Mẹo Which of the following is not a true statement about devices and the internet?

Mẹo về Which of the following is not a true statement about devices and the internet? Mới Nhất

Cao Nguyễn Bảo Phúc đang tìm kiếm từ khóa Which of the following is not a true statement about devices and the internet? được Cập Nhật vào lúc : 2022-12-11 07:26:04 . Với phương châm chia sẻ Thủ Thuật về trong nội dung bài viết một cách Chi Tiết 2022. Nếu sau khi Read tài liệu vẫn ko hiểu thì hoàn toàn có thể lại Comments ở cuối bài để Tác giả lý giải và hướng dẫn lại nha.

Broad network access is defined as the ability of network infrastructure to connect with a wide variety of devices, including thin and thick clients, such as mobile phones, laptops, workstations, and tablets, to enable seamless access to computing resources across these diverse platforms. This article explains this concept in detail and lists its key components. It also discusses the best practices to remember when rolling out broad network access for your users in 2022 and beyond. 

Nội dung chính Show
    Table of ContentsWhat Is Broad Network Access?8 Key Components of Broad Network Access 1. Cloud data center 2. Wide area network(s)3. Thin clients 4. Thick or fat clients 5. Zero clients 6. Open systems interconnection (OSI) architecture 7. Security mechanisms 8. Self-service support Top 7 Best Practices for Implementing Broad Network Access in 20211. Configure your network for secure remote access 2. Pay special attention to mobile cloud computing  3. Regulate the data collected by broad network access providers 4. Quantify the performance SLAs you’re looking to achieve 5. Enforce role-based access control (RBAC) 6. Federate your authentication and authorization infrastructure 7. Educate users on end-client security Key takeaways MORE ON CLOUD

Table of Contents

    What Is Broad Network Access?8 Key Components of Broad Network AccessTop 7 Best Practices for Implementing Broad Network Access in 2022

What Is Broad Network Access?

Broad network access is the ability of network infrastructure to connect with a wide variety of devices, including thin and thick clients, such as mobile phones, laptops, workstations, and tablets, to enable seamless access to computing resources across these diverse platforms. It is a key characteristic of cloud technology. 

The term broad network access can be traced back to the early days of cloud computing, when accessing resources was a complex and costly affair. Resources were finite and, for the most part, extremely limited as devices could only access networking and storage systems that were hosted locally. The cloud introduced a radical shift by democratizing access to compute, storage, and network resources. Broad network access is a defining characteristic of the cloud, without which the private and public cloud services we know today would not exist. 

In fact, the National Institute of Standards and Technology (NIST), U.S., lays down five clear traits that make a cloud a cloud: 

    On-demand self-service Broad network accessResource pooling Rapid elasticity Measured service 

Broad network access is what makes the cloud available to any device from any location. A cloud provider must ensure that it provides its customers with broad network access capabilities. Otherwise, one would be able to use the cloud service only from a limited set of platforms. 

Today, broad network access is available across every large-scale public cloud vendor, be it Amazon Web Services (AWS), Google Cloud Platform (GCP), or Microsoft Azure. You can configure these clouds to power any device, right from an employee’s smartwatch to your company’s largest storage system. Apart from this, broad network access is a key parameter to check when setting up a private cloud. 

While public clouds bring broad network access capabilities by default, private servers don’t do the same. For instance, you could set up an on-premise server to connect with only local devices close to the enterprise core. HR systems are a good example. In a traditional office, employees would be able to log into their attendance portal and clock in only from their designated workstations inside the office campus. The server where the attendance app is posted does not have broad network access, and therefore cannot be accessed from a remote location or a mobile device. 

However, broad network access is increasingly becoming a key demand for private cloud solutions. This is due to three reasons: 

    Remote work and the occasional WFH were common even before 2022. Now, in the wake of the pandemic, it is vital to support cloud access and app-based workflows from any device. Bring your own device (BYOD) allows employees to use a device of their choice, which may be a personal device as well. Without broad network access, BYOD isn’t possible. Companies may opt for a private instead of a public cloud landscape for security and compliance reasons. However, they wouldn’t want to sacrifice the flexibility and convenience of device-agnostic network access. 

Therefore, it is vital to weave broad network access into your cloud SLAs so that employees and business processes can easily access the resources they need to perform their optimum. 

Also Read: How To Make Networks Ready for Cloud-First Era With SD-WAN

8 Key Components of Broad Network Access 

Broad network access capabilities remove any access barriers between a device and the server to which it is connected. This applies to on-premise servers, a private cloud managed by you, a private cloud managed by someone else, a community cloud, a public cloud, and even hybrid and multi-cloud landscapes. 

Given the current state of cloud maturity and our multi-device work habits, it is easy to take broad network access for granted, but research suggests this may not always be the case. As we mentioned, NIST lays down five characteristics that define cloud computing. However, as per the 2022 State of DevOps Report by DevOps Research and Assessment (DORA), just 29% of cloud technology users agreed that their solutions meet all of these five characteristics. Top performers in the report were 23 times more likely to meet all characteristics, including broad network access. 

Therefore, to reap full benefits from the cloud, broad network access (among other things) cannot be taken for granted. Companies must proactively ensure that their cloud vendors can provide them with truly device-agnostic access to cloud services, even for less mainstream clients like wearables, IoT interfaces, ruggedized devices, etc. This has to be part of your service level agreements (SLAs) so that the vendor is obligated to deliver on the promise of broad network access, which is indispensable for modern enterprise operations. 

To achieve this promise, cloud vendors must pay attention to the following key components: 

Which of the following is not a true statement about devices and the internet?

Key Components of Broad Network Access 

1. Cloud data center 

The cloud data center is the component housing all your network resources. It is the foundation of your broad network’s access capabilities and may be managed by you, a managed services partner, or a cloud vendor like AWS, GCP, Microsoft, IBM, HPE, etc. The cloud data center must be set up to optimize and deliver resources across various devices without any compatibility issues. You should be able to log and monitor traffic from diverse platforms and optimize your cloud costs accordingly. Keep in mind that the “cloud” data center in this scenario could be situated in any location – your office campus, your headquarter city, your country, or on the opposite side of the world. The location will be determined by compliance and latency requirements. 

2. Wide area network(s)

The cloud data center reaches your devices (also known as clients) through one or more wide area networks. A wide area network (WAN) refers to a network system where the connected clients are situated a significant distance from each other, typically more than a kilometer apart. Depending on the nature of your company, the cloud data center will require connectivity with multiple WANs to provide uninterrupted broad network access. For instance, a global organization can have dedicated cloud data centers in every continent. Each data center connects with multiple regional WANs to provide network access to devices in that perimeter. 

3. Thin clients 

Now let us discuss the devices through which broad network access will be delivered. An enterprise with sufficient digital maturity will have three types of clients: thin, thick, and zero. A thin client refers to a computing system with very little local resources, only enough to run apps and processes when connected to a server. It is a bare-metal device without the ability to store data. It must connect with a remote server to fetch computing resources and have basic OS and configuration settings housed locally. 

You can use thin clients in several ways. A thin client installed in your lobby can help visitors check in and out without requiring the full investment of on-device storage, operating memory, a full-featured OS, multiple apps, etc. Virtual machines, which are also thin clients, can be used as temporary shells for software development and DevOps. Chromebooks are also an evolution of thin clients as they cannot run without network connectivity. 

Your cloud data center should be able to provide these and other thin clients with broad network access. 

4. Thick or fat clients 

Most devices that end-users interact with on a daily basis fall into this category. A computing system capable of running on its own is called a thick client, or fat or rich client. While thin clients support internet access, it’s perfectly equipped to run as a standalone device without support from your cloud data center. Our laptops, office workstations, mobile phones, tablets, etc., are all thick clients as they have built-in storage, operating memory, and an OS of their own. 

Your cloud data center has to be able to support thick clients of all shapes and sizes. As the device marketplace evolves, broad network access must adapt with the entry of new form factors, the retiring of once-popular devices, like Blackberry, and the rise of high-capacity consumer electronics. 

5. Zero clients 

Zero clients are an emerging device category that is increasingly popular in the age of IoT. Zero clients are defined as devices with no storage capacity and can run only ultra-lite and low bandwidth applications. IoT systems like wearables that collect real-time information or equipment sensors fall into this category. Unlike a thin client, it does not have operating systems or on-device configurations. Its only purpose is to collect data from its surroundings and relay data generated by your central cloud data center to users by acting as a terminal. Broad network access has to be able to power zero clients as well. 

