尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
1 – Networking Infrastructure and Protocols
a)
Answer: Structured cabling system is process of transferring all your data, voice,
multimedia, security, and even wireless connections throughout your building or
campus through network. Structure cabling uses an extended form of star
topology. Structured cabling systems can be break down into six sub elements
that are horizontal wiring, vertical (or backbone) wiring, telecommunication room
(TR), work area, equipment room (ER),entrance facility (EF).
The performance of the extended star topology is very much high as compared
to other topologies. It is just like a star topology but with more switch/hubs. And
also the data flow in this network is much more convenient and secure. In this
topology every central devices are connected with each host. Also the data rate
is high. There will be use of UTP Cat 6 cable for joining entire network. It
performs better than other cables. It has high transmission rate. It can support
10/100 Mbps Ethernet. For the high speed internet we are going to use fiber
optics cable which we will join with the internet service provider.
b)
Answer: Each layer operates via rule i.e. protocols. OSI model has a seven
layers and each of them has its own protocols. Various protocols will be needed
for us. The four protocols along with their used are explained below:
i) SMTP: SMTP is part of the application layer of the TCP/IP protocol which
provides a set of codes that simplify the communication of email
messages between email servers. SMTP provides code to email server
which makes email server to understand what that mean.
ii) ARP: It helps in the process of IP routing which finds the hardware
address or mac address, of a host or IP address. It is layer 3 protocol of
OSI model. It enables communication on an internetwork. It detects the
proper location for a data to pass.
iii) FTP: IT means the protocol which helps in file transfer process. It is the
fastest way to get the large files from one computer to another. It is also
efficient. This protocol falls in the application layer of the OSI model. FTP
allows you to transfer files back and forth this means both the Manager of
the company as well as staffs can send information and files to each
other.
iv) SSL Protocol: It stands for Secure Socket Layer. It is a protocol used for
sending confidential data over the Internet. It creates a secure connection
between the web browser and the server. It protect us from the data
privacy which encrypts the information. It falls in layer 6 of the OSI model
i.e. the presentation layer protocol.
c)
Answer: In wireless network for the communication radio signals, infrared light
beams are used. The devices that help a devices to connect to a network using
Wi-Fi are as follows:
a) Wireless Modem/Routers:
It is a networking device that does the same work and has same functions
as like a router, it also include the functions of a wireless access point and
also commonly used to allow access of network to the device that does
not need cable.
b) Wireless Network Adapter:
A wireless network adapter assists with computing gadget to join a remote LAN.
Remote system connectors contain an inherent radio transmitter and beneficiary.
There are essentially three principle sorts of connectors, conventional PCI remote
connectors are include cards intended for establishment inside a desktop PC having
a PCI transport.
Wireless network works on the basis of IEEE 802.11 Standard. The protocol architecture
consists of Physical Layer with two sublayers PLCP & PMD and Data Link Layer
consists of MAC and LLC sublayer. The Wi-Fi system consist of Wi-Fi client, access
point and LAN. LAN may consist of Ethernet Switch, RADIUS Authentication Server etc.
Basically Wi-Fi works in half-duplex mode and Wi-Fi standard consist of only
Physical Layer and Data Link Layer. This tells us that it fits in the OSI model.
d)
Answer: Wireless Networks are networks in which electromagnetic waves carry
the signal over part or all of the communication path.
The Standards of the Wi-Fi are explained below:
 IEE.802.11a: This standard offers high level performance and high data transfer
rate up to 54 Mbps, and also has a good range.
 IEE.802.11b: This was first wireless LAN standard to be widely adopted and
which was built into many laptop which was able to transfer data up to 11 mbps
and also had a good range.
 IEE.802.11g: After the 802.11a and 802.11b new standard was built with more
improvement and advanced features. It provides up to 54 mbps. All the defects of
802.11b was improved in this standard
 IEE.802.11n: It transfers data up to 600 Mbps also the performance was also
better. It uses the Antenna technology. It supports the backward compatibility
under special condition to improve data throughout.
Some of the advantages of using the wireless network are as follows:
 Mobility:
With a laptop or smart phones access can be made available in a wide
place. Internet access will be much easier since it is versatile.
 Fast setup:
Wireless network can be effortlessly setup and masked, which is ideal for
some individuals who are on makeshift worksites/homes or rented space.
 Cost:
Setting up a wireless network can be a great deal more financially savvy
when contrasted with other system. No need of cables so the cost is also
less.
 Expandability:
For the wireless network expansion feature is not difficult task. Expansion
of the network can be done easily. It is easy to add other wireless
component or equipment on the network.
Disadvantages of wireless network
 Security: Wireless networks are much more susceptible to unauthorized use. It
can hacked easily.
 Interference: Wireless networks use radio signs and comparable strategies for
transmission, they are powerless to obstruction from lights and electronic gadgets.
 Inconsistent connections: Connection can be lost and it may be unreachable
sometime.
 Power consumption: The wireless transmitter in a portable workstation requires a
lot of force; subsequently, the battery life of tablets can be antagonistically
affected.
 Speed: The speed of wireless network is not that so much fast as compared to wired
network.
I would recommend 802.11g as it has quick greatest pace and its directed
frequencies keep signal obstruction from different gadgets however it has
higher expense.
No, I won’t recommend the entire LAN be connected wirelessly because the
data rate and speed of the wireless network is very much slow as compared
with the wired network. Also the wireless network has weak security as it can
be easily hacked. Wired network offers fastest transfer rate and high security.
Task 2 – Addressing
A)
> Addressing in network is an important factor. Without address the network cannot be
run or it cannot identify the proper location to transmit data. Address helps to identify the
proper path for the network. Each and every device on network has its unique address
from which data/messages can be transferred to the required device as per required.
Networks needs specific and unique address for routing. The popular form of
addressing on network is IP address and MAC address. The address given on network
are globally unique.
B)
> A MAC (media access control) address is a unique numeric code that is permanently
assigned to device form the manufacturer.
IP address is the numeric address of a device on the network for finding the proper
location to share the data.
Layer 3 address is absolutely an intelligent address which is free of any specific
equipment; a Mac address is connected with specific equipment and equipment makes.
An example of layer 3 addressing is IP addressing.
Addressing in layer 2 happens with the help of Mac address. It is very important so as to
not to confuse with the IP addressing. Switches and hubs are directly associate on layer
2 addressing (MAC addressing).
IPv4 address IPv6 address
1) They are 32-bit length 1) They are 128 bit length
2) It is represented in decimals 2) It is represented in hexadecimals
3) Static or dynamic addressing is
required to configure IPv4 address
3) Auto-configuration of address is
available.
4) Packet flow identification is not
available
4) Packet flow identification is available.
.
C)
> Private IPv4 address are unique address that won't be seen by or correspond
straightforwardly with the Internet. These private locations can't be utilized on the
Internet or used to correspond with the Internet.
It can be very useful for us. The importance of it is Security and Cost is also low. As
there will be no external network there will be no malicious application and threats.
Issues like misfortunes in Internet availability or outer server blackouts don't influence
the execution of a private network.
D)
> Mac address is a unique identifier assigned to network devices. Mac address are 6-
byte (48 bits). The initial 3-bytes are ID number of the maker, which is allocated by an
Internet measures body. The second 3-bytes are serial number appointed by the maker.
IP address is a 32-bit sequence of 1s and 0s which is unique identifier. IP address are
of two type:
Static IP address: it is process of assigning the IP address to the device due to which
there may occur duplicity in address.
Dynamic IP address: This type of IP address is assigned by server automatically by the
help of DHCP protocol.
E)
> A subnet mask, which contains a binary bits of ones and zeros, is connected to a
location to figure out if the location is on the nearby system or whether it must be
directed outside the neighborhood system.
The subnet cover is similar to a channel that is connected to a message's destination IP
address. The capacity of a subnet cover is to tell gadgets which a piece of a location is
the system number including the subnet, and which part is the host. Subnets
additionally give security. Sub mesh serves to make its own sub network.
No, this is not applicable for us as this is a small office there will be no need of it.
F)
> Each IP address has two sections, the system part (distinguishing the system number
to which the PC is connected) and the host part (which recognizes the host inside of the
nearby system). The procedure of conveying the packet starting with one point then
onto the next point is referred as routing. Networks in the internet are connected to each
other via routers. Routers carry packets from one network/subnet to another. Routers
maintain a routing table to decide how to route the IP packets. In this way the packets
gets from one point from another point by the help of routers.
TASK 3: SECURITY
a)
Answer: Confidentiality: It is the privacy or to restrict unknown users so that only the
needed user will see the required information. Data encryption is a best method for
ensuring confidentially. It prevents the information from the wrong or unauthorized
people. For the privacy it is used. Example: User ID and password will be needed
in the office for using the FTP.
Integrity: Integrity includes authenticity, non-repudiation and accountability. It
controls maker/checker, quality assurance and audit logs. Integrity involves in
maintain the accuracy, consistency of the data during whole cycle. Integrity also
include file permissions and user access controls. Example: Sometime there need to
change something in the file so only the authorized person will be able to do it.
Availability: Availability helps to provide the Information and other critical assets to
customers when needed. It helps to prevent the loss of data as it back up the data
eventually. It also performs hardware repairs when needed and also helps to
maintain the correctly functioning operating system. Example: There will be need of
old files or document in the office to see old records so backup will be needed.
b)
Answer
 DIGITAL SIGNATURES: The use of digital signature reduces risks of
document interception, read, destroy while the document is in transit. A
digitally signed document can easily tracked. By the help of digital
signature only the recipient that we want will get document
 IP ADDRESS FILTERING: For the network security IP address filtering is
also an important method to protect network from threats. Only the known
devices will be able to connect in the network. It will reduce the risk of
access of an unauthorized PCs in the network from which the privacy of
the company is maintain.
c)
Answer: The seven ways to keep the network secure are as follows:
 Always change the name of your router do not keep default name.
Router name should be unique.
 Always use the firewall and antivirus software. There should be strong
firewall maintained which prevent the hackers from entering into the
network.
 You should always perform the regular scan of the network for the
better and secure performance of the network.
 Always limit the remote access.
 Ensure all the code, pins are encrypted.
 Segment your network.
 Updated version of the software should be used.
d).
Answer: In my view the biggest threat for the system is Eavesdropping. Since there will
be a Wi-Fi network in the office and boundaries of Wi-Fi-signal will be outside the office
which will be easy to access. Also there will be IP based calls in the office due to which
eavesdropping will be easier to perform. Also the data will be transferred over internet in
which the threat might occur.
Task 4 – Diagram and explanation
a)
Answer: Switch helps to build full-duplex communication where there is no data
collision. It works in Layer 2 of OSI model. Below we have used patch cable, switches
and router for connecting to a network. Web server will be through cloud computing. It
saves the storage for us. Cloud computing reduces the cost and increase the flexibility
of use.
B)
Answer:
C)
Answer: Suitable IP addresses for the devices are as follows:
Network Hardware Type of IP Address IP Address Subnet Mask
Computer DHCP 192.168.30.1 –
192.168.30.10
255.255.255.0
Laptop DHCP 192.168.30.11 –
192.168.30.13
255.255.255.0
Network Printer DHCP 192.168.30.14 255.255.255.0
Server STATIC 192.168.0.100 –
192.168.0.104
255.255.255.0
Router STATIC 192.168.1.1 255.255.255.0
Switch STATIC 192.168.1.3 255.255.255.0
Patch Panel STATIC 192.168.1.2 255.255.255.0
Wireless AP STATIC 192.168.1.0 255.255.255.0
Mobile and tablet DHCP 192.168.30.14-
192.168.39.20
255.255.255.0
D)
Answer: The hardware components that we have chosen are as follows:
i) Patch Panel: A patch panel gives a helpful spot to end the link's majority runs
originating from diverse rooms into the wiring storage room. The progressions
can be made rapidly and effortlessly.
ii) Switches: Switch helps to connect the device on network. Switches are more
hardware oriented. Multi ports switches cost less. It is simple to manage. It is
highly reliable.
iii) Router: Routers finds the brief and the least demanding way to exchange
the information, data between the diverse sending and getting PCs.
iv) Wireless Access Point: Though there will be smart phones, laptops and
tablets on the office there will be need for wireless access point for the
convenient use of the internet.
And also there are CAT cables and server computers.
E)
The prices of different components are given below:
Component Price Quantity Specification
Router TP-LINK Archer
D20 AC750 Dual Band
Modem Router.
£39.99 1 Dual Band-300Mbps on
2.4GHz + 433Mbps on
5GHz, cable or fiber
modem.
Net gear ProSafe GS116
16-port Gigabit Switch
£70.36
1 quickly upgrading
workstations to full Gigabit
speed, packed with ease-
of-use features.
NEW Link 1U 24 Port
CAT5E Patch Panel
£13.99 2 High quality angled
terminal block contacts
NETGEAR WN604-
100UKS N150 Wireless
Access Point
£28.69 1 Easy to configure
business-class security,
including WPA2 and MAC
authentication
TRIXES Network CAT5e
RJ45 Ethernet LAN Cable
Patch Lead 50M
£9.99 2 Pre-fitted network plugs on
both ends Easy to use -
Plug and Play
Lenovo C40 21.5-Inch HD
All-in-One Desktop PC
£490.82 10 despite the large screen
and full metal stand, the
C260 can fit almost
anywhere
HP 736958-421 ProLiant
ML350p Gen8 1P PS
Server
£1,521.56 5 Processor: Intel Xeon E5-
2620 v2 six core, 2.1 GHz,
15 MB, 7.2 GT/s QPI
Samsung Chromebook
XE303C12-A01UK 11.6-
inch Laptop
£159.90 3 Portable and powerful -
dual core
Epson Workforce WF-
2630 Four-in-One for the
Small Printer
£59.99 1 Easy to use - 30-page
automatic document
feeder
Sage Instant Account
Software
£86.39 1 Perfect for new office,
leading account software
Norton Security with
Backup 2.0 25Gb: 1 user
10 device
£29.99 2 at cheaper price with extra
features
Microsoft Lumia 435 £59.89 8 3G Capacitive
touchscreen
Microsoft Surface 2 64GB
Tablet
£479 8 Fast processor, 2 GB
memory
MICROSOFT OFFICE
HOME AND BUSINESS
2016
£200.13 1 With more updates
available
Sage 50 Payroll £126.7 1 Can Support Up to 15
employees
TASK 5: Remote access
a)
> Remote access network is the technology of getting able to access to a computer or a
network from a remote distance. The method for performing remote access in a less
cost is by establishing a VPN. VPN is a network technology that helps to establish
secure connection over the network.
The component for remote access network are:
1) Dial-up Remote access: The innovation is accessible as a directing's piece
and remote access administration. It permits customer to utilize the
information transfers framework like making a physical or virtual circuit to a
port on a remote access server.
2) Telnet: its protocol (Telnet protocol) helps users to make remote connections.
By using telnet user can create a remote command console on a host.
3) Terminal services: It provides remote desktop for administration. It is
specifically designed for server management. Multiple host and simultaneous
client sessions can be hosted through the terminal services.
b)
> There are lots of impact on network security by remote access network.
Remote access network establish VPN for secure connection over a network.
There are lots of VPN protocol for securing the data some of them are:
 IP Security
 Secure Sockets layer and Transport Layer Security
 Point-to-point Tunneling Protocol
 Layer 2 Tunneling Protocol
VPN technology use encryption method to ensure security. All traffic
over VPN secure data integrity and privacy by encryption. VPN needs
administrators to ensure communications are kept private.

More Related Content

What's hot

S4 réseaux et internet _
S4 réseaux et internet _S4 réseaux et internet _
S4 réseaux et internet _mostafakhali
 
sfc Assingment l4dc NCC education
 sfc Assingment l4dc NCC education sfc Assingment l4dc NCC education
sfc Assingment l4dc NCC education
David Parker
 
Tìm hiểu về bluetooth
Tìm hiểu về bluetoothTìm hiểu về bluetooth
Tìm hiểu về bluetooth
Kim Oanh
 
50315546 rapport-de-stage-telecom
50315546 rapport-de-stage-telecom50315546 rapport-de-stage-telecom
50315546 rapport-de-stage-telecom
mohamed nadasd
 
Les réseaux capteurs / actionneurs
Les réseaux capteurs / actionneurs Les réseaux capteurs / actionneurs
Les réseaux capteurs / actionneurs
Abdelkader Moussidene
 
LES RESEAUX INFORMATIQUES.pdf
LES RESEAUX INFORMATIQUES.pdfLES RESEAUX INFORMATIQUES.pdf
LES RESEAUX INFORMATIQUES.pdf
ssuser18776b
 
wifi securite
wifi securite wifi securite
wifi securite
ayoub_anbara96
 
Đồ án Xây dựng bộ mã hóa và giải mã dữ liệu dựa trên thuật toán AES trên nền ...
Đồ án Xây dựng bộ mã hóa và giải mã dữ liệu dựa trên thuật toán AES trên nền ...Đồ án Xây dựng bộ mã hóa và giải mã dữ liệu dựa trên thuật toán AES trên nền ...
Đồ án Xây dựng bộ mã hóa và giải mã dữ liệu dựa trên thuật toán AES trên nền ...
Aubrey Yundt
 
Introduction aux réseaux informatiques
Introduction aux réseaux informatiquesIntroduction aux réseaux informatiques
Introduction aux réseaux informatiques
lmodadam
 
Transmission media
Transmission mediaTransmission media
Transmission media
kinish kumar
 
EOM
EOMEOM
Computer system
Computer systemComputer system
Computer system
Rū Sh
 
Splunk
SplunkSplunk
Splunk
PhanTrung43
 
ETUDE ET MISE EN PLACE DE LA SOLUTION VOIP OVER LTE, DIMENSIONNEMENT ET MESUR...
ETUDE ET MISE EN PLACE DE LA SOLUTION VOIP OVER LTE, DIMENSIONNEMENT ET MESUR...ETUDE ET MISE EN PLACE DE LA SOLUTION VOIP OVER LTE, DIMENSIONNEMENT ET MESUR...
ETUDE ET MISE EN PLACE DE LA SOLUTION VOIP OVER LTE, DIMENSIONNEMENT ET MESUR...
Sidali Bhs
 
Commande optimale
Commande optimaleCommande optimale
Commande optimale
Adouane
 
Introduction_Reseau.ppt
Introduction_Reseau.pptIntroduction_Reseau.ppt
Introduction_Reseau.ppt
AmalHadri2
 
Computer systems assignment frontsheet
Computer systems   assignment frontsheetComputer systems   assignment frontsheet
Computer systems assignment frontsheet
bao023
 
Data Communication
Data CommunicationData Communication
Data Communication
Mahesh Kumar Attri
 
Thiết kế anten vi dải sử dụng trong hệ thống thông tin vô tuyến
Thiết kế anten vi dải sử dụng trong hệ thống thông tin vô tuyếnThiết kế anten vi dải sử dụng trong hệ thống thông tin vô tuyến
Thiết kế anten vi dải sử dụng trong hệ thống thông tin vô tuyến
Dịch vụ viết bài trọn gói ZALO: 0909232620
 

What's hot (20)

S4 réseaux et internet _
S4 réseaux et internet _S4 réseaux et internet _
S4 réseaux et internet _
 
sfc Assingment l4dc NCC education
 sfc Assingment l4dc NCC education sfc Assingment l4dc NCC education
sfc Assingment l4dc NCC education
 
Tìm hiểu về bluetooth
Tìm hiểu về bluetoothTìm hiểu về bluetooth
Tìm hiểu về bluetooth
 
50315546 rapport-de-stage-telecom
50315546 rapport-de-stage-telecom50315546 rapport-de-stage-telecom
50315546 rapport-de-stage-telecom
 
Les réseaux capteurs / actionneurs
Les réseaux capteurs / actionneurs Les réseaux capteurs / actionneurs
Les réseaux capteurs / actionneurs
 
LES RESEAUX INFORMATIQUES.pdf
LES RESEAUX INFORMATIQUES.pdfLES RESEAUX INFORMATIQUES.pdf
LES RESEAUX INFORMATIQUES.pdf
 
wifi securite
wifi securite wifi securite
wifi securite
 
Đồ án Xây dựng bộ mã hóa và giải mã dữ liệu dựa trên thuật toán AES trên nền ...
Đồ án Xây dựng bộ mã hóa và giải mã dữ liệu dựa trên thuật toán AES trên nền ...Đồ án Xây dựng bộ mã hóa và giải mã dữ liệu dựa trên thuật toán AES trên nền ...
Đồ án Xây dựng bộ mã hóa và giải mã dữ liệu dựa trên thuật toán AES trên nền ...
 
Introduction aux réseaux informatiques
Introduction aux réseaux informatiquesIntroduction aux réseaux informatiques
Introduction aux réseaux informatiques
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
EOM
EOMEOM
EOM
 
Computer system
Computer systemComputer system
Computer system
 
Splunk
SplunkSplunk
Splunk
 
ETUDE ET MISE EN PLACE DE LA SOLUTION VOIP OVER LTE, DIMENSIONNEMENT ET MESUR...
ETUDE ET MISE EN PLACE DE LA SOLUTION VOIP OVER LTE, DIMENSIONNEMENT ET MESUR...ETUDE ET MISE EN PLACE DE LA SOLUTION VOIP OVER LTE, DIMENSIONNEMENT ET MESUR...
ETUDE ET MISE EN PLACE DE LA SOLUTION VOIP OVER LTE, DIMENSIONNEMENT ET MESUR...
 
Commande optimale
Commande optimaleCommande optimale
Commande optimale
 
Cem
CemCem
Cem
 
Introduction_Reseau.ppt
Introduction_Reseau.pptIntroduction_Reseau.ppt
Introduction_Reseau.ppt
 
Computer systems assignment frontsheet
Computer systems   assignment frontsheetComputer systems   assignment frontsheet
Computer systems assignment frontsheet
 
Data Communication
Data CommunicationData Communication
Data Communication
 
Thiết kế anten vi dải sử dụng trong hệ thống thông tin vô tuyến
Thiết kế anten vi dải sử dụng trong hệ thống thông tin vô tuyếnThiết kế anten vi dải sử dụng trong hệ thống thông tin vô tuyến
Thiết kế anten vi dải sử dụng trong hệ thống thông tin vô tuyến
 

Viewers also liked

Computer configuration
Computer configurationComputer configuration
Computer configuration
anwarkamal786
 
Original assignment
Original assignmentOriginal assignment
Original assignment
Prasanthan Perumal
 
Networking- computer connections
Networking- computer connectionsNetworking- computer connections
Networking- computer connections
Hossian
 
Network Infrastructure Virtualization Case Study
Network Infrastructure Virtualization Case StudyNetwork Infrastructure Virtualization Case Study
Network Infrastructure Virtualization Case Study
Cisco Canada
 
Networking online assignment
Networking online assignmentNetworking online assignment
Networking online assignment
Kavitha Dhanesh
 
Network proposal
Network proposalNetwork proposal
Network proposal
Waldo Botha
 
Network Proposal Power Point
Network Proposal Power PointNetwork Proposal Power Point
Network Proposal Power Point
guest7fbe17
 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal ppt
FrankNitty II
 
WRITTEN ASSIGNMENT FORMAT - LA 3.0 COMPUTER NETWORK & COMMUNICATION
WRITTEN ASSIGNMENT FORMAT - LA 3.0 COMPUTER NETWORK & COMMUNICATIONWRITTEN ASSIGNMENT FORMAT - LA 3.0 COMPUTER NETWORK & COMMUNICATION
WRITTEN ASSIGNMENT FORMAT - LA 3.0 COMPUTER NETWORK & COMMUNICATION
salwahanim
 

Viewers also liked (9)

Computer configuration
Computer configurationComputer configuration
Computer configuration
 
Original assignment
Original assignmentOriginal assignment
Original assignment
 
Networking- computer connections
Networking- computer connectionsNetworking- computer connections
Networking- computer connections
 
Network Infrastructure Virtualization Case Study
Network Infrastructure Virtualization Case StudyNetwork Infrastructure Virtualization Case Study
Network Infrastructure Virtualization Case Study
 
Networking online assignment
Networking online assignmentNetworking online assignment
Networking online assignment
 
Network proposal
Network proposalNetwork proposal
Network proposal
 
Network Proposal Power Point
Network Proposal Power PointNetwork Proposal Power Point
Network Proposal Power Point
 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal ppt
 
WRITTEN ASSIGNMENT FORMAT - LA 3.0 COMPUTER NETWORK & COMMUNICATION
WRITTEN ASSIGNMENT FORMAT - LA 3.0 COMPUTER NETWORK & COMMUNICATIONWRITTEN ASSIGNMENT FORMAT - LA 3.0 COMPUTER NETWORK & COMMUNICATION
WRITTEN ASSIGNMENT FORMAT - LA 3.0 COMPUTER NETWORK & COMMUNICATION
 

Similar to Computer Network ASsignment

Lan
LanLan
Concept of networking
Concept of networkingConcept of networking
Concept of networking
sumit dimri
 
Data Communication
Data Communication Data Communication
Data Communication
MSSadeq
 
Network system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & TechnologyNetwork system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & Technology
Manas Saha
 
Networking / Internet and Web Technologies
Networking / Internet and Web TechnologiesNetworking / Internet and Web Technologies
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Soumen Santra
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
Sujee Antony
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
jaba kumar
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
okelloerick
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptx
ssuser86699a
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
skknowledge
 
Ethernet and LIFI
Ethernet and LIFIEthernet and LIFI
Ethernet and LIFI
ROHIT JADHAV
 
Unit 1 ppt-idc
Unit 1 ppt-idcUnit 1 ppt-idc
Unit 1 ppt-idc
hiya123jes
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
abiramiabi21
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
Dwi Yulianto
 
Ccna day1
Ccna day1Ccna day1
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
darulquthni
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
Sanjeev Jain
 
Nt1310 Unit 8 Network Components
Nt1310 Unit 8 Network ComponentsNt1310 Unit 8 Network Components
Nt1310 Unit 8 Network Components
Lisa Williams
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
Mohsen Sarakbi
 

Similar to Computer Network ASsignment (20)

Lan
LanLan
Lan
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Data Communication
Data Communication Data Communication
Data Communication
 
Network system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & TechnologyNetwork system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & Technology
 
Networking / Internet and Web Technologies
Networking / Internet and Web TechnologiesNetworking / Internet and Web Technologies
Networking / Internet and Web Technologies
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptx
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
 
Ethernet and LIFI
Ethernet and LIFIEthernet and LIFI
Ethernet and LIFI
 
Unit 1 ppt-idc
Unit 1 ppt-idcUnit 1 ppt-idc
Unit 1 ppt-idc
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Nt1310 Unit 8 Network Components
Nt1310 Unit 8 Network ComponentsNt1310 Unit 8 Network Components
Nt1310 Unit 8 Network Components
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 

Recently uploaded

Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
 
Decolonizing Universal Design for Learning
Decolonizing Universal Design for LearningDecolonizing Universal Design for Learning
Decolonizing Universal Design for Learning
Frederic Fovet
 
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptxScience-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Catherine Dela Cruz
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
ShwetaGawande8
 
Slides Peluncuran Amalan Pemakanan Sihat.pptx
Slides Peluncuran Amalan Pemakanan Sihat.pptxSlides Peluncuran Amalan Pemakanan Sihat.pptx
Slides Peluncuran Amalan Pemakanan Sihat.pptx
shabeluno
 
managing Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptxmanaging Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptx
nabaegha
 
Creating Images and Videos through AI.pptx
Creating Images and Videos through AI.pptxCreating Images and Videos through AI.pptx
Creating Images and Videos through AI.pptx
Forum of Blended Learning
 
Cross-Cultural Leadership and Communication
Cross-Cultural Leadership and CommunicationCross-Cultural Leadership and Communication
Cross-Cultural Leadership and Communication
MattVassar1
 
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Celine George
 
Keynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse CityKeynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse City
PJ Caposey
 
Post init hook in the odoo 17 ERP Module
Post init hook in the  odoo 17 ERP ModulePost init hook in the  odoo 17 ERP Module
Post init hook in the odoo 17 ERP Module
Celine George
 
How to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRMHow to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRM
Celine George
 
The Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teachingThe Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teaching
Derek Wenmoth
 
Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024
Friends of African Village Libraries
 
bryophytes.pptx bsc botany honours second semester
bryophytes.pptx bsc botany honours  second semesterbryophytes.pptx bsc botany honours  second semester
bryophytes.pptx bsc botany honours second semester
Sarojini38
 
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
yarusun
 
(T.L.E.) Agriculture: "Ornamental Plants"
(T.L.E.) Agriculture: "Ornamental Plants"(T.L.E.) Agriculture: "Ornamental Plants"
(T.L.E.) Agriculture: "Ornamental Plants"
MJDuyan
 
nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...
chaudharyreet2244
 
How to Create User Notification in Odoo 17
How to Create User Notification in Odoo 17How to Create User Notification in Odoo 17
How to Create User Notification in Odoo 17
Celine George
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
Kalna College
 

Recently uploaded (20)

Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
 
Decolonizing Universal Design for Learning
Decolonizing Universal Design for LearningDecolonizing Universal Design for Learning
Decolonizing Universal Design for Learning
 
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptxScience-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptx
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
 
Slides Peluncuran Amalan Pemakanan Sihat.pptx
Slides Peluncuran Amalan Pemakanan Sihat.pptxSlides Peluncuran Amalan Pemakanan Sihat.pptx
Slides Peluncuran Amalan Pemakanan Sihat.pptx
 
managing Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptxmanaging Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptx
 
Creating Images and Videos through AI.pptx
Creating Images and Videos through AI.pptxCreating Images and Videos through AI.pptx
Creating Images and Videos through AI.pptx
 
Cross-Cultural Leadership and Communication
Cross-Cultural Leadership and CommunicationCross-Cultural Leadership and Communication
Cross-Cultural Leadership and Communication
 
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17
 
Keynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse CityKeynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse City
 
Post init hook in the odoo 17 ERP Module
Post init hook in the  odoo 17 ERP ModulePost init hook in the  odoo 17 ERP Module
Post init hook in the odoo 17 ERP Module
 
How to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRMHow to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRM
 
The Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teachingThe Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teaching
 
Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024
 
bryophytes.pptx bsc botany honours second semester
bryophytes.pptx bsc botany honours  second semesterbryophytes.pptx bsc botany honours  second semester
bryophytes.pptx bsc botany honours second semester
 
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
 
(T.L.E.) Agriculture: "Ornamental Plants"
(T.L.E.) Agriculture: "Ornamental Plants"(T.L.E.) Agriculture: "Ornamental Plants"
(T.L.E.) Agriculture: "Ornamental Plants"
 
nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...
 
How to Create User Notification in Odoo 17
How to Create User Notification in Odoo 17How to Create User Notification in Odoo 17
How to Create User Notification in Odoo 17
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
 

