Q1:- Identify and explain the advantages of subnet?
Answer: A subnet is a logical grouping of network devices. which mention which hosts a part of a sub network number are come with the subnet is divided into their respective networks virtually defined sections allows the administrator to gain a lot of network subnets. When there as any organization network divided i nto subnets allows it to be connected to the Internet with a single shared network address. Subnets outside an organization can obtain multiple Internet Correspondence between subnet masks and IP address ranges defined mathematical formulas. Professionals use calculators subnet masks and mapping between addresses .. There are many advantages subnet are as follows.
Advantages of subnet :-
(1) Trouble shooting:- Troubleshooting is easier with the help of the network sub because it is easier to find a problem in a large network to small network.
(2) Security :- packets should be routed between subnets is that providing security to the network. By evaluating the security of network communication between network devices work the same for each additional user. Subnet sensitive resources, it is more difficult to implement security measures. It authorizes a different host or subnet firewall needs to be deployed, critical functions such as security measures to ensure that the firewall allows. These servers and other networks can be configured for other subnets can be accessed.
(3) Invisible to the public Internet: The implementation of the sub-networks so that the internal division of the network into subnets is only visible within the organization; organization to the rest of the Internet is still just one big, flat, Network.
(4) No Need To Request New IP Addresses...
... middle of paper ...
... Temporal Key Integrity Protocol (TKIP) to wrap in WEP encryption techniques and advanced security to overcome most of its weaknesses. That is why data privacy is possible with the help of WPA security.
Key management:- WPA is characterized by generation system / Key Management combines strong authentication and data privacy functions. Keys are created after successful authentication and through the subsequent four-way handshake between the station and the access point.
Data integrity:- TKIP includes a message integrity code at the end of each plain text message to ensure that counterfeiting messages. In WPA it includes encryption algorithms to give protection to the data, cryptographic integrity checks to prevent message modification and replay, and dynamic key management algorithms. WPA describes the new security association concept associated with 802.11.
10. The router line indicates to the client what its default gateway should be. The subnet mask line tells the client which subnet mask it should use.
Properly secure wireless systems: - To prevent data breaches it is very important to secure wireless networks. WI- Fi network security is necessary because it is very easy to hack the data and unauthorized access. Breaches can be prevented by using strong passwords, encryption methods, and strong verification.
The entire purpose of the Subnet Mask is to show the computer where to separate the IP Address into the Network ID and the Host ID. When read in Binary, a Subnet Mask will always be a string of 1's followed by a string of 0's. The 1's cover the Network ID while the 0's cover the Host ID. The IP Address is separated between the last 1 and the first 0.
Don't use default settings, obvious passwords or keys. Rotate your WEP keys oftenat least once per day or every 10,000 packets of information to foil hackers' efforts. Finally, monitor, monitor, monitor! Do not just turn your network on and assume it will always stay the same. Check and sniff your own network for APs you don't know about.
Moreover, VPN allows the creation a secure private network over a public network such as the Internet.
Wi-Fi facilitates ease of use and is getting increasingly popular with homes and businesses. Multiple Wi-Fi Access Points can be located in a given area. Wi-Fi security issues continue to be a problem, as the number of Access Points grows.
This proposal is for a small office that will have users who are connected by Wi-Fi or cable. The network will include devices and resources that is shared among all the users. The network will need to have security measures in place to protect the entire network and keep the wireless access secure and available only to employees of the company.
[4] W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, “A key management scheme for wireless sensor networks using deployment knowledge,” in Proc. 2004 IEEE INFOCOM, pp. 586–597.
The Internet consists of a three level hierarchy composed of backbone networks (e.g. ARPAnet, NSFNet, MILNET), mid-level networks, and stub networks. These include commercial (.com or .co), university (.ac or .edu) and other research networks (.org, .net) and military (.mil) networks and span many different physical networks around the world with various protocols, chiefly the Internet Protocol.
Description of an Intranet An Intranet provides the facilities and technology of the Internet, only on a private network. It works by connecting computers together and linking them via a communication tool called a protocol. The company's intranet will be kept private from certain users by means of software located on an intranet server called a Firewall. Therefore, Phone Ease can have complete control of what electronic based information is to be accessed by certain users.
Subnetting allows you to create multiple logical networks that exist within a single Class A, B, or C network. If you don't subnet, you will only be able to use one network from your Class A, B, or C network. Unless you have been assigned many major networks, you really need to subnet.
For thousands of years cryptography and encryption have been used to secure communication. Military communication has been the leader of the use of cryptography and the advancements. From the start of the internet there has been a greater need for the use of cryptography. The computer had been invented in the late 1960s but there was not a widespread market for the use of computers really until the late 1980s, where the World Wide Web was invented in 1989. This new method of communication has called for a large need for information security. The internet allows people to communicate sensitive information, and if received into the wrong hands can cause many problems for that person.
Corporate Networks in organisations can be complex structures that “requires a great deal of attention” (Clemm 2007). Even small companies can have quite complex networks that are a considerable investment to the business. The notion that corporate network management is a cost to a business rather than a continual beneficial investment is a naive assumption that requires further investigation to the benefits that network management brings. Clemm (Clemm 2007) states in his text that the ultimate goal of network management “is to reduce and minimize total cost of ownership”, improving operational efficiency and lowering cost. Clemm (Clemm 2007) also notes that “Network Management is not just related to cost and quality”, which will be an continual concept presented throughout the report. The report will address key issues with corporate network management and ultimately argue and justify that corporate network management must be seen as a positive benefit to the business and not as a continual expense. The supporting articles will also provide sound evidence that networking is crucial to a business’s processes and production which can be seen from the OpenSSL Heartbleed Security vulnerability fiasco (Nieva 2014) or the QANTAS Amadeus system failure (Heasley 2012).
Wi-Fi (Wireless Network) or 802.11 networking is a phenomenal way of providing Internet wirelessly at a low cost. Using radio waves, a wireless network connects a PC, mobile phone or just about anything that connects to the internet wirelessly by a router. By transmitting signals at 2.4 or 5 GHz it allows the waves to transmit more data at a faster rate. Typical Wi-Fi standards are 802.11a, b, g, n, or ac and they can switch up the frequency depending on the model (Brain). Families can create their own wireless network that can be shared between family members without the use of hooking all their devices up to the modem and can also protect their home network from potential hackers with the use of a TKIP or AES encryption. Businesses can also create a “hotspot” which is an area that has wireless networks for free or at a set fee. This is extremely convenient for commuters that need internet access while they are at work, waiting on a plane, or just sitting at a coffee spot without the need for wires(Cox).
LANs systems can be defined and connected in many different ways. This is the reason for the standardization for every one can have a common ground to start from. “The LANs described Herein are distinguished from other types of data networks in that they are optimized for a moderate size geographic area such as a single office building, warehouse, or a campus. The IEEE 802 LAN is a shared medium peer-to-peer communications network that broadcasts information for all stations to receive. As a consequence, it does not inherently provide privacy. The LAN enables stations to communicate directly using a common physical medium on a point-to-point basis without any intermediate switching node being required. There is always need for an access sublayer in order to arbitrate to access to the shared medium. The network is generally owned, used, and operated by a single organization. This is in contrast to Wide Area Networks (WANs) that interconnect communication facilities in different parts of a country or are used as a public utility. These LANs are also different from networks, such as backplane buses, that are optimized for the interconnection of devices on a desk top or components within a single piece of equipment.”(IEEE 802 Standard 1990) That is the standard definition for LANs by Institute of Electrical and Electronics Engineer committee 802. They are the committee used to set the standard in workmanship and operations for technicians that set-up and perform maintenance on LANs systems. And through all the technical words what they are trying to say is a LAN is a small area network that distributes information among computer in a small work environment unlike WANs that distribute information across global areas.