.

Friday, April 19, 2019

Application Architecture Case Study Example | Topics and Well Written Essays - 1000 words

Application Architecture - Case Study ExampleThis is done using additional Internet addresses that have been reserved for this purpose. These special addresses are invalid in the Internet itself. The hosts using these addresses whitethorn communicate among themselves, but they cannot access the Internet directly. NAT In rules of order to make it easy for the profits administrator, the NAT translates all the personal and confidential IP addresses into inclusive IP addresses. This will require an incremental modification devoid of host and routers modification. Furthermore, the NAT has its own drawbacks for instance its performance is slow since each packet is processed onward translating it. Therefore the IP traceability also becomes complicated because data packets are hard to trace. 3 Tunneling Tunneling is also referred as port forwarding. Port forwarding is often used for establishing a secure data channel from issue office to the remote office corporate network by utilizing the Internet. One of the methods for deploying a tunneling protocol is to put together the WAN connection with port number on with allocation of the required service. For example, for accessing remote desktop for a payroll application, port number 3389 will be used with the service named as RDP service along with the specific IP address of the computer. As discussed earlier, PPTP developed by Microsoft. Likewise, PPTP is required for transmitting encrypted data everywhere the VPN. Besides, no data encryption is available on port forwarding configuration as match to tunneling because every tunneling route needs to be defined. This may create complex configurations that are difficult to manage. 4 Access Control List In a router, firewall, multi-layer switches etc. the Access Control List is characterized. If a data packet attempts to pass through a router, it will take in security rules and policies. In the same way, the users rights on the files and directories are identified t ie in to the ACL operating system. In order to check quality, the files and folders are read, write and executed. Thus, the ACL offers security for the network data administration, system files and folders. 5 Sub net Sub netting is described in document RFC 950, originally referred to the wedge shapedivision of a class-based network into sub networks, but now refers more generally to the subdivision of a CIDR block into smaller CIDR blocks (Subnetting, n.d). In IPv4, a single subnet only encloses 254 assignable IP addresses. The issues related to the broadcast are always triggered, generating network over-crowding and disruption in services. Therefore, these IP addresses should be managed properly in order to control congestion. However, o outstrip the above mentioned issues, the IP addresses are divided into smaller class C networks for better performance related to network management and security. In addition, to operate a corporate network, sub netting is needed in order to al locate private IP addresses to inbound networks as the spheric IP addresses are limited. The global IP addresses can be configured on the bases of WAN (Wide Area Network) devices. 6 Virtual topical anaesthetic Area Network (VLAN) The Virtual Local Are

No comments:

Post a Comment