Free Essay

Issc340

In:

Submitted By Airforce1
Words 3051
Pages 13
Wireless Security T 01/15/2015 ISSC340 American Public University System Eric Yocam

When it comes to dealing with wireless security, it happens to be a problem for everyone. The rise in devices being made during the last decade has put a strain on the amount of data being requested by users. The statistics show that 64 percent of Americans who have internet service providers that impose a broadband cap, have a meter for the cap that is presented. Recent studies have shown that five out of seven people’s meters don’t count your bits correctly. This allows for the chance of assuming what data is being used and being overcharged for what is not actually used.
Other statistics show that the laptops that were purchased in 2005 and later were equipped with wireless connectivity. This created an issue with wireless laptops connected to the corporate network, it presents a situation where a hacker could sit in the parking lot and receive information through laptops and other devices, or break in using the wireless card-equipped with this wireless connectivity option.
In order to test the strength of most wired and wireless networks the intrusion detection system was implemented. This is a software application that monitors the network activity for malicious activity or privacy violations. The way this works, is that the incidents get reported to a management station. The two different types of intrusion detection system are (NIDS) network based and (HIDS) Host based intrusion detection systems. The next step in security would be to assign a (IDPS) Intrusion detection and prevention system. When applied this tracks and monitors the system being used for hazardous or malicious activity. The purpose is to log and keep track of any activity that may seem like a malicious act in any way.

There are plenty of ways to ensure that you have your wireless security set to where just anyone cannot connect to it and use it. The different types of security that can be placed on your router are, WEP, WPA, and WPA2. WEP is outdated and usually is not used today for security reasons. It is defined as a security algorithm for 802.11 standard. The main purpose of WEP was to provide the data confidentiality of what a wired network would offer. There are two different types of authentication used with WEP, there is open system authentication, and shared key authentication. The general concept of open system authentication is that, the WLAN client has the access point and does not need to provide authentication. In shared key authentication, there is a four step handshake process. First, the client has to send an authentication request, there is a reply with the clear text challenge, the client encrypts the text, and the access point decrypts the response.
WPA is the next step in wireless security. This standard was developed and became available in 2003. The security protocol was developed by the Wi-Fi alliance to secure wireless networks, this was in response to the lacking security of WEP, which brought about concern for more security. WPA include a new feature to include a message integrity check to verify the integrity of packets.
WPA 2 is the most current protection for Wi-Fi available. This is the stronger version of WPA and is also known as “IEEE 802.11i-2004”. The same flaw remains with
WPA and WPA2 with weak passwords and weak passphrase, known as a brute force attack. There are still password cracking attacks, which can mostly be avoided using a

random password of 20 characters. There are programs used for brute force attacks, such as air crack suite.
There are steps that can be taken to ensure that the wireless network you are using is safe and secure. The first step is to verify the wireless network and base it according to your needs. One reason would be to weigh out the pros and cons of a wireless network against a wired and more secure network. One disadvantage is the shared bandwidth on multiple devices throughout your home, seeing how access points have an allotted maximum output. Also, it is known that wireless signals are easier to interrupt and be intercepted that wired networks. Even with the standards improving the security of wireless networks, it is still a means of concern.
The second step is to see what type of coverage you will need and make it custom to the needs of your home. If you have a small apartment, then there will be no need for a long range, but if you are in a big home, with a basement, then there will be a need for more coverage area. One thing to keep in mind is that the further the coverage, the weaker the signal, also in most cases the weaker the coverage, the slower the signal tends to be.
The third step is to plan how much bandwidth is needed. If you are doing your day to day tasks of school, social media, and watching videos on YouTube, then there will be no need to have to plan on how much bandwidth utilization will be accessed. Yet, if you work from home and have a job that requires much more bandwidth, then that is a thing to make sure that you have enough bandwidth for yourself, when sharing

with others. It would be best to contact your ISP and look at different plans according to the bandwidth that suite you the best.
The fourth step is to make a requirement list for the hardware needed. In traditional homes, all is usually needed is a modem/router and you are able to access the internet with the least amount of requirements. In some situations, you will need a switch or hub if you want to connect like a wired network, this seems to be more for people with experience and know how these devices work and want those devices as a just in case situation.
The fifth step is to perform a site survey. This can be used to test your wireless strength throughout your home. You want to make sure your access point is located in the perfect location, so that the signal reaches throughout the house or apartment that you are living in. This is an important step when deal with wireless connectivity, because you do not want a weak signal.
The sixth step is the final step, to make everything come together in one piece. This step is to make sure to implement security. Without this step, all of the other step do not matter. The first step to this is to change the default administrator password that is set up on the device. This is to protect you from anyone else who has that same device, they would be able to access everything, just by having the default password that comes on the device from the factory. The next step is to turn off and change the (SSID) service set identifier, doing this does not allow anyone else to see that you have a wireless signal, there for giving amateurs no reason to attempt to connect to your

network. If you want more control over your network, another means of security is to implement MAC address filtering, this filters out what can connect to your access point by checking the allotted MAC addresses that are assigned to your access point, and not allowing any device that is not assigned to the access point, via a different MAC address. Within this step, another security option that can be used but is not needed is a (VPN) virtual private network. If you are accessing (PII) Personally identifiable information, such as birth certificate, social security card, or banking information, a virtual private network would secure all of that information by tunneling the bits and making it much harder to intercept any of the information provided.
The next topic is (WDS) wireless distribution systems, the definition is enabling the wireless distribution of access points. This allows multiple access points to expand your wireless network without the wired infrastructure. This option saves MAC addresses of clients across access points, this provides access point-to-access point connectivity. There are two modes of WDS, the first is wireless bridging, which allows access point-to-access point to communicate with each other, yet do not allow wireless stations. The second mode of WDS is wireless repeating. This allows access point-to-access point to communicate with wireless stations and each other.
When it comes to mobile wireless security, there are many things that can keep you safe. Currently I have an IPhone 4s, which I keep a passcode on, which is generally not the safest for of security, but I don’t keep important documents or PII on my device, so this is not a huge concern for me. Most other and newer phones provide

different and better forms of security. For example, Apple has come out with the iPhone 5s, equipped with the technology of a fingerprint scanner. The fingerprint scanner was a great idea and provide much more security than the standard passcode/password format. After 5 wrong attempts with the fingerprint scanner, you are asked to provide an additional 4 digit pin code, if you set your device up in that manner. There have been plenty of studies showing how much of a better security option this is opposed to others. “Hackers” can theoretically guess your passcode every 1 in 10,000 tries. With all of the password cracking techniques out, there really isn’t a need to even guess passwords anymore, the application does all of the work for you. With the fingerprint scanner there is a 1 to 50,000 fail rate. There has been talk that some mobile companies are searching around for the benefits of creating kill switches on all cell phones, so far the data that has come up is, this is said to save $2.6 billion dollars a year on lost and stolen phones. This means that if someone steals, or finds a lost phone, there is no more use for it. As of right now, companies without and some with sim cards allow a stolen phone to still be sold. The service is stopped but the phone can still be used by someone else. This idea would most likely stop the theft and sale of stolen cell phones, making the phone useless, and in the end save everyone money. When dealing with mobile wireless security, something to point out is SMS messaging. The standard messaging system through the carrier is not a secure

messenger. None of the data being sent is encrypted in any way, and since all of this information is wireless, it makes it very easy for the information to be stolen. Introduced through applications for smartphones in the past 3 years or so has been IP based peer-to-peer messaging. A current example of peer-to-peer messaging would be the blackberry, in which the blackberry uses the instant messaging type interface to let everyone that has a blackberry contact each other, without any additional costs to them. Another, but different example of peer to peer messaging would be, the applications able to be downloaded on most providers’ application stores. One example of said applications would be “bitmessage”, which allows users to “send secure, encrypted, peer-to-peer instant messages.”(Ravenscraft, 2013).
A different example of peer-to-peer communication would be WhatsApp, Kik, and text me, these are all examples of peer-to-peer applications. All of these applications have the blackberry style interconnected interface, that allows messaging to multiple people, and also you can update your status on other social media websites like Facebook, Myspace, or twitter, while being connected through instant messaging. Apple also has their own peer-to-peer service, called iCloud messaging. This allows everyone with an apple product (IPhone, IPad, and IPod) to communicate with each other through mobile data and Wi-Fi through P2P messaging at no additional cost to the user. This is a very handy feature to have with apple for me, especially being in a different country and having high data rates for SMS messaging someone in the state, this option allows me to bypass the high mobile bill rate.

Information has been released saying that on all of the mobile carriers and cell phone providers come to an agreement, there will be one overall P2P messaging system that supports all platforms and connects everyone together. This would make more sense to be able to have any platform, yet contact anybody, but since there will always be rivalry’s, it is not said to come in to effect anytime soon, unless sells go even for all carriers. It would be a nice way to keep everyone connected.
Since mobile phones have become almost an equivalent to cheap computers, in terms of processing power and RAM, the sales have mobile phones have gone up and the sales of PCs’ have gone down 12%. Since most people use laptops and the mobile industry in a sense taking over, the only use for a PC is for gaming now-a-days. The sales of laptops have also increased, not nearly as much as the tablet sales, which has gone up 20% in the past year. With these numbers, no one see’s the PC lasting much longer.
With all of our newest technology being wireless, this presents the option of implementing Bring your own device (BYOD) to companies. This option from a security standpoint has it pros and cons. For example, using personal devices to access company information, and going home to where this information can be stolen off of most people’s lack of security from their home networks, isn’t a very smart idea. However, if the amount of information is limited to what people can access while under the bring your own device rule, then it may make sense to implement these sort of changes. The positive effect of this is, it boosts company morale, knowing that you can

use your own personal device to get your work done. This is why many companies are looking into implementing this idea into the work place. The thing needed to make this happen is to limit what information everyone can use and store on their own personal equipment, make sure they have all of the security aspects covered on their part, such as passwords and to make sure all of the data being taken is encrypted, and last making sure that if they view these files at home, that they have a secure enough network to do so. After Bring your own device (BYOD) there will be a new implementation called Join our cloud (JOC), this implementation will focus on network, application, and content that will build an workforce that is interconnected, without worrying about what has control over devices. This is a simple way for workers to get an easy understanding of company policies, and also access resources that happen to be shared across the company. With the amount of processing power they already have and rising, I believe that there will soon be a way to implement working on our smartphones. All of the readily available applications pretty much allow our mobile phones to do the same thing as laptops and PCs’, since that is the case, working on your phone to get things accomplished would be and easy way to get work done, without being distracted by opening multiple tabs to surf the internet. I believe that this will be the next role in how companies run businesses, and this may be a promising factor with the younger generation, and them being somewhat attached to their phones.

Conclusion
With the way security is being implemented on our home network, everyone seems to be lacking, yet it doesn’t seem to be a concern in the world for most people. As wireless security becomes more and more unstable, there will be a call for a higher standard for more than WPA2 on our home based networks, and more than just passcodes on our mobile devices. As implemented, the fingerprint scanner is pretty much fool proof, yet only around 20% of users with that secure technology actually use it. It takes the attention of getting information stolen for anyone to realize it is time have more security for all of your devices.

References
Michael, Cooney. (September 21, 2012). 10 Common mobile security problems to attack. Retrieved from http://www.pcworld.com/article/2010278/10-common-mobile-security-problems-to-attack.html

Melanie, Pinola. (n.d.). How to encrypt the data on your android phone or iPhone. Retrieved from http://mobileoffice.about.com/od/mobile-devices/a/How-To-Encrypt-The-Data-On-Your-Android-Phone-Or-Iphone.htm

Unknown (August 15, 2014). Securing smartphones. Retrieved from http://help.unc.edu/help/encrypting-cell-phones/

Ian, Paul. (October 15, 2013). Security to go: Three tips to keep your mobile data safe. Retrieved from http://www.pcworld.com/article/2052810/security-to-go-three-tips-to-keep-your-mobile-data-safe.html

Robert, Baldwin. (October 26, 2013). Don’t be silly. Lock down and encrypt your Smartphone. Retrieved from http://www.wired.com/2013/10/keep-your-smartphone-locked/

It business edge. 2014. Top 10 Strategic Trends for 2014. [ONLINE] Available at:http://www.itbusinessedge.com/slideshows/top-10-strategic-technology-trends-for-2014-04.html. [Accessed 24 May 14].

Sarah Smith. 2014. Telecommunication Electronics. [ONLINE] Available at:http://www.prnewswire.com/news-releases/telecommunication-electronics---global-trends-estimates-and-forecasts-2011-2018-250784571.html. [Accessed 24 May 14].

MDSL BLOG. 2014. World leading Technology Lifestyle. [ONLINE] Available at:http://www.mdsl.com/resources/mdsl-blog/latest?limitstart=0. [Accessed 01 May 14].

Craig Wittington. 2014. 2014 outlook on telecommunications. [ONLINE] Available at:http://www.deloitte.com/view/en_US/us/Industries/industry-outlook/839e85e47142b310VgnVCM2000003356f70aRCRD.htm. [Accessed 16 April 14].

Huawei. 2014. Telecom industry trends in the next decade. [ONLINE] Available at:http://www.huawei.com/en/about-huawei/publications/communicate/hw-080991.htm. [Accessed 15 May 14].

RCR Wireless. 2014. Blackberry moves beyond mobile devices. [ONLINE] Available at:http://www.rcrwireless.com/article/20140523/mobile-minute/blackberry-moves-beyond-mobile-devices-rcr-mobile-minute/. [Accessed 23 May 14].

Similar Documents

Free Essay

Issc340

...2. Literature Review Many network applications are built on top of TCP. And many are continuing to be built on TCP in the future. Up to date studies show that several alternatives have been proposed to lessen the poor end-to-end performance of the unmodified TCP in the wireless medium. The protocols in this section will point out the advantages and disadvantages of each approach. • Congestion Avoidance: It is assumed that all losses are due to congestion avoidance, which becomes quite problematic over wireless links. Congestion avoidance is a way to deal with lost packets. In packet-switched networks, packets move in and out of the buffers and queues of switching devices as they pass through the network. A packet-switched network is often referred to as a “network of queues”[W. Stevens 2]. A characteristic of packet-switched networks is that packets may arrive in bursts from one or more sources. Buffers help routers absorb bursts until they can catch up. If traffic is excessive, buffers fill up and new incoming packets are dropped. Increasing the size of the buffers is not a solution, because excessive buffer size can lead to excessive delay. Congestion can occur when data arrives on a fast LAN and gets sent out a slower WAN [Allen 2]. Congestion can also occur when numerous input streams arrive at a router whose output capacity is less than the sum of the inputs. Now, any host injects packets at anytime and those packets are variable in size, which makes predicting...

Words: 702 - Pages: 3

Free Essay

Issc340 Week1Assignment

...Name: Date: October 11, 2014 ISSC340 Week 1 Assignment (3% of Grade) APUS/Sanford Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) I LAN is define as a local area network which consist of a croup of computers that are within the same geographical location such as a home, or building, or even a group of small buildings. The architecture that builds a LAN all includes these components. First and foremost it is the actual network topology and how it is laid out, weather this is by wire or wireless. Next is the network operation system or NOS, which is what manages all the resources that are within the network. This is usually a server of some sort. Another main part of the network is the network interface card or NIC, this serves at the actual interface between the network and the computer. 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) A network operation system (NOS) can be defined as a management system on a network that enables the provisions of one or more client or clients. It is a component that runs within a server that provides multiple users within a network, also can provide file and print servers, can provide a gateway for internet access, and can also implement a wide array of network securities...

Words: 335 - Pages: 2

Free Essay

Issc340 Week 4

...Name: ___________________________Date: ____________________ ISSC340 Week 4 Assignment (3% of Grade) Lesson 4 Review: LAN Topologies The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. What are the two methods that Carrier Sense Multiple Access (CSMA) employs to handle messages that are sent simultaneously? (Min. word count: 15) Carrier sense multiple access methods are detection where a transmission is cancel when collision is detected and avoidance where transmission is delayed. Which topology would you use when unable to install network cable? (Min. word count: 15) Mesh topology because is provides has separate cables for each connection, meaning a cable can break without interfering with the rest of the network. What is inherent in mesh topologies that enable them to provide high reliability? (Min. word count: 20) Mesh topology provides fault tolerance by having separate cables for each connection, allowing any one cable to break without interfering with the rest of the network. What are advantages of star topologies? (Min. word count: 10) Star topology gives great fault tolerance as any device/cable failure will not affect the rest of the network. Compare the two modes supported by wireless topologies. (Min. word count: 20) In ad-hoc mode data in the network is transferred to and from wireless network adapters connected to PCs. An infrastructure network enables you to...

Words: 454 - Pages: 2

Premium Essay

Issc340 Week 1 Assignment

...Name: _Aaron Hancock_ Date: _12OCT2014_ ISSC340 Week 1 Assignment (3% of Grade) APUS/Sanford Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) The main architectural components are 1: The network's physical topography (how the nodes are connected) 2: The access method (how the nodes access the transmission medium) 3: the transmission technique (how information passes through the network) 4: the transmission media (wired or wireless) 5: the use of specific protocols (the language used to communicate between computers) 6: the LAN's inter-connectivity (how the LAN shares with other networks) 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) A network operating system (NOS) manages the resources used within the network and enebles select services to select nodes. A NOS consists of two main components: a server component and a client component. The server component is the most complex component that runs on the server. The server component can do many things, to include; manage multiple users, provide access to files and printers, provide internet access, and enforce network security protocols. The client component runs on the client machine and enables the client to participate on the network. A NOS client component...

Words: 270 - Pages: 2

Free Essay

Issc340 Week 1 Assignment

...Name: Date: ISSC340 Week 1 Assignment (3% of Grade) Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) The main architectural components of any LAN starts with the layout for how the nodes connect, the access method (which is how the node gain access to a transmission medium), the transmission technique (which is how the information passes through the network), transmission media (which is defined by either wired or wireless connections), the use of very specific protocols (which are sets of rules that define how the computers communicate and define the LANs interconnectivity), which then determines how the LAN shares information. 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) One of the biggest differences between a Network Operating System and a regular operating system is that unlike the OS which can run a single computer, the Network Operating System can run multiple computer on a network at once and allow the network to continue running. The Network Operating System is an essential element of the LAN that can consist of server components and a client component. The server components have multiple responsibilities that can range from managing multiple users on a network, providing access to file...

Words: 297 - Pages: 2

Premium Essay

Issc340 Week 6 Assignment

...Name: Jerry Cunningham Date: 16 March 2015 ISSC340 Week 6 Assignment (3% of Grade) APUS/Sanford Lesson 6 Review: Transmission Media The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What is the difference between standard voice-grade cabling and data-grade cabling? (Min. word count: 30) When determining the difference between voice-grade cabling and data-grade cabling, user much keeps in mind that twisted pair cables such as voice grade can support data speed of 19Kbp up to a distance of six miles. On the other hand data grade cabling have a speed of to 100 Mbps. 2. True or false: A diameter of a 22AWG twisted-pair cable is smaller than a 26AWG twisted pair cable? Explain… (Min. word count: 10) The answer would be false because due to being bigger in the numbers of AWG the diameter of the cable would be much smaller 3. In which frequency bands to do short-range wireless transmission operate? (Min. word count: 10) When dealing with frequency band short-range wireless operates in both 2.4(Ghz) microwave band and 5 (Ghz) band 4. What are the two types of light source used to transmit signals over optical fiber? (Min. word count: 10) According to textbooks, the two different types of light source use to transmit signals over optical fiber are: analog and digital data 5. True or false: Bluetooth is a good example of short-range wireless transmission...

Words: 297 - Pages: 2

Premium Essay

Issc340 Final Paper

...For over the past several decades, information technology companies have been striving to figure out new and more effective ways to ensure that their computers and associative equipment, as well as, their clients’ devices are secure from unwanted intrusions. As computers and other electronic devices become more sophisticated and start storing more and more personal information, which includes, but is not limited to the development of technologies such as the fiber-optics, satellite communications, Bluetooth and the innovation of cloud storage, users are attempting to ensure their personal items are safe. However, while device users are trying to ensure their items are secure, there are the opposing parties that are constantly attacking and attempting to infiltrate any and all defenses posed by a target computer. An attacker can gain personal information, such as finance data, including credit card information as well as account numbers, and other important information relevant to your life. These attempts can eventually lead to success and jeopardize the people being attacked. These attacks are becoming more sophisticated and complex as well, meaning not only that technologies need to be evolved and enhanced, but also that the user needs to be more conscious than ever of exactly what they are doing on their systems. According to Dictionary.com Network security is “The protection of a computer network and its services from unauthorized modification, destruction, or disclosure”...

Words: 3328 - Pages: 14

Premium Essay

Issc340 Week 1 Assignment

...Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) There are several main architectural components of a LAN. Included is the physical topology of the network determining how the nodes on the network are connected. Access methods are needed on the network to determine how the nodes will access the transmission mediums. The networks transmission techniques and the transmission media determine how the information will be passed throughout the network and if the network will use cables or be wireless. Protocols are a main component of a LAN because they lay out how the various machines will communicate between each other. The LAN’s interconnectivity is another main component because it determines how the information on its own network will be shared with other types of networks. 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) The network operating system (NOS) allocates resources throughout the network and allows sharing of services to its clients. There are two different parts of the NOS, the server portions and the client portions. The server portion of the NOS will be more complex than the clients because that runs the servers and consists of many more tasks. The server portion of the NOS will have many functions...

Words: 344 - Pages: 2

Free Essay

Issc340 Week 2 Assignment Lesson 2 Review: Wide Area Networks

...Name: ___ ____________ Date: __ 2013_________ ISSC340 Week 2 Assignment (3% of Grade) APUS/ Lesson 2 Review: Wide Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What is a T1 circuit? (Word count: 15-25) ____A T1 circuit is a DS1 WAN technology that is comprised of 24 x 64 kbps data channels and 1 x 8 kbps allotted for signal and network management for a total of 1.544 Mbps. It is versatile because data types can be divided into voice, video, and data channels from one T1. ________________________________________________________________________________________________________________________________________________________ 2. A statistical multiplexer provides each user with … (Word count: 15-25) ____bandwidth based on demand on the circuit as it is available. This is different and more efficient than TDM where each user is slotted a given bandwidth whether it is used or not. __________________________________________________________________________ ______________________________________________________________________________ 3. What does a SONET add/drop multiplexer do? (Word count: 15-25) ____It provides the capability to add or extract part of the data payload without completely demultiplexing or remultiplexing the signal.____________________________ 4. Describe an ATM cell … (Word count: 15-25) ___ATM is a connection-oriented, packet-switching technology that...

Words: 299 - Pages: 2

Premium Essay

Issc340Wk1

...ISSC340 Week 1 Assignment (3% of Grade) Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) There are six parts to the to the LAN architecture components which include the network’s physical topology, the access method, the transmission technique, transmission media, protocols, and LANs interconnectivity. The architecture is the layout of how the network will be connected. The access method is how a particular node (network component) will gain access to a transmission medium. The transmission technique is how data passes throughout the network. Transmission media is the connection to the network whether it be wired or wireless. The protocols are the set of rules that defines how the nodes will communicate with each other. Last but definitely not least is the interconnectivity which determines what and how information is shared. 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) The network operating system (NOS) is what manages resources of the network and allows sharing of services to its clients. There are two different parts of the NOS, the server portions and the client portions. The server portion of the NOS is the more complex portion because it is what manages who can access what resources. It is...

Words: 330 - Pages: 2

Premium Essay

Issc 340 Assingment 2

...Name: Fabian Calle-Calle Date: 11 Feb 2015 ISSC340 Week 2 Assignment (3% of Grade) Lesson 2 Review: Wide Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What is a T1 circuit? (Word count: 15-25) A T1 circuit is the most common connectivity method in the United States and Japan and it is 24 different channels of voice and data that carries signals at a speed of up to 1.544 mbps 2. A statistical multiplexer provides each user with … (Word count: 15-25) The ability to have a faster connection depending on the transmission trends by switching between channels according to the demand of the network 3. What does a SONET add/drop multiplexer do? (Word count: 15-25) It provides the capability to add or drop part of the transmission payload without the overhead of completely demultiplexing and remultiplexing the entire signal. 4. Describe an ATM cell … (Word count: 15-25) It is a data frame that is always 53 bytes long that serves as the basic unit of ATMs packets switching technology 5. Which technologies provide affordable high-speed connections for home-based networks? (Word count: 15-25) There are three main methods of connecting to the internet that is available for an affordable price. Cable Internet which is the most common, and reliable this method provides a good amount of speed for a reasonable price. DSL connections is the cheapest high speed connection that...

Words: 302 - Pages: 2

Premium Essay

Avionics Tech

...ISSC340 Quiz 1 APUS Part 1 of 1 - 1.25/ 1.25 Points Question 1 of 5 0.25/ 0.25 Points The first three fields in an IPv6 address are equivalent to an IPv4 network ID. What is the term for this part of the address? Correct A.Site prefix B.Interface ID C.Subnet ID D.MAC address Answer Key: A Feedback: That is correct! Question 2 of 5 0.25/ 0.25 Points The IP address for Jack's laptop is 192.168.1.103. Which of the following statements about Jack's network is true? A.Jack's network is a server-based network. B.Jack's network is a directory-based network. C.Jack's network uses IPv6 addressing. Correct D.Jack's network uses private IP addressing. Answer Key: D Feedback: That is correct! Question 3 of 5 0.25/ 0.25 Points Which of the following components manages network resources and enables the provision of services to network clients? A.Internet Protocol version 6 (IPv6) Correct B.A network operating system (NOS) C.A network interface card (NIC) D.A non-dedicated server Answer Key: B Feedback: That is correct! Question 4 of 5 0.25/ 0.25 Points Any addressable and manageable device on the network other than the network cabling is referred to as a: Correct A.node. B.domain controller. C.back end. D.front end. Answer Key: A Feedback: That is correct! Question 5 of 5 0.25/ 0.25 Points Most home networks are: A.mainframe networks. B.server-based networks. Correct C.peer-to-peer...

Words: 275 - Pages: 2

Premium Essay

Week 5 Assignment

...Name: Charles Buchanan Date: 12/07/2014 ISSC340 Week 5 Assignment (3% of Grade) APUS/Sanford Lesson 5 Review: Networking Models, Traffic and Devices The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. Describe the three modes of communication available on a network. (Minimum word count: 60) Whenever we connect devices there must be away for one device to communicate to another. The three basic modes of operation annoy network are Simplex, Half-Duplex, and Full-Duplex operation. in simplex operation, a network cable or communication channel can only send information in one direction. Half-duplex operations are capable of sending information in both directions between nodes, but only one direction can be utilized at a time. Full-duplex operation is a connection between two devices and is capable of sending information in both directions simultaneously. 2. List the seven layers of the OSI model, including both layer number and name for each. (Minimum word count: 20) The Open Systems Interconnect (OSI) model has seven layers. The application, presentation, session, transport, network, datalink, and physical layers. 3. Describe a protocol data unit (PDU). (Minimum word count: 30) A protocol data unit (PDU) is an open system interconnection term use in telecommunications that refers to a group of information added or removed by a layer of the OSI model...

Words: 500 - Pages: 2

Premium Essay

My Paper

...Name: _Terrence Pryor__________________________ Date: 09/06/2014____________________ ISSC340 Week 3 Assignment (3% of Grade) APUS/Kageorgis Lesson 3 Review: Networking and the Internet The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What is an extranet? (Minimum word count: 30) An intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the Internet securely._________________________________________________________________________________________________________________________________________________________________________________________________________________________________ 2. Describe the function of a firewall. (Minimum word count: 70) A firewall is a system designed to prevent unauthorized access to or from a private computer network. They are frequently used to prevent unauthorized Internet users from accessing private networks that are often described as intranets which are connected to the Internet.___________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ 3. Which tunneling protocols are commonly...

Words: 300 - Pages: 2

Premium Essay

Issc340Week3

...ISSC340 Week 3 Assignment (3% of Grade) Lesson 3 Review: Networking and the Internet The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What is an extranet? (Minimum word count: 30) An extranet is an internal network that allows users to share information without making it public. It is similar to a business library that allows only employees to have view the content. 2. Describe the function of a firewall. (Minimum word count: 70) The function of a firewall is to control the flow of information between the internet and private networks. The function of a firewall within a network is similar to a barrier door or gate. It serves as the first line of defense and assists in preventing network attacks. Another way to think of a firewall would be a security guard or metal detector. As information is passed to and from different networks, the firewall is inspecting and looking out for suspicious content. 3. Which tunneling protocols are commonly used by VPNs? (Minimum word count: 25) The four most commonly used tunneling types for VPN’s are L2TP, IPSec, PPTP, and SSL. L2TP is layer to tunneling protocol and does not provide encryption, IPSec is another an encryption and authentication method that is very time consuming and expensive. PPTP is point to point tunneling and the most supported by VPN. And SSL is secure socket layering and does require software installation. 4. Describe a differential backup...

Words: 386 - Pages: 2