Also Read: What Is IoT Device Management? Definition, Key Features, and Software

6. Open systems interconnection (OSI) architecture 

OSI is the heart of the deployment of broad network access. It tells the cloud data center how it should connect with the WAN and how the WAN, in turn, should connect with the end-thin, thick, or zero clients. OSI architecture, as defined by the International Organization for Standards (ISO) and the International Electrotechnical Commission (IEC), defines OSI as having seven layers that allow a network to receive and transmit data. These are: 

    Physical layerData link layerNetwork layer Transport layer Session layer Presentation layer Application layer 

How you (or your cloud vendor or managed services provider) set up each of these layers will determine the performance of your broad network access landscape. 

7. Security mechanisms 

A key challenge of broad network access is security, which is why it must be considered as a key component of your network environment. By definition, broad network access allows multiple devices to log in to a network and gain from cloud-delivered resources. If left unattended, this could open backdoors and vulnerabilities that a malicious entity can exploit. Therefore, network security must be woven into your SLAs the web, application, network, and device levels. You may want to collaborate with stakeholders across your IT supply chain to address any security risks across the end-to-end broad network access ecosystem. 

8. Self-service support 

Finally, self-service is a vital characteristic that makes your cloud genuinely a cloud. For example, a public or private cloud infrastructure may require users to submit a complaint or service ticket instead of solving the issue themselves. This goes against one of the five defining characteristics of the cloud as laid down by NIST and could significantly hinder broad network access. 

Let’s say that your cloud environment supports access from mobile phones – but when an employee tries to clock in from their phone in the morning before they can open their workstation, the service is unavailable. In such scenarios, the employee should be able to quickly look up and resolve the issue via a self-service knowledge base. In the absence of self-service, true and effective broad network access isn’t possible. 

Top 7 Best Practices for Implementing Broad Network Access in 2022

If you want to implement cloud infrastructure or optimize network connectivity in 2022, broad network access has to be a key parameter. Forrester’s 2022 report titled “The Future of Enterprise Computing” suggests that nearly half (49%) of U.S. users leverage a “triple play” of devices and work across a personal computer, a tablet, and a smartphone. This indicates the urgent need to implement broad network access the earliest, guided by seven best practices. 

Which of the following is not a true statement about devices and the internet?

Best Practices for Implementing Broad Network Access in 2022

1. Configure your network for secure remote access 

One of the key use cases of broad network access implementation is remote access support. Employees and partners should be able to log in to your network and use cloud resources from any location – from home, partner offices, distributed locations like retail outlets, and on the field. Therefore, remote access must be kept secure and không lấy phí of vulnerabilities. 

There are several steps you can take to ensure secure access across your environment. To begin with, the network must use the secure sockets layer (SSL) protocol to prevent the hijacking of data in transit. You can also leverage network access control (NAC) to prevent unauthorized access, a virtual private network (VPN) to protect end-user data, and network log monitoring to keep a watch on traffic behavior. Check out products like Duo Secure Remote Access by Cisco and Privileged Remote Access by BeyondTrust to address remote security concerns. 

2. Pay special attention to mobile cloud computing 

A large number of users leveraging broad network access from remote locations will do so via their smartphones. While the cloud supports desktop and mobile systems alike, you have to consider service composition, migration, and service offloading separately for mobile environments. Services have to be attuned to mobile usage through the responsive design of user interfaces and as much as feature parity as possible. Employees should not feel that the mobile experience is lacking in any way, and they need to log in from a desktop to access full network functionalities. Self-service plays an important role here and should help users solve any basic doubts or challenges they face when using broad network access via mobile. 

3. Regulate the data collected by broad network access providers 

Broad network access enables a two-way interaction, which means that the cloud data center delivers network connectivity and will collect data from end clients to optimize the service. It’s important to monitor, regulate, and properly govern the data that’s collected. Typically, providers will gather information and metadata such as network IP addresses, the size and name of individual files, the typical hours of access, common file actions, etc. While this data collection is meant to improve the quality of service (QoS) when delivering broad network access, it is important to govern data collection according to your organizational, industry, and regional regulations. 

4. Quantify the performance SLAs you’re looking to achieve 

Often organizations adopt the cloud with sky-high expectations but fail to achieve the desired benefits. This is because there is an inadequate understanding of the five characteristics that define the cloud. There are no specific performance indicators around broad network access or self-service mentioned in the SLAs. Organizations must quantify what they expect from cloud technology, be it greater uptime, device-agnostic access, faster network speeds, better software performance, or something else. This will help you understand the precise nature of network performance and if it’s helping you meet your business goals. 

5. Enforce role-based access control (RBAC) 

Given that broad network access opens your cloud environment to the widest possible cross-section of users, RBAC is a must-have. Role-based access control or RBAC means that while all services are accessible from all devices, employees will be only able to use services relevant to their role. For example, partners logging into your network will find themselves locked out of most internal processes and apps. Certain services may remain restricted until an employee has completed their probation period. Visitors or guests could enjoy temporary access based on their roles. And, this must be augmented by an intrusion detection system so that RBAC protocols aren’t violated. 

6. Federate your authentication and authorization infrastructure 

Broad network access enables widespread interconnectivity across your IT environment. As the number of systems connected to the cloud grows, you need to centralize how access is managed. This requires the federation of authentication and authorization infrastructure. Federation means that authentication mechanisms for different systems are connected using a quantified service, and the same authorization parameters, credentials, and identity data can be used for multiple systems. This ensures that an employee logs into every system using the same set of credentials so that: 

    The end-user experience is convenient for every device and every service in the broad network access environment. Employees cannot log into services using credentials other than their own and pose a security risk.You have comprehensive logs on network activity for every user, regardless of the device or service in question.

7. Educate users on end-client security 

Finally, it is important to remember that broad network access may add new security risks by expanding your threat vectors. With each new device variant that is supported, a new threat vector is introduced to your IT environment. That’s why end-user education and awareness are crucial to ensure that malicious entities cannot use the end client as a backdoor to reach your central cloud data center. Educate users on: 

    Password management best practices Detecting suspicious machine behavior like unaccounted-for storage The need for regular software updates and patching How to spot an insider threat New device onboarding rules and policies 

Remember, the security of broad network access ultimately lies in the hands of those using it. Any misstep in end-user education could compromise the entire environment, including the central cloud data center that houses organizational apps and data. 

Key takeaways 

Broad network access is indispensable for operating a modern, connected enterprise IT environment. From WFH employees and remote freelancers to long-time partners and new vendors – stakeholders from different locations will require access to your services from a wide variety of devices. By prioritizing broad network access, you can ensure that: 

    Remote work and remote customer servicing are carried out securelyYour IT environment is scalable enough to support a new generation of devices  Cloud objectives are met and you can achieve the expected ROI Private or hybrid cloud implementations do not cause a performance, flexibility, or user experience trade-off You can gain from the thick and thin clients necessary to support business processes and innovation 

Cloud adoption is likely to grow steadily over the next few years, with Deloitte predicting that the migration forecast is “cloudy with a chance of clouds.” Between 2022 and 2025, the cloud will grow by over 30%, and broad network access is essential to be able to realize its true value. By understanding the importance of broad network access – and not taking it for granted – enterprises will be able to build a secure connected environment that’s equipped for the future. 

Have you implemented broad network access your organization? If yes, share your experience with us on LinkedIn, , or Meta. Join the conversation!

MORE ON CLOUD

    Top 10 Free or Affordable Cloud Storage Solutions in 2022
    Private vs. Public Cloud: 10 Key ComparisonsVirtual vs. Private Cloud: 10 Key ComparisonsCloud vs. On-premise Comparison: Key Differences and SimilaritiesMulti-Cloud vs. Hybrid Cloud: 10 Key Comparisons
Tải thêm tài liệu liên quan đến nội dung bài viết Which of the following is not a true statement about devices and the internet?

Clip Which of the following is not a true statement about devices and the internet? ?

Bạn vừa tham khảo Post Với Một số hướng dẫn một cách rõ ràng hơn về Video Which of the following is not a true statement about devices and the internet? tiên tiến nhất

Share Link Tải Which of the following is not a true statement about devices and the internet? miễn phí

Quý khách đang tìm một số trong những ShareLink Tải Which of the following is not a true statement about devices and the internet? miễn phí.

Giải đáp thắc mắc về Which of the following is not a true statement about devices and the internet?

Nếu sau khi đọc nội dung bài viết Which of the following is not a true statement about devices and the internet? vẫn chưa hiểu thì hoàn toàn có thể lại Comments ở cuối bài để Tác giả lý giải và hướng dẫn lại nha #true #statement #devices #internet