What is Internetworking
- Tech Article

What is Internetworking?

Internetworking is very important term in Cyber Security and internet. In this article you will learn about  what is Internetworking? And in this article I will give you the definition of Internetworking, which will help you to get simple concept of Internetworking.

 

See also

What is Internetworking?

What is Internetworking

Access control

Internetworking is the connection of the local LAN (Local Area Network) server to other LAN\WAN servers via various connection (e.g., routers, gateway). The current Department E-mail system, for example could exists without this inter connectivity. Each additional LAN\WAN inter connection can add outside user and increase the risks to the system.

LAN server and network devices can function as “filters” to control traffic to and from external networks. For example, application gateway may be used to enforce access control policies at network boundaries. The important point is to balance connectivity-requirements with security requirements.

Wireless LAN

Wireless LANs use infrared light waves or Radio Frequencies (RF) to transmit signals and data to PCs, servers, and other network device. Networks can use a combination of wired and wireless capabilities. Increasingly, portable computers, laptop, and palmtops will have wireless connectivity.

Wireless LANs, particularly those which are radio based, can be vulnerable to the interception of data and passwords. Security planning, careful selection of security features (e.g., Data Encryption), and security training are crucial for the successful wireless LAN implementation.

Organizational Teamwork

The effective administration of LANs\WANs require inter-organizational coordination and teamwork. Since network can cross so many organizational boundaries, integrated security requires the combined efforts of many personal, including the administrators and technical staff (who support the local servers, network, and internetworks), security personal, users, and management.

E-mail

E-mail messages are somewhat different from other computer applications in that they can involve “store and forward” communications. Messages travel from the sender to the recipient, often from one computer to another over a WAN. When messages are stored in one places and them forwarded to multiple location they because vulnerable to interception or can carry viruses and related malicious software.

Risk Management

This is the process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives and deciding what counter measures, if any, to take in reducing risk to an acceptable level.

The Middlebox Communication (midcom) Working Group of the Internet Engineering Task Froce in working on standardizing protocol for managing firewalls and other middle boxes.

Conclusion

This article will be useful for those who are interested in Cyber Security and networking also. I hope you  understand “what is internetworking” ? and its concept.

If you have any question and any comment regarding this topic you can tell me in comment below.

See also

About Subham Das

Hi, I am Subham, Owner and Founder of TechBick. I am a technology lover boy and I like to play with new Android apps. I am so interested in tech and I also like to read about new tech article and new innovations of science. I can say I am a regular reader of tech magazines and blogs. I believe in the quote " Sharing of knowledge is earning of knowledge"
Read All Posts By Subham Das

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.