Preview

Unit 3 Assignment 3 Chris Wiginton

Satisfactory Essays
Open Document
Open Document
522 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 3 Assignment 3 Chris Wiginton
Chris Wiginton
1/10/14
IS-3120 Unit 3 Assignment 3

Convergence of IP-Based Networks

In the early days of the Internet, the only way to connect to the Web was by using a modem in conjunction with a dial-up connection. The modems, which stand for modulator-demodulator, were devices that converted analog signals into digital signals. Early modems operated at 1200 bps or bit/s per second to 2400 bps. Data transfer was slow and often unreliable.
Today the Internet and the means to access the Internet has changed radically from the days of the modem. We now use lightning fast networks that include broadband, T1, satellite and digital wireless connections. The modernization of network technology has enabled the invention of cell phones, and other devices that allow users to access the Web and other networks from almost anywhere in the world and beyond.
The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.
A converged network has many of the same risks and susceptibility to threats as you might find if you were dealing with two separate networks. Denial of Service attacks against banks data storage servers could cause a lot of harm and potentially cause the loss of millions of dollars, Identification theft or loss of confidence for the organization. Converged networks place more information and resources in line with each other than would be found in having separate networks for each network needed to operate a company. This just means IT managers have to place all safeguards in one place.
Wireless or mobile technology has added another

You May Also Find These Documents Helpful

  • Satisfactory Essays

    unit 5 assignment1

    • 309 Words
    • 2 Pages

    What type of install is the cable going into? Is everything in a fixed position? If you have an install where items are moved around without being disconnected, using highly flexible cable is necessary. Cables in these scenarios need to be flexible to meet those demands of mobility, and also for the life of the wire so that it does not crack, break, fray or short. We had a job at a university where we moved flat panels on a track system to create different screen sizes, and for that we had to make sure the cable would meet the demand.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In order to provide speed and reliability, large and enterprise-level networks today are typically constructed in multiple layers. They are the access layer, also called the network edge layer, the aggregation or distribution layer; and the network core layer. The access layer is usually a mesh of network switches, linked to other switches in the aggregation layer, which in turn is linked to the core.…

    • 681 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 3 Assignment 1

    • 310 Words
    • 1 Page

    5. How long do you think it will take before the IPv4 addresses are completely exhausted? It could possibly become exhausted within the next two years or so.…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    The Internet has been designed as a ‘pool of endless information’ for anyone who has access. With its introduction in the mid 1990’s, it has vastly changed the way we do business, obtain all kinds of data and the way we communicate in the world today. With its sheer potential, we have created the most powerful tool of our modern day technology. In a series of memos that were first written in 1962, by an MIT expert of the name of J.C.R Licklider, he had envisioned a type of ‘network’ in which a set of computers were globally interconnected in sharing information and anyone could access data from anyone of these terminals (Leiner, Cerf, Kahn & Clark, 1962-1974).…

    • 1786 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Networks have become more vulnerable because of fundamental shifts in the complexity and proliferation of personal and business applications, user access, and behavior, as well as the new threat landscape, leading organizations to rethink their network security strategy.…

    • 2498 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Disadvantages- One of the biggest disadvantages is that is creates a single point of failure. Take a sales company for instance. If the internet were to go down, they could still pick up the phone and make sales calls. Converged networks have the cumulative effect of introducing a new risk to data assets that did not exist in the old world of network stovepipes: a “monolithic point of failure”. This is distinct from a “single point of failure”, which indicates a point in an application, system or process where a collapse impacts that particular application system or process. A monolithic point of failure has impacts spreading far beyond a given application, system or process; everything is impacted: data, voice, remote monitoring, manufacturing, and access control. Formerly, one communications system may have been largely unaffected by a failure in another network; for example, the LAN drops so people pick up the phone. Under convergence, a…

    • 827 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Early History

    • 460 Words
    • 2 Pages

    After the first fax transmission in 1962, the modulation of data into sound for transmission across telephone lines spread in popularity for several years. Though modulation/demodulation, or modem, technology continued to carry slower data traffic for the remainder of the 20th century, according to the History of Computing, the 1969 development of Internet Protocol (IP) marked a significant milestone in data communication history. Within the following decades, early packet communication technologies like Asynchronous Transfer Mode (ATM), Frame Relay and Integrated Services Digital Network (ISDN) emerged as a viable solution for commercial and high-end residential data needs. By 1991, more than 1 million servers had come online using Internet Protocol technology, and the World Wide Web emerged as the primary component of the Internet by the mid-1990s.…

    • 460 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Network Security

    • 4030 Words
    • 17 Pages

    I am commissioned by a nationwide firm of lawyers and accountants to perform such a challenging task. The firm has its Head office in Manchester and a branch office in Glasgow. My job is to produce a consultation report to connect both of their sites together using an appropriate WAN technology and then specify and design their “network security provision”. In this report I am going to discuss different WAN technologies and will select the best among them i.e. IP VPN to connect our network sites together. Based on the diagrams provided for the planes of two sites I will identify the areas of security weaknesses and risks and will recommend the necessary solutions to overcome those weaknesses. I will then present techniques to prevent our network from several viruses and malicious softwares that could destroy our network. I will suggest some necessary actions to be carried out in order to strengthen the security of our network. Finally I will enlighten the role of switches in securing networks and will explain the role of “IEEE 802.1x protocol” in our “network security provision”. Keeping in mind all the above key factors I will produce a complete report of “network security provision” for the lawyers and accountants firm that will gain their entire satisfaction.…

    • 4030 Words
    • 17 Pages
    Best Essays
  • Good Essays

    The power of the internet has broadened over the years since it has distended to include the internet connected devices. Most of homes, schools and even mobile phones today have already internet connectivity.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Research Paper on Ns2

    • 2840 Words
    • 12 Pages

    Computer and network technology provide convenience to the people, but at the same time, security problems have emerged and become more and more serious. With the increasing popularity of computer applications, in particular, the rapid development of network technology, more and more security threat have appeared and information security has become a very important and urgent issue to be solved. Network information security has become the fifth security…

    • 2840 Words
    • 12 Pages
    Satisfactory Essays
  • Good Essays

    Issues of convenience drive the popularization of new methods of electronic communication. As telephones and fax machines were supplemented by the Internet and cell phones, communication became faster and more readily available. The Internet is notable for allowing the transmission of visual data, as well as text and voice, nearly instantly. The amount of information available on the Internet continues to grow as users create and maintain content that exists side by side with professionally produced content. Broadband connections are made available in even developing countries and wireless technology makes the Internet available in places never thought possible.…

    • 770 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Living in the modern era there’s no rejection that the world is getting modernized day by day in every aspect of life. Technology has taken over our lives and has become one of the basic necessities. One of them is Internet.…

    • 1475 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    We access the Internet in many ways; mainly through computers and our phones. “Residential broadband subscriptions among American households overall grew sevenfold between 2001 and 2009. It found that the percentage of households that connect to the Internet using broadband grew to 63.5 percent in 2009 from 9.2 percent in 2001, reflecting increases across nearly all demographics. The report -- prepared by the Commerce Department 's National Telecommunications and Information Administration and the Economics and Statistics Administration -- is based on a Census survey of about 54,000 households conducted in October 2009.” (Tessler, 2010)…

    • 1480 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    internet in comunication

    • 305 Words
    • 2 Pages

    The Internet is a global network connecting millions of computers. More than 100 countries are linked into exchanges of data, news and opinions. The Internet allows greater flexibility in working hours and location, especially with the spread of unmetered high speed connections. It can be accessed almost anywhere by numerous means, including through the mobile Internet devices. Because of this, the number of Internet users was increasing every year.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    mass media

    • 358 Words
    • 2 Pages

    Nowadays the most popular Internet service is e-mail. Most of the people use the network only for sending and receiving e-mail messages. But now you can work through the internet, play games, read books, learn languages, watch films, TV programs.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays