Unit 7: Multimedia, Security, and Cloud Computation over the Internet
Multimedia over the Internet becomes more and more popular. This unit guides you through the protocols for transmitting multimedia content, such as voice and video, over the Internet, and discusses security, reliability, and fault tolerance issues related to Internet applications. You will also be introduced to one of the most recent Internet-based technologies: cloud computation, and we will briefly discuss network remote access and directory services.
Completing this unit should take you approximately 6 hours.
Upon successful completion of this unit, you will be able to:
- compare application protocols, such as Voice over Internet Protocol (VoIP) and Internet Protocol television (IPTV);
- describe some typical challenges for TCP/IP security and their solutions;
- improve TCP/IP security by using security protocols;
- illustrate how IT professionals use Virtual Private Networks (VPNs) to enhance security in the workplace;
- evaluate remote access and directory services;
- apply fault tolerance techniques to improve network reliability; and
- describe the basis of cloud computing over the Internet.
7.1: Voice over Internet Protocol (VoIP)
Read this article, which discusses one of the most popular network applications: Voice over IP. There are quite a few industry protocols for Voice over IP; one of the most popular and widely accepted is IETF protocol SIP. As you read, pay special attention to the registering and calling process.
7.2: Internet Protocol Television (IPTV)
Read this article, which discusses another popular network application: Video over IP. This protocol enables us to have video conferences over the Internet. As you read, pay special attention to the different IPTV techniques, such as video on demand (VOD), live television, and time-shifted television.
7.3: TCP/IP Security
Read this lecture. As you read, pay special attention to DoS attacks, intrusion, hijacking, Web authentication attacks, and weakness in Internet architecture.
As you read this section, consider the following questions: When you first used your computer to access the Internet, what was the first security technique you heard about? How does a firewall protect your system from the "evil-doers" lurking on the Internet?
7.4: Cloud Computing
Read this article and take notes on the following popular terms: IaaS (Infrastructure as a Service), PaaS (Platform as a Service), SaaS (Software as a service), MaaS (Monitoring as a Service), CaaS (Communication as a Service), and XaaS (anything as a Service).
Watch this video, which discusses the advantages and disadvantages of cloud computing and when it makes sense for companies to move to the cloud.
7.5: AAA Protocol, Network Remote Access, and Directory Services
Read this article and take notes on the following: authentication, authorization, and accounting (AAA) and where they are used.
7.5.1: Remote Authentication Dial In User Service (RADIUS)
Read this article and take notes on the following popular terms: Remote Authentication Dial In User Service (RADIUS), roaming, realms, and proxy operations.
7.5.2: Terminal Access Controller Access-Control System Plus (TACACS+)
Read this article and take notes on the following: Terminal Access Controller Access-Control System (TACACS), Terminal Access Controller Access-Control System Plus (TACACS+), and how they are used in AAA Protocols.
7.5.3: Lightweight Directory Access Protocol (LDAP) and Directory Services
Read these articles and note the following terms: directory service, X.500, distinguished name (DN), and LDAP operations.
Read this article to learn the implementation and the process to select the Master in a redundant router configuration. Notice HSRP and CARP. What makes VRRP different from both HSRP and CARP?
7.6: Network Reliability and Fault Tolerance
Read this article and take notes on the following popular terms: reliable network, reliable multicast, unicast protocols, and reliability properties.
7.7: Network Security Techniques
Follow the steps detailed in this document, which will instruct you how to use port-scanning techniques to administrate a large network.
Read this material for a detailed description of VPNs and their use to improve network security.
Follow these steps to control your computer from a mobile device via Virtual Network Computing. Virtual Network Computing is a graphical desktop sharing system. It uses Remote Frame Butter Protocol to control another computer remotely. Even if you choose not to download the above apps, reading this article is still valuable as it provides an explanation of the difference between RDP and VNC.
Follow these steps in order to control your computer from a mobile device.
Unit 7 Assessment
- Receive a grade
Take this assessment to see how well you understood this unit.
- This assessment does not count towards your grade. It is just for practice!
- You will see the correct answers when you submit your answers. Use this to help you study for the final exam!
- You can take this assessment as many times as you want, whenever you want.