Preview

Unit 3 Assignment 3 Chris Wiginton

Satisfactory Essays
Open Document
Open Document
522 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 3 Assignment 3 Chris Wiginton
Chris Wiginton
1/10/14
IS-3120 Unit 3 Assignment 3

Convergence of IP-Based Networks

In the early days of the Internet, the only way to connect to the Web was by using a modem in conjunction with a dial-up connection. The modems, which stand for modulator-demodulator, were devices that converted analog signals into digital signals. Early modems operated at 1200 bps or bit/s per second to 2400 bps. Data transfer was slow and often unreliable.
Today the Internet and the means to access the Internet has changed radically from the days of the modem. We now use lightning fast networks that include broadband, T1, satellite and digital wireless connections. The modernization of network technology has enabled the invention of cell phones, and other devices that allow users to access the Web and other networks from almost anywhere in the world and beyond.
The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.
A converged network has many of the same risks and susceptibility to threats as you might find if you were dealing with two separate networks. Denial of Service attacks against banks data storage servers could cause a lot of harm and potentially cause the loss of millions of dollars, Identification theft or loss of confidence for the organization. Converged networks place more information and resources in line with each other than would be found in having separate networks for each network needed to operate a company. This just means IT managers have to place all safeguards in one place.
Wireless or mobile technology has added another

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Chris Wiginton 1/10/14 IS-3120 Unit 3 Assignment 3 With the current application of 802.11b wireless solution Highbrow Ed is using, hot spots are inefficient for application delivery, and to manage the bandwidth they will need for the collaboration and expansion required in the future. An upgrade to an optimized Wireless LAN (WLAN) architecture will solve all of their business needs.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Course Project: Security Assessment and Recommendations Aircraft Solutions SEC: 571 Adam Grann Professor: Reynolds Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    IOT’S FOR SMART CITIES. INTRODUCTION: Living in the modern era there’s no rejection that the world is getting modernized day by day in every aspect of life. Technology has taken over our lives and has become one of the basic necessities. One of them is Internet.…

    • 1475 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Networks have become more vulnerable because of fundamental shifts in the complexity and proliferation of personal and business applications, user access, and behavior, as well as the new threat landscape, leading organizations to rethink their network security strategy.…

    • 2498 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Disadvantages- One of the biggest disadvantages is that is creates a single point of failure. Take a sales company for instance. If the internet were to go down, they could still pick up the phone and make sales calls. Converged networks have the cumulative effect of introducing a new risk to data assets that did not exist in the old world of network stovepipes: a “monolithic point of failure”. This is distinct from a “single point of failure”, which indicates a point in an application, system or process where a collapse impacts that particular application system or process. A monolithic point of failure has impacts spreading far beyond a given application, system or process; everything is impacted: data, voice, remote monitoring, manufacturing, and access control. Formerly, one communications system may have been largely unaffected by a failure in another network; for example, the LAN drops so people pick up the phone. Under convergence, a…

    • 827 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Network Security Analysis

    • 5047 Words
    • 21 Pages

    Keywords: Network; Security; Analysis; Countermeasures 1. Introduction As technology develops, network is getting more and more mature. It is known to all that security is the second step after that a successful network has been deployed.…

    • 5047 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Early History

    • 460 Words
    • 2 Pages

    Computer Connections • After the first fax transmission in 1962, the modulation of data into sound for transmission across telephone lines spread in popularity for several years. Though modulation/demodulation, or modem, technology continued to carry slower data traffic for the remainder of the 20th century, according to the History of Computing, the 1969 development of Internet Protocol (IP) marked a significant milestone in data communication history. Within the following decades, early packet communication technologies like Asynchronous Transfer Mode (ATM), Frame Relay and Integrated Services Digital Network (ISDN) emerged as a viable solution for commercial and high-end residential data needs. By 1991, more than 1 million servers had come online using Internet Protocol technology, and the World Wide Web emerged as the primary component of the Internet by the mid-1990s.…

    • 460 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Network Security

    • 4030 Words
    • 17 Pages

    I am commissioned by a nationwide firm of lawyers and accountants to perform such a challenging task. The firm has its Head office in Manchester and a branch office in Glasgow. My job is to produce a consultation report to connect both of their sites together using an appropriate WAN technology and then specify and design their “network security provision”. In this report I am going to discuss different WAN technologies and will select the best among them i.e. IP VPN to connect our network sites together. Based on the diagrams provided for the planes of two sites I will identify the areas of security weaknesses and risks and will recommend the necessary solutions to overcome those weaknesses. I will then present techniques to prevent our network from several viruses and malicious softwares that could destroy our network. I will suggest some necessary actions to be carried out in order to strengthen the security of our network. Finally I will enlighten the role of switches in securing networks and will explain the role of “IEEE 802.1x protocol” in our “network security provision”. Keeping in mind all the above key factors I will produce a complete report of “network security provision” for the lawyers and accountants firm that will gain their entire satisfaction.…

    • 4030 Words
    • 17 Pages
    Best Essays
  • Better Essays

    Currently there are two ways of accessing the Internet—via dial-up connection and broadband connection. Dial-up used to be popular before broadband became mainstream. A dial-up connection is where you would connect your phone line directly to an internal modem in your computer. A modem is a device found in a computer or a fax machine that is capable of deciphering bits of data transferred through the phone lines into useful information. Before you can browse the Internet, you have to manually dial a specific number on Windows such as 1315 or 1515 to enable Internet access. Dial-up connections will favor infrequent users who check their occasional e-mail or browse for information rarely as they are charged on a pay-per-use basis. The more you use, the more you pay. Currently the price of dial-up connections is 5sen per minute. However, as people are browsing the web and using e-mail more…

    • 1966 Words
    • 8 Pages
    Better Essays
  • Good Essays

    The Effect of Electronic Communication The Convenience Factor o Issues of convenience drive the popularization of new methods of electronic communication. As telephones and fax machines were supplemented by the Internet and cell phones, communication became faster and more readily available. The Internet is notable for allowing the transmission of visual data, as well as text and voice, nearly instantly. The amount of information available on the Internet continues to grow as users create and maintain content that exists side by side with professionally produced content. Broadband connections are made available in even developing countries and wireless technology makes the Internet available in places never thought possible.…

    • 770 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Research Paper on Ns2

    • 2840 Words
    • 12 Pages

    I. INTRODUCTION Computer and network technology provide convenience to the people, but at the same time, security problems have emerged and become more and more serious. With the increasing popularity of computer applications, in particular, the rapid development of network technology, more and more security threat have appeared and information security has become a very important and urgent issue to be solved. Network information security has become the fifth security…

    • 2840 Words
    • 12 Pages
    Satisfactory Essays
  • Satisfactory Essays

    mass media

    • 358 Words
    • 2 Pages

    The history of Internet began in the United States in 1969. It was a military experiment. The internet helped to survive during a nuclear war, because it could be dangerous to get out for any living being to get some information to anywhere.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    • DSL (Digital Subscriber Line) DSL is an internet accessing technology that uses ordinary copper telephone lines. It is fast and a DSL subscriber can receive data at rates up to 6.1 megabits (millions of bits)…

    • 3464 Words
    • 14 Pages
    Best Essays
  • Powerful Essays

    We access the Internet in many ways; mainly through computers and our phones. “Residential broadband subscriptions among American households overall grew sevenfold between 2001 and 2009. It found that the percentage of households that connect to the Internet using broadband grew to 63.5 percent in 2009 from 9.2 percent in 2001, reflecting increases across nearly all demographics. The report -- prepared by the Commerce Department 's National Telecommunications and Information Administration and the Economics and Statistics Administration -- is based on a Census survey of about 54,000 households conducted in October 2009.” (Tessler, 2010)…

    • 1480 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    The power of the internet has broadened over the years since it has distended to include the internet connected devices. Most of homes, schools and even mobile phones today have already internet connectivity.…

    • 825 Words
    • 4 Pages
    Good Essays