Internet Protocols and Network Security

Internet Protocols

Internet protocols allow a set of interconnected networks to communicate. Problems may occur breaking the TCP/IP communication between two communicating hosts. The problems can be hardware-related, software or even a combination of both software and hardware (Davidson, 2012). TCP/IP connectivity may occur inhibiting communication between the hosts. As such, a server administrator can perform troubleshooting to identify the problem. The problem can be a physical issue, LAN segment, IP connectivity issue or even a name resolution problem. Configurations and duplicate IP addresses are also major issues in TCP/IP.

A network administrator can use the Ping tool to identify primary issues from the destination device by IP address (Rosen, 2014). They can then troubleshoot the local connectivity problems. They can then use ping to ping from the source to the destination by address. If the test fails, they can troubleshoot using the domain server troubleshooting system. If it fails, they can ping using both the name and address. The traceroute tool can also be used to probe a path that a packet uses to traverse a network. The tool can identify issues that relate to TCP/IP connectivity to a network.

Checking local network connectivity requires pinging the destination by IP address if the destination is on the same subnet as the source (Cisco, 2016). Pinging using the default gateway can be necessary if the destination is on a different subnet. Disconnecting a device from the LAN and re-pinging the device can assist to identify a physical issue. The Traceroute is useful when finding a place in the path between hosts that are slowing down their communication. The trace route may not be useful when the packet paths change during packet tracing. Pings determine the ability of a packet to be distributed to address. Pings are unreliable as a lengthy ping may not indicate the unavailability of the host.

Network Security

Converged networks require high-level security to protect the underlying network infrastructure (Academy, 2016). Any security breach can topple critical services in an enterprise. An organization should, therefore, ensure that it develops and adopts reliable security mechanisms to protect its network. The policies and mechanisms should also reduce the risk that the critical infrastructure may face. The IT infrastructure continues to make a revolution with the increasing convergence of both voice and data networks.

The reduction of risks in the converged network may include a proper authentication for all people and devices in the network (Cisco, 2016). The authorization of the network devices also associates the devices with their roles. The network administrators should ensure that the converged systems have protective mechanisms to prevent any exploitation of the devices on the network such as VoIP and other applications. A dynamic response can also play a critical role in protecting the devices or the attack levels on critical infrastructure.

Both the network administrators and users are responsible for ensuring the security of the network. The users in a converged network should ensure that they follow the laid down procedures and rules (Its.uark.edu, 2016). They should also report any suspicious activity and scene that they identify in a network as it may be a loophole for a security attack. Network administrators should carry out regular network maintenance and monitoring tasks to ensure that the network works accordingly. The network administrators should also respond to any issue that arises regarding the organization’s network.

 

 

References

Academy, C. (2016). The Network as a Platform (1.2) > Exploring the Modern Computer             Network: Types, Functions, and Hardware. Ciscopress.com. Retrieved 7 February 2016,       from http://www.ciscopress.com/articles/article.asp?p=2158215&seqNum=5

Cisco,. (2016). Troubleshooting TCP/IP. Retrieved 7 February 2016, from             http://www.cisco.com/en/US/docs/internetworking/troubleshooting/guide/tr1907.html

Davidson, J. (2012). An introduction to TCP/IP. Springer Science & Business Media.

Its.uark.edu,. (2016). Computer and Network Security Policy | IT Services | University of   Arkansas. Retrieved 7 February 2016, from https://its.uark.edu/policies/network-security/

Rosen, R. (2014). Internet control message protocol (ICMP). In Linux Kernel Networking (pp.      37-61). Apress.