Wednesday, February 19, 2020

Network Security and the Demilitarized Zone Coursework

Network Security and the Demilitarized Zone - Coursework Example The researcher states that the disadvantages associated with DMZ are not significant, but one issue can be highlighted, as the segregation may create a hassle for the network administration because DMZ requires frequent updates and maintenance. Moreover, the hardware cost is high and requires dedicated hardware in order to implement DMZ within the network. Deployment includes a switch, separate firewall, and IDS etc. The most significant advantage that is shared by both of these technologies is communication. However, intranet provides limited communication as compared to the extranet, but it is still effective. In order to implement the intranet, local area network and a host is required. The network must adhere to the requirements of the intranet application. Moreover, the application will be deployed on a separate workstation called as a host or server. The star topology is recommended for intranet-based networks as the network administrator can manage and administer intranet issu es in a centralized environment. Furthermore, the presence of the intranet will enable new trends for communication. For example, paperless communication between employees, chatting, e-mails and blogs etc. disadvantage includes maintenance and security issues. Hardware requirements for an extranet are similar, except Extranet provides a wide coverage for employees, who want to work from home, or communicate while traveling. However, in order to provide or publish contents on the Internet, certain advanced protocols are required. For instance, VPN is a secure choice. Accordingly, due to its broad functionality, security issues are also more as compared to the intranet. Network address translation is defined as â€Å"An Internet protocol that allows individual sites to support more IP hosts than the number of IP addresses assigned to it. This is done using special Internet addresses that have been reserved for this purpose. These special addresses are invalid on the Internet itself. The hosts using these addresses may communicate among themselves, but they cannot access the Internet directly† (Campus infrastructure guidelines). NAT translates private IP addresses into global IP addresses, making it simple for the network administrator, as incremental changes are required without modifying host and routers. Moreover, the disadvantage NAT has is that it is slow because each packet is processed, prior to the decision of translating it or not. ‘IP traceability’ also becomes difficult as data packets are difficult to trace.   Tunneling is also called as port forwarding. Port forwarding is configured for a secure channel within the medium or corporate networks. One way of implementing a tunneling protocol is to configure a DSL modem by defining the port number that is allocated for using specific service. For instance, in order to access remote desktop via port forwarding, port number 3389 and RDP service is defined in the router against the IP a ddress of the workstation on which the service needs to be executed. A popular tunneling protocol developed by Microsoft is known as Point to Point Tunneling Protocol (PPTP).

Tuesday, February 4, 2020

Between Constructivist Learning and Direct Instruction Essay

Between Constructivist Learning and Direct Instruction - Essay Example Direct instruction proponents dispute the latest trend in education strategies which encourages learners to construct their own learning via minimal guidance even without prior knowledge of underlying concepts, principles, and processes (Baumann, 1982). They say that this method goes against the human cognitive architecture, that is, learners can only churn out, via long term memory, what was previously inputted to them. Constructivist Learning Constructivist learning, in whatever form it may be, is rooted from the works of Piaget and Vygotsky (Gallagher & Reid, 2002; Kirschner, Sweller, & Clark, 2006; Hmelo-Silver, Duncan, & Chinn, 2007). Constructivists propose that learning occurs when knowledge is constructed by the learner through personal experiences, interaction with the environment, and scaffolding guidance of an adult or more experienced person. In response to Kirschner et al’s (2006) position that minimally guided instruction is less effective that direct instruction , Hmelo-Silver, et al (2007) pointed out that a number of constructivist strategies, specifically problem-based and inquiry learning, utilize more than just minimal guidance during scaffolding. They say that scaffolding takes place at a high rate in problem-based and inquiry learning, thus refuting Kirschner, et al’s position. Moreover, Hmelo-Silver (2007) produced a long list of studies and researches which attested to the effectiveness of problem-based and inquiry learning. Another notable point that constructivists try to emphasize is that positive effects of employing constructivist approaches may not be immediately observed from standardized tests (Hiebert, Stigler, & Jacobs, 2005; Hmelo-Silver, Duncan, & Chinn,... So much debate has been going on to pinpoint exactly which mode of instruction would produce the best results for a learner. While it may be disappointing to think that no one has found the secret formula to learning yet, the on-going debate is a welcome clash of ideas because it means that educators still have not rested on the age-old established â€Å"facts† about learning and are still very much in the quest for the improvement of the ease and effectiveness of the teaching and learning process. Maybe no one has found the secret formula yet because there may be no secret formula at all. Perhaps the only reliable â€Å"fact† about learning is that each learner is unique; what might work for one may not work for another. The best that we can hope for is that at the end of the day, teachers/educators/facilitators have done their best in trying to create an appropriate and effective learning environment for the child.