Premium Essay

Logical vs Physical Topology

In:

Submitted By Pattydapps
Words 2757
Pages 12
Abstract
E-commerce has presented a new way of doing business all over the world using internet. Organizations have changed their way of doing business from a traditional approach to embrace ecommerce processes. As individuals and businesses increase information sharing, a concern regarding the exchange of money securely and conveniently over the internet increases. Therefore, security is a necessity in an e-commerce transaction. The purpose of this paper is to present a token based Secure E-commerce Protocol. The purpose of this paper is to present a paradigm that is capable of satisfying security objectives by using token based secure

Keywords: Trusted Third Party (TTP), Pretty Good Privacy (PGP), Secure Socket layer (SSL), Secure Electronic Transaction (SET).

1. INTRODUCTION
E-commerce refers to a wide range of online business activities for products and services. Security is the basic need to secure information on internet. It also pertains to any form of business transaction in which the parties interact electronically rather than by physical exchanges or direct physical contact. A security objective is the contribution to security that a system or a product is intended to achieve. E-commerce has become a dynamic force, changing all kinds of business operations world-wide. E-commerce is conducted on global network i.e. Internet which is un-trusted. So confidentiality is required during transmission and it must be kept secure against all type of threats The related concepts and business practices not only influence communications, the routines of daily life and personal relationships, they represent opportunities for initiating new international and domestic business ventures. However, as the Cyber is used increasingly as a platform for e-commerce transactions, security becomes a primary issue for Internet applications. Security has emerged as an

Similar Documents

Premium Essay

Lan Topologies

...switches. You’re seeing an excessive number of broadcast packets throughout the LAN and want to decrease the effect this broadcast traffic has on your network. What steps must you take to achieve this goal? Ideally it’s preferable to probably split it up into one or more workstation subnets (based on say, departments) and then another subnet (or more for a larger enterprise) for the servers. Traffic between the subnets will be routed. This means the broadcasts from workstations won't hamper the servers and vice versa. Case Project 2-3 In Chapter 3, you learn about network topologies and technologies. As preparation, do Internet research on the following topics: ● Physical versus logical topology ● Bus topology ● Star topology ● Ring topology ● Ethernet and CSMA/CD Write a short explanation (two to three sentences) of each concept and be prepared to discuss it with the class. Physical...

Words: 749 - Pages: 3

Premium Essay

Nt1210 Unit 1

...It will discuss nods, NICs, data routing devices, firewalls, and servers. Hardware choices are very important for a LAN. The types of devices on a network will determine its capabilities. The two biggest factors are cost vs. function. The person, or people, designing a LAN do not want to pay more than necessary according to their needs. But underestimating their requirements can be just as bad, or worse. Underestimating requirements can force a network designer(s) to have to completely replace some, or all, of the network...

Words: 2470 - Pages: 10

Premium Essay

Term Paper

...Ethernet cards are essential parts of a network. They connect a computer to another computer or to a server by using a cable, an alternative to a wireless network. Ethernet Network – The Role of Ethernet in Computer Networks An ethernet network is a situation in which multiple computers are connected to one another and share the same Internet protocol address. An ethernet network has multiple computers on the same server. The benefit in this is that multiple networks do not need to be created. The downside to an ethernet network is that the connection of multiple computers leaves each computer open to hacking, malware, and viruses — in the event that a virus should attack one computer on the system. There are certain components necessary for an ethernet network: * Ethernet cable * Ethernet hub * Crossover cable * Router Ethernet Cable An ethernet cable is a necessary cord to connect two or more computers to the same network. Each computer must have its own ethernet cable in order to operate on the same ethernet network. Ethernet Hub An ethernet hub is a device used to string together each ethernet cable, which connects each computer on the same network. An ethernet hub contains several ethernet ports. Crossover Cable A crossover cable is a substitute for ethernet cables when one wants to connect two or more computers to the same ethernet network. Router A router is similar to an ethernet cable in that it connects two or more devices. Routers are more often used for...

Words: 9787 - Pages: 40

Premium Essay

Class

...You should have the following skills before studying for the Network Pro certification: * Knowledge of PC hardware installation and configuration * Knowledge of using and administering a Windows client computer You can gain these skills through the TestOut PC Pro certification. After finishing this section, you should be able to complete the following tasks: * Read simulated component documentation and view components to make appropriate choices to meet the scenario. * Add and remove simulated computer components. * Change views to view and add simulated components. * Use the zoom feature to view additional image details. * Attach simulated cables. * Use the simulation interface to identify where simulated cables connect to the computer. You have been hired as a network technician for a small corporate network. Today is your first day on the job and you need to familiarize yourself with the network. A new employee will work in Office 2 and you need to complete the workstation in the office. Complete the following tasks in Office 2: * Add the monitor to the office (next to the computer). * Use the DVI-D cable to connect the monitor to the computer. * Connect the power cord to the monitor and plug in the monitor. * Add the mouse to the office, and connect the mouse's USB cable to a USB port on the computer. * Add the keyboard to the office, and connect the keyboard's USB cable to a USB port on the computer. *...

