Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Summary

Summary Computer Networking/ Cyber Security

Rating
-
Sold
-
Pages
26
Uploaded on
20-05-2023
Written in
2022/2023

Computer Networking courses equip learners with knowledge in the fundamentals of computer networks; network security; network architecture; computer communications; software-defined networking; and more.

Institution
Course

Content preview

Introduction to Networking
Networking involves connecting two or more computers or devices to enable communication
and information sharing. This connection can be established through various means such as
wired or wireless connections. It serves multiple purposes, including sharing resources,
communicating with other users, accessing the internet, and many more. Devices are connected
using network protocols, such as Ethernet and Wi-Fi, and are assigned using IP addresses that
allow them to communicate with each other. Networking is an essential component of modern
computing and is used in various settings, from small businesses to large corporations and
from home networks to global networks. Networking is a rapidly growing field with many career
opportunities available. As technology advances, the need for skilled networking professionals
is increasing. Some of the most popular networking career opportunities include network
engineer, network administrator, network security specialist, wireless network engineer, cloud
network engineer, and many more.

Types of Networks
The two major types of networks are Local Area Networks (LANs) and Wide Area Networks
(WANs).


Local Area Networks (LANs)
A LAN comprises cables, gateways, switches, routers, and additional parts that allow these
devices to connect to private servers, cloud services, and other LANs via larger networks. The
computers in each department could be conceptually linked to the same switch in an office with
many departments, be it accountancy, IT support, and administration, still they might be
segregated to operate separately. The benefits of a LAN are similar to those of any collection of
connected devices. They may access anywhere, control one another, exchange files, print to
shared printers, and utilize a single internal connection. To identify these devices inside the
network, an IP address can help. An IP address is a language string of digits allocated to any
device connected to a network that utilizes Internet Protocol as the communication medium.


Wide Area Networks (WANs)
A WAN is a collection of LANs or any other networks that interact with one another. It is used to
connect devices over long distances, such as different cities or countries. WANs are often used
by businesses to connect their different offices, data centers, and cloud services.


Network Components
Network components include switches, routers, and IP addresses.


Switches

,A network switch joints devices in a network such as computers, printers, wireless access
points, and allows them to communicate with each other by exchanging data packets. They can
do both physical hardware devices that handle real networks or software-based virtual devices.
Based on the type of switches employed, they can either differentiate between network devices
using either their IP addresses or MAC addresses which are separate types of addresses
allotted to each hardware device irrespective of the network it is connected to.


Routers
The router is a physical or virtualized networking equipment that receives, analyzes, and
transmits data packets across computer networks. The router checks and data packets
destination IP address and utilizes headers and forwarding tables to determine the best path to
transform the packet.


IP Addresses
An IP address is a language string of digits allocated to any device connected to a network that
utilizes Internet Protocol as the communication medium. It serves as the digital equivalent of
your house or workplace's mailing address. The addresses are divided into four sections
separated by drops. Each traditional tree strain numeral portion represents an 8-bit binary
integer which can range from 0 to 255. These four integers are expressed in normal decimal
notation and then separated by docs.

Conclusion
Networking is an essential component of modern computing, enabling communication and
information sharing. Understanding the different types of networks, network components, and
IP addresses is crucial for any networking professional. With the growth of virtualization and the
internet of things, the need for skilled networking professionals is increasing, making it a rapidly
growing field with many career opportunities available.




Network Address Translation and Firewalls

A data network is essentially a network of networks, with the internet serving as the world's
biggest one. However, when a router communicates with devices outside a local network, it
tends to mask the internally allocated IP addresses and uses a single public IP address for all
the devices. This process is called Network Address Translation (NAT) IP allocation. A network
address translation is a method of translating one IP address to another while these packets are

, in transit through a router. This improves security and reduces the number of IP addresses
required by a company.


To receive some particular information that must be transmitted to a local device in the network,
it checks the internal routing tables to determine the correct internal IP address and the current
destination to send the external leadership data too. But let's say a device on the external
network or a Wide Area Network (WAN) wants to communicate directly with the device from the
local network. This cannot be allowed since this can be a very big security risk for devices in a
secure environment. All of this NAT and exit rule creation and handling can be taken care of by a
firewall.


A firewall is a type of network security device that analyzes the incoming and outgoing
networking traffic and allows organized data packets depending on a set of security rules. Its
objective is to provide a barrier between your local network and external traffic such as the
internet. The most common sort of firewall, which are packed at filtering firewalls, check
packets and prevent them from getting through if they do not maintain established security
rules. This sort of firewall examines the package destination and source IP addresses. If the
packet fits an allowed rule on the firewall, they are permitted to access the network.


But let's say we as users want to allow external requests to reach individual computers or
devices on our local network. There are two ways to facilitate this behavior. The first way to go
through this step is by using a DMZ, which stands for a demilitarized zone. Instead of
communicating directly with the local network device, the external data is sent to the router
instead. The router will have created a DMZ sub-network with only those devices added to it that
require other external information to reach them on altered. Once the data is received by the
router, it passes it on to the DMZ subnet and subsequently to all the devices which are a part of
that summary. However, since external data can reach devices in a network without any firewall
checks if they are part of the DMZ subnet, the security risk associated with this method is very
large compared to the second variant, which is port forwarding.

Written for

Course

Document information

Uploaded on
May 20, 2023
Number of pages
26
Written in
2022/2023
Type
SUMMARY

Subjects

$10.98
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
siddhantbhaisare

Get to know the seller

Seller avatar
siddhantbhaisare Exam Questions
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
2 year
Number of followers
0
Documents
1
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions