Thursday, 13 September 2012

Best Explaining the mobile networking




Many people are on the move in the business world today, and many companies are allowing same employees to work from home. A technique still use today, but which is declining, is to set up a bank of modems and give dial- In access to certain people, such as salesman, who are always on the move. for a business that  needs data connection to branch offices but can’t justify that cost of leased lines, modem  bank provides the necessary remote connection. You can host a bank of modem under many different operating system, unix(with its efficient kernel and support for large number of serial devices) to  windows  2000/2003 (using the remote access services  (RAS) you even can install servers that are basically appliances that act as a front end to provide a bank of modem for dial-in services.

However, maintaining a bank of modem can be expensive because each modem needs  a telephone  line which is an ongoing cost. There are several security issues to be considered. For example, what happens if someone discovers the telephone number of your dial-up access? It would then be easy to use a password dictionary attack to break into the network.     

However sometimes a simple dial- in modem is not the the best solution. With internet access available almost anywhere in the United States, Europe Japan, and many other countries, the internet can be a good solution to this problem. You can use a single, high bandwidth connection to allow multiple home workers, traveling salesman, and other mobile workers to connect to your network just as if they were sitting at a desk at the office.

The only problem with this access method is the fact that the internet is not exactly the most secure place in the world. As a matter of fact, just connecting your company’s networks to the internet is a serious task that should be accompanied by careful consideration of how  you will control that connection (such as using a good firewall strategy ), and how you will segment portions of your network to make sure that intrusions or other security breaches can be minimized.

No comments:

Post a Comment