logo

Computer Network

   

Added on  2022-12-27

8 Pages1520 Words471 Views
Running head: COMPUTER NETWORK
COMPUTER NETWORK
Name of student
Name of university
Author’s note:

1
COMPUTER NETWORK
Table of Contents
Task 1:............................................................................................................................2
Task 2:............................................................................................................................2
Task 3:............................................................................................................................3
Task 4:............................................................................................................................3
Task 5:............................................................................................................................4
References......................................................................................................................6

2
COMPUTER NETWORK
Task 1:
The ACL could be used by the organisation for the isolation of the network traffic.
The ACL or Access Control List along with the detail to any file system of computer could
be described as the categories of the authorisations that are involved to any object (Bayesteh
et al. 2014). Any ACL specifies the major system processes or users that are allowed access
to the matters, and whatever kind of operation are permitted on any provided objects. For
each of the entry in any common ACL states any subject as well as the operation. Within
some kinds of the exclusive computer hardware, the access control list offers the rules, which
could be functional to the IP addresses or port numbers that are accessible on any layer 3 or
majorly the host and individually with the categories of the hosts or the networks that have
the permission of using the service (Setapa and Suhilah 2014). Even though it is furthermore
possible for configuring the access control lists founded on the domain names in the network
and this is the questionable idea due to the fact that the individual UDP, TCP as well as the
ICMP headers does not contain the names of domain.
Task 2:
The VLAN could be used for the retain the internet access in the network. The Virtual
LAN could be described as the concept where the devices could be divided logically on the
layer 2 (Liyanage and Gurtov 2014). Commonly the layer 3 devices majorly divides the
broadcast domain but the division of the broadcast domain could be done by the switches by
the proper utilisation of the VLAN. The domain of broadcast is the segment of the network in
which if any devices executes the broadcasting of any packet then all device within the
similar broadcast would receive it. The devices within the similar broadcast domain would
receive majority of the broadcast packet but it is restricted to the switches solely as the
routers does not forward out the broadcast packet (Wang et al. 2014). For the forwarding of

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Wireless: WLAN Tools, Packet Capture, and Wireless Technologies
|16
|2601
|65

Networking Technologies
|7
|974
|32

Networking: Layering, Limiting, Diversity, Obscurity, Simplicity
|6
|1081
|338

Wireshark Network Traffic Analysis
|9
|1507
|432

Network and Computer Security
|14
|2411
|68

Secure Network Operations | Assignment
|5
|1098
|10