Thursday, May 9, 2019

Network Security and the Demilitarized Zone Coursework

net profit Security and the Demilitarized Zone - Coursework ExampleThe researcher states that the disadvantages associated with DMZ argon not significant, but one douse can be highlighted, as the segregation may create a hassle for the network face because DMZ requires frequent updates and maintenance. Moreover, the hardw are cost is high and requires dedicated hardware in order to apparatus DMZ within the network. Deployment includes a switch, separate firewall, and IDS etc. The most significant advantage that is shared by both of these technologies is communication. However, intranet provides limited communication as compared to the extranet, but it is still effective. In order to implement the intranet, local anesthetic area network and a host is required. The network must adhere to the requirements of the intranet application. Moreover, the application go away be deployed on a separate workstation called as a host or server. The star topology is recommended for intranet-base d networks as the network administrator can manage and administer intranet issues in a centralized environment. Furthermore, the presence of the intranet will enable new trends for communication. For example, paperless communication between employees, chatting, e-mails and blogs etc. disadvantage includes maintenance and security issues. Hardware requirements for an extranet are similar, except Extranet provides a wide coverage for employees, who want to work from home, or communicate while traveling. However, in order to provide or publish contents on the Internet, certain advanced protocols are required. For instance, VPN is a secure choice. Accordingly, due to its broad functionality, security issues are also more as compared to the intranet. Network manner of speaking translation is defined as An Internet protocol that allows individual sites to sup mien more IP hosts than the enumerate of IP addresses assigned to it. This is done using special Internet addresses that have bee n reserved for this purpose. These special addresses are invalid on the Internet itself. The hosts using these addresses may communicate among themselves, but they cannot access the Internet instanter (Campus infrastructure guidelines). NAT translates private IP addresses into global IP addresses, making it simple for the network administrator, as additive changes are required without modifying host and routers. Moreover, the disadvantage NAT has is that it is slow because each packet is processed, prior to the decision of translating it or not. IP traceability also becomes difficult as data packets are difficult to trace. Tunneling is also called as manner forwarding. Port forwarding is configured for a secure channel within the medium or incorporated networks. One way of implementing a tunneling protocol is to configure a DSL modem by defining the look number that is allocated for using specific service. For instance, in order to access remote desktop via port forwarding, por t number 3389 and RDP service is defined in the router against the IP address of the workstation on which the service needs to be executed. A popular tunneling protocol developed by Microsoft is known as Point to Point Tunneling communications protocol (PPTP).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.