The foundation of working with networks is to understand basic networking techno
ID: 3662174 • Letter: T
Question
The foundation of working with networks is to understand basic networking technology concepts such as:
Network architecture.
Networking standards.
For this assignment, you are asked to:
Define the basic concepts of networking technology, including network architecture.
Select either the IEEE or the ISO as a standards-setting organization and explore that organization's Web site. Using this Web site and your textbook, answer the following questions with regard to standards:
Explain the purpose and role that standards-setting organizations play in establishing network standards.
Identify at least two standards in network technology.
Explain how standards can contribute to the advancement of the network industry.
Note the importance of the work done by your selected organization in the advancement of network technology.
Explanation / Answer
Q. Explain the purpose and role that standards-setting organizations play in establishing network standards.
A. In order to facilitate the development of open standards, however, organizations are needed that will coordinate the creation and publishing of these documents. Generally, these are non-profit organizations that specifically take a neutral stance regarding technologies and work for the betterment of the industry as a whole.
Q. Identify at least two standards in network technology.
A. 1.0 Information Technology Network Security Standards
The purpose of this appendix is to establish the requirements for implementing standards for the security of network infrastructure, communications, applications, interfaces, and data centers (hereafter referred to in this appendix as networks) used throughout the United States Department of Agriculture (USDA). This access control policy guidance is designed to protect information systems and data within the USDA.
2.0 User Account Management
Each agency, staff office, or shared service provider must establish and administer a user account management program for controlling access to USDA networks. This program must include procedures to establish, activate, modify, review, disable, and remove user accounts. All user account administration for agency networks will be performed by appropriately trained and authorized system security personnel in accordance with technical direction provided by the agency Information Systems Security Program Manager (ISSPM), Department policy, and Federal regulations. All user accounts are required to be documented and made available for audit by the USDA Office of the Chief Information Officer or other authorized parties.
Q. Explain how standards can contribute to the advancement of the network industry.
A. Standards are published documents that establish specifications and procedures designed to ensure the reliability of the materials, products, methods, and/or services people use every day. Standards address a range of issues, including but not limited to various protocols that help ensure product functionality and compatibility, facilitate interoperability and support consumer safety and public health.
Q. Note the importance of the work done by your selected organization in the advancement of network technology.
A. The recent advancement of wireless-based communication technology and electronics has facilitated the implementation of a low-cost, low-power sensor network. Basically, a ubiquitous sensor network (USN) consists of three parts: a sensor network consisting of a large number of sensor nodes, a base station (also known as a gateway) interfacing between the sensor network and an application server, and the application server controlling the sensor node in the sensor network or collecting the sensed information from the sensor nodes in the sensor network.
ISO/IEC 29180:2012 describes the security threats to and security requirements of the USN. In addition, it categorizes the security technologies according to the security functions that satisfy the said security requirements and where the security technologies are applied in the security model of the USN. Finally, the security functional requirements and security technologies for the USN are presented.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.