Introduction
An integrated network system consists of various components. This include, the applicable devices such as switches, bridges, routers and gateways, a central database, services to monitor, provide the devices and interrogating the central database, a front end, system agents, system probes and an interface. Switches act as linkage points in an Ethernet network; devices here are connected through various twisted pair cables. Bridges are computer networking devices that build connections to other bridge networks using the same protocol. Routers are layer devices in networking (GreeksforGreeks, 2018). They analyze and process logical information such as IP addresses found in the network header in a packet. Gateways connect various networks as well as passes packets to the network. They act as links between computer programs and networking systems. The relational database stores data from the managed devices. A standard protocol transfers information from these managed devices. Services, on the other hand, are needed to extract the required data from their databases.
Network Management Models
There are various possible network management models, which include centralized, hierarchical and distributed. A centralized architecture monitors all the devices on a network. Also, it is responsible for every network management duty carried out within the system. However, there are potential problems with resilience. For example, the system is not particularly scalable as it contains only one point failure.
The hierarchical model uses multiple systems. One system acts as a central server while others act as clients. Its significant advantage is in network monitoring that can be distributed all over the network; also information is centralized. The distributed model as network management combines both hierarchical and centralized approaches. Therefore, there is no single failure but an increased level of network traffic.
Risks and Their Management
There are some networks risks an organization can experience if they do not engage in capacity planning and management. They include the risk of financial loss, distorted company image, dissatisfaction, a decrease in productivity and procurement cycle. Financial planning is needed to service level assurance. Therefore it is important to develop a technology strategy to provide the acceptable service at the lowest possible cost. Create the best environmental relation strategy and minimize production risks to maximize productivity as well as engage the right channels in the procurement cycle.
The Impacts of Network Problems
The apple company just like any other organization, shares various networking problems within their systems. They include; cable problems, connectivity problem, network collision, and software problem. Cables are cut or maybe shortened. Connections can have a problem through a change in configuration or malfunctions. Bad network set up can lead to network collisions, and software configuration problem such as DNS and WINS configuration can be traced. These problems can lead to leak of information, mismanagement and miscommunication and if not dealt with can cause downfall of the organization.
Poor Procedures
There are poor procedures that take place within an organization that needs to be addressed. For example, miscellaneous USB devices connected to networking devices are capable of infecting a network. Targeted malware can also automatically be executed when connected to a live USB port. The management individuals should make sure the computer is set to default to avoid the auto run policies within the computer. Also, external cables and USB devices should be discouraged within the organization.
Case Studies
The earthquake of magnitude 6.8 in Japan is said to have occurred in Niigata Prefecture. Buildings were damaged, and houses were blacked out. Disaster countermeasures prepared mobile engine generators and supplied power to the buildings. As the commercial power supply resumed in the buildings after two days, there was no failure of telecommunication services because of the power shutdown (Bci, 2010). This shows that there was a continuous power supply caused by the large scale earthquake. This shows that telecommunication and networking services can be continuously sustained by a power high natural energy even for a long time.
Access Control, Authorization, and Auditing
Access controls, authorization, and auditing can be facilitated by use of electronic systems that are designed to be controlled through a network. The control access system authorizes and audits someone entering a premise, thereby giving the organization full protection and security. Most of the access control systems use networks. It is through these networks that communication and information are formed and communicated. The various access control, authorization, and auditing system include an electronic door, fingerprint access through a biometric access system and proximity access control system (EL-PRO-CUS, 2018).
Security
Separation of privilege can be established at a network environment by ensuring the principle of least privilege is adhered to. This mandates that accounts, users and various computing procedures are minimized in access to resources that seriously need them (Miller, 2018). Privileged and management solutions through the use of passwords can be used to prohibit account sharing. The organization can make sure every person outside the IT department has only one password that is standardized with non-privileged accounts.
Secure passwords can be enforced by the organization that involves every member generating their own password. Individuals within an organization may not like the idea of changing passwords every month or not reusing or creating complex passwords. There can be a scenario where many passwords are forgotten, or people find it uncomfortable and tiresome to continuously change and input complex passwords.
Certificate Authorities
Certificate authorities are verifiable small files that usually contain credentials that help to identify people, websites and devices. An example of the certificate authority is the SSL Certificate that binds ownership details with cryptographic keys. The name of the website for the certificate is SSL/TLS protocol that is used as a venue to activate a secure browsing session. To register with the certificate authority, there must be significant backward compatibility with other browsers. For instance, a domain validated SSL certificate must have verified ownership to be included within the applied certificate. Browsers and other devices trust a certificate authority by accepting its root certificates into its store. The database is then approved by the certificate authority.
References
Bci. (2010). The business case for BCM (case studies). Retrieved from https://www.thebci.org/resource/the-business-case-for-bcm.html
EL-PRO-CUS, (2018). Understanding about types of access control systems. Retrieved from https://www.elprocus.com/understanding-about-types-of-access-control-systems/
Miller, M. (2018). How Separation of Privilege Improves IT Security. Retrieved from https://www.beyondtrust.com/blog/entry/how-separation-privilege-improves-securityGreeksforGreeks, (2018).
Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter). Retrieved from https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-switch-router-gateways/
Cite this page
Network Components - Essay Sample. (2022, Nov 30). Retrieved from https://proessays.net/essays/network-components-essay-sample
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Education and Cyber Security Awareness Essay
- IT Security Risk Assessment Essay Example
- Digital Marketing vs Traditional Marketing Paper Example
- Paper Example on Company Transitions to Big Data: Reducing Costs With Hadoop
- Secure Digital Assets: Cybersecurity for Organizations - Essay Sample
- Data Storage and Processing in the 21st Century: A Guide - Research Paper
- Dark Net: Anonymity, Whistleblowing, and Challenges - Essay Sample