UNIT-II
UNIT-II
5. Security Management
Access Control: Manages who has access to the network and
enforces policies to prevent unauthorized access.
Firewall and Intrusion Detection: Configures firewall rules
and uses intrusion detection systems to identify and block
malicious activities.
Endpoint Security: Ensures that all devices connected to the
network comply with security policies.
Data Encryption and VPNs: Encrypts data in transit and uses
VPNs for secure remote access, especially important for
sensitive or regulated data.
Degraded Service
Degraded service occurs when the network fails to deliver expected
performance.
Causes:
1. High Congestion: Excessive traffic can lead to delays and packet drops.
2. Hardware Failures: Faulty network devices can disrupt performance.
3. Poor Configurations: Misconfigured routers or switches can create
bottlenecks.
Capacity Planning
Key Components
1. Switch Capacity: Ensures switches handle concurrent connections
without performance drops.
2. Router Capacity: Considers routing, packet forwarding rates, and
resource usage.
3. Internet Connection: Determines required bandwidth for external
traffic.