logo

Telecommunication And Information Security

The final assessment is a five-question essay assignment that requires understanding of network devices, VPNs, and their applications.

15 Pages3211 Words14 Views
   

Added on  2022-08-18

Telecommunication And Information Security

The final assessment is a five-question essay assignment that requires understanding of network devices, VPNs, and their applications.

   Added on 2022-08-18

ShareRelated Documents
Running head: TELECOMMUNICATION AND INFORMATION SECURITY
TELECOMMUNICATION AND INFORMATION SECURITY
Name of the Student:
Name of the University:
Author’s Note:
Telecommunication And Information Security_1
TELECOMMUNICATION AND INFORMATION SECURITY
1
Question 1:-
Explain the differences between the following network devices: hub, bridge, switch, router, and a
firewall. Where would you utilize each device and why? Where does each device reside within
the OSI model?
Answer:-
Hub:-
It is mainly a multiport repeater. This links with several wires coming from several
branches. Hubs cannot filter information, so data packets are directing to all attached devices
(Gil et al., 2014). They do not have the logical expression to search the most exceptional
technique for data packets which leads to ineffectiveness and excess.
Bridge:-
It mainly works at the data link layer. It is also a repeater. A bridge is the layer-2 devices,
working on the frames. The bridge is also applying for interrelating two LANs working on the
equivalent protocol. It has a particular input and distinct output port, thus constructing it a two-
port device. The two types of the bridge are source routing and transparent bridges.
Switch:-
It is a multiport connection with a buffer and a construct that can improve its
effectiveness and performance. There is a data link layer device. The switch can execute fault
checking before promoting data that creates (Jovcic & Lin, 2014). It was handy as it does not
forward packets that have technical mistakes and forward proper packets selectively to accurate
port only.
Telecommunication And Information Security_2
TELECOMMUNICATION AND INFORMATION SECURITY
2
Router:-
It mainly routes data packets built on their IP addresses. This network Layer device
connects with WANs and LANs together. The router has dynamically informing routing
benchmark based on which they make choices on routing the data packets. Routers execute the
traffic pointing functions on the Internet. The information sent over the internet, like as an email
or webpage, is in the procedure of data packets.
Firewall:-
It is a network safety structure that controls and displays departing and external network
traffic constructed on scheduled security directions. A firewall generally obstructs a reliable
internal network and untrusted outside network, like as the Internet. Its objective is to create an
obstacle between the core network and inbound traffic from external resources in order to block
malicious traffic like hackers and viruses (Hassanin et al., 2018). The three types of firewall are
Circuit-level gateway, Packet filtering firewall and Stateful inspection firewall.
Purposes:-
Hub:-
The people mainly use the hub to fix a network of individual computers together. People
can just link the Hub to the standing network jack and then the Hub tool. Furthermore, it is also
taking to run cabling from the Switch to the cubicle.
Bridge:-
Collision is very much tricky terms in network engineering. With the help of a bridge, the
user system designer can avoid network collision effectively. The principal aim for segmenting
Telecommunication And Information Security_3
TELECOMMUNICATION AND INFORMATION SECURITY
3
networks is to decrease the number of devices linked to the equivalent wire and thus decrease the
waiting period for the transmission. Bridge also helpful to install any network device. With the
help of Bridge, the device takes a data packet where the destination and source addresses are on
the equivalent segment, and it overlooks it.
Switch:-
These are generally used in LAN to send every incoming communication frame by
considering at the physical device location, known as the MAC address. Usually, a switch
delivers a massive number of ports for cable networks, allowing for star topology routing. It is
generally using to link several computers to the network (Ragupathi, Sekar & Susitra, 2014).
These also distributes a LAN into several collision domains with free broadband, thus
importantly rising the LAN bandwidth.
Router:-
It mainly links several networks and forward packets intended either for its particular
networks or other networks. It is also measured a layer-3 device for its prime forwarding
selection is based on the evidence in the layer-3 IP packet, exactly the terminal of protocol
location.
Firewall:-
With the help of a firewall, the user can avoid illegal internet operators from retrieving
isolated networks linked to the internet, particularly intranets. It is also working to block these
illegal requests, passing over only selected traffic. The user can also construct a firewall to
prohibit access to specific facilities to prevent workers from retrieving non-work sources while
on the timepiece.
Telecommunication And Information Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Secure Network Operations | Assignment
|5
|1098
|10

Different Types of Network Cables - Cat 3, Cat 5, Cat 5e, Cat 6, Cat 6a, Cat 7
|7
|1785
|126

COMP609 - Networking Devices Assignment
|5
|872
|67

LAN technologies and their role in Organisation | Report
|50
|6692
|117

Understanding Network Components: Servers, Switches, Routers, and LAN Cables
|53
|3138
|62

IT Networking Project For Restaurant
|10
|1334
|129