purchase essay papers , high involvement purchase essay, purchase essay online , computer purchase essay
Monday, June 17, 2019
Detecting rogue access point using Omnipeek software to analyze the Essay
Detecting rogue access point using Omnipeek software to analyze the wireless net - Essay ExampleThe readable Systems Interconnect reference model formulated by the International Standards Organization (ISO), defines at least seven storeys to enable communication through the communicate. These layers are the sensual layer, the data link layer, the network layer, the transport layer the session layer. According to peter and scarfone (2007), the TCP/IP layer provides network communication and is make up of four chief(prenominal) layers. These are the 2.0.2 Transport layer Provides connectionless services and connection oriented services amid various elements. It ensures reliability of communication and uses Transmission underwrite Protocol (TCP) and User Datagram Protocol (UDP).2.0.3 Internet Protocol layer (IP) this layer routes packets across the network. The IPv4 is the fundamental network protocol for TCP/IP layer. Other commonly used protocols are the Internet Group focus Protocol (IGMP) and the Internet Control Message Protocol (ICMP).The four main layers inter-work to transfer information between the hosts. The information is passed from the highest layer to the lowest layer with each layer adding more information. The lowest layer sends the information through the physical network the information is past passed upwards to its destination.Network security encompasses the various provisions made to a computer network infrastructure and the policies adopted by the network system administrator to cling to the network and the resources accessed through that network (Nazario, 2003). Various network security systems are in use. ... Other commonly used protocols are the Internet Group Management Protocol (IGMP) and the Internet Control Message Protocol (ICMP). 2.0.4 Hardware layer also known as the data link layer and handles communication on the physical network component. The Ethernet is the best known protocol. The four main layers inter-work to tra nsfer information between the hosts. The information is passed from the highest layer to the lowest layer with each layer adding more information. The lowest layer sends the information through the physical network the information is then passed upwards to its destination.Network security encompasses the various provisions made to a computer network infrastructure and the policies adopted by the network system administrator to protect the network and the resources accessed through that network (Nazario, 2003). Various network security systems are in use. The simplest involves one factor authentication through the use of the username and password, two factor authentications by using an ATM card or a mobile phone or three factor authentication using fingerprint or retinal scan. The intrusion prevention systems detect and appropriate any attacks posed by malwares, Trojans and worms (Simmonds et al, 2004). The intrusion detection systems on the other hand detect threats and inform the system administrator. As stated by Crothers (2002), the main methods used to detect the attacks on network systems are Signature base detection Anomaly based detection State full protocol analysisDifferent network systems have different network security technologies. The different network security technologies can be classified into four major groups. These are Network based intrusion detection and prevention system (IDPS) monitors
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.