WEEK 4 ESSAY QUESTIONS Instructions: Answer all questions in a single document. Then submit to the appropriate assignment folder. Each response to a single essay question should be about a half-page in length (about 150 words). 1. Communications within a computer network rely on numerous components for data to traverse from the initial sender of a message or file to the receiver at the distant end of the communication path. In addition to the media that the data travels across, the devices that guide the data packets through the network, and the protocols that establish end-to-end connectivity and negotiate the communication, network services play a critical role in providing the necessary addressing and name resolution services. Describe the following services and their role in network communications: ARP, DHCP, ICMP, SNMP, and DNS. 2. Modern organizations rely on the Internet for information and research necessary to stay competitive but this access can come with significant risk if they don’t take the necessary steps to safeguard their internal resources from outside attackers. In this week’s reading, various types of firewalls and firewall configurations were discussed. Describe the terms bastion host, DMZ, dual-homed firewall, screened host, and screened subnet and their roles in firewall architectures. 3. Many organizations employ a mobile workforce and/or provide the option of telework to their employees to allow them to work from home. In both situations, a secure means of accessing the corporate network remotely must be provided. Discuss the four main tunneling protocols used to provide virtual private network access between remote users and their corporate network.

    Question 1: Network Services and Their Roles In Network Communication

    Discourse analysis protocol(ARP) is a network protocol utilized in the intercharge of IP Discourse into DLC discourse or the visible discourse. ARP requests are broadcasted by a multitude intending to attain visible discourse where the visible hardware discourse is supposing by the multitude on the network possessing the IP discourse (Pandey & Saini, 2016). The chief office of ARP is to appear coercion the invention discourse also public as MAC discourse of a multitude from its already ordinary Internet Protocol discourse. Dynamic Multitude Configuration Protocol(DHCP).  The explicit role of DHCP is to convey and announce full multitude discourse that is sole. To restore any knowledge from anywhere on the internet extraneously an IP discourse it is unusable.

    Internet curb missive protocol(ICMP) is a troubleshooter that brings an falsity missive to the requesting beginning IP showing a amount that a multitude cannot be root coercion introduction of the satisfied. Its chief role is to announce on any highlighted network manifestation. Simple Network Management Protocol(SNMP) curbs integral the impressivities carried extinguished on network inventions as courteous as gain them public to the pertinent bodies that are the conductor who can fluctuate the values at succeed. Domain designate classification(DNS) is the jurisdiction that the internet locates the restricted multitude designates that are root and defined into internet protocol discoursees. The role of DNS is, to get a decent platform coercion emails from divergent domains.It helps disjoined multitudes to announce.

    Question 2: Firewalls and Firewalls Configurations

    A mound multitude is an intermediary unarranged the outside network and the persomal area network. Its role is to impress as a enclosure or else a bulwark layer that is aggressioned and prevents the multitude from aggression. demilitarized zone(DMZ). It is a sub-network that stands in unarranged an interior LAN, from the internet. Outside media are root in the DMZ thus at the distribution of the internet, excepting the surplus, of the internet LAN, sweepings close.

    Dual-homed firewall Just as the designate states, the firewintegral uses span or further intermediaries. The offices in the classification can be announced to the firewall, and the impressivities extinguishedside the multitude from the internet can suit to the firewall, excepting the span cannot announce straightly. The screened multitude brings knowledge from a multitude that is interlinked to simply the interior network. Any outside sound to adit the classification succeed feel to follow genuineness from the multitude. Screened subnet these firewalls feel three ease features legitimate coercion ease the extinguisheder undivided legitimate coercion enriching from the outside aggressions from the internet, the promote buffer that impresss as an intermediary unarranged the span phases of network and the third undivided that connects to the persomal edifice.

    Question3: Tunneling Protocols Used to Get Virtual Private Network Adit

    Point-to-point tunneling protocol(PPTP) is a network protocol that is legitimate coercion the whim of VPN. PPTP gets a TCP interlink with the VPN client and server. PPTP VPN server discourse is conveyed by the conductor of the servers. Layer 2 tunneling protocol(L2TP). Is a multitude networking platform used by ISP to prepare VPN impressivities? L2TP is detain gone they are near exposed to aggressions from the internet (Jahan et al., 2017).                                                                                                            

    L2TP/IPsec enables a unshaken to grant axioms balance the internet. And stationary, L2TP/IPsec maintaining the plane of ease in the knowledge. Securing axioms is dundivided with Triple DES (3DES) and also Axioms Encryption Standard (DES) by using ease keys generated from the Internet Key Exfluctuate higgling rule. Detain socket tunneling protocol (SSTP) is unarranged the types of VPN tunnel which gets a cem PPP commerce through aa SSL/TLS machine. The practice of SSTP is that it is near ceced by firewalls, differently L2TP.

    References

    Applebaum, A., Li, Z., Levitt, K., Parsons, S., Rowe, J., & Sklar, E. I. (2016). Firewintegral configuration: An contact of multiagent metaplane argumentation. Argument & Computation, 7(2-3), 201-221.

    Jahan, S., Rahman, M. S., & Saha, S. (2017, January). Contact restricted tunneling protocol adoption coercion Virtual Private Networks. In Networking, Classifications and Ease (NSysS), 2017 International Conference on (pp. 39-44). IEEE.

    Pandey, A., & Saini, J. R. (2016, March). ARP cache restitution coercion defending spoofing and poisoning aggressions. In Computing coercion Sustainable Global Development (INDIACom), 2016 3rd International Conference on (pp. 3487-3492). IEEE.