Module10 Euc
Module10 Euc
Module 10 – Networks
19689322
9911150038080
1. Prepare six presentation slides (On the Online Assessment Tool – your
answer - just say Slide 1 then include your notes and then Slide 2 then
include your notes, etc.) on one of the following categories: client/server
network, peer-to-peer network, and cloud computing. In your notes discuss
the pros and cons of their network architecture type, as well as discuss a
model that incorporates the hardware/software components that would be
needed. (6)
SLIDE 1:
Client/Server Network:
SLIDE 2:
SLIDE 3:
Pros of Client/Server Network continued:
o enables efficient sharing of resources among multiple clients
o improved overall productivity and collaboration
o easier to maintain and update the system
SLIDE 4:
Cons of Client/Server Network:
o Costly to set up and maintain
o Dependency on the server for network operations
o Single point of failure
SLIDE 5:
Cons of Client/Server Network continued:
o Performance Limitations
o cost of servers
o decreased privacy
o autonomy of nodes due to their need to communicate with a
central server
SLIDE 6:
• model that incorporates the hardware/software components that would
be needed:
Component Description
3. What are some reasons that an individual or corporation might set up a VPN?
(2)
Security: Protect sensitive data from unauthorized access or cyber
threats.
Privacy: Safeguard online activities from surveillance or tracking.
Remote Access: Access resources on a private network from a remote
location.
Engineering, Advanced
Widely
AutoCAD architecture, Moderate Expensive drafting tools,
available
construction 3D modeling
3D CAD Software
Professional Ease of
Software Cost AvailabilityFeatures
Uses Use
Parametric
Engineering,
Widely modeling,
SolidWorks product Moderate Expensive
available simulation
design
tools
Professional Ease of
Software Cost AvailabilityFeatures
Uses Use
Engineering, Cloud-based,
Free and
product Widely collaboration
Fusion 360 Moderate paid
design, available tools, CAM
versions
manufacturing capabilities
BIM Software
Professional Ease of
Software Cost Availability Features
Uses Use
Building
Architecture, information
Widely
Revit engineering, Moderate Expensive modeling,
available
construction collaboration
tools
BIM, 3D
Architecture,
Limited visualization,
ArchiCAD urban Moderate Expensive
availability teamwork
planning
features
8. Research net neutrality, including history and current legal status. Provide
arguments for or against net neutrality and decide whether or not it is
beneficial. (6)
Net neutrality is the principle that Internet service providers (ISPs)
should treat all data on the Internet equally, without discriminating or
charging differently based on user, content, website, platform,
application, or method of communication.
o History:
The concept of net neutrality emerged in the early 2000s as the
Internet became more widely used. In 2015, the Federal
Communications Commission (FCC) in the United States
implemented strong net neutrality rules to ensure an open
Internet. However, in 2017, the FCC under the new administration
repealed these regulations, leading to a more relaxed approach to
net neutrality.
o Current Legal Status:
As of now, the legal status of net neutrality varies by country.
Some countries have implemented strong net neutrality
regulations, while others have taken a more relaxed approach. In
the United States, the situation remains contentious, with ongoing
debates and legal battles at both the federal and state levels.
o For Net Neutrality:
• Preservation of Open Internet: Net neutrality ensures that all online
content is treated equally, preventing ISPs from favoring certain
websites or services over others.
• Promotion of Innovation: It fosters a level playing field for startups and
small businesses, allowing them to compete with larger, established
entities.
• Consumer Protection: Net neutrality safeguards consumers from
potential price discrimination and ensures access to a diverse range of
online content.
o Beneficial or Not?
The debate over net neutrality is complex and multifaceted. While
proponents argue that it is essential for preserving a free and
open Internet, opponents raise concerns about its potential
impact on investment and innovation. Ultimately, the benefits of
net neutrality depend on one's perspective and the specific
context of the regulatory environment.
11. Discuss what steps you will take to make a home’s wireless network more
secure. Why is each step necessary to protect the network’s security?
Research and discuss both hardware and software that might help with
security, including authentication, encryption, firewalls, and network
maintenance. Pay particular attention to the password protocols that should
be followed. (10)
• Modify the SSID and password that is set as the default.
It is important to change the default Service Set Identifier (SSID) and
password because attackers can easily exploit widely known default
settings.
• Activate encryption (either WPA2 or WPA3)
Encryption hinders unauthorized entry to the network. Enable either
WPA2 or WPA3 encryption protocols to protect the data being sent over
the network.
• Utilize secure passwords
Having strong passwords is crucial in order to avoid unauthorized
access. Long passwords with a combination of letters, numbers, and
special characters are essential for every device and service and should
be distinct.
• Firmware for the Router needs to be updated.
Consistently updating the firmware of the router is essential to fix any
security flaws and guarantee the most recent security enhancements
are activated.
• Activate MAC Address Filtering.
MAC address filtering adds an additional level of security by permitting
only designated devices to access the network.
• Set up a firewall.
A firewall watches and regulates both inbound and outbound internet
traffic, stopping unauthorized entry and defending against online
dangers.
• Utilize Virtual Private Network (VPN) technology
A VPN secures internet traffic by encrypting it, providing additional
security measures, particularly for remote network access.
• Turn off Remote Management
Preventing unauthorized users from accessing the router's settings
externally is done by disabling remote management.
12. The _________ address is a unique hardware address identified for your
computer or device. (1)
MAC (Media Access Control) address