StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Developing Computer Networking - Essay Example

Cite this document
Summary
The paper "Developing Computer Networking" describes that computer networking has been developed over the years and this has brought many advantages in today's business society. With computer networks, it is possible to share resources and information…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
Developing Computer Networking
Read Text Preview

Extract of sample "Developing Computer Networking"

Introduction Computer networking has been developed over the years and this has brought many advantages in the today's business society. With computer networks, it is possible to share resources and information. Information can be stored in a common location and this location be put in a network where everyone who can access the network will have the chance to access it and therefore save them the trouble of having to look for that information and carry it using external storage devices. The network also makes it possible to share resources like printers and hard drives. This therefore reduces costs for of having to buy these resources. Proposed client-tier architecture The application architecture that I better and promises better security is that of 3-tier architecture. In this aspect the server will be installed in a data center with the server of the server program. Three-tier architecture has various layers with various functions. 3-tier architecture. The 3-tier client/server architecture was introduced to eradicate the problems that were associated with 2-tier architecture. With this architecture, a middleware lies between the server and the client. They are implemented in several ways, which include implementation as a message server, or application server or processing monitors. The functions of the middleware are queuing, execution of applications, staging of the databases, and prioritization for work in progress (Wegner, & Peter, 2007). This architecture improves performance when the number of users is increased. It has the advantage of flexibility when compared to 2-tier architecture. One of the downsides of this architecture is the fact that the development is more complex than that of 2-tier applications. There are two types of 3-tier architectures 3-tier with message server In this type of 3-tier architecture, the messages are processed and prioritized asynchronously. This is done in such a way that the messages have a header which contains priority information, address and identification number. The message server provides a link to the relational database management system and other sources of data. Messaging systems are good alternatives to wireless infrastructures (Gorit, Dreoh, & Jeri, 2006). This architecture allows the main body of an application to run on a shared host instead on running on the his machine which is already overloaded due to its minimal resources (Rabaugh et al, 2001). The application server shares the sections of the business logic, computational and data retrieval engine. The good thing about this architecture is the fact that applications are scalable compared to 3-tier with message server. Furthermore, the installation costs are less on a single server compared to a situation where maintenance is done on each of the client machines. In the payroll program, the users will be configured so that they can access the server which is installed in a central location. The reason why I prefer this architecture is that one application program will be acquired and the rest will be in the server machine. It will be cheaper. The cost will be reduced in terms of purchasing the software that will be installed. This is because in this case one application software will be purchased which will be installed in the server. Given the many users who are going to use the program, it will mean that the applications would be bought for every user who will be required to use the payroll program. Another cause for reduction of cost is that of maintenance. With this architecture, there will be maintenance of the server machine only. Maintaining one application is easier and cheaper in terms of expertise who will undertake the maintenance (Orfali, Dan, & Jeri, 2006). How to prevent interception There are mitigation strategies that are used to eradicate the risks that are associated with interception attacks. For spoofing and ARP poisoning, one way on which this can be mitigated is by using IP addresses which are static. Also the network administrator should make use of ARP tables which are static. By exploiting CLI commands in UNIX and windows operating systems, the network administrator will know all the IP addresses of all the hosts that are found in the network. For the large networks, the network administrator will be required to have port security features that are available for the switch. Switches should be protected with this approach. One example of a port security feature is to have one MAC address to be associated with each of the physical ports of the switch. This will prevent the attackers from changing the MAC address of their machines. This way, switch security features will have been eradicated as the attackers will not have a chance to change the MAC addresses. The issue of spoofing will also be eradicated with this move. This is because it will be hard for attackers to change the MAC addresses of the computers which are being used (Badenhorst & Ellof 2007). Another mitigation strategy is to have ARP monitoring tool installed in the network. It is important to have network administrators understand what ARP tool will do. With the use of this tool, attacks from ARP poisoning will be avoided. It will make it easier to safeguard the security and the operation of the switches because ARP reporting and replies will be protected (Angell 2007). To prevent phishing and other email security vulnerabilities, organizations should install enterprise level security software in the network. It is advisable that this security software be able to check messages which are going out of the network and also those that are coming into the network. This will prevent messages from transmitting spam from networks that have been compromised (Aceituno 2005). Also, users should be advised to change passwords frequently. This will prevent attackers from using brute force attack and, therefore, making it easier to guess passwords that are used by staff. Users should also be advised to use passwords that are strong. They should not use dictionary words or any combination of their names. Staff should also be trained about the internet security issues so that they are aware of what is going on. Most users are attacked because they are not aware of what is going on. They should be aware that their data and information is company assets and should be well guarded. They should be taught about the importance of having their passwords as their own and not sharing with anyone (Anderson 2001). Host-based firewall is a crucial layer defense that a client can use. It filters any data that are leaving or entering a specific host computer. There are operating systems that have integrated personal firewall such as internet connection firewalls. When activated, it tracks all the data exchange. References Aceituno, V 2005, 'On information security paradigms', ISSA Journal, vol 6, no. 3, pp. 2-34. Anderson, R 2001, Security engineering: A guide to building dependable distributed systems, John Wiley and Sons, New York. Angell, I 2007, 'Computer security in these uncertain times: The need for a new approach', The Tenth World Conference on Computer Security, Audit and Control, London. Badenhorst, K & Ellof, J 2007, 'Computer secutity methodology: Risk analysis and project definition', Computer and Security, vol 8, no. 9, pp. 339-346. Baskerville, R 2008, Designing information systems security, John Wiley and Sons, New York. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Security Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Computer Security Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1465533-computer-security
(Computer Security Essay Example | Topics and Well Written Essays - 1000 Words)
Computer Security Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1465533-computer-security.
“Computer Security Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1465533-computer-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Developing Computer Networking

Evolution of video gaming and computer networking

This paper will seek to provide a basic analysis of evolution of video gaming and computer networking.... This paper will seek to provide a basic analysis of evolution of video gaming and computer networking.... oday there is up to the eight generation of video games and computer networking.... As time went by, computer-networking technology started maturing as in the 1970s, there were introductions of packet based computer technology....
11 Pages (2750 words) Research Paper

The Role of Computer Technology in the Human Race

This paper ''the Role of computer Technology in the Human Race'' tells that the computer technology is the governing force behind the survival of man in the present world.... computer technology has been a source of numerous changes that could not have been thought of before it.... Literally speaking, computer technology refers to the process of planning, constructing, designing and implementing a computer system....
8 Pages (2000 words) Thesis

The Advantages of Wireless Networking

1 networking, from the protocols that control the wireless network concept.... The history of wireless networking discovery takes us back to 1888 when Heinrich Herz discovered the first radio wave.... A desktop computer usually has an internal card, and may or may not have antennas.... In the years that followed, other scholars were further developing the radio frequency concept....
4 Pages (1000 words) Research Paper

History of Operating Systems

These include access points, broadband, cable, content networking, contact center solutions, data center networking, network management, optical, routing, security, VPN, storage networking, switching, unified communications, video, voice, and wireless (networking, 2004).... Colossus was an electronic computer built in Britain at the end of 1943 and developed to crack the German coding system - Lorenz cipher.... Another general-purpose computer of this era was 'ENIAC' which was completed in 1946....
6 Pages (1500 words) Essay

WAN Structure: Advantages and Protocols

Consequently, to achieve the benefits from the computers, those In this situation, computer networking becomes essential for the company.... A computer is brilliant device that facilitates people keep and maintain information as well as perform operations on massive amounts of data quickly.... However, a computer network is basically a set of computers connected through cable or other media so that they can share resources, communicate, and distribute information....
6 Pages (1500 words) Term Paper

Reliance on Computer Technology

The current paper under the "Reliance on computer Technology" highlights that computer technology has enabled the society to excel by transforming and making work easier but it has also led to a lot of side effects that are negatively affecting society.... Currently, a large percentage of people around the world have got access to a personal computer either at home, workplace, libraries or at internet cafes.... Every single day, most people spend a significant amount of time in front of a computer screen sending e-mails, shopping, banking online, talking to friends on social media platforms or doing academic research....
6 Pages (1500 words) Essay

Development of Computers and the impacts on society through the time

A computer is an electronic device that executes instructions and process data faster and more accurately than humans (Jain 2).... he word computer was first used in 1613 to describe a human who performed calculations and this definition remained the same until the end of 19th C when individuals began to realize that machines perform calculations faster and more accurately as compared to humans.... The first electronic digital computer introduced in 1950's used vacuum tubes, followed by the computers that used transistors (Jain 1)....
4 Pages (1000 words) Essay

Computer Networking Analysis

The "computer networking Analysis" paper focuses on the critical analysis of the major issues in the variety of computer networks.... Before the development of the internet, there wasn't widespread internet networking and this was around the 1950s.... It's also due to the fact it's the national standard for networking.... he networking operating system used will depend on the size of the network.... A computer network is a connection of more than one computer; this is done to share files....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us