Tuesday, February 4, 2020
Business technology 250 Assignment Example | Topics and Well Written Essays - 2000 words
Business technology 250 - Assignment Example The NIC allows a computing device to connect to a particular network. The network controller provides the hardware and circuitry needed to relay messages on a particular type of data link layer standard. Of these standards Ethernet has gained significant popularity and is widely used across the globe. It is for this purpose Ethernet enabled NIC would be made use of (Posey 2006). Wireless access point (WAP): Wireless access point is basically a device that allows wireless devices such as Smartphones, tablet PCs and Laptops to gain access to wired networks via some standard (Enterasys 2013). Through access point a number of devices are able to use the services of a network without the use of additional wiring. A WLAN controller is used to help manage Wireless access points within an office or a particular area (Enterasys 2013). DSL (asymmetric digital subscriber line) Modem: ADSL technology enables the transmission of data at a faster rate than traditional modems. The transmission medi um in both types of modems is the same that is copper telephone lines. The frequencies used by ADSL are different from those that are used during a telephone call. A device known as DSL filter allows the division of a telephone connection for the purposes of ADSL services and voice calls (ANSI 1998). Switch: A network switch is a device that is used to connect two or more than two devices with each other. In some cases a switch is used to connect two different sections of a network (Kohlhepp 2000). Switches are mainly used in those network areas where great emphasis is placed on the performance of the network and its security. Some vendors of switches provide firewall protection and network intrusion detection along with the switch to enhance its performance (Kohlhepp 2000). Gateway: A gateway is a computational system that has the capability to link two different networks that make use of different communication protocol. A gateway can comprise of hardware components, software comp onents or a combination of both. Unlike the switch a gateway tends to operate at any layer of the OSI model. The layer at which the gateway operates depends on the type of protocol being used (Allen-Bradley 2013). VPN software: VPN software helps establish the process of tunneling. VPN tunneling is a technology that allows users to create and manage logical network connections (Bender 2010). Through tunneling packets that are created in a certain VPN are encoded with a certain carrier protocol which is decoded only at the receiving end. Through tunneling certain threats and attacks can be averted and the security of the network can be strengthened (Bender 2010). Architecture of the system: Architecture in computers refers to the process of designing the structure of a computer system, microprocessor or even a program of a system. The architecture that is required in the case scenario can be divided into three main blocks of network foundation, network services and user services. Net work foundation: Like the foundation of a building the network foundation is considered as a building block on which the infrastructure and the rest of the services rely on (Cisco 2012). The network foundation ensures that information is easily transported from one location to the other without any hindrance. The network foun
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.