logo

Secure Network Operations | Assignment

   

Added on  2022-08-21

5 Pages1098 Words10 Views
Running head: SECURE NETWORK OPERATIONS
SECURE NETWORK OPERATIONS
Name of student
Name of university
Author’s note:

1
SECURE NETWORK OPERATIONS
Summary of chapter 5
This chapter describes the importance of the network infrastructure could be
considered as the software as well as the hardware resources of the complete network that
allows the network connectivity, operations, communication as well as the management of
any enterprise network. It allows the communication path as well as the services among the
processes, users, applications, external network as well as the services. The network
infrastructure is commonly the section of IT infrastructure found within majority of the
enterprise IT environments. The complete network infrastructure has been effectively
interconnected and it could be used for the internal communication, the external
communications or both of them. Any common network infrastructure mainly involves the
networking hardware, networking software and the network services.
A router could be described as the device whose primary task is forwarding the data
packets along the networks. The router has been connected to minimum two of the networks,
typically two LANs or the WANs or any LAN as well as the network of the ISP. The location
of typical router is at the gateway, which is the location where two or even more networks are
interconnected. Forwarding tables and the headers are used by the routers for determining the
most appropriate path for the forwarding of the packets, and it uses the protocols, for
example, ICMP for establishing communication among one another and then configure the
most appropriate router among the two hosts.
The network switch could be described as the switching hub or bridging hub which is
the networking hardware that helps in connecting the devices on any computer network by
the utilisation of the packet switching for receiving as well as forwarding data to intended
destination devices. Network switch could be considered as the multiport network bridge

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Telecommunication And Information Security
|15
|3211
|14

Networking Essentials
|8
|2067
|165

LAN Architecture for Top Network Company
|11
|657
|77

Network Security Implementation
|20
|3861
|478

Switch Engineering
|18
|4058
|217

Riordan Network Security Recommendations Assignment
|5
|923
|161