Wednesday, August 7, 2019
Application Architecture Case Study Example | Topics and Well Written Essays - 1000 words
Application Architecture - Case Study Example This is done using special Internet addresses that have been reserved for this purpose. These special addresses are invalid in the Internet itself. The hosts using these addresses may communicate among themselves, but they cannot access the Internet directlyâ⬠. NAT In order to make it easy for the network administrator, the NAT translates all the personal and confidential IP addresses into inclusive IP addresses. This will require an incremental change devoid of host and routers modification. Furthermore, the NAT has its own drawbacks for instance; its performance is slow since each packet is processed before translating it. Therefore the ââ¬ËIP traceabilityââ¬â¢ also becomes complicated because data packets are hard to trace. 3 Tunneling Tunneling is also referred as port forwarding. Port forwarding is often used for establishing a secure data channel from head office to the remote office corporate network by utilizing the Internet. One of the methods for deploying a tunn eling protocol is to configure the WAN connection with port number along with allocation of the required service. For example, for accessing remote desktop for a payroll application, port number 3389 will be used with the service named as ââ¬ËRDP serviceââ¬â¢ along with the specific IP address of the computer. As discussed earlier, PPTP developed by Microsoft. Likewise, PPTP is required for transmitting encrypted data over the VPN. Besides, no data encryption is available on port forwarding configuration as compare to tunneling because every tunneling route needs to be defined. This may create complex configurations that are difficult to manage. 4 Access Control List In a router, firewall, multi-layer switches etc.; the Access Control List is characterized. If a data packet attempts to pass through a router, it will take in security rules and policies. In the same way, the userââ¬â¢s rights on the files and directories are identified related to the ACL operating system. In order to check quality, the files and folders are read, write and executed. Thus, the ACL offers security for the network data administration, system files and folders. 5 Sub Netting Sub netting is described in ââ¬Å"document RFC 950, originally referred to the subdivision of a class-based network into sub networks, but now refers more generally to the subdivision of a CIDR block into smaller CIDR blocksâ⬠(Subnetting, n.d). In IPv4, a single subnet only encloses 254 assignable IP addresses. The issues related to the broadcast are always triggered, generating network congestion and disruption in services. Therefore, these IP addresses should be managed properly in order to control congestion. However, o overcome the above mentioned issues, the IP addresses are divided into smaller class C networks for better performance related to network management and security. In addition, to operate a corporate network, sub netting is needed in order to allocate private IP addresses to inb ound networks as the global IP addresses are limited. The global IP addresses can be configured on the bases of WAN (Wide Area Network) devices. 6 Virtual Local Area Network (VLAN) The Virtual Local Are
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment