[SOLVED] provide replies to below 2 posts each in 150 words 6-network security

I’m trying to learn for my Computer Science class and I’m stuck. Can you help?

Struggling to find relevant content or pressed for time? – Don’t worry, we have a team of professionals to help you on
[SOLVED] provide replies to below 2 posts each in 150 words 6-network security
Get a 15% Discount on this Paper
Order Now

Main que:

What is authentication, authorization, and Accounting? Please provide an example


Authentication: It is the process of providing a user with access to the network. The users like employees want to access the network resources by asking the credentials like username and password. Common methods of authentication are put authentication on console port, AUX ports, etc. A network administrator has the full control on how a user can be authenticated if wanted any access to the networks. Some of the methods of acquiring the authentication include using the local database of that device, sending the authentication request to the external server, etc. In the process of performing the authentication is broken into three parts: Principal (Entity that requests the authorization), Credential (the user provides as the proof of identity like shared key or password, one-time password (OTP), etc.) and Contextual (includes network and physical location of the request made).

Authorization: It is providing the ability to implement the policies of the network resources after the user has access to network through authentication. Authorization is used to determine what resources can be accessed by the user who has the successful authentication to access the networks. Like network administrator determines what operations to be performed by the user. For junior employees, the administrator can create access to the user which allow the user only to perform few operations. There is also a concept called null authorization (no authorization at all) where this is the most common authorization in AAA. After the authentication occurs, the user is granted full access to the network.

Accounting: This provides a way to monitor and track the events performed by the user after having the success authentication granted to the network resources, how long the user has the access. The administration is able to create an accounting activity and also has the authority to specify what should be accounted and to whom the records can be sent. Accounting holds the track history of the users who has the successful authentication like, which clients have the access to the network, what all access they were granted and when the client has been disconnected etc. Accounting is widely used in the Internet Service Provider space.


To use the local database and local running configuration, we need to implement AAA in case of new employees. The first step is to create the users and have the authentication requested to the administrator for access to access the local database. Then the administrator who has the authorization grants the access to the new employee by providing a username or email id and the password to log in and have the successful authentication to access the local database. This user’s events will be tracked by the accounting activity created for this specific user. When there is an issue with accessing the networks or the database, the administrator will access the accounting activity and provide an immediate solution for the issue with the authentication.


hat is authentication, authorization, and Accounting? Please provide an example

In the past decade the cloud services have enabled many organizations and individuals to perform variety types of tasks such as online storage, email services and on demand TV and online shows. With the help of cloud services, the deployment of applications with very cheap cost with elastic and scalable due to fault tolerance system. Authentication and authorization and accounting (AAA) are three mains that helps track the system tracker of the user activities via IP-based network and controlling the access to network resources. A term AAA protocol is often implemented as a dedicated server.

Authentication refers to identifying unique information in each user system in a form of username and password. With the help of system administrators, we are able to monitor, add or delete authorized user in the system.

Example: When a network administrator controls the user authentication when an individual wants to access the network. These methods include local database that could be a router that sends authentication request to an external server. Sometime customized authentication methods are used for default authentication customization.

Authorization refers to the an individual adding or denying any user access in the computer network and its resources. Depending on the limit and their access towards the networks, users are given different authorization level depending on that. This determinization can be based on variety of entities on geographical location, date or time restriction, multiple logins by single individuals frequency associated types of authorization in the services include routing assignments, IP address filtering, bandwidth encryption traffic management.

Example: when a junior engineer who has not given any privilege to access all the resources and would want to access the devices, this were the administration would come into the picture to allow particular commands wherein the view will be created which will allow particular commands to be executed. This is to specify the user in a way is authorized to network resources through local database or ACS server.

Accounting refers to tracking or record keeping of individual activities in an computer network. Some of the examples of accounting would be time period but not limited to accounting time spent towards accessing the network, capacity and trend analysis, network cost allocations, billing data and user authentication and authorization.

Examples of AAA protocols include:

  • Diameter, a successor to Remote Authentication Dial-In User Service (RADIUS)
  • Terminal Access Controller Access-Control System (TACACS)
  • Terminal Access Controller Access-Control System Plus (TACACS+) a proprietary Cisco Systems protocol that provides access for network servers, routers and other network computing devices.

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with MyCoursebay
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Business and administrative studies
Customer 452813, June 30th, 2022
Social Work and Human Services
Great Work!
Customer 452587, November 2nd, 2021
Application Letters
Well written essay, will definitely use this service in the future.
Customer 452773, April 14th, 2022
Social Work and Human Services
Great Work !!!
Customer 452587, November 9th, 2021
Always perfect! Thank you!!!
Customer 452453, April 15th, 2021
Customer 452813, June 25th, 2022
Customer 452813, July 5th, 2022
Customer 452813, July 5th, 2022
Customer 452813, July 5th, 2022
Criminal Justice
Excellent Work!!!
Customer 452587, March 10th, 2022
Great work. thank you again!
Customer 452707, August 7th, 2022
Social Work and Human Services
Great Work!
Customer 452587, September 16th, 2021
Customer reviews in total
Current satisfaction rate
3 pages
Average paper length
Customers referred by a friend
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Order your essay today and save 15% with the discount code DC15


Thank you for choosing MyCoursebay. Your presence is a motivation to us. All papers are written from scratch. Plagiarism is not tolerated. Order now for a 15% discount

Order Now