THE FIRST GENERATION OF FIREWALL ARCHITECTURES Task 1: Translate the key words and phrases: detect обнаружить circumstances обстоятельства match совпадение kernel ядро scrutiny исследование adhere придерживаться peer-to-peer communications одноранговые коммуникации a bastion host or a dual-homed bastion host хост-бастион или хост-бастион с двойным подключением более сложные алгоритмы проверки more sophisticated inspection algorithms circumstances surrounding the triggering of audit events обстоятельства, связанные с инициированием событий аудита transport layer headers заголовки транспортного уровня it must not be expressly denied это не должно быть прямо отвергнуто certain types of connections to be made определенные типы соединений, которые необходимо выполнить разрешена жесткая маршрутизация сетевого пакета the network packet is allowed to be routed tough as defined by the rules как определено правилами appears to have originated from a different похоже, что он произошел от другого хоста host Task 2: Complete the sentences: A firewall creates a boundary between two or more networks Firewall technologies provide different capabilities for auditing communication events More mature firewall technology provides more detailed audit records, or summary information, about the network packets that are allowed through or prevented from traversing the firewall More detailed and descriptive audit record information yields better monitoring capabilities in a firewall product. Each IP network packet is examined to see if it matches one of a set of rules defining what data flows are allowed The more sophisticated packet filters are able to detect IP, TCP, UDP, and ICMP. Because packet filters are implemented in the network layer, they generally do not understand how to process state information in the high-level protocols, such as FTP If the checks succeed, the network packet is allowed to be routed through the firewall as defined by the rules in the firewall’s routing table. The complete network packet inspection adheres to the following general algorithm Task 3: Answer the questions to the text: 1. What does a firewall create? firewall creates a boundary between two or more networks 2. What capabilities do most firewall technologies provide? Most firewall technologies provide different capabilities for auditing communication events 3. What is a packet filter firewall? Because packet filters are implemented in the network layer, they generally do not understand how to process state information in the high-level protocols, such as FTP 4. What is packet filters manipulation based on? the physical network interface that the packet arrives on the address the data is (supposedly) coming from (source IP address) the address the data is going to (destination IP address) the type of transport layer (TCP, UDP, ICMP) the transport layer source port the transport layer destination port 5. Are packet filters able to detect IP, TCP, UDP, and ICMP? Yes 6. What is the general algorithm of the complete network packet inspection? If no matching rule is found, then drop the network packet. If a matching rule is found that permits the communication, then allow peer-topeer communication. If a matching rule is found that denies the communication, then drop the network packet. 7. What process is called network address translation? Network address translation Task 4: « 5G is coming: what does it mean for all of us?» Write about 10 -15 sentences and express your opinion. 5G communication. In 5G networks, the peak speed is 20 times higher than that of 4G. An example for clarity: while you download one movie as Full HD on a fourth-generation device, your neighbor with 5G will download two dozen of the same movies during this time. And even if this is an ideal situation, but even under unfavorable conditions, everything will be about the same: 5G cellular networks will be much faster. This is a beast that is especially "appreciated" by fans of multiplayer games and streaming videos. Delay is the time interval between your actions on the gadget and the reaction to them from the application in which you work or play. This parameter has a noticeable impact on the quality of online games, video and audio conferences that are conducted via the mobile Internet.