0b_0b_0b_networking_for_a_charity

Networking for a Charity

Student Name

Institution Affiliation

Peer-to-peer networks

The networking set up has improved with the latest versions of windows. Specifically, connecting the computers correctly prompts windows to set up the appropriate settings automatically. Windows 7 enables a user to ‘save’ a wireless connection for automatic connection when the computer comes close to the network. For that to happen, first, each computer has to have a network interface card (NIC), for example USB network adapter, internal network adapter, a network PC card, and a mother-board based network chip. An external router is also needed. The user must activate DHCP (Dynamic Host Control protocol) on the router. The DHCP automatically assigns different/unique IP addresses to the computers connected to the network. The network cable should run from the NIC to the router ports. In case of a high-speed modem, the user can run a network cable from the WAN port in the router and into the modem’s network port. This process ensures that all the six computers can share internet connection. In addition, all commuters must have unique names and use the same workgroup name.

Internet, files, and devices sharing in a network

Sharing of devices such as printers in many workplaces brings convenience and cost efficiency. Sharing printers in a network involves connecting it to the host computer. The host computer then ‘shares’ the printer to all the network computers by allowing them to print over a LAN or internet connection. The main limitation of sharing printers using a host computer is that it must be on if any computer is to use the printer. If the user wants to print using a different computer on the same network, then they must have a network setup and a printer installed on the host computer. In addition to printers, networks can also share files such as documents, photos, and music among others. Joining a home group is the easiest way that one can use to share pictures, videos, music, documents, and printers as well. When joining a home group, a user has to instruct windows on which libraries and folders to share. A user can protect the home group settings using a password, which is changeable at any time. The ‘share with’ menu is the simplest way to share things, but a public folder offers another option.

Network security

Not many people have addressed the security issues with P2P networks. The problem comes with the requirement to provide anonymity for the users of P2P networks and the increasing need of providing data integrity, confidentiality, accountability, authentication, non-repudiation, and robust access control. Other problems affecting P2P networks include pseudospoofing attacks whereby malicious parties claim multiple identities, thus causing fundamental security threats. For example, the e-bay system reputation, which is a P2P system constantly, finds itself under pseudospoofing attacks (Damiani, 2002). The security of P2P networks becomes worse with the lack of centralized authority to vouch for security parameters or identities. However, features of the TCG specifications can be used to improve the network security. Specifically, using TGC protocols for DAA (Direct Anonymous Attestation) enforces the use of a stable platform-dependent pseudonyms and consequently reducing pseudospoofing in P2P networks.

Users can use runs of DAA protocols to build entity authentication at the level of pseudonyms and safely link it to secure channels using known end points. Many security services in networks rely on the user to establish stable identities (Rivest, 2005).

Hardware recommendations

A network enables computers to share resources between/among them. The computers to use in a network have to meet certain standards that are compatible to the operating system in use. There are many hardware components needed to create a network involve. A keyboard and a mouse are essential as they perform routine operations in a computer. There are wired and wireless versions of keyboards and mice. A monitor displays what the user is doing on the keyboard and mouse. A VGA cable connects the computer with the monitor. Printers are also important for the printing needs of the users in the networks.

Many printers are wireless although wired ones are also available at a lower price. Networks cables (comes in different colors such as yellow, red, and blue) connect many computers together. All these hardware devices are available at general stores, computer stores, or web stores over the internet. Computers are connected together using the serial ports. However, connecting many computers together needs one to use a central ‘object’ that connects all computers and other devices. This ‘object’ then distributes or manages the network traffic. Most users use a hub, router, or the switch as the ‘object’ at the center of a network.

The network also requires one to have network cards, which can be internal, external, or wireless. The network cards (NIC) connects a computer to the exterior. Most computers from big companies come with tested and ready network cards. The last party involved in a network is an ISP (Internet Service provider). This company connects the network and the internet. These involve local telephone companies and local TV cable companies. In addition, a firewall is needed to protect the network from potential intruders. Types of firewalls include software and hardware firewalls.

References

Damiani, E. (2002). A Reputation-based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In V. Atluri, editor, Proceeding s of the 9th ACM Conference on Computer and Communications Security, pages 207-216. ACM Press

Rivest. R. (2006). SDSI: A Simple Distributed Security Infrastructure, Revised. Presented at CRYPTO’96 Rumpssession.

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply