Preview

Unit 3 Assignment 3 Chris Wiginton

Satisfactory Essays
Open Document
Open Document
522 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 3 Assignment 3 Chris Wiginton
Chris Wiginton
1/10/14
IS-3120 Unit 3 Assignment 3

Convergence of IP-Based Networks

In the early days of the Internet, the only way to connect to the Web was by using a modem in conjunction with a dial-up connection. The modems, which stand for modulator-demodulator, were devices that converted analog signals into digital signals. Early modems operated at 1200 bps or bit/s per second to 2400 bps. Data transfer was slow and often unreliable.
Today the Internet and the means to access the Internet has changed radically from the days of the modem. We now use lightning fast networks that include broadband, T1, satellite and digital wireless connections. The modernization of network technology has enabled the invention of cell phones, and other devices that allow users to access the Web and other networks from almost anywhere in the world and beyond.
The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.
A converged network has many of the same risks and susceptibility to threats as you might find if you were dealing with two separate networks. Denial of Service attacks against banks data storage servers could cause a lot of harm and potentially cause the loss of millions of dollars, Identification theft or loss of confidence for the organization. Converged networks place more information and resources in line with each other than would be found in having separate networks for each network needed to operate a company. This just means IT managers have to place all safeguards in one place.
Wireless or mobile technology has added another

You May Also Find These Documents Helpful

  • Good Essays

    In order to provide speed and reliability, large and enterprise-level networks today are typically constructed in multiple layers. They are the access layer, also called the network edge layer, the aggregation or distribution layer; and the network core layer. The access layer is usually a mesh of network switches, linked to other switches in the aggregation layer, which in turn is linked to the core.…

    • 681 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 3 assignment 1

    • 479 Words
    • 2 Pages

    The purpose of this policy is to define standards for connecting to Richman Investments network from any host. These standards are designed to minimize the potential exposure to Richman Investments from damages which may result from unauthorized use of Richman Investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman Investments internal systems, etc.…

    • 479 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 3 Assignment 1

    • 375 Words
    • 2 Pages

    1. Research the following organizations and explain their involvement with the Internet public IP addresses:…

    • 375 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The Internet has been designed as a ‘pool of endless information’ for anyone who has access. With its introduction in the mid 1990’s, it has vastly changed the way we do business, obtain all kinds of data and the way we communicate in the world today. With its sheer potential, we have created the most powerful tool of our modern day technology. In a series of memos that were first written in 1962, by an MIT expert of the name of J.C.R Licklider, he had envisioned a type of ‘network’ in which a set of computers were globally interconnected in sharing information and anyone could access data from anyone of these terminals (Leiner, Cerf, Kahn & Clark, 1962-1974).…

    • 1786 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Networks have become more vulnerable because of fundamental shifts in the complexity and proliferation of personal and business applications, user access, and behavior, as well as the new threat landscape, leading organizations to rethink their network security strategy.…

    • 2498 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Disadvantages- One of the biggest disadvantages is that is creates a single point of failure. Take a sales company for instance. If the internet were to go down, they could still pick up the phone and make sales calls. Converged networks have the cumulative effect of introducing a new risk to data assets that did not exist in the old world of network stovepipes: a “monolithic point of failure”. This is distinct from a “single point of failure”, which indicates a point in an application, system or process where a collapse impacts that particular application system or process. A monolithic point of failure has impacts spreading far beyond a given application, system or process; everything is impacted: data, voice, remote monitoring, manufacturing, and access control. Formerly, one communications system may have been largely unaffected by a failure in another network; for example, the LAN drops so people pick up the phone. Under convergence, a…

    • 827 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The power of the internet has broadened over the years since it has distended to include the internet connected devices. Most of homes, schools and even mobile phones today have already internet connectivity.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Research Paper on Ns2

    • 2840 Words
    • 12 Pages

    Computer and network technology provide convenience to the people, but at the same time, security problems have emerged and become more and more serious. With the increasing popularity of computer applications, in particular, the rapid development of network technology, more and more security threat have appeared and information security has become a very important and urgent issue to be solved. Network information security has become the fifth security…

    • 2840 Words
    • 12 Pages
    Satisfactory Essays
  • Good Essays

    Issues of convenience drive the popularization of new methods of electronic communication. As telephones and fax machines were supplemented by the Internet and cell phones, communication became faster and more readily available. The Internet is notable for allowing the transmission of visual data, as well as text and voice, nearly instantly. The amount of information available on the Internet continues to grow as users create and maintain content that exists side by side with professionally produced content. Broadband connections are made available in even developing countries and wireless technology makes the Internet available in places never thought possible.…

    • 770 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Early History

    • 460 Words
    • 2 Pages

    After the first fax transmission in 1962, the modulation of data into sound for transmission across telephone lines spread in popularity for several years. Though modulation/demodulation, or modem, technology continued to carry slower data traffic for the remainder of the 20th century, according to the History of Computing, the 1969 development of Internet Protocol (IP) marked a significant milestone in data communication history. Within the following decades, early packet communication technologies like Asynchronous Transfer Mode (ATM), Frame Relay and Integrated Services Digital Network (ISDN) emerged as a viable solution for commercial and high-end residential data needs. By 1991, more than 1 million servers had come online using Internet Protocol technology, and the World Wide Web emerged as the primary component of the Internet by the mid-1990s.…

    • 460 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Living in the modern era there’s no rejection that the world is getting modernized day by day in every aspect of life. Technology has taken over our lives and has become one of the basic necessities. One of them is Internet.…

    • 1475 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    We access the Internet in many ways; mainly through computers and our phones. “Residential broadband subscriptions among American households overall grew sevenfold between 2001 and 2009. It found that the percentage of households that connect to the Internet using broadband grew to 63.5 percent in 2009 from 9.2 percent in 2001, reflecting increases across nearly all demographics. The report -- prepared by the Commerce Department 's National Telecommunications and Information Administration and the Economics and Statistics Administration -- is based on a Census survey of about 54,000 households conducted in October 2009.” (Tessler, 2010)…

    • 1480 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Network Security

    • 4030 Words
    • 17 Pages

    I am commissioned by a nationwide firm of lawyers and accountants to perform such a challenging task. The firm has its Head office in Manchester and a branch office in Glasgow. My job is to produce a consultation report to connect both of their sites together using an appropriate WAN technology and then specify and design their “network security provision”. In this report I am going to discuss different WAN technologies and will select the best among them i.e. IP VPN to connect our network sites together. Based on the diagrams provided for the planes of two sites I will identify the areas of security weaknesses and risks and will recommend the necessary solutions to overcome those weaknesses. I will then present techniques to prevent our network from several viruses and malicious softwares that could destroy our network. I will suggest some necessary actions to be carried out in order to strengthen the security of our network. Finally I will enlighten the role of switches in securing networks and will explain the role of “IEEE 802.1x protocol” in our “network security provision”. Keeping in mind all the above key factors I will produce a complete report of “network security provision” for the lawyers and accountants firm that will gain their entire satisfaction.…

    • 4030 Words
    • 17 Pages
    Best Essays
  • Satisfactory Essays

    mass media

    • 358 Words
    • 2 Pages

    Nowadays the most popular Internet service is e-mail. Most of the people use the network only for sending and receiving e-mail messages. But now you can work through the internet, play games, read books, learn languages, watch films, TV programs.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays