/
Control of Wide Area Networks Steven Powell Frederick Gallegos Payoff This article describes Control of Wide Area Networks Steven Powell Frederick Gallegos Payoff This article describes

Control of Wide Area Networks Steven Powell Frederick Gallegos Payoff This article describes - PDF document

sherrill-nordquist
sherrill-nordquist . @sherrill-nordquist
Follow
522 views
Uploaded On 2015-01-15

Control of Wide Area Networks Steven Powell Frederick Gallegos Payoff This article describes - PPT Presentation

1 Control of Wide Area Networks Steven Powell Frederick Gallegos Payoff This article describes the various types of wide area networks and their access methods and connective devices communications protocols network servic ID: 31957

Control Wide Area

Share:

Link:

Embed:

Download Presentation from below link

Download Pdf The PPT/PDF document "Control of Wide Area Networks Steven Pow..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

87-01-45.1 Control of Wide Area NetworksSteven PowellFrederick GallegosThis article describes the various types of wide area networks and their access methods andgroup of campuses.WANs are usually static in nature. Changes to them require rerouting telephone linesand installing modems. LANs on the other hand can be quickly reconfigured;Types of Wide Area NetworksThere are two basic types of WANs: centralized and distributed. Centralized WANs consist áAllowing network expansion and terminal changes to be accomplished through plug-ináSupport of a variety of applications and a large number of terminals.áFacilitating interconnectivity by means of gateways, bridges, and routers.áDistributing terminals to the most convenient locations rather than forcing them toáCentralized network management and monitoring of use and performance to ensure packets after they reach their destination. There are two types of frames: control frames forlink management and information frames for the transfer of information.)Network ServicesFrame relay and asynchronous transfer mode (ATM) are technologies used to supportFrame Relay Network Services.Frame relay is an extremely flexible and cost-effective technology that supportsto run dedicated links between all the endpoints on a private network. The other majorAsynchronous Transfer Mode Network Services.Asynchronous transfer mode (ATM) refers to a high-bandwidth, low-delay The Network Management SystemEvery major business wants to have the most efficient and economical operation of theNetwork TopologiesAlthough the star topology is the most popular WAN topology, a number of otherStar Topology.The star topology is highly reliable; loss of one node results only in the loss of aRing Topology.The ring topology uses link segments to connect adjacent nodes; each node isBus Topology.The bus topology is also not considered reliable. If the link fails, the entire segmentThe availability of network resources using this topology depends on the access controlMesh Topology.This kind of topology is highly reliable, because it provides a diverse set of áProtocol analyzers.áNetwork monitors.áNetwork management software.áGeneral statistical tools.áHybrid tools. Most analyzers come with simulation programs that allow network managers to gaugeNetwork MonitorsNetwork monitors track and statistically analyze traffic on network segments. As withprotocol analyzers, the device is physically connected to the segments being monitored.Network Management SoftwareNetwork management software and workstations are designed to monitor and report onHewlett-Packard's HP-OpenView, Sun Microsystems' SunNet Manager, IBM'sNetView/6000, and E-Comms' E-Commander. Novell's NetWare 4.1 offers reliableGeneral Statistical ToolsThese tools are designed primarily to provide statistical information about networkProTools' Network Control Series, EMC's DataReach, and TimeFinder.The InternetThe Internet was started in the 1960s by the US Defense Department's Advanced Research uses the Internet to disseminate the results of its research; the company prefers usingInternet because it is available 24 hours a day, every day. An oil company uses the InternetUsers can connect to the Internet in several ways: dialing in to a personal account on anPersonal AccountsWith this first alternative, service is limited to certain levels of accessÑfor example,Commercial GatewaysWith this approach, users must obtain an official Internet membership for their systems;Server SecurityServer security involves limiting access to data stored on the server. Although this field isare the use of static web pages and active dynamic Web page creation. These two methodsStatic Web PagesStatic Web pages are simply HTML files stored on the server. Many databasestored there occurs in the same manner that any other Web documents would be secured. One of the most straightforward ways to protect sensitive HTML documents is to limitDynamic Page GenerationFavored by large organizations, this method is gaining popularity as the technology togenerate Web pages instantly from a database query becomes more robust. A dynamic WebOne of the first security issues that a WAN security administrator must confront isDatabase ConnectionsWith most of the dynamic connectors to databases, a connection with full access mustbe granted to the Web server because various queries will need to access different tables orserver security crucial. For example, an ODBC data source given full administrator accessTable Access ControlStandard table access control, if featured in the user authentication system, is more intermediate users Ñ and so valid security is a must. Remember, a little knowledge can beUser-Authentication SecurityAuthentication security governs the barrier that must be passed before the user can accessExhibit 1 shows an example of a standard security login throughA Schematic Diagram of Different Types of Layers InvolvingThe HTML login is simply an HTML page that contains the username and passwordHTML form login security, however, must be implemented by hand. Often this meansSession SecurityAfter the user has supplied proper identification and access is granted to data, sessiondesigned for security, and as such is very insecure. Because data sent from one machine to this interception except by encrypting all of the information that flows both ways (seeNeed For Web Protection Levels (Encrypted) 1.Destru BasicBasicBasicNobasicNo Secure Internet/Intranet BasicBasicBasicNoBasicBasic StrongStrongBasicBasicBasicBasicBasic StrongStrongStrongStrongStrongStrongStrongStrong Threats Reputation Inadvertent Unauthorized Unauthorized Unauthorized2.Transactional Basic Basic Strong Basic BasicElecronical Strong Basic Strong Strong Strong together to provide a common routing protocol. A common routing protocol will giveAuthor BiographiesSteven PowellFrederick Gallegos Frederick Gallegos, CISA, CDE, CGFM, is the EDP audit advisor for the College ofBusiness Administration, California State Polytechnic University, Pomona CA. He has