The Three-Two Network Configuration Model
  • Category: Information Science and Technology

The 3-2 Network Configuration Model, presented by Joseph Boletti in the course "IT-200 Fundamentals of Information Technology" instructed by Luke Konrath on January 23, 2022, includes the definition and description of five important IT concepts within a network.

1. First, the IP address and DNS are introduced. IP addresses are unique identifiers assigned to devices in a network, allowing them to connect locally and globally. DNS, or Domain Name System, functions as a phonebook for the internet, keeping a database of domain names and their corresponding IP addresses to enable website access.

2. Second, servers and clients are defined. A server is a computer that provides data to other network-connected devices, while clients access data from servers through software. Sharing resources through servers and clients is an essential feature of networking.

3. Third, VPN or Virtual Private Network, is explained as a private network that masks a user's IP address to keep their data anonymous and encrypted. VPN is especially crucial when using unsecured public wi-fi networks.

4. Fourth, firewalls are introduced as a security system for networks regulating traffic and preventing attacks from bad actors. They can be hardware or software, acting as a security fence for network devices.

5. Finally, LANs or Local Area Networks, and WANs or Wide Area Networks are discussed. LANs connect devices within the same physical location, allowing them to share resources. WANs encompass multiple LANs to share data between locations, making them essential for businesses and organizations.

A network configuration diagram created by Justin Altuve is presented. The diagram depicts the modem connected to a hardware firewall, which is connected to a wireless router. The router connects the devices to the internet, including a PC, laptop, IP phone, and printer. The wireless router allows all devices to access the internet, with the PC, laptop, and printer able to connect with each other. Justin can also sync his camera wirelessly, and if necessary, wire his desktop to the router for a better connection. Based on his photography business, the instructor recommends he purchase network-attached storage for additional backup, in addition to cloud storage he may already use.

Continue by Your Own
Share This Sample