Network Hardware and its Security Read and understand the situations outlined be
ID: 3675456 • Letter: N
Question
Network Hardware and its Security
Read and understand the situations outlined below and attempt to initiate the desired discussion:
When selecting a NIC to install, analyze and explain what an administrator should do if a motherboard supports more than one kind of expansion slot. Define wireless NICs and describe their advantages and disadvantages. Describe the symptoms that may indicate that two devices are attempting to use the same interrupt request (IRQ). Describe the factors to consider when choosing an NIC for a workstation or a server.
Explain why network engineers value VLANs. Include a discussion on reasons for using VLANs. Describe the advantages of VLAN trunking. Describe a distance-vector routing protocol suited to WANs. Describe how a bridge translates between two segment types.
Explain why multitasking does not mean performing more than one operation simultaneously. Be sure to define preemptive multitasking. Describe symmetric multiprocessing and asymmetric multiprocessing.
Describe three advantages of choosing a proprietary UNIX system. Describe the key difference between freely distributable UNIX and proprietary implementations. Explain how UNIX and Linux handle multiprocessing. Describe the UNIX memory model in terms of addressing scheme and virtual memory.
Describe who should conduct a security audit and explain its advantages, if any. Explain how to block traffic attempting to exit a LAN and discuss why an administrator would want to do this. Define secure shell (SSH) and explain threats it guards against. Include an explanation of the encryption algorithms that may be used with it. Describe the two phases IPsec use to accomplish authentication.
Explanation / Answer
Please find the answers below :
1)
If a motherboard supports more than one kind of expansion slot, refer to the NIC and PC manufacturers’ guidelines for information on the preferred type of NIC. If possible, you should choose a NIC that matches the most modern bus on the motherboard. For example, if a PC supports both ISA and PCI, attempt to use a PCI NIC. Although you may be able to use the older bus and NIC types without any adverse effects, some NICs will not work in an older bus if a faster, newer bus is available on the motherboard.
Wireless NICs, which contain antennas to send and receive signals, can be found for all of the bus types discussed in this chapter. One disadvantage to using wireless NICs is that currently they are somewhat more expensive than wire-bound NICs using the same bus type.
ny of the following symptoms could indicate that two devices are attempting to use the same IRQ: The computer might lock up or “hang” either upon starting or when the operating system is loading. The computer might run much more slowly than usual. Although the computer’s NIC might work properly, other devices - such as USB or parallel ports.
2)
Network engineers value VLANs for their flexibility. They can include ports from more than one switch or segment. Any type of end node can belong to one or more VLANs. VLANs can link geographically distant users over a WAN, and they can create small workgroups within LANs. Reasons for using VLANs include: • Separating groups of users who need special security or network functions • Isolating connections with heavy or unpredictable traffic patterns • Identifying groups of devices whose data should be given priority handling • Containing groups of devices that rely on legacy protocols incompatible with the majority of the network’s traffic • Separating a very large network into smaller, more manageable subnets.
3)
One advantage of VLAN trunking is its economical use of interfaces. For example, if you establish five different VLANs that span two switches, you can connect these VLANs using only one interface on each switch, rather than five separate interfaces. Trunking also allows switches to make efficient use of their processing capabilities. As when creating VLANs, you configure trunking through the switch’s operating system software.
o translate between two segment types, a bridge reads a frame’s destination MAC address and decides to either forward or filter it. If the bridge determines that the destination node is on another segment on the network, it forwards the packet to that segment. If the destination address belongs to the same segment as the source address, the bridge filters the frame. As nodes transmit data through the bridge, the bridge establishes a filtering database of known MAC addresses and their locations on the network. The bridge uses its filtering database to determine whether a packet should be forwarded or filtered.
4)
Note that multitasking does not mean performing more than one operation simultaneously. In UNIX, Linux, Windows Server 2003, and Windows Server 2008, the server performs one task at a time, allowing one program to use the processor for a certain period of time, and then suspending that program to allow another program to use the processor. Thus, each program has to take turns loading and running. Because no two tasks are ever actually performed at one time, this capability is more accurately referred to as preemptive multitasking - or, in UNIX terms, time sharing. Preemptive multitasking happens so quickly, however, that the average user would probably think that multiple tasks were occurring simultaneously.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.