Network Security: Remote Access, Interconnecting Devices, and WAN Technologies
VerifiedAdded on 2023/06/07
|9
|1459
|154
AI Summary
This article discusses remote access technologies such as RDP, VPN, and cloud storage, interconnecting devices like repeaters, hubs, and bridges, and WAN technologies like point-to-point link, circuit switching, and packet switching. It also explores how FNU can benefit from these technologies to improve network security and provide better facilities to staff and students.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: NETWORK SECURITY
NETWORK SECURITY
Name of student:
Name of university:
Author’s note:
NETWORK SECURITY
Name of student:
Name of university:
Author’s note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1NETWORK SECURITY
Remote access technologies
Redesigning of the current network at the FNU can be executed by the use of Remote
desktop protocol, virtual private network and cloud storage facility. Technologies for remote
access are of various kinds including cloud computing. The most commonly used remote
access technologies are:
1. Remote desktop protocol: RDP assists users by providing control to the client
system supervisors for accessing mutual files, printers that are connected locally or
over the network, and several other devices. RDP provides support on both server
and client for security in transport layer (TLS) 1.0. This protocol is considered to be
very secure as it has 128-bit encryption using an RC4 encryption (Ku et al. 2016).
2. Virtual private Networks: VPNs or Virtual Private Networks regularly secure the
data of a corporation using firewalls and encrypted data. VPN is used to make all the
functionality available to the local user with access to the central system of an
organisation network (Kaur 2017). The office capabilities for the FNU like sharing
of files, scanners and printers access, password-protected access to files, websites
and intranets, and logons to organisation management systems can be accomplished
remotely. The main objective of enabling remote access technologies in the system
of an organisation is to implement maximum functionality and security. A private
and secure network for the faculty and the students of FNU can be provided by this
network. The information required by any user can be accessed easily and the threat
of data theft can be minimised by the application of virtual private network.
3. Cloud storage: All the data of an organisation can be stored in a single database
known as cloud storage. Cloud provides better security to the information and data
of the organisation and it can be accessed with proper authentication from anywhere
Remote access technologies
Redesigning of the current network at the FNU can be executed by the use of Remote
desktop protocol, virtual private network and cloud storage facility. Technologies for remote
access are of various kinds including cloud computing. The most commonly used remote
access technologies are:
1. Remote desktop protocol: RDP assists users by providing control to the client
system supervisors for accessing mutual files, printers that are connected locally or
over the network, and several other devices. RDP provides support on both server
and client for security in transport layer (TLS) 1.0. This protocol is considered to be
very secure as it has 128-bit encryption using an RC4 encryption (Ku et al. 2016).
2. Virtual private Networks: VPNs or Virtual Private Networks regularly secure the
data of a corporation using firewalls and encrypted data. VPN is used to make all the
functionality available to the local user with access to the central system of an
organisation network (Kaur 2017). The office capabilities for the FNU like sharing
of files, scanners and printers access, password-protected access to files, websites
and intranets, and logons to organisation management systems can be accomplished
remotely. The main objective of enabling remote access technologies in the system
of an organisation is to implement maximum functionality and security. A private
and secure network for the faculty and the students of FNU can be provided by this
network. The information required by any user can be accessed easily and the threat
of data theft can be minimised by the application of virtual private network.
3. Cloud storage: All the data of an organisation can be stored in a single database
known as cloud storage. Cloud provides better security to the information and data
of the organisation and it can be accessed with proper authentication from anywhere
2NETWORK SECURITY
with the internet technology. This method is most effective method of implementing
remote access in an organisation. The important records and files are updated
regularly in the cloud and in the case of data loss or theft of data, the backup of these
files can be easily restored (Yang et al. 2013). This is essential for storing all the data
of FNU in a centralised storage facility with maximum security and protection. Data
backup canbe achieved easily with the introduction of cloud storage in the network
of FNU.
with the internet technology. This method is most effective method of implementing
remote access in an organisation. The important records and files are updated
regularly in the cloud and in the case of data loss or theft of data, the backup of these
files can be easily restored (Yang et al. 2013). This is essential for storing all the data
of FNU in a centralised storage facility with maximum security and protection. Data
backup canbe achieved easily with the introduction of cloud storage in the network
of FNU.
3NETWORK SECURITY
Organization wide interconnecting Devices
The intention of the senior management of FNU to increase the production and the
idea provided by the IT department of the FNU is to provide better facilities to the staff and
student using wireless connection. Interconnection devices are generally used to setup a
network in an organization. These devices enables the users in an organization to
communicate easily and efficiently. Some of these network interconnection devices are as
follows:
1. Repeater: When a signal travels through a transmission medium, there is always a
possibility of loss of data due to attenuation. The function of a repeater is to take a
signal, regenerate that signal and retransmit through the transmission medium. The
length of a network is extended by connecting two or more network segments using a
repeater. Several media types can be connected and several bridge segments with
various data rates can be linked using a repeater.
2. Hub: A hub receives signals one end and retransmit those signals through various
ends. Hub is commonly employed by the organisations with network design of star
topology. Additionally, hub introduces fault tolerance at a significant degree as each
device in the network is connected independently to the hub and if any fault occurs in
any of the devices, the other network devices are not affected.
3. Bridge: It is used to connect similar types of LAN segments in a network. Bridges are
similar to hub except that bridges help in extending the capacity of a network as every
port has its individual MAC address on a bridge. Bridges have the ability to identify
and learn about the network topology with the help of analysis of address of the
source of the incoming frames from all network segments that are attached to the
network (Ahn and Hong 2013).
Organization wide interconnecting Devices
The intention of the senior management of FNU to increase the production and the
idea provided by the IT department of the FNU is to provide better facilities to the staff and
student using wireless connection. Interconnection devices are generally used to setup a
network in an organization. These devices enables the users in an organization to
communicate easily and efficiently. Some of these network interconnection devices are as
follows:
1. Repeater: When a signal travels through a transmission medium, there is always a
possibility of loss of data due to attenuation. The function of a repeater is to take a
signal, regenerate that signal and retransmit through the transmission medium. The
length of a network is extended by connecting two or more network segments using a
repeater. Several media types can be connected and several bridge segments with
various data rates can be linked using a repeater.
2. Hub: A hub receives signals one end and retransmit those signals through various
ends. Hub is commonly employed by the organisations with network design of star
topology. Additionally, hub introduces fault tolerance at a significant degree as each
device in the network is connected independently to the hub and if any fault occurs in
any of the devices, the other network devices are not affected.
3. Bridge: It is used to connect similar types of LAN segments in a network. Bridges are
similar to hub except that bridges help in extending the capacity of a network as every
port has its individual MAC address on a bridge. Bridges have the ability to identify
and learn about the network topology with the help of analysis of address of the
source of the incoming frames from all network segments that are attached to the
network (Ahn and Hong 2013).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4NETWORK SECURITY
5NETWORK SECURITY
WAN Technologies
WAN is the data communication network that is used to transmit data over a
relatively broad area. The transmission takes place with the help of telephone companies or
routers. WAN technologies functions in the three lower layers of the model of OSI reference,
which are the physical layer, data link layer, and network layer. The introduction of WAN
facilities in the network of FNU can provide a better network with less response time and
students can gain interactive applications for better development. The idea of online teaching
in FNU can be executed by the introduction of WAN network. This network provides fast
and reliable internet facility to the students and the staffs.
Point to point link: The path of individual communications from the provider to the
system is called point-to-point link. Generally, in this networking design, the carrier network
delivers a direct connection via telephone lines to the system of the customer. These links are
generally costly than the shared services like Frame Relay.
Circuit switching: The necessity of initiating the communication and terminating it
as per wish is achieved with the help of circuit switching. When data is provided to a router
from an isolated site, the data is transmitted over the circuit number of that remote network
when that specific switched circuit is initiated. In ISDN circuits, the device places a call to
that telephone number in the isolated ISDN circuit. The data transfer is initiated when these
two networks are linked and authenticated. After the completion of data transmission, the call
gets disconnected (Porter et al. 2013).
Packet switching: Packet switching enables the sharing of mutual carrier resources
between the users. The kind of switching is cheap as it provides the customer a greater usage
of the carrier infrastructure. Connections are created into the carrier network are users are
WAN Technologies
WAN is the data communication network that is used to transmit data over a
relatively broad area. The transmission takes place with the help of telephone companies or
routers. WAN technologies functions in the three lower layers of the model of OSI reference,
which are the physical layer, data link layer, and network layer. The introduction of WAN
facilities in the network of FNU can provide a better network with less response time and
students can gain interactive applications for better development. The idea of online teaching
in FNU can be executed by the introduction of WAN network. This network provides fast
and reliable internet facility to the students and the staffs.
Point to point link: The path of individual communications from the provider to the
system is called point-to-point link. Generally, in this networking design, the carrier network
delivers a direct connection via telephone lines to the system of the customer. These links are
generally costly than the shared services like Frame Relay.
Circuit switching: The necessity of initiating the communication and terminating it
as per wish is achieved with the help of circuit switching. When data is provided to a router
from an isolated site, the data is transmitted over the circuit number of that remote network
when that specific switched circuit is initiated. In ISDN circuits, the device places a call to
that telephone number in the isolated ISDN circuit. The data transfer is initiated when these
two networks are linked and authenticated. After the completion of data transmission, the call
gets disconnected (Porter et al. 2013).
Packet switching: Packet switching enables the sharing of mutual carrier resources
between the users. The kind of switching is cheap as it provides the customer a greater usage
of the carrier infrastructure. Connections are created into the carrier network are users are
6NETWORK SECURITY
able to share this carrier network. Data packets are transmitted over the network with the help
of created virtual circuits between the location of the customers (Perelló et al. 2013).
able to share this carrier network. Data packets are transmitted over the network with the help
of created virtual circuits between the location of the customers (Perelló et al. 2013).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7NETWORK SECURITY
References
Ahn, D. and Hong, S., 2013. A study on magnetic field repeater in wireless power
transfer. IEEE Transactions on Industrial Electronics, 60(1), pp.360-371.
Kaur, A., 2017. Virtual Private Network. International Journal of Research, 4(7), pp.958-
962.
Ku, J., Kim, M.S., Lee, J., Qui, P.X. and Huh, E.N., 2016. WARP: Web-Based Adaptive
Remote-Desktop Protocol for VDI. In Information Science and Applications (ICISA)
2016(pp. 189-194). Springer, Singapore.
Perelló, J., Spadaro, S., Ricciardi, S., Careglio, D., Peng, S., Nejabati, R., Zervas, G.,
Simeonidou, D., Predieri, A., Biancani, M. and Dorren, H.J., 2013. All-optical
packet/circuit switching-based data center network for enhanced scalability, latency,
and throughput. IEEE Network, 27(6), pp.14-22.
Porter, G., Strong, R., Farrington, N., Forencich, A., Chen-Sun, P., Rosing, T., Fainman, Y.,
Papen, G. and Vahdat, A., 2013. Integrating microsecond circuit switching into the
data center (Vol. 43, No. 4, pp. 447-458). ACM.
Yang, K., Jia, X., Ren, K., Zhang, B. and Xie, R., 2013. DAC-MACS: Effective data access
control for multiauthority cloud storage systems. IEEE Transactions on Information
Forensics and Security, 8(11), pp.1790-1801.
References
Ahn, D. and Hong, S., 2013. A study on magnetic field repeater in wireless power
transfer. IEEE Transactions on Industrial Electronics, 60(1), pp.360-371.
Kaur, A., 2017. Virtual Private Network. International Journal of Research, 4(7), pp.958-
962.
Ku, J., Kim, M.S., Lee, J., Qui, P.X. and Huh, E.N., 2016. WARP: Web-Based Adaptive
Remote-Desktop Protocol for VDI. In Information Science and Applications (ICISA)
2016(pp. 189-194). Springer, Singapore.
Perelló, J., Spadaro, S., Ricciardi, S., Careglio, D., Peng, S., Nejabati, R., Zervas, G.,
Simeonidou, D., Predieri, A., Biancani, M. and Dorren, H.J., 2013. All-optical
packet/circuit switching-based data center network for enhanced scalability, latency,
and throughput. IEEE Network, 27(6), pp.14-22.
Porter, G., Strong, R., Farrington, N., Forencich, A., Chen-Sun, P., Rosing, T., Fainman, Y.,
Papen, G. and Vahdat, A., 2013. Integrating microsecond circuit switching into the
data center (Vol. 43, No. 4, pp. 447-458). ACM.
Yang, K., Jia, X., Ren, K., Zhang, B. and Xie, R., 2013. DAC-MACS: Effective data access
control for multiauthority cloud storage systems. IEEE Transactions on Information
Forensics and Security, 8(11), pp.1790-1801.
8NETWORK SECURITY
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.