Posts

Blog Wrap up

 I have enjoyed writing blogs because it leads to having to find new ways to explain and write about networking topics. I don’t think that it was majorly helpful for my current job, because I don’t work in anything that involves too much networking yet, but maybe one day, it will be more useful. I don’t think that I will continue blogging about networking unless it was for a future class because I don’t think I would ever know what to write unless being told. Being able to blog wouldn’t necessarily be desirable for a company, but I think that being able to effectively communicate what you know to individuals who won’t have as much knowledge around networking or other IT areas does make you more of an attractive hire for companies.

Week 10 - Network Tools

 There are a couple different kinds of tools that can be used to check an ethernet line. These tools are a cable tester, which can test your line before you run it; a fiber optic tester, this is used to detect issues in fiber optic cables, such as damage or incorrect terminations; cable pulling equipment, helps in installing or upgrading large amounts of cabling efficiently, and finally network cable testers, which assess the operational status of network connections, identifying issues in signal strength and connectivity. Across these different tools, they all are used to complete, generally the same task of testing the cable and making sure they are functional.

Week 9 - Implementing Security Policies and how it affects workers

  Implementing security policies can have many implications on the teams that they are implemented with. One such thing is a zero-trust policy. This leads to multiple step authentication because of the system policies in place leading to the network not automatically trusting anything that connects to a network and requires additional authentication to access any resources on the network.   Additional ways the policies can affect the employees are by preventing access to resources, requiring different steps to access secure areas, and limiting what internet websites can be accessed on the secure network. Although these policies can prevent employees from doing certain things, it keeps the network and information on that network secure.

Week 8 - VPN and Certain Companies Policies

 Companies will have different policies about their users using a VPN to log on. Some might be okay with it and encourage their users to use a VPN for the users’ own security, but others will not encourage nor be okay with their users. Netflix : Will only show shows and movies that they have worldwide rights for, like squid games and stranger things. Hulu : Hulu implemented advanced measures to prevent users from accessing its content via VPNs. Due to Hulu only having content limited for the US and Japan, attempting to access Hulu using a VPN will result in the site blocking the user. Amazon Prime: Prime has also implemented polices to block VPN usage due to concerns over content licensing agreements and the protection of its business interests. 

Week 7 - Choosing a Wi-Fi provider

 There is a lot to consider when choosing a Wi-Fi provider. Certain things can be like how many devices will regularly be connected to the network, what those that are connected will be doing and if a direct connection is needed or if wireless is fine. Certain providers like quantum fiber and google fiber offer a fiber optic connection, which is a direct connection to each network, meaning that your Wi-Fi won’t lessen because of nearby houses/networks during peak hours. It also means that you will more often than not, have the full amount of upload/download speed that you are paying for. If you need to be streaming shows, hosting meetings or are an avid gamer, this is also something to consider to have a higher speed network to ensure that you have the best connection during those activities.   Some negatives to consider are that if you have a regular wireless network like a majority of what Starlink, Xfinity or T-Mobile offer, you are going to lose speed generally aro...

Week 6 DHCPv6

  Dynamic Host configuration protocol or DHCP is a network protocol that is used to automate the process of assigning an IP address and additional network configuration data to any new connecting devices. This allows for networks to be more streamlined in their process of assigning new devices IP addresses and eliminates issues that occur on a manual network of a device not being able to connect because of a specific IP address being attached to the connected port, or all are already assigned.                DHCPv6 is the protocol for IPv6 addresses. It is an extension of DHCP designed specifically for an IPv6 network. Just like with regular DHCP, it allows the connected devices to automatically obtain an IP address, DNS server information and domain names and other configuration data. DHCPv6 has 3 key features: stateful configuration, stateless configuration and multicast communication. ·    ...

Week 5 - How DHCP works

 Dynamic Host Configuration Protocol (DHCP) is a network protocol used to automate the process of assigning IP addresses and other network parameters to devices on a network. DHCP utilizes a 4 step process to assign addresses. Step 1 – Discover: The DHCP client broadcasts a DHCPDISCOVER message to find available DHCP Servers. This message is sent to a local network using the destination address 255.255.255.255. Step 2 – Offer: DHCP servers respond with a DHCPOFFER message, providing an IP address and other configuration details. The server broadcasts this message to the client. Step 3 – Request: The client responds with a DHCPREQUEST message, indicating acceptance of the offered IP address. This message is also broadcast to inform all DHCP servers. Step 4 – Acknowledgment: The DHCP server sends a DHCPACK message to the client, confirming the IP address assignment and providing the lease duration and other configuration information.