preview

Review Of Interconnection Hardware And Hubs

Good Essays
Review of interconnection hardware – hubs, switches, routers Our design includes hubs, switches and routers in the infrastructure. In this section we will provide a quick overview of these appliances. Network hubs, switch, and router all perform the job of connecting computers. A network hub connects computers to each other, but it is designed with no real understanding of the information that is being transferred through the hub. what it is transferring. Network hubs are usually used in a private network (no Internet access). Hubs are pretty dumb about how they transfer data: a packet of data received from a connected device is broadcast to all other connected devices. Network bandwidth is split between all of the connected computers, which means that the more computers that are attached to a hub, the slower the connection. Hubs should be used with restraint for that matter. A network switch also connects computers to each other, but unlike a hub. hen a switch receives a packet of data, it is smart enough to know what computer or device the packet is destined, for and sends it accordingly. A network router is different from both a switch and a hub. Routers primarily route data packets to other networks. They provide the interfaces between external and internal networks (the Internet and a LAN, for example). A router usually contains other functions such as firewalls, traffic monitoring, VPN, and more services. Security Review According to the SciTechConnect blog [1], “In today’s network infrastructures, it is critical to know the fundamentals of basic security infrastructure. Before any computer is connected to the Internet, planning must occur to make sure the network is designed in a secure manner. Many of the attacks ... ... middle of paper ... ...ss secure network. VPN uses special software to use the public Internet to provide remote users secure access to their organization 's network. We recommend the use of VPN for remote access to DEM intranet for all authorized users. No remote access to DEM intranet should be provided to anyone not using a VPN. 4. Intrusion Detection Systems (IDS) – An IDS is a software, hardware, or combination network appliance that monitors and inspects all inbound and outbound network traffic. An IDS performs pattern matching to identify indicators of attack or suspicious activities. Contrast this with a firewall, which inspects all outbound and inbound traffic to make sure disallowed types of connections are not being initiated. To summarize, we are recommending the use of WPA-2 Enterprise protocols, VPN for remote access, Firewalls, Proxy Servers, and IDS for the DEM network.
Get Access