IT 200 Network Configuration Model
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
IT-200
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
5
Uploaded by lunarminded
IT 200 Network Configuration Model
By Megan Miller
IT-200-J6932 Fundamentals Info Technology 23EW6
Professor Ortiz
Assignment Due on 07/16/2023 11:59PM
Defining IT Concepts and Their Importance
i.
IP Address and DNS
IP address stands for internet protocol address. It is a numerical name given to every device connected to a network that uses the internet protocol for communications. A label would be a good way to explain it, or a name tag. It plays a critical role in identifying or being able to locate a specific device on a network. DNS stands for Domain Name System. It is a decentralized system that can translate a domain name into IP addresses. Allowing a person to gain access to websites or services by typing in an easy to remember address for example, like going to www.facebook.com
so there would be no need to remember the specific IP address that is linked to that website. We can use the website address instead of using the numerical address that is associated with it. Humans can remember words better than their capacity to remember chains of
numbers so this is an ideal solution to what would otherwise have been a huge inconvenience and problem with using the internet for most of us.
ii.
Server and Client
A server is a system that can provide shared services or resources to different computers or devices that are on the same network. Designed to respond to requests such as hosting websites, managing data, running different applications especially for a business or other network related task. A client is the devices or computers that are requesting or utilizing the services that a server is providing. Clients are usually the ones that initiate contact with the server for things like accessing data or information, printing, and other resources. In a financial business environment like a bank, a whole department might be on one server with several employee computers or other devices capable of connecting by network to the server such as printers/copy machines that
are connected to and using the same server accessing it through a mapped network.
iii.
VPN
VPN stands for virtual private network. This is a type of technology service that creates a secure and encrypted connection over a public network. Meant to establish a way to offer privacy
and security for a user to be on a public network for the purpose of being able to access resources
or communicate and have it remain private while being on a public network to prevent risks of proprietary or personal information from being accessible by others unintentionally VPNs are crucial for financial institutions in their efforts at preventing identity theft and preventing proprietary business information from being leaked.
iv.
Firewalls
Firewalls are the security for networks either in the form of software or sometimes in the form of a device. They are a network’s security guard that is monitoring all the incoming and outgoing traffic on the network it’s being utilized for. They are a barrier between internal networks and external ones on the internet, applications or found in downloaded content. They examine network packets to determine if it’s safe to allow certain types of traffic based on the settings that determine the rules it will be following. They prevent unauthorized access into a business or personal network, attacks, protect data and sensitive information.
v.
LANs and WANs
LAN stands for local area network and is confined within a small, localized area like a home,
school, or business. They are used to connect computers or other resources and devices to one another so that they can share and communicate with each other. WANs stands for wide area network and is meant for a bigger area geographically than a LAN. It can span across cities or even countries. WANs connect multiple LANS or networks together to allow for long distance connectivity like LANs provide on a smaller scale.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
vi.
Summary of the Importance of the Above-Mentioned Concepts
By understanding and utilizing the above-mentioned concepts, network admin as well as users will effectively be able to manage and secure network resources, ensure confidentiality when needed and maintain stable and reliable network infrastructure.
Part Two: Network Configuration Model Scenario
Option #2: “Georgia Springer runs a small accounting firm with two partners and a secretary. Each employee has a personal workstation. Client information is stored on a central server shared between all workstations in the office. There is a single networked device that functions as a copier, printer, fax machine, and scanner. The office’s network has a firewall and connects to
the internet through a cable modem.”
I.
The Network Configuration Model I Would Recommend.
The network configuration model that I would recommend for Georgia Springer’s accounting firm is made up of the above-mentioned components. At the firm, each employee has a personal workstation. These workstations would then be connected to one central server. The server would
connect directly to the network through a switch, as would the router and the Wi-Fi router. The central server would be where all the client information and data are stored and shared between the workstations. The employees can access, update, and retrieve the necessary resources to conduct their job functions from the server through their workstations. There would be in place a single networked device in the general office meant to serve a multitude of functions such as copying, printing, faxing, and scanning. That device would also be connected to the network and the employees would have access to it and be able to use it as needed throughout their workdays The office manager would have their own for that in their office. There is a good firewall
protecting the network to prevent unauthorized threats to the business. The network is wired and connected to the internet by cable modem but also connected to the switch, the switch would be connected to server and wireless router, the wireless router would be connected to all the workstations including management and secretarial. Additionally, I would recommend implementing access controls. Such as each employee having their own log ins and credentials giving them access to the network so their activity on the network can be monitored and tracked. Regular backups so data wouldn’t accidentally be lost
if technology failed. Updates are regularly being made to the security that is being used. Using encryption and strong passwords for everything. Regular security audits and investing in a good VPN to be utilized.