This content originally appeared on DEV Community and was authored by Mohana Vamsi
Default-Gateway
A default gateway is a router's IP address that allows a subnet to communicate with other devices on a network. It's the path used when a device doesn't know where the destination is, and it's also the exit point for all packets in the network that have destinations outside the network.
VLAN
A VLAN or Virtual Local Area Network is a logical grouping of devices or users within a network, based on shared attributes like location, department, or security requirements. VLANs play a crucial role in improving network security, enabling better resource allocation, and simplifying network management.
Key Features of VLANs
Isolation: VLANs isolate traffic between different groups, helping to minimize the risk of unauthorized access to sensitive data.
Scalability: VLANs allow network administrators to grow and change networks with ease, without causing disruptions.
Cost Effectiveness: VLANs can reduce the need for additional hardware by reusing existing switches and networks for added functionality.
Improved Performance: By narrowing the broadcast domain, VLANs can improve network performance by reducing unnecessary traffic.
Types of VLANs
Port-based VLANs: In this type, devices are separated based on their physical connection to the switch. Each port is assigned to a specific VLAN.
Protocol-based VLANs: Devices are grouped based on the network protocol they use. For example, all IP devices can be assigned to one VLAN, while IPX devices can be assigned to another.
MAC-based VLANs: Devices are assigned to VLANs based on their MAC addresses. This approach offers better security and flexibility but requires more administrative effort.
DMZ
A DMZ, also known as a Demilitarized Zone, is a specific part of a network that functions as a buffer or separation between an organization’s internal, trusted network and the external, untrusted networks like the internet. The primary purpose of a DMZ is to isolate critical systems and data from the potentially hostile external environment and provide an extra layer of security.
Purpose of DMZ
Security: By segregating critical systems, a DMZ reduces the risk of unauthorized access and potential damage from external threats. This is achieved by implementing strong access controls, firewalls, and intrusion detection and prevention systems (IDS/IPS) to monitor and filter traffic between the DMZ and internal networks.
Content Filtering: It enables organizations to place publicly accessible servers (e.g., web and email servers) within the DMZ without exposing the entire internal network to potential attacks. This ensures that only authorized traffic is allowed to pass through.
Ease of Management: DMZ aids in simplifying security management processes as it provides a centralized location for implementing, auditing, and monitoring security policies, rules, and configurations for public-facing resources.
Router
A router is a networking device responsible for forwarding data packets between computer networks. It acts as a traffic coordinator, choosing the best possible path for data transmission, thus ensuring smooth communication between networks. Routers are an integral part of the internet, helping to establish and maintain connections between different networks and devices.
Switch
A switch is a networking device that connects devices together on a computer network. It filters and forwards data packets between different devices by using their MAC (Media Access Control) addresses to identify them. Switches play an essential role in managing traffic and ensuring that data reaches its intended destination efficiently.
This content originally appeared on DEV Community and was authored by Mohana Vamsi
Mohana Vamsi | Sciencx (2024-08-09T12:35:24+00:00) Understand the terminologies of in CS. Retrieved from https://www.scien.cx/2024/08/09/understand-the-terminologies-of-in-cs/
Please log in to upload a file.
There are no updates yet.
Click the Upload button above to add an update.