Words: 11760 - Pages: 48

Premium Essay

Nt1310 Unit 5 Unit 1

...Slower devices would still work on the faster network, but only at the fastest speed that device can work at. For an organization of 100 users, upgrading to a 1000 Mbps network would be an unnecessary expense. In regards to internet connections, the network would only work as fast as the internet service provider allows, or the speed that the organization is paying for Physical and Virtual Local Area Networks In a physical local area network (LAN) all devices are connected physically on the same network to each other, sharing a broadcast domain, therefore having a limitation due to transmission mediums and speeds. To separate devices on a separate networks, routers and firewalls would need to be used for each network separation. Spacing and location of devices will determine the type of devices and where these devices will be placed. Physical LANs can range from wide area networks (WAN), to campus area networks (CANs), or metropolitan area network, based on the size the network is to encompass. Logical topologies, such as virtual LANs (VLANs) is the signal flow of devices without regards to the physical topology of the network. The University of Houston (2016) explains how an organization can save funds by purchasing one switch as opposed to multiple switches, as one switch can be configured to host multiple VLANs. Further more they go on to explain how trunking allows ports on multiple switches to be viewed as one VLAN. Hubs and Switches Both hubs and switches connect devices...

Words: 972 - Pages: 4

Premium Essay

Ntc362.Week5

...Team B - Integrative Network Design Project Jacob Acuna, Susan Granata, David Teague University of Phoenix - NTC/362 Ronald Bowell October 26, 2015 Page Break Kudler Fine Foods is a purveyor of specialty and gourmet foods in the San Diego, CA. area. They currently have three locations: the home office in La Jolla, CA., and two store locations in Del Mar, CA. and Encinitas, CA. Kudler is in need of a new network design and topology that will address multiple issues faced in a growing enterprise. The new network must incorporate a new network topology to reduce downtime and ensure that functionality will remain if one or two devices are down. In addition, a VoIP system must be installed over the network, along with an internal WLAN in each store. The WAN will tie all three stores together to increase collaboration and network file sharing, and the new network must be easily scalable to support growth of the company and integration of future stores. Of utmost priority is the security of the network. The sensitive nature of credit card processing makes Kudler Fine Foods a prime victim for cyber threats, and therefore policies must be put in place to protect the customer and employee data. Network Characteristics and Components The current network characteristics and components for the Del Mar store starts with a small office scenario that is accompanied by six Dell Vostro computers for management. All six computers are running Windows 7 and all...

Words: 3311 - Pages: 14

Premium Essay

Nt1310 Unit 3 Assignment

...from damage when adequately routed physically, but some cables will be routed next to or under manufacturing equipment. o The network should use the same topology and media throughout to minimise the number and variety of spares that must be kept on hand. o The office space is expected to have an open plan, and the office partitions are designed to facilitate routing physical network cables. o The budget allocated allows for the purchase of new cabling and connection hardware, including network adapters, as necessary. However, you have been directed to keep costs as low as possible. o The company wants to install a network with a minimum bandwidth of at least 100 Mbps. o The plan should allow for future expansion and for eventually taking the bandwidth to 1 GB per second. o The final network should not have any routing requirements. With all of the criteria mentioned, the major concerns are the electromagnetic interference from the manufacturing space and the protection of the cables with the effective speed. These concerns will be addressed in the later research of this project. [5 marks] • All work by others should be properly cited using the IEEE style of referencing. Referencing Article title: STP vs UTP Cables: Application Comparison – Custom Cable Website title: Custom Cable URL: https://customcable.ca/stp-vs-utp-cables-application-comparison/ Author Inc. Cisco Systems Article title: CCNA: Network Media Types > Twisted-Pair Cable Website title: Ciscopress...

Words: 1634 - Pages: 7

Premium Essay

Kudler Fine Foods Network Design Project

...the following: Final Network Design The integrative network design project for Kudler Fine Foods will include Transmission Control Protocol/ Internet Protocol (TCP/IP) will be used as a means of communication within a private network or the internet for Kudler Fine Foods network devices. Hypertext Transfer Protocol (HTTP) is used for transfer of multimedia files, video, sound, and text over the internet. Kudler Fine Foods will implement File Transfer Protocol (FTP) to download files, transfer files, delete files, copy and rename files from the internet as needed. Mesh Protocol will be used to connect all devices such as printers, computers, and scanners on the network. In a true mesh topology every node has a connection to every other node in the network ("Common Physical Network Topologies ", 2014).   The network will consist of a hardware firewall blocking unwanted access from outside of the location. The next step is to set up a hub or switch that will connect all of the stores terminals. All of these terminals such as registers and remote locations such as warehouse will be hardwired with twisted pair CAT 5 Ethernet cable. The server will be located in a room in each store with the hub or switch. A wireless access point/router will be centrally located in the store to provide good signal in every part of the store for employees using their handheld devices to be able to view and update the store inventory while on the sales floor Since the blade servers are easily...

Words: 4817 - Pages: 20

Free Essay

Rpr Technology

...Resilient Packet Ring Technology 1 CHAPTER 1 INTRODUCTION 1.1 Background: The nature of the public network has changed. Demand for Internet Protocol (IP) data is growing at a compound annual rate of between 100% and 800%1, while voice demand remains stable. What was once a predominantly circuit switched network handling mainly circuit switched voice traffic has become a circuit-switched network handling mainly IP data. Because the nature of the traffic is not well matched to the underlying technology, this network is proving very costly to scale. User spending has not increased proportionally to the rate of bandwidth increase, and carrier revenue growth is stuck at the lower end of 10% to 20% per year. The result is that carriers are building themselves out of business. Over the last 10 years, as data traffic has grown both in importance and volume, technologies such as frame relay, ATM, and Point-to-Point Protocol (PPP) have been developed to force fit data onto the circuit network. While these protocols provided virtual connections-a useful approach for many services-they have proven too inefficient, costly and complex to scale to the levels necessary to satisfy the insatiable demand for data services. More recently, Gigabit Ethernet (GigE) has been adopted by many network service providers as a way to network user data without the burden of SONET/SDH and ATM. GigE has shortcomings when applied in carrier networks were recognized and for these problems, a technology...

Words: 5466 - Pages: 22

Free Essay

Tech Writing Proposal

...SAMPLE TECH WRITING PROPOSAL INTRODUCTION AND DISCLAIMER This is an altered version of a real Tech Writing project submitted by a student and passed by an Evaluator. There is no guaranty that either the original version or this altered one would pass evaluation if submitted today. Despite our best efforts to provide consistent evaluation across all students and projects, Evaluators are human and are allowed latitude in grading. Additionally, your interpretation of what you see is likely to be different from the interpretations of others; in other words, even if you strictly follow the model of this paper, there is no guarantee of immediate success with your project. The original work was altered to mask the identity of its author and the various commercial products mentioned. References and their citations were also masked because no effort was made to determine whether other changes affected their validity. The inserted Comments indicate only that all required TaskStream sections are present, not that they are correctly completed for all types of projects. The best that can be said about the original work is that an evaluator found the work submitted to be sufficient to the task. Viewing this sample may or may not produce a similar result for you. Bottom line: You are the author of your work. We hope this sample helps to dissipate some of the uncertainty that surrounds the Capstone Project, but it cannot guaranty a trouble-free process. IMPORTANT: For maximum benefit...

Words: 7152 - Pages: 29

Free Essay

Tm586 Project Paper

...Priscilla Oppenheimer, an instructional text detailing a method of network design that’s based upon what can be readily found evident throughout the overall networking community to be the most logical and efficient sequence of steps necessary in the creation of a network. Having stated this, it is of value for the reader to know that the aforementioned sequence of steps, as examined in Oppenheimer’s work, will correspond closely to the order of WLAN design and management issues that are addressed in this document, and can be followed up by way of documentation found under the same title and author at the end of this article. The major design and management issues found unique to a WLAN involve those pertaining specifically to the transmission and reception of radio frequency (RF) waves. For example, there is the strategic placement of access points (AP), which are devices designed to send and receive radio signals between nodes. This, in turn leads to a consideration of any possibility of physical materials that may be found that could hinder radio signals between APs, which will here be replaced by a ‘worst case’ factoring.   Protocols and standards dealing with wireless technology are also unique, as they correlate directly to WLANcharacteristics. In support of wireless communications, physical wiring is also necessary, as the WLAN must at some point connect to a WAN....

Words: 2801 - Pages: 12

Premium Essay

It245-Intro to Network Management

...Introduction to Network Management Phase 5: Network Security & Network Management Network User Guide Final Version Gabriel B. Del Fierro IT245-1304B, Introduction to Network Management Instructor: Brian Rodgers December 23, 2013 Executive Summary The purpose of this user guide is to familiarize you the Casa Del Fierro organization, what their needs are within this Network Organization. Contained in the following pages will provide you with all of the pertinent information that you will need in order to provide the highest quality of service and care. “An ounce of prevention is better than a pound of cure” – B. Franklin.   Table of Contents IT245-1303B-01 Network Project Plan Executive Summary 1 Table of Contents 2 Section 1: Introduction of the Organization and its Requirements 4 Section 2: Network Architecture Design 6 Section 3: Network Model or Stack to be Used 8 Section 4: Network Protocols 15 Section 5: Network Security 19 Section 6: Network Management 22 References 24 Section 1: The Organization & It’s Network Requirements The Casa Del Fierro is a small organization with a total of two main users with a few friends and family that comes to visit on holidays. Although this network is set up in a comfortable home, individual needs may vary. The internet is used on a daily basis, Streaming Movies along with music, Online School, Social Media, Games, Online Banking and accessing medical care records. The devices to be networked...

Words: 5562 - Pages: 23

Premium Essay

Jon Jons

...This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Exploration: Network Fundamentals course as part of an official Cisco Networking Academy Program. Activity 1.1.1: Using Google Earth™ to View the World Learning Objectives Upon completion of this activity, you will be able to: • • • • • Explain the purpose of Google Earth. Explain the different versions of Google Earth. Explain the hardware and software requirements needed to use Google Earth (free edition). Experiment with Google Earth features such as Help | Tutorial. Experiment with Google Earth to explore continents, countries, and places of interest. Background Google Earth is a popular application that executes on the desktop of most operating systems. It requires a broadband connection to the Internet and displays Earth as a manipulated 2D, or 3D image. The popular world news channel, CNN, regularly uses Google Earth to emphasize where a news story has occurred. At the time of writing this activity, there are three versions of Google Earth. The version that fits most needs is Google's free version, Google Earth. A Google Earth Plus version includes GPS support, a spreadsheet importer, and other support features. The Google Earth Pro version is for professional and commercial use. The URL http://earth.google.com/product_comparison.html contains a description of the versions...

Words: 60675 - Pages: 243

Premium Essay

Geographic Information Systems

...An Extended Entity-Relationship Model for Geographic Applications * Thanasis Hadzilacos Computer Technology Institute, University of Patras Box 1122, GR-26110, Patras, Greece thh@cti.gr Nectaria Tryfona National Center for Geographic Information and Analysis Univ. of Maine, Orono, ME 04469-5711, U.S.A nectaria@spatial.maine.edu Abstract. A special-purpose extension of the EntityRelationship model for the needs of conceptual modeling of geographic applications, called the Geo-ER Model, is presented. Handling properties associated to objects not because of the objects’ nature but because of the objects’ position, calls for dealing -at the semantic modeling levelwith space, location and dimensionality of objects, spatial relationships, space-depending attributes, and scale and generalization of representations. In order to accomplish this in the framework of ER and its derivatives, we introduce special entity sets, relationships, and add new constructs. The rationale as well as examples of usage of the Geo-ER model from actual projects are presented. 1. Introduction Is everybody special or are we all alike? Should we develop applications according to a special methodology for each class of applications, such as medical, business process and geographic, or should we use a single blanket approach for all? Personal preferences and philosophical discussions aside, it does seem that the general purpose side has won most battles in computer science, from hardware to programming languages...

Words: 4100 - Pages: 17

Premium Essay

Computing

...Task 1 Element 1 Describe computer network types and standards. 1.1 The description distinguishes types of networks. Homogeneous Networks Homogeneous means similar, it is easy to administer and protect the homogeneous network configuration in networking. In a homogeneous network configuration, the similar operating environment is used to run the all systems. Same protocols are used to run the same operating environment and with the similar security attributes. A homogeneous network used a NIS+ master, is shown in the following figure. Figure (a) Homogeneous Network Heterogeneous Networks Heterogeneous means different, to run different network protocol a Trusted Solaris networks can be used. Different protocols are used to run the same operating environment and with the different security attributes and uses the different NIS (network information service). The following figure shows a typical heterogeneous network and some different protocols. There is a good example of heterogeneous network in networking term, computers with MS windows XP / windows 7 & UNIX, Linux, can communicate to each other by using different network protocols. Figure (b) Heterogeneous Network (Oracle, 2010) Wide Area Network Wide Area Network (WAN) is any network that crosses different far places like national boundaries. In WAN we can shares software and resources with connecting workstations and can Share information/files over a larger area A centralised WAN consist of a central...

Words: 12246 - Pages: 49