5 Feb 2023

78

Local Area Network/Wide Area Network: Overview and Components of Security

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 613

Pages: 2

Downloads: 0

Kudler Foods uses local area network/wide area network thus it should have security measures put in place to ensure the privacy and security of the organization against electronic threats. Security of the network begins first with the understanding of how the system or network works (Peterson & Davie, 2012) . There are three main components used in the securing the networks. These components are: 

Router 

It is the outermost security gate that is the first line of defense in the network. Its purpose is to provide packet routing to the networks that it is connected to. The router can also be configured to filter packets that are used maliciously, for instance, Simple Network Management Protocol. There are various configuration protocols of a router, namely, intrusion detective, protocols, auditing and logging, patches and updates, services and, administrative access. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Firewalls 

This is a software that is used to allow traffic in only known ports and blocks ports that are unnecessary. It should be able to monitor all known attacks and prevent them from reaching the server. Mostly one does not have the administrative rights to access the upstream router. 

Switches 

Switches are used in forwarding packets directly to a particular network segment, not the entire network. This helps a great deal in protecting the Kudler Foods’ system against packet sniffing between networks. The switch also has configuration categories which are encryption, virtual local area networks, insecure defaults, services and, patches and updates. 

There are different types of networks in which these components are used to prevent electronic attacks including the Local Area Networks (LANs), wireless technologies and, Wide Area Networks (WANs). 

Local Area Network 

LAN consists of a group of computers, associated electronic devices that have a common communication line and a wireless link to a server within a distinct geographical area and shares common resources (Palmer & Sinclair, 2012) . The Local Area Network allows Kudler to connect through routers, cables, and switches to the internal servers and websites. The primary ways of enabling the Local Area Network is through Ethernet and WI-FI. With the development in virtualization of the Local Area Network, the technology has allowed the administrators of Kudler to group network nodes logical without a major change of infrastructure. 

Wide Area Network 

This is a network that exists over a large geographical region that interconnects smaller networks, that is the Local Area Network and Metro Area Network (Palmer & Sinclair, 2012) . This system enables a communication between different locations owned by Kudler Foods. A router is used to connect a Local Area Network to a Wide Area Network. Having a Virtual Private Networks also allows the connectivity between WAN. The WAN uses connections such as multiprotocol label switching, T1s, commercial broadband internet links and carrier Ethernet. This allows the end users of Kudler who are located in different geographical regions to communicate and be able to access the same resources. There are two types of Wide Area Network employed by the organization, that is, the traditional Wide Area Network and Software-defined Wide Area Networks. 

Wireless Technologies 

Wireless technologies involve sending messages over a distance without the help of wires, cables or any electrical wires ( Wireless Technologies , 2007) . The distance is not fixed, can be a few meters or hundreds of kilometers. Kudler Foods heavily employs this kind of technology. There are different types of wireless communication, for example, the infrared wireless communication, mobile wireless, fixed wireless, and portable wireless. There are also quite a number of wireless equipment that are used, that is, cordless computer peripherals, global positioning system, and cellular phones. 

For networking to be able to function properly, it has to have components that build it. There are various building blocks that make up an entire network system for it to perform its functions adequately (Peterson & Davie, 2012) . Examples blocks that are used by Kudler to build networks include: 

Server computers- Store shared resources and enables access to end users. 

Network interface- Installed in computers enabling communication over a network 

Cable- Used to physically connect computers to a network. 

Switches- Connects computers to the network. 

Network software- A software employed for the proper functioning of the network. 

Client computers- End users at Kudler use these computers to access the resources in servers. 

References

Palmer, M. & Sinclair, R. (2012). Guide to designing and implementing local and wide area networks (1 st ed.). Boston, Mass.: Course Technology. 

Wireless Technologies 2007 . (2007) (1st ed.). [Piscataway, N.J.]. 

Peterson, L. & Davie, B. (2012). Computer networks (1st ed.). Amsterdam: M. Kaufmann. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Local Area Network/Wide Area Network: Overview and Components of Security.
https://studybounty.com/local-area-networkwide-area-network-overview-and-components-of-security-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration