Posts

Showing posts from July, 2022
Week Five: Advanced Networking Devices - VPN Lots of topics were discussed for this week five chapters reading, and the four chapters reading are: TCP/IP Applications, Network Naming, Securing TCP/IP, and Advanced Networking Devices. All the contents or topics provided in each chapter reading played an important role in computer networking. The purpose for this blog is that I will be picking a single topic from one of the four chapters and discuss to the best of my knowledge. Let get started with that being said! Virtual Private Networks (VPN) VPN is configurated for secure network communications. VPN hides Internet Protocol (IP) address from could-be hackers, government agencies, corporations, etc. It doesn’t matter if whether you are connected to a VPN in public, your identity will stay always remind protocoled. You put your privacy at risk when connected to a public network because that public network doesn’t have encrypt tunnel, and therefore, has no endpoints. VPN in the other
Week Four: TCP/IP, and Routing The week four topics focuses on Transmission Control Protocol/ Internet Protocol (TCP/IP), and Routing. Both contents play an important role in the computer networking environment as we all know. Like every other technology that we heavily relied on to execute our daily activities, TCP/IP had a rough beginning. To put it into content, and be specific, TCP/IP was created by UNIX. In the early 80s, four of major players in the computer and network industry (Microsoft, Apple, Novell, and UNIX) had created their own protocol com communicating and sending data over a network. No one software or protocol could execute everything that the network required, and because of that, the four major companies decided to put together their “protocol under term the protocol suite.” The following are the lists of those protocol: IPX/ SPX represented Novell, NetBIOS/NetBEUI represented Microsoft, AppleTalk represented Apple, and TCP/IP represented UNIX. Eventually as time