Order for this Paper or Similar Assignment Writing Help

Click to fill the order details form in a few minute.

Posted: August 13th, 2022

ARP: Address Resolution Protocol is the process of mapping an IP address

Questions
Your Name
Your Institution

Questions
1. ARP: Address Resolution Protocol is the process of mapping an IP address to a Media Access Control. It therefore serves the function of translating 32-bit addresses to MAC addresses which are 48-bit and vice versa.
DHCP: Dynamic Host Configuration Protocol allows the server to take a scope of numbers allocated to a network and allocate them to a specific computer as an IP address.
ICMP: Internet Control Message Protocol is used by devices on the network to determine whether messages are successfully reaching the recipient. The ICMP helps devices detect communication issues across the network.
SNMP: Simple Network Management Protocol uses agents in the form of utility programs to monitor the networks behavior and traffic and store the information on management information base (Rouse, 2019). The utility programed are usually loaded on devices such as routers, servers, or hubs.
DNS: A domain name service aid TCP/IP protocols identify hosts by their IP addresses. DNS servers translate host addresses instead of giving users the task of memorizing the domain names.

2. Bastion host: A specialized computer that acts as a gateway from a public to a private network. It is exposed to the public network and outside a firewall or between two firewalls as it logs access on a proxy server (Bittlingmeier and King, 2003).
DMZ: a subnetwork that faces outward to create a node that is exposed to attacks before they reach the main network. The role of a DMZ is to add an extra layer of protection.
Dual-homed firewall: a technique whereby two network interfaces are placed between a trusted and untrusted network. The firewall is application-based and its role is to provide secure services to untrusted networks.
Screened host: both a proxy server and a router are used as security layers. The role is to form a closed network where the router is the first to screen for disallowed access then the proxy server acts as the web server’s front end.
Screened subnet: the use of three components that act as firewalls. Mostly routers are used and they make up the internal, external and perimeter components. The role is to offer a public interface, buffer, and additional subnet.

3. The four main VPN access tunneling protocols are OpenVPN, PPTP, SSTP, and L2TP/IPSec. PPTP is known as Point-to-Point Tunneling Protocol and it is the easiest method to use. It requires only a password, username and IP address to connect to the corporate servers. The protocol use TCP ports to send and receive data across the network to the server. However, this method was phased out due to numerous vulnerabilities that were prone to attacks. There is then the use of Layer 2 Tunneling Protocol (L2TP) alongside an Internet Protocol Security (IPSec). This protocol encapsulates and encrypts data hence creating dual security measures for the data being transmitted across the tunnel. SSTP is known as Secure Socket Tunneling Protocol and it transmits data through the SSL which works in conjunction with the Transport Layer Security on the Windows OS (Athow, 2019). For the OpenVP, the protocol was developed recently enabling open source AES 256-bit encryption of data packets being transmitted over the network. Users can select from a range of cryptographic algorithms and the method is supported on any OS.
References
Athow, D. (2019). VPN Tunnels explained: what are they and how can they keep your internet data secure. Retrieved from https://www.techradar.com/vpn/vpn-tunnels-explained-how-to-keep-your-internet-data-secure#:~:text=Types%20of%20VPN%20tunneling%20protocols,most%20or%20all%20of%20them.
Bittlingmeier, D. & King, T. (2003). Understanding the Concepts of Security Topoligies. Retrieved from https://www.pearsonitcertification.com/articles/article.aspx?p=31562&seqNum=4#:~:text=The%20third%20type%20of%20topology,proxy%20server%20(bastion%20host).
Rouse, M. (2019). Address Resolution Protocol (ARP). Retrieved from https://searchnetworking.techtarget.com/definition/Address-Resolution-Protocol-ARP

Check Price Discount

Study Notes & Homework Samples: »

Why Choose our Custom Writing Services

We prioritize delivering top quality work sought by students.

Top Tutors

The team is composed solely of exceptionally skilled graduate writers, each possessing specialized knowledge in specific subject areas and extensive expertise in academic writing.

Discounted Pricing

Our writing services uphold the utmost quality standards while remaining budget-friendly for students. Our pricing is not only equitable but also competitive in comparison to other writing services available.

0% similarity Index

Guaranteed Plagiarism-Free Content: We assure you that every product you receive is entirely free from plagiarism. Prior to delivery, we meticulously scan each final draft to ensure its originality and authenticity for our valued customers.

How it works

When you decide to place an order with Dissertation Help, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We analyze your order and match it with a custom writer who has the unique qualifications for that subject, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00