The Importance Of Firewall

Great Essays
1.10 FIREWELL:
Firewall is a physical security device that cleaned in specs traffic coming from one network to a different network. A firewall is a system that implements an access control policy among two networks.
Example:
“Allows: http, mails etc. Keeps out: intruders, denial of services attacks etc.”

1.10.1 Firewall work: The protocol that computers use to be in touch on the internet is called TCP/IP.
Each computer on the Internet has a only one of its kind internet protocol and each computer has a run of ports used to be in touch with other computers
“Ex: http (web pages) – port 80 FTP (file) – port 21”
1.10.2 Need of firewall:
We require a firewall if we have a network (called a trusted network) which is linked to any other network (called an entrusted network) which does not fit in to us (like the internet)
Security it will discontinue most hackers from in advance access to the networks.
A firewall can do something
…show more content…
For example:
One computer in Canada and second one in New Zealand
TCP/IP is also defining that how can data format and also give IP address to that data. It is also decide route of data means it’s also work with the help of router give path to data one computer to other computer.

1.11 DHCP (Dynamic Host Configuration Protocol) :
Whenever we want to configure a network we have to assign IP address to all computers in our network. If we are creating small network it is easy to assign an IP address manually but if we want to develop a large network we can assign IP address with the help of DHCP server. DHCP server provides automatically IP address to all computers and other information such as default gateway and DNS server address to the computers.
Now we assign IP address we have two options
1. Obtain an IP address automatically
This option we select when we create a large network.

2. Use the following IP address In this option we have three sub

Related Documents

  • Decent Essays

    Nt1330 Unit 7 Exercise 1

    • 556 Words
    • 3 Pages

    1. Ethernet Ethernet is a combination of computer networking technologies most commonly used in local, metropolitan, and wide area networks. 2. Server A computer or computer program that manages access and distributes information through a centralized service in a network.…

    • 556 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Implementing Firewall Filter Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network. First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    CS320 Assignment 1 Andrew McConnon 13349871 You want to connect different computers, at different locations, so that they can exchange data with each other. What are the different challenges that you need to overcome? Host Identification on small networks isn’t a problem as it can be set up with manual ways of addressing, but will be exponentially harder the larger a network becomes. Protocols, DHCP servers and addressing are a huge need if you want to create and sustain a large, expanding network.…

    • 399 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    The identity infrastructure is contained within Active Directory, which provides security, authentication, and authorization of identities (Training Solutions, 2014). The DHCP and DNS service are also provided to ensure reliable name resolution, and dynamic IP address assignment to the network devices that require dynamic IP address assignment. Finally, there are storage devices that contain a hybrid solution of storage area networks (SAN), and network attached storage (NAS).…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    THE DEFERENCES OF HANDLING SOCKET AND SERVERSOCKET First of all what is a socket? A socket is the one end –point of two-way communication link between two programs running over the network. This means the programs run on different computers, usually referred as the local and the remote computer.…

    • 1130 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The benefit of using this kind of system is that it makes certain files and documents more secure. As it assures only people with the right credentials too access specific pieces of data. Intruder Detection Systems An intruder detection system can track network and system activities for policy violations which would then send a report of what is happening on the network to a management station.…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The following are the top 10 types of packets: IPv4: Internet Protocol version 4 (IPv4) is the standard version of the internet protocol, that acts as the platform for standard internet protocols and existing internet models (ISP). Extensive use of this protocol led to exhaustion of IP addresses. Therefore, we are bound to use IPv6, in the near future. A feature called as sub-netting is used for IP address allocation. It is defined in RFC 791.…

    • 917 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The purpose of the internet layer is to organise or handle the movement of data on network. The meaning of movement of data is routing of data over the network. The main protocol used in the internet layer is IP (internet protocol), however ICMP (Internet control message protocol) and IGMP (Internet group management protocol) are also used in the internet…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    It also may include a firewall, virtual private network handling and other security functions. But, these can be handled by dedicated/separate devices. Browsers “A web browser (commonly referred to as a browser) is a software application for retrieving, presenting, and traversing information resources on the World Wide Web,, Basically, it allows any user to browse on the web (access data/information).…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    This also helps to detect strange traffic running across the servers 3. Secure Workstations: Creating user log in set ups so that only the corresponding person can access the network from a work station help to prevent lower security level personnel from gaining access. 4. Secure the Network: Access level assignments…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1380 Words
    • 6 Pages

    First to connect to the internet you need an internet service provider to have access to the internet which is a router to connect to your home network to the ISP. It can be wired or wireless connected to your home network. The web browser is a program which allows me to browse web pages such as my sync email account. You need a domain name to identify the IP address to have access; they are used in URLs to find particular web pages. URL first part is named a protocol finder and indicates what protocol should be used, the last part is a resource name and it identifies the IP address of where the resource is placed.…

    • 1380 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Internet was originally called the ARPANET, and in order to enhance the ARPANET to be enable may different types of computer networks to all communicate with each other, an open source protocol needed to be created, hence the development of TCP/IP. TCP/IP improved communications throughout the network and allowed all computers to easily communicate with one another. Another technology that helped expand the ARPANET to more users in a specific location was the development of the Ethernet. Ethernet is a coaxial cable that is still used today in many local area networks. Ethernet is highly effective in moving data from one computer to another at high speeds.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    General relativity is fundamentally incompatible with quantum mechanics- they have been at odds with each other since its discovery in 1915- relativity breaks down at the subatomic level and vice versa. A conjecture by two physicists may finally reconcile relativity with quantum mechanics and put an end to the chain of inconsistencies began by Hawking’s information paradox. Albert Einstein first discussed the concept of quantum entanglement in a 1935 paper co-written with his colleagues Boris Podolsky and Nathan Rosen. In the form of a thought experiment known as the EPR paradox, they demonstrated the incompleteness of quantum mechanics.…

    • 837 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays