Page 43 - CITS - Computer Software Application -TT
P. 43

COMPUTER SOFTWARE APPLICATION - CITS




           2  Security: The encryption used in VPNs ensures that your data remains confidential and secure while being
              transmitted over potentially insecure networks, like public Wi-Fi hotspots.
           3  Bypass Geographic Restrictions: VPNs enable you to access content that might be restricted or blocked in
              your region. By connecting to a server in a different location, you can appear as if you’re browsing from that
              region and access region-specific content.

           4  Remote Access: Businesses use VPNs to provide secure remote access for employees who need to connect
              to the company’s internal network from outside locations. This is particularly useful for remote work or traveling
              employees.
           5  Types of VPNs: There are various types of VPNs, including remote-access VPNs and site-to-site VPNs.
              Remote-access VPNs are used by individuals to connect to a private network over the internet. Site-to-site
              VPNs are used to connect multiple networks in different locations.


























           Introduction to DHCP
           Dynamic Host Configuration Protocol (DHCP) is a network protocol used to automatically assign IP addresses
           and other network configuration settings to devices on a network. It simplifies the process of connecting devices
           to a network by eliminating the need for manual IP configuration.
           Key features and uses of DHCP include:

           •  Automatic IP Address Assignment: DHCP servers allocate IP addresses dynamically to devices as they
              connect  to  the  network.  This  automation  reduces  the  risk  of  IP  address  conflicts  and  simplifies  network
              management.
           •  Efficient Resource Allocation: DHCP optimizes the allocation of IP addresses by releasing them when they
              are no longer in use. This prevents address wastage and ensures efficient use of available addresses.
           •  Centralized  Configuration:  DHCP  enables  centralized  management  of  network  configuration  settings.  It
              can provide additional information to devices, such as DNS server addresses, default gateways, and subnet
              masks.
           •  Scalability: DHCP is highly scalable and suitable for both small and large networks. It streamlines the process
              of adding new devices to the network without manual configuration.

           •  Lease Management:  DHCP  leases  are  time-limited  assignments  of  IP  addresses.  This  allows  network
              administrators to control how long devices can retain an IP address, ensuring that addresses are periodically
              released for other devices to use.
           DORA Process
           The “DORA” process is an acronym that stands for “Discover, Offer, Request, Acknowledge.” It refers to the
           sequence of steps in the Dynamic Host Configuration Protocol (DHCP) through which a client device obtains an
           IP address and other network configuration information from a DHCP server. Here’s a breakdown of each step in
           the DORA process:



                                                           30

                              CITS : IT&ITES - Computer Software Application - Lesson 01-17
   38   39   40   41   42   43   44   45   46   47   48