DES Network. Computer and Network Examples
The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of the electronic data.
The encryption is an important issue for any organization, it allows to safely keep, handle and transmit the sensitive data through the local network, wireless network or the Internet. The encryption applies the key to the plain text and converts it into the ciphertext. The ciphertext at that looks like the set of the random characters.
The key is a mathematical algorithm known only to the sender and the recipient of the message. The applying of the key to the ciphertext will convert it back to the plain text - it is the decryption process.
This diagram was created in ConceptDraw DIAGRAM v12 using the Computer and Networks Area of ConceptDraw Solution Park and shows how the encryption and access control work together to secure data.
Example 1. DES network.
Using the solutions of the Computer and Networks Area for ConceptDraw DIAGRAM v12 you can create your own computer network diagrams quick and easy.
The diagrams designed with ConceptDraw DIAGRAM v12 are vector graphic documents and are available for reviewing, modifying, and converting to a variety of formats (image, HTML, PDF file, MS PowerPoint Presentation, Adobe Flash or MS Visio).
See also Samples:
FOUR RELATED HOW TO's:
Secure Wireless NetworkUse the ConceptDraw DIAGRAM v12 diagramming and vector drawing software enhanced with powerful tools of Network Security Diagrams Solution from the Computer and Networks Area of ConceptDraw Solution Park to effectively visualize the importance of network security and wireless network security, and ways to ensure them, to easily design Network Security Diagrams and Maps, Network Security Model, Secure Wireless Network and Network Security Architecture diagrams.
Picture: Secure Wireless Network
Network TopologiesWhen describing any computer network, we imagine a set of devices and nodes, arranged in some way. Talking about network structures, we should distinguish physical and logical network topologies, as physical topology is about devices location and logical topology illustrates data flow. In the same time, they do not have to match, and some devices, such as repeaters, may have a physical star layout, but a bus logical topology.
There are two main types of computer network topologies: Physical topology that show the physical organization of a network - equipment and types of connections. Star network topology involves a set of devices that is connected to a single hub (router). Ring network topology means that, devices connected according this topology have two connections, connecting with nearby devices to make a loop. Bus network topology is the topology presented at the current diagram. It is similar to a ring topology. The difference is that data moves up and down a linear connection, copying itself where network equipment works as bus-stations along the way. This network topology can be used for small network, or when adding an extra device into a network.
Picture: Network Topologies
Personal area (PAN) networks. Computer and Network ExamplesAll computer networks differ by various params, and their size is one of them. As global area networks are the biggest, personal area (PAN) networks are the smallest. Personal computers, smartphones and other devices that have possibility to connect to Internet form a personal network.
This diagram was created using ConceptDraw Computer Network Diagrams to represent a typical components of Personal area network. A personal area network (PAN) is the connection of IT devices around an individual person. This sample of personal area network involves a notebook, a personal digital assistant (PDA), and a portable printer. Commonly a PAN contains such wireless devices as mouse, keyboard, smartphone and tablet. A wireless connection is typical for a PAN.
Picture: Personal area (PAN) networks. Computer and Network Examples
Active Directory DiagramIt's no secret that there is a list of skills that every average system administrator should have. And it's important to be able to manage domains via active directory technologies. The best way to keep all the details in mind is to draw a diagram representing users, groups and domains.
This diagram represents an Active Directory Services (Active Directory Domain Services). It can be helpful for system and network administrators to organize a network physical and logical elements (domains, data bases, servers, network equipment, end-user computers etc.) into a secure and logical structure. The logical structure of Active Directory is a hierarchical organization of all network components. The data that is stored in Active Directory comes from some diverse sources. The Active Directory diagram created using ConceptDraw Active Directory Diagram solution. It shows allocating group policies and functions assigned to end users. It helps to plan, manage and maintain the certain user access scenario.
Picture: Active Directory Diagram