropriate quantity of bandwidth is critical. You don't want to lose consumers or lower company efficiency because your bandwidth is constrained, no matter how well-designed your website is, do you? Choosing the appropriate bandwidth can improve your job performance. More bandwidth enables for more data to be sent (including uploads and downloads). This helps to expand service handling capacity, execute jobs rapidly, and satisfy a big number of website users. + The bandwidth limit: A bandwidth limit is a function that restricts internet access to maintain consistent transmission quality. Reason: Because it is easier to check for problems when there are fewer visitors. If there is too much traffic, it will cause bandwidth congestion, which could result in IP crashes, network lag, delayed network connection, or even no access to the website. Finally, the primary goal of this function is to guarantee that all devices connect to the network at the same consistent pace. - Requirements of the network system: + Must be manageable: A successful network system must be closely maintained and monitored, as well as easily supported, in order to effectively handle and resolve problems. + Must be scalable: As a company expands, so will the amount of visitors requiring network bandwidth. As a result, the infrastructure must be able to expand to support the increased number of customers. + Must be able to work continuously: The network system must be stable, reliable, and capable of running 24 hours a day, seven days a week. + Security must be ensured: It is critical that the network system be secure and safe. Because the most crucial thing is company data. Network security is also concerned with the protection of business resources. - Efficiency of the network system: + If the computation is inaccurate, it can easily result in system failure, unstable operation, higher maintenance costs and time, and decreased work efficiency. As a result, properly and methodically designing network architecture from the start will avoid difficulties and dangers in the future. + A professional deployment crew will have highly specialized operations and expertise. Because using the correct approach and procedure will help the network system perform effectively and last a long time. + Local area network (LAN) construction: A few little errors during construction, such as dragging cables through sharp surfaces or leaving wires outside, may severely weaken the signal. As a result, the functioning, interchange, and sharing of internal data is highly dependent on the signal wire's quality and technique of installation and maintenance. + Network transmission: Choose suitable bandwidth packages based on your needs and the number of customers. For a powerful and steady network connection to the outside world. + Quality network equipment and supplies: You cannot use the default WiFi Router offered by carriers since it is easily overwhelmed in a short period of time. Instead, organizations should employ specialist and respected market equipment like as Cisco, Draytek, Mikrotik, and others. Select the proper network equipment to help the system run more efficiently. 1.2.3. Operating principles of network divices and types of server and network software - Operating principles of network devices: + Repeater: is a signal amplifier that ensures the signal may be sent longer without being diminished. + A hub is a device that amplifies a signal and functions as a multi-port repeater. When one port on the hub receives information, it is instantaneously sent to the other ports. Popular Hubs are classified into two types: Smarthub and Active Hub + A bridge is a network device that links two small networks together to build a bigger network. Bridges function at the OSI network model's layer 2. Bridge, on the other hand, only links networks of the same kind, and utilizing them for high- speed networks will be more challenging if they are far away. resources. The configuration of the virtual server, which can be modified directly on the system management software, is very simple to upgrade or alter. However, modifying the virtual server's resources is dependent on and restricted by the actual server's resources.  Cloud server: is a server that combines several separate physical servers with a SAN storage system with exceptional access speed to let the server run rapidly, stably, and with minimal downtime. Because a cloud server is constructed on cloud computing technology, it is simple to upgrade any piece of equipment while in use without disrupting the server's operation.  Web server: is software and hardware that uses HTTP (Hypertext Transfer Protocol) and other protocols to respond to client requests made over the World Wide Web. The main job of a web server is to display website content through storing, processing and delivering webpages to users. Besides HTTP, web servers also support SMTP (Simple Mail Transfer Protocol) and FTP (File Transfer Protocol), used for email, file transfer and storage.  Proxy server: A proxy server acts as a gateway between you and the internet. It’s an intermediary server separating end users from the websites they browse. Proxy servers provide varying levels of functionality, security, and privacy depending on your use case, needs, or company policy.  Virtual machine (VM): As their name suggests, virtual machines store and connect data strictly through virtual space. To create a virtual machine, IT teams use a hypervisor, also known as a virtual machine monitor (VMM), which is software that can run thousands of virtual machines through only one piece of physical hardware. This method of server virtualization is widely used for data transfer and storage because they are the most cost-effective type of server to run.  File transfer protocol (FTP) server: FTP servers are used to relocate files from one computer to another. Uploaded files move from your computer to the server while downloaded files are extracted from the server onto your device. File transfer protocol also refers to the method of using a server to connect one computer to another in order to share data safely.  Application server: These servers connect clients to software applications through virtual server connections. This allows users to bypass downloading data to their own hardware in order to access applications. Application servers can effectively host large amounts of application data to many users at once, making them ideal for businesses.  File server: A file server stores data files for multiple users. They allow for faster data retrieval and saving or writing files to a computer. This is a basic type of server used commonly by organizations where lots of users need access to files that are more conveniently and safely stored on a server than a personal computer.  Database server: Database servers function as large storage spaces that organizations use and access to run multiple programs to meet their needs. A database server can run independently of any database architecture.  Mail server: A mail server stores and delivers mail for clients through email service platforms. Because mail servers are set up to continually connect to a network, individual users can access their email without running any systems through their own devices.  Print server: A print server connects remotely to local computers to print through a network. These servers give businesses the ability to use a single printer to serve an entire department. Some printers even come with their own built-in server ready to join a network once they're installed in an office area.  Domain name system (DNS) server: These servers transform readable computer domain names into computer language IP addresses. The DNS server takes search data from a user and finds the requested address to deliver to the client device.  Collboration server: When work needs to be shared across multiple users, a collaboration server makes it easy to connect. These servers allow you to share and store files, applications and other large amounts of data.  Game server: Large gaming networks use servers to connect users from around the world. These servers host multi-player online games.  Monitoring and management server: Monitoring and management servers function in several capacities. First, they record and track digital transactions and receive user requests. Others simply monitor and don't actively participate in user operations. Monitoring servers are responsive to network administrators who survey network health to check for threats or bugs in the system. - Network software: is a broad word for a variety of software that simplifies the operation, planning, monitoring, and deployment of computer networks. + Functions of network software  Administrators can add and delete users from the network using user management. This is especially useful when it comes to recruitment or decreasing costs.  Administrators can utilize file management to select where to store data and regulate who has access to it.  Access provides users with continuous access to network resources.  Administrators can use cybersecurity solutions to help secure and prevent data breaches. + Type of network software:  Network storage software  Data storage software  Patch management software  Security monitoring software  Property management software  Deployment and Migration Software  Printer and fax software  Network management software 2. Activity 2 2.1. Design the Local Area Network First, building A includes the sales office, the administration room, and the human resources department. The sales room needs printing so an additional printer will be placed in this room. The sales room has up to 20 PCs, but 1 switch only has 24 sockets, so a separate switch will be needed. The HR department also needs a printer to manage the data. Because the HR department and the admin room only have 10 PCs, 2 servers, and 1 printer, they will share one switch. Next, building B will place 1 router, 1 switch connected to the router, and 10 PCs connected to the switch. 2.2. The security and quality of service requirements required for the accessory selection - SSH (Safe Socket Shell) is a network protocol that allows for the secure establishment of network connections. SSH runs on the TCP/IP layered model's - POP3 (Post Office Protocol) is a one-way communication protocol between an email server and an email client such as Outlook or Thunderbird. The POP3 protocol works by contacting your email server account and downloading and storing locally on your computer any emails delivered to your Incoming Mail, consuming a fixed amount of storage space on your system. The emails are subsequently often erased from the email server; however, in the case of Outlook, there is an option to save the email. 2.3. Design a networked system to meet a certain specification 2.4. Provide an IP address allocation table for the network. (Separate IP reasonably) Device Inteface IP address Subnet Mask Vlan Default gateway R1 G0/0.10 192.168.10.1 255.255.255.0 -- -- G0/0.20 192.168.20.1 255.255.255.0 -- -- G0/0.30 192.168.30.1 255.255.255.0 -- -- G0/0.40 192.168.40.1 255.255.255.0 -- -- G0/1 192.168.50.1 255.255.255.0 -- -- R2 G0/0.1 192.168.1.1 255.255.255.0 -- -- G0/1 192.168.50.2 255.255.255.0 -- -- SW1 F0/2-22 -- -- 10 -- Vlan 10 192.168.10.10 0 255.255.255.0 10 192.168.10.1 SW2 F0/3-4, F0/9-12 -- -- 20 -- F0/7-8, F0/13-15 -- -- 30 -- F0/5-6 -- -- 40 -- Vlan 20 192.168.20.10 0 255.255.255.0 20 192.168.20.1 Vlan 30 192.168.30.10 0 255.255.255.0 30 192.168.30.1 Vlan 40 192.168.40.10 0 255.255.255.0 40 192.168.40.1 SW3 F0/2-13 -- -- 1 -- Server 0 Fa0 192.168.40.2 255.255.255.0 40 192.168.40.1 Server 1 Fa0 192.168.40.3 255.255.255.0 40 192.168.40.1 PC0 Fa0 192.168.10.9 255.255.255.0 10 192.168.10.1 PC1 Fa0 192.168.10.17 255.255.255.0 10 192.168.10.1 PC3 Fa0 192.168.20.2 255.255.255.0 20 192.168.20.1 PC25 Fa0 192.168.20.4 255.255.255.0 20 192.168.20.1 PC4 Fa0 192.168.30.3 255.255.255.0 30 192.168.30.1 PC5 Fa0 192.168.30.2 255.255.255.0 30 196.168.30.1 PC6 Fa0 192.168.1.3 255.255.255.0 1 192.168.1.1 PC7 Fa0 192.168.1.10 255.255.255.0 1 192.168.1.1 Printer 0 Fa0 192.168.20.3 255.255.255.0 20 192.168.20.1 Printer 1 Fa0 192.168.10.3 255.255.255.0 10 192.168.10.1 Printer 2 Fa0 192.168.1.11 255.255.255.0 1 192.168.1.1 2.5. Install and configure the network services and applications of your choice (Web, dns, mail, ...) ‘VM Management Radius EAP D1 top — ok Plane ont Gaby DNS Server 192.168.40.2 Start PAddress : [192 } [188 } [20 1G ] subnet ua [38 les |[es8 |f | acrosome =) TP ener wcaates Add J | Save J | Remove ] Pool Defautt DNS Sip’ Subnet Max = TFTP = WLC Name Gateway Server Address Mask User Server Address) sales 182.168.... 192.168... 182468... 255.255... 30 0.0.0.0 0.0.0.0 Buikting B 192.168... 192.168... 192.168. (255.255... 30 0.0.0.0 0.0.0.0 . 255.256... 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 B Serverd Physical Config Services Desktop DHCP wertce serie © On Oo sino deta DNS Server 192.168.40.2 Start PAddress : [192 | [tee | [20 \[2 ] ‘Subnet Mask: [255 | [285 | [258 | [o ] sem ntfs = | vrsene Radius EAP WLC Address: Ada || Seve || Remove Pool Default ‘DNS. Sar Subnet Max FTP: WLC Name Gateway Server Address Mask User Server Address) sales 192.168... 0.0.0.0 0.0.0.0 Building B 192.168... 30 0.0.0.0 0.0.0.0 AD 192.168... 30 0.0.0.0 0.0.0.0 0.0.00 00.0.0 1924 - 255.255... 255 0.0.0.0 0.0.0.0 Oop EMAIL ccna ‘SMTP Service POP3 Service DHCP DHEHNS: @on O oFF @w O ofr FTP. DNS: SYSLOG Domain Name ABA User Setup NTP User | ] Password | EMAIL — sieunhanGao ToT Seaman WM Management Radius EAP D1 top How to fix: Check the terminals and servers to ensure if the IP addresses of such devices are appropriately setup. + The router is not routing: It might be caused by forgetting or incorrectly forwarding the IP address range. How to fix: Check that the routers have routed to the right destination twice. + Have not installed trunk port between switches: omitted or installed the incorrect trunk port. How to fix: Verify that the enemy's trunk ports are accurate. + There is no routing between vlans: missed or configured the incorrect subnet mask, and network range. How to fix: Check and route between vlans with the right IP range and subnet mask. + The switch's default gateway has not been configured: forgot or installed incorrectly. How to fix: Reset the switch's default gateway path. - Is the information security system running well? If the user says no. We can provide some examples and workarounds for the following: Contact the respondent to questions about the issue and then give flexible remedies such as system security checks. moreover, we need to enhance the security system such as purchasing anti-virus software, utilizing MULTI- FACTOR AUTHENTICATION, using Network Security FIREWALL, and so on. - Are devices like printers running correctly? If the user says no. We must verify that the printer's connection address has been installed, and we must evaluate and propose that users improve their hardware setup to fulfill the requirements of the work. - Are the two server trees running properly and have a stable connection to the machines? If the user answers no. We need to evaluate the server system whether the server is out of memory, the server has a configuration or security problem, or the server has been hacked by hackers, thus we need to inspect the server's functioning. 