Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

University of Santo Tomas Legazpi

Activity No. & Title: Activity 2: Internetworking Subject Code: CPE 322.1

1. What is the concept of internetworking and its significance in computer networks


and security?
- Internetworking refers to the practice of linking various computer networks together,
allowing them to communicate and exchange information with one another. It employs
specialized hardware and software components that facilitate seamless interactions
across different network architectures and technologies. This interconnectivity
between networks is essential for enabling widespread access to shared resources,
supporting scalable growth, and promoting compatibility, although it also necessitates
robust security measures to safeguard the interconnected systems.

2. Discuss a brief historical context and evolution of internetworking protocols.


- Internetworking traces its roots back to ARPANET, the pioneering wide-area network
developed in the 1960s. As the need for interconnecting diverse networks grew, the
TCP/IP protocol suite emerged as the standard for internetworking, facilitating the
explosive growth of the Internet in the 1990s. Continuous advancements in
internetworking protocols and technologies have been instrumental in enabling global
connectivity and seamless communication across heterogeneous networks over the
years.

3. Explain the OSI model and how it relates to internetworking.


- The Open Systems Interconnection (OSI) model establishes a layered framework for
network protocols, enabling communication between diverse systems. Its standardized
layers act as guidelines for developing internetworking components that facilitate
connectivity across different network architectures. The OSI model's structured approach
fosters interoperability, allowing seamless integration of heterogeneous networks
through common protocols and specifications.

4. What is the role of IP addresses and subnetting in internetworking?


-Internet Protocol (IP) addresses serve as unique identifiers for networked devices,
enabling internetworking and communication across interconnected networks. The
practice of subnetting involves subdividing a larger network into smaller subnetworks,
optimizing IP address allocation and enhancing network organization. Proper IP
addressing and subnetting schemes are essential for efficient routing and data
transfer within and between interconnected networks.

5. Give at least three examples of security threats in internetworking, and provide


strategies to mitigate them.

• Unauthorized access:

- Unauthorized access to interconnected networks can lead to data


breaches, system compromise, and misuse of resources.
- Strategies to mitigate unauthorized access include implementing
strong access controls, multi-factor authentication, and encryption
of network communications.
• Malware propagation:

- Malware like viruses, worms, and trojans can spread rapidly across
interconnected networks, causing data loss, system disruption, and
theft of sensitive information.
- Deploying antivirus software, maintaining regular security updates,
and implementing network segmentation can help contain and
prevent malware propagation.

• Denial of Service (DoS) attacks

- DoS attacks aim to overwhelm network resources, disrupting


services and causing network downtime.
- Implementing redundant network infrastructure, load balancing, and
intrusion detection/prevention systems can help mitigate DoS
attacks and ensure network availability.

6. Summarize the main points and highlight practical applications of internetworking in


computer networks and security.

• The practice of internetworking revolves around interconnecting various


computer networks, allowing them to communicate and exchange data
seamlessly. It relies on specialized hardware components and protocols that
promote interoperability across different network architectures. Internetworking
plays a pivotal role in facilitating resource sharing, accommodating scalable
network growth, enabling global connectivity via the Internet, and addressing
security concerns arising from interconnected environments. Its applications are
widespread, encompassing enterprise networks, cloud computing services,
Internet of Things ecosystems, e-commerce platforms, and remote access
solutions.why it is good for small network

You might also like