StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Data communications and Network Fundamental - Assignment Example

Cite this document
Summary
Now Brilliant Boats has a Windows 2000/3 LAN and has recently installed an intranet. The intranet is fire-wall protected to ensure that competitors can not gain access to its confidential designs. Access to the intranet, via a web browser varies depending on employee jobs…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.3% of users find it useful
Data communications and Network Fundamental
Read Text Preview

Extract of sample "Data communications and Network Fundamental"

Download file to see previous pages

The existing situation in the company's network infrastructure does not allow achieving best performance and security that are necessary at current stage of its development. Virtual Private Network technology should be used in Brilliant Boats network infrastructure to solve a number of issues, such as remote access over the Internet, connecting computers over an intranet and connecting networks over the Internet. VPNs provide remote access to Brilliant Boats' resources over the public Internet to most important clients, while maintaining privacy of information.

Rather than making a long distance (or 1-800) call to Brilliant Boats or outsourced network access server (NAS), the client may dial a local ISP. Using the connection to the local ISP, the VPN client creates a VPN connection between the remote access computer and the Brilliant Boats' VPN server across the Internet. VPNs allow the sales department's LAN to be physically connected to the Brilliant Boats' intranet but separated by a VPN server. The VPN server is not acting as a router between the Brilliant Boats' intranet and the sales department LAN.

A router would connect the two networks, allowing everyone access to the sensitive LAN. By using a VPN server, the network administrator can ensure that only those users on the Brilliant Boats' intranet who have appropriate credentials can establish a VPN connection with the VPN server and gain access to the protected resources of the sales department. Additionally, all communication across the VPN can be encrypted for data confidentiality. Those users who do not have the proper credentials cannot view the sales department LAN.

Connecting Networks over the InternetThere are two methods for using VPNs to connect local area networks at remote sites:Using dedicated lines to connect a branch or client office to Brilliant Boats' LAN. Using a dial-up line to connect a branch or client office to the Internet. The VPN client uses the connection to the local ISP to create a VPN connection between the branch office router and the Brilliant Boats' corporate hub router across the Internet. This is known as a site-to-site VPN connection.

In both cases, the facilities that connect the branch office and Brilliant Boats' corporate office to the Internet are local. The Brilliant Boats' corporate hub router that acts as a VPN server must be connected to a local ISP with a dedicated line. This VPN server must be listening 24 hours a day for incoming VPN traffic. 3. Introducing VPNA virtual private network (VPN) is the extension of a private network that encompasses links across shared or public networks like the Internet. A VPN enables you to send data between two

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Data communications and Network Fundamental Assignment”, n.d.)
Data communications and Network Fundamental Assignment. Retrieved from https://studentshare.org/technology/1526172-data-communications-and-network-fundamental
(Data Communications and Network Fundamental Assignment)
Data Communications and Network Fundamental Assignment. https://studentshare.org/technology/1526172-data-communications-and-network-fundamental.
“Data Communications and Network Fundamental Assignment”, n.d. https://studentshare.org/technology/1526172-data-communications-and-network-fundamental.
  • Cited: 0 times

CHECK THESE SAMPLES OF Data communications and Network Fundamental

The Mobile Communication Principles and Cellular System

In a mobile cellular network, mobile/cells are normally planned in set/groups of 7 to form or build a cluster.... The aim of this research is to discuss and provide a detailed analysis of the new cellular telephony technology, mobile communication principles, cellular system architectures, and cellular system components that participate in establishing cellular mobile communications.... In addition, it has conventionally been shared by different industries, such as mobile communications, broadcasting and the military....
7 Pages (1750 words) Research Proposal

Network and Transport Layers

It is hereby fundamental that all the NDA staff members do their best in comprehending the key concepts behind data communication).... This makes it fundamental that NDA put the need for integration of nCompass in its day-to-day data communication operations.... This essay "network and Transport Layers" focuses on the delivery of a quality training session necessary for enhancing employee knowledge on the subject of the network....
3 Pages (750 words) Essay

Security Solutions for Mobile Ad-hoc Networks Including the Development of IDS

The paper "Security Solutions for Mobile Ad-hoc Networks Including the Development of IDS" states that mobile ad hoc networks have the capability to establish networks on the air in possible harsh situations where is not possible to set-up customary network arrangements.... This paper has outlined the security needs for the MANET communication network.... The diverse issues obviously formulate a situation for developing multi-fence safety answers that attain both wide security as well as enviable network performance (Yang, Luo, Ye, lLu, & Zhang, 2004) and (Nash, 2000)....
15 Pages (3750 words) Research Paper

Living in a Network-Centric World

The study "Living in a network-Centric World" focuses on the critical analysis of the peculiarities of a new dimension of living in a network-centric world.... nbsp;The world has become a global village due to the introduction of data networks, especially the Internet.... hellip; There are numerous advancements in the computers and data networks and their impact on communication, which are the outcomes of solid-state technology and the advent of large-scale integration (Bertsekas & Gallager, 1992)....
5 Pages (1250 words) Case Study

Basic Concepts of Checksum or CRC Integrity Checks

his is blocking socket as it waits for the response of the network before returning.... The likely causesThe new Wiki software has caused network intrusion leading to the breach of security.... The management should uninstall the software since it is causing network problems.... This technology can fundamentally allow for the division of networks into three components—the network, subnet address, and host.... It can cut down on network traffic because broadcasting to hosts becomes restrained to individual subnets....
6 Pages (1500 words) Assignment

Data Communications and Network

This report "data communications and network" presents a network that can be defined as a set of interconnected computers together for the main purpose and objective of sharing data.... hellip; Distributed systems, as well as network systems, only function if the interconnection between the networked devices is reliable.... This means the network must be fault-tolerant and resilient.... Therefore, the power or strength of a reliable network includes resiliency, and the backbone being the availability of the cost-effective redundancy of good design....
8 Pages (2000 words) Report

Applied Data Communications and Networks by Buchanan

… The paper “Applied data communications and Networks by Buchanan”  is a great example book review on information technology.... The paper “Applied data communications and Networks by Buchanan”  is a great example book review on information technology.... A computer network is the connection of a group of computers together with the motive of data and information sharing.... Computer network topology, therefore, is the manner in which individual computers connect, including the devices and the nodes used....
8 Pages (2000 words) Book Report/Review

Information Security Management

Pay attention to The network security element of subnetting improves security by way of splitting an Internet Protocol or IP address anywhere within its 4-byte (or 32-bit) address.... Also called subnet addressing, this technology can fundamentally allow for the division of networks into three components—the network, subnet address, and host.... It can cut down on network traffic because broadcasting to hosts becomes restrained to individual subnets....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us