2.7. Recommend maintenance schedule to support networked system. - In the context of the electronic computer industry, which is constantly evolving and bringing many benefits to consumers, network system maintenance, repair, and upgrading are critical. Consider the following advantages: + Increase work productivity: When using a network system, it is extremely beneficial to plan for maintenance in order to ensure that the system's documents and equipment are reviewed on a regular basis, detected immediately, and handled. timely. + Save time and money: Routine system maintenance will help you avoid having to repair your system when problems arise, as well as reduce the likelihood of problems occurring during use. + Optimization: You can always rely on the network to be up and running. makes it simple to link and organize documents so that you can easily access and retrieve information - When connected to the internet, devices are frequently attacked by viruses and attacks, making cybersecurity a top priority. Therefore, regular system monitoring and maintenance will allow you to detect threat actors early and take appropriate remedial steps. We can create quarterly maintenance plan, i.e. every three months, for all network equipment in BKACAD company. + Server upkeep: The server is considered the system's heart. It manages client connections and information sharing.  Check access rights (functions, scopes, limitations)  Check security, reconfigure security items (firewall, virus prevention ...)  Store important documents (accounting, office, import and export, customer documents ...)  Optimize storage (clean up, remove unnecessary software and documents) and optimize office software, anti-virus software  Check the operation of email, internet, printing systems... for work  Check the operating parameters of the server and back up the configuration  Record the data in the monitoring book (maintenance book) in accordance with the normal maintenance process of machinery and equipment. + Switch Maintenance: Essentially, a switch port creates an electronic tunnel between a source and its destination, where no other traffic can enter. Because of this, it is possible to have collision-free communication. However, if something goes wrong with the switches, communication may be interrupted. Networks need to be able to share information, and proper maintenance can help secure those connections. + Router Maintenance: With routers, or like the above devices, software and firmware are susceptible to damage if not maintained regularly. As part of your network maintenance plan, you should also check your hardware for any warning signs, like a clogged fan or overheating. And just like any other computer on your network, making sure that your device is always up to date with the right updates can save you from unexpected situations. PCO - a x Physical Config Desktop Programming Attributes - Ping to AD room Physical Config Desktop Programming tributes. — Peek) pronet tt Mae! - Ping to the printer in the sales room - Ping to the B building B® pco Cad dixem one piece Jong@emailcom ‘Sent : Sat Nov 12 2022 08:46:32 méira rap one piece d4y dixem khong Receiving mail from POP3 Server emailcom DNS resolving. Resolving name: email.com by querying to DNS Server: 192.168.40.2 DNS resolved ip address: 192.168.40.3 Receive Mail Success. Cancel Send/Receive OD top - Send an email to building A 3.3. Record test results and analyze these against expected results. Number What it being tested Test results Expected results 1 Ping in the same vlan complete complete 2 Ping other vlan complete complete 3 Ping to printer complete complete 4 Ping to Server complete complete 5 ssh to the router in the building A complete complete 6 ssh to the router in building B complete complete 7 Ssh to SW1, SW2, SW3 complete complete 8 Send an email to building B complete complete 9 Send an email to building A complete complete 3.4. Investigate what functions will allow the system to support device growth and the addition of communication devices. - Establish incident response and remediation capabilities. Check incident management plans. Train specialists and report incidents to law enforcement agencies. - Establish monitoring strategies and provide support policies. Maintain monitoring of all systems and networks. Analyze activity logs for anomalies. - Endpoint security establishes a layer of security between personal and business computing devices that help prevent attacks through intrusions from personal computers. - How it acts as a secure gateway between the enterprise network and the internet. Manage traffic, allow authorized access and prevent unauthorized access. III. Reference 7/7/2015 + Network principles + gov.uk + https://www.gov.uk/government/publications/network- principles/network-principles What Is a Network Protocol, and How Does It Work? + comptia + https://www.comptia.org/content/guides/what-is-a-network-protocol 15/9/2021 + SSH + vi.wikipedia.org + https://vi.wikipedia.org/wiki/SSH#:~:text=SSH%20(ti%E1%BA %BFng%20Anh%3A%20Secure%20Socket,k%C3%AAnh%20k%E1%BA%BFt%20n%E1%BB%91i%20ri %C3%AAng%20t%C6%B0. Network solutions + vietnetco.vn + https://vietnetco.vn/loi-ich-ung-dung-network-solutions/11271.html Indeed Editorial Team + 13/1/2021 + Types of Computer Servers and How They Function + indeed.com + https://www.indeed.com/career-advice/career-development/types-of-servers
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved