To access resources on a network, a user must prove who they are and that they have permissions to access the resources. This process consists of the
Identification is the initial process of confirming the identity of
The Domain Name System (DNS) is a hierarchical, distributed database that maps logical hostnames to IP addresses. DNS is a distributed
database because no one server holds all of the DNS information. Instead, multip
The Dynamic Host Conguration Protocol (DHCP) centralizes management of IP addressing in a network by allowing a server to dynamically
assign IP addresses to clients. DHCP also allows mobile users, who
Devices like hubs, switches, and bridges connect multiple devices to the same network segment. Internetwork devices connect multiple
networks or subnets together and enable communication between hosts
IP addresses allow hosts to participate on IP-based networks. The following are important things to know about IP addresses:
An IP address is a 32-bit binary number represented as four octets (four 8-bit numbe
Classful addresses are IP addresses that use a default subnet mask, as follows:
Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0
They are considered classful because the default su
The following table lists several common connection devices used within a LAN:
A hub is the central connecting point of a physical star, logical bus topology. Hubs manage commu
A protocol is a set of standards for communication between network hosts. Protocols often provide services, such as email or le transfer.
Most protocols are not intended to be used alone, and instead rel
When managing networks, you will frequently work with number systems other than the decimal numbering system that you are already
familiar with. These additional numbering systems include:
Binary (Base 2)
A network is a group of computers (often called nodes or hosts) that can share information through their
interconnections. A network is made up of the following components:
Computer systems (nodes or hosts).
Network devices that enable connectivity (such
A decision support system (DSS) is a computer program application that analyzes business data and
presents it so that users can make business decisions more easily. It is an "informational application" (to
distinguish it from an "operational application"
Project: Design Requirements List
Summerville, South Carolina
Summerville, South Carolina
In this weeks discussion, we were asked to complete a needs analysis to
An intrusion detection system (IDS) is a special network device that can detect attacks and suspicious activity. There are several ways to describe typical
An intrusion detection system can b
Public Wifi Hotspot
A firewall is a device or software running on a device that inspects network traffic and allows or blocks traffic based on a set of rules.
A network-based firewall inspects traffic as it flows between networks. For example, you
A countermeasure is an action or a control put into place that eliminates or reduces the effects of a threat or attack. The following list identifies common
countermeasures that protect against a wide variety of attacks.
The following table lists switch features that can be implemented to increase network security:
A virtual LAN (VLAN) is a logical grouping of computers based on switch port.
Remote access allows a host to connect remotely to a private server or a network to access resources on that server or network. Remote access
connections are typically used to connect remotely to servers at your office, but can a
The authentication protocol identifies how credentials are submitted, protected during transmission, and validated. Instead of a simple username and
password, some authentication protocols use certificates and digital signatures