Network segmentation is the process of breaking up a single computer network into different subnets. Each subnet is referred to as a network layer. This has implications on the network's performance, safety and functionality.
Network segmentation has various advantages, some of which are:
Reduction of Network congestion. Local traffic can be reduced on each subnet because there would be fewer hoists per subnet. This goes a long way in improving performance.
Overall improvement in network performance. This is achieved in several ways. One of which is increasing the bandwidth available to each user. Each segment has the full bandwidth available to it; therefore, network segmentation has a multiplier effect on the bandwidth. For example if there are 100 users on a 100 Megabytes per second segment, an average of 1megabytes per second of the bandwidth is available to each of the 100 users. However, if segmentation is implemented and 10 segments are created from this single segment, there would be 10 user on each segment, making about 10 megabytes of bandwidth potentially available for each user. Also, another way of improving performance is by reduction in the incidence of collision among packets of information. This is because packets of data tend to stay in individual segments as each segment connects to the network backbone as though it were a single unit. Therefore segmentation would reduce the tendency for packets of data to collide at the level of the network backbone.
Network segmentation also has the advantage of containing network problems. for example if there is any breach in integrity of the network in the form of maybe a virus attack, it can still be contained in each segment of the network but if the network is not segmented, all the computer units in the network may end up being infected by the attack. Also, the effect of local system failures can limited to specific segments if the network is segmented, instead of the glitch affecting the whole network as a whole.
At the level of the machines, drive lock software can be installed to limit access to information of the hard drive. Also, another measure is to leave the machines without removable drives so that it would not be easy to copy information from the computer system.
At the level of the server, securing the location of the server to prevent physical intrusion and compromise of the system. Also the use of database management software would also give some form of protection against intruders.
Part 1A
1) what are some of the changes that have occurred in our society because of the internet? How has electronic mail changed our society?
2) Which network benefit do you think is the most useful in society? And Why?
The advent of the internet has brought a lot of changes in the ways people communicate with one another with the advent of e-mails, video conference calls and social networking. Also there are newer ways of doing business especially with the use of websites. There are also new ways of conducting research online with the presence of various resources as online libraries, expert forums and online communities of like minds. It is easier to get information about any subject matter today. All one needs to do is just to search online and the answer pops up. Communication in my opinion, is one area that has been very useful to people. Since the advent of the internet, ways of communicating, including e-mails, video conferencing and social networks have been established as standard ways of communicating. This has improved over the traditional ways of paper mails, faxes and telephones.
Part 1B
What kind of security measures have you encountered when using computers? Think of some ways to increase the security of the computers and data in your classroom or at home.
Security measures I have encountered when using computers include being prompted to type in my and password when logging into my personal computer. Whenever I use my flash drive, my antivirus program scans it and prompts me if there are any threats on it, sometimes, they are removed automatically and at other times, I am asked to complete the threat removal process myself. Also, whenever I visit my online bank website, I am notified that I have reached a secure site and that all data transmitted between the site and my computer is secure. Security of the computer in my class can be improved by having functioning antivirus program installed in order to prevent intrusion attacks. Also, a password can be activated on the system so that only class members can log on to the computer system. This would keep outsiders out.
REFERENCES
M. J. Norton (2001). Basics of networking Segmentation: Switching and Bridging. Networking as a 2nd Language. O'Reilly. Retrieved 5th December 2011 from
Network segmentation (2011). Network Segmentation. Retrieved 5th December, 2011 from
What are the advantages and disadvantages of firewalls?
Advantages of a firewall include keeping intruders out of the computer, thereby preventing hacker attacks. Having a properly configured firewall gives a sense of security when surfing the internet. It also guarantees total privacy and security for one’s personal information.
Disadvantages of a firewall include technicality in configuration. A firewall can be difficult to configure especially for the novice computer user. Wrong configuration might even do more harm than good because it can prevent access to some kind of information if it is not configured properly.
A firewall can also restrict access to certain services on the local computer and even on the internet especially if it has been configured to recognize such services as threats.
Pinktec (2011). Firewalls Advantages and Disadvantages. Pinktec Computer Services. Retrieved on 5th December, 2011 from http://kimberleytaylor.com/articles/firewalls_advantages.htm
T Northrup (2011). Firewalls. Microsoft TechNet. Retrieved 5th December 2011 from http://technet.microsoft.com/en-us/library/cc700820.aspx.