Web Development 2 (WD2) 1.1 The hardware components which enable internet access are: Routers – A small device which joins multiple networks together, its entire purpose is to send/route data packets between networks and devices on the network. Routers use wireless and wired technologies to send data packets. Allows multiple computers or other devices join the same network. Ethernet cables – which is normally an RJ-45 cable that connects to the Ethernet card inside the device, the purpose of it is to communicate with the hub/modem/router.
A VPN connects two internet nodes (a nerd way to refer to a device connected to the internet) securely and privately even in a public network A user using a VPN client on Computer A connects to a VPN server using data security measures such as encryption to send and receive information from the server. To communicate with Computer B using a VPN, both computers must be connected to the VPN server. Any data sent or received on either computer must pass through the VPN server. One use of VPN technology is to extend Private networks over public channels.. For example, a company may enable workers with portable workstations to connect to the company network as if they were using the office computer. The network traffic is routed over public infrastructure, but it is encrypted by the VPN client and therefore secure from spoofing and other forms of interceptions.
Web Server: A web server is where it stores all the websites that are within the internet. The purpose of a web server is to deliver the web pages from the server and sends you the information of a website that you have requested. It provides the web pages you see on your internet browser. The web server works via getting data and information received from a browser that has asked for a page, it than will be processed through the server looking for what’ve requested and sends back the information to your screen.
VP networks are the best solution for the company. Because it will improve productivity, extend geographic connectivity and simplify network topology with ensuring security, reliability and scalability. Also, VPN can be very convenient not like other methods e.g. leased lines that can get very expansive. There are two types of VPN: Remote-Access and Site-to-Site.
Often, many organisations use VPN to communicate across many locations. For example, a big company has many offices in different cities and they probably need to send data to the different places via the internet. Therefore, to keep the data secure, they probably set up a VPN with an encrypted connection so that unauthorised cannot access the data. Moreover, each employee might have a VPN account with their business or company, so it 's help them to connect to their office computer from home or other places. It is very helpful for the travellers or business that they can access any kind of office data from their laptop.
The Internet Privacy also has a risk because there are many ways in which people can divulge their personal information, for instance by use of “Social Media” and by sending bank and credit card information to various websites. Moreover, directly observed
E-business is the terms that using internet for business purpose. Now a day, every individual know how to use internet for multi purposes. Some of them were using for knowledge, for social and for business purpose. Internet provides a new platform for increase the revenue of the business. While website is one of the common tools using by community, e-business is just a web presence.
1. Traffic control: As the data communication is the most energy-consuming part of the wireless sensor networks by decreasing the amount of traffic, energy can be saved. To distribute traffic effectively from a central node to other nodes, investigations are still needed in the network. 2. Preserve the traffic load balancing:
1.3 How do local area networks (LANs) differ from wide area networks (WANs) and backbone networks (BNs) Local area networks are limited within an organization Wide area networks extend over a large geographical distance and may be privately owned or rented Backbone network are the part of network infrastructure that feeds the connected networks 1.8 Describe the seven layers in the OSI network model and what they do. Application – this layer is specific to applications and provides services such as email, network software services and file transfers Presentation - In this layer, the data is formatted in a schema that network understands, and also manages data encryption and decryption Session – this layer establishes and controls the data communication between
Unit 7 Assignment: Client Networking Request NETWORK ARCHITECTURE LAN method of networking with RJ45 CAT5/6 Ethernet Cable can be used as there are only three computers which are to be connected. Client/Server technology will help as they can make the computer placed in their home next to the store as the server. The server can later be used to access information like bills, inventory, total purchases etc. TRANSMISSION MEDIA A wired media should be preferred to be on the safer side as wireless is always prone to attacks.