Network Essays

The Difference Between Obscene and Indecent Materials

Obscene material, “is not protected by the First Amendment,” (361) to the Constitution and cannot be broadcast at any time. On the other hand, indecent material is protected by the First Amendment and cannot be banned entirely. It may, however, be restricted in order to avoid its broadcast during times of the day when there is a reasonable risk that children may be in the audience. According to the U.S. Supreme Court, to be obscene, material must meet a three-prong…

Read >>

Acme Manufacturing Wan Design

Acme Manufacturing is a growing company that is headquartered in Atlanta, Georgia. Recently the company has acquired a manufacturing plant in China and multiple offices in the United States. Acme is now in need of a WAN solution to connect their many offices. All new equipment will be used to build the LANs at the offices. Then the LANs will be connected to the WAN to allow for easier communication and data transfer between the offices. The headquarters in Atlanta,…

Read >>

Hardware Vs Software Routing

A router can be defined as a device that connects two or more than two computer networks and selectively exchanges packets of data among them. Every packet data encompasses address information that a router can use to find out whether the destination and source are on the same network, or if the packet data must be transmitted from one network to another. Through projecting routing needs and network traffic centered on the types and number of applications and hardware devices…

Read >>

Internet Protocol Version 4 (ipv4) Security

IPv4 is an end-to-end network model that supports the multicast operation. Multicast operations or communications involve information transfer from one node in as single transmission to multiple receivers within the network. Moreover, it facilitates the broadcasting of multimedia information like videos and audio teleconferences. IPv4 utilizes MAC addresses and IP addresses to send data packets within and outside the Local Area Network respectively. For security purposes, routers are used in the interconnection of multiple networks to map the IP addresses…

Read >>

Wireless Radio Signals

Coverage area: The space in which the wireless radio signals in one wireless LAN can effectively reach and be used to send and receive data between the WLAN’s APs and its clients. Shared bandwidth: A term referring to how some networks must share the right to send data by taking turns, which limits the total number of bits sent by all devices (the network’s total capacity). Wi-Fi: A term created by the Wi-Fi Alliance as part of its overall wireless…

Read >>

Communication Cost

In some cases, the commercial cost of data transmission may be more important the time cost. Commercial organisations often prefer to transmit data over low capacity lines which they own as opposed to using public, high capacity lines that have usage charges. The routing algorithms do not have to use just one metric to determine the optimum route; rather it is possible to choose the optimum route based on multiple metrics. In order for the optimum path to be chosen…

Read >>

Router and Switch Configuration

When installing, setting, and configuring a switch it is important to know what kind of switch is needed and installed in the network. For this purpose I have chosen the Cisco switches main line, which is the Catalyst Switches, which is one of the popular series and models. They include fixed-configuration desktop models, configurable plug-and-play modular chassis models and packages with high-speed buses into which many cards can be inserted. To configure the Cisco Catalyst switch I will use the…

Read >>

Snort and Wireshark

1. When running Snort IDS why might there be no alerts? There are couple reasons when running Snort IDS there might be no alerts. The first one could be related to settings because the administrator has to set Snort IDS to its optimum settings in order to get any alerts. Since Snort works by ruleset, it can be mistakenly set up to a port other than what the network is using. The mistake can be done by either keeping the…

Read >>

Network Protocols and Applications

Introduction Information technology is a tool that enables information transfer between premises in a network. The benefits of such technology are unquestionably important as it helps a company to manage their resources efficiently and lessen the decision making process. Furthermore, information technology (IT), a network design plays important role in determining a success of transmitting information. Since network design is essential, Dennis (2002) suggests that there are three basic network designs that any network designers should take into account; they…

Read >>

How Interconnected Networks Work

The concept of interconnecting networks entails ensuring that the set network structures enables communication and flow of information based on the way in which the network structure is organized. The working of interconnected networks involves integration of diverse network protocols and procedures (Battista, Patrignani, and Pizzonia 2003). Working of Interconnected Networks Domain name services, internet protocols, routers, and switches are some of the network protocols which are normally utilized when interconnecting protocols. According to William (1992, pp. 190-205), when interconnecting…

Read >>

Integrating School Safety Data for the Purpose of Safe School Program Evaluation

Abstract This paper addresses the issue of school safety and what should be done to enhance it. The need for all stakeholders; the government, the school administrations and community to facilitate safe school planning and thus essentially enhance school safety are equally taken into consideration. The paper further provides some of the indicators that are considered while implementing an effective safe school plan and how to assess and evaluate the proven programs. This in essence, provides a general picture of…

Read >>

Ip Address Schema Design for a Medium Sized Business

IP Address Schema Design for a Medium-Sized Business The following IP schema is designed to fit the needs of the Warehouse Company. The company has purchased and installed all of the required equipment for the network infrastructure. After consulting with their design team and gathering the required documentation and network designs, we are ready to proceed. The network design requires an IP schema that will minimize the cost of public IP addresses. Due to this requirement we will use a…

Read >>

Incident Response

Any network can be subjected to security compromise. There is no amount of coding or access control that can ultimately prevent an attack to a network. However, there is a need for any organization to ensure that their networks are safe and their incidence responses are effective. There are many tactics and tools that are employed by attackers to evade any detection by the investigation or incidence response teams, remain anonymous and to avoid attracting any attention by looking like…

Read >>

Encryption and Network Security

Honeynets: Observing Hackers’ Tools, Tactics and Motives in a Controlled Environment Solutions to hacker attacks are usually fixes that are developed when damage has been done. Honeynets were solely developed to catch and monitor threats (i. e. a probe, scan or attack). They are designed to gather extensive data about the threats. These data are then interpreted and used for the development of new tools to prevent actual damages to computer systems. Talabis defines a honeynet as a network of…

Read >>

Network Design Plan Review of Related Study

The literature review is about the study of the network design of the Department of the Interior and Local Government, wherein there are different networks or technologies to be used and the security purposes of the office. This review also includes the possible devices to be used, according to our client it is convenient of any devices the important thing is that traffic within every department and also from the regional offices must be prevented. There must be a Quality…

Read >>