Computer Network ASsignment

  • 1. 1 – Networking Infrastructure and Protocols a) Answer: Structured cabling system is process of transferring all your data, voice, multimedia, security, and even wireless connections throughout your building or campus through network. Structure cabling uses an extended form of star topology. Structured cabling systems can be break down into six sub elements that are horizontal wiring, vertical (or backbone) wiring, telecommunication room (TR), work area, equipment room (ER),entrance facility (EF). The performance of the extended star topology is very much high as compared to other topologies. It is just like a star topology but with more switch/hubs. And also the data flow in this network is much more convenient and secure. In this topology every central devices are connected with each host. Also the data rate is high. There will be use of UTP Cat 6 cable for joining entire network. It performs better than other cables. It has high transmission rate. It can support 10/100 Mbps Ethernet. For the high speed internet we are going to use fiber optics cable which we will join with the internet service provider. b) Answer: Each layer operates via rule i.e. protocols. OSI model has a seven layers and each of them has its own protocols. Various protocols will be needed for us. The four protocols along with their used are explained below: i) SMTP: SMTP is part of the application layer of the TCP/IP protocol which provides a set of codes that simplify the communication of email messages between email servers. SMTP provides code to email server which makes email server to understand what that mean. ii) ARP: It helps in the process of IP routing which finds the hardware address or mac address, of a host or IP address. It is layer 3 protocol of OSI model. It enables communication on an internetwork. It detects the proper location for a data to pass. iii) FTP: IT means the protocol which helps in file transfer process. It is the fastest way to get the large files from one computer to another. It is also efficient. This protocol falls in the application layer of the OSI model. FTP allows you to transfer files back and forth this means both the Manager of the company as well as staffs can send information and files to each other. iv) SSL Protocol: It stands for Secure Socket Layer. It is a protocol used for sending confidential data over the Internet. It creates a secure connection between the web browser and the server. It protect us from the data
  • 2. privacy which encrypts the information. It falls in layer 6 of the OSI model i.e. the presentation layer protocol. c) Answer: In wireless network for the communication radio signals, infrared light beams are used. The devices that help a devices to connect to a network using Wi-Fi are as follows: a) Wireless Modem/Routers: It is a networking device that does the same work and has same functions as like a router, it also include the functions of a wireless access point and also commonly used to allow access of network to the device that does not need cable. b) Wireless Network Adapter: A wireless network adapter assists with computing gadget to join a remote LAN. Remote system connectors contain an inherent radio transmitter and beneficiary. There are essentially three principle sorts of connectors, conventional PCI remote connectors are include cards intended for establishment inside a desktop PC having a PCI transport. Wireless network works on the basis of IEEE 802.11 Standard. The protocol architecture consists of Physical Layer with two sublayers PLCP & PMD and Data Link Layer consists of MAC and LLC sublayer. The Wi-Fi system consist of Wi-Fi client, access point and LAN. LAN may consist of Ethernet Switch, RADIUS Authentication Server etc. Basically Wi-Fi works in half-duplex mode and Wi-Fi standard consist of only Physical Layer and Data Link Layer. This tells us that it fits in the OSI model. d) Answer: Wireless Networks are networks in which electromagnetic waves carry the signal over part or all of the communication path. The Standards of the Wi-Fi are explained below:
  • 3.  IEE.802.11a: This standard offers high level performance and high data transfer rate up to 54 Mbps, and also has a good range.  IEE.802.11b: This was first wireless LAN standard to be widely adopted and which was built into many laptop which was able to transfer data up to 11 mbps and also had a good range.  IEE.802.11g: After the 802.11a and 802.11b new standard was built with more improvement and advanced features. It provides up to 54 mbps. All the defects of 802.11b was improved in this standard  IEE.802.11n: It transfers data up to 600 Mbps also the performance was also better. It uses the Antenna technology. It supports the backward compatibility under special condition to improve data throughout. Some of the advantages of using the wireless network are as follows:  Mobility: With a laptop or smart phones access can be made available in a wide place. Internet access will be much easier since it is versatile.  Fast setup: Wireless network can be effortlessly setup and masked, which is ideal for some individuals who are on makeshift worksites/homes or rented space.  Cost: Setting up a wireless network can be a great deal more financially savvy when contrasted with other system. No need of cables so the cost is also less.  Expandability: For the wireless network expansion feature is not difficult task. Expansion of the network can be done easily. It is easy to add other wireless component or equipment on the network. Disadvantages of wireless network  Security: Wireless networks are much more susceptible to unauthorized use. It can hacked easily.  Interference: Wireless networks use radio signs and comparable strategies for transmission, they are powerless to obstruction from lights and electronic gadgets.  Inconsistent connections: Connection can be lost and it may be unreachable sometime.  Power consumption: The wireless transmitter in a portable workstation requires a lot of force; subsequently, the battery life of tablets can be antagonistically affected.
  • 4.  Speed: The speed of wireless network is not that so much fast as compared to wired network. I would recommend 802.11g as it has quick greatest pace and its directed frequencies keep signal obstruction from different gadgets however it has higher expense. No, I won’t recommend the entire LAN be connected wirelessly because the data rate and speed of the wireless network is very much slow as compared with the wired network. Also the wireless network has weak security as it can be easily hacked. Wired network offers fastest transfer rate and high security. Task 2 – Addressing A) > Addressing in network is an important factor. Without address the network cannot be run or it cannot identify the proper location to transmit data. Address helps to identify the proper path for the network. Each and every device on network has its unique address from which data/messages can be transferred to the required device as per required. Networks needs specific and unique address for routing. The popular form of addressing on network is IP address and MAC address. The address given on network are globally unique. B) > A MAC (media access control) address is a unique numeric code that is permanently assigned to device form the manufacturer. IP address is the numeric address of a device on the network for finding the proper location to share the data. Layer 3 address is absolutely an intelligent address which is free of any specific equipment; a Mac address is connected with specific equipment and equipment makes. An example of layer 3 addressing is IP addressing.
  • 5. Addressing in layer 2 happens with the help of Mac address. It is very important so as to not to confuse with the IP addressing. Switches and hubs are directly associate on layer 2 addressing (MAC addressing). IPv4 address IPv6 address 1) They are 32-bit length 1) They are 128 bit length 2) It is represented in decimals 2) It is represented in hexadecimals 3) Static or dynamic addressing is required to configure IPv4 address 3) Auto-configuration of address is available. 4) Packet flow identification is not available 4) Packet flow identification is available. . C) > Private IPv4 address are unique address that won't be seen by or correspond straightforwardly with the Internet. These private locations can't be utilized on the Internet or used to correspond with the Internet. It can be very useful for us. The importance of it is Security and Cost is also low. As there will be no external network there will be no malicious application and threats. Issues like misfortunes in Internet availability or outer server blackouts don't influence the execution of a private network. D) > Mac address is a unique identifier assigned to network devices. Mac address are 6- byte (48 bits). The initial 3-bytes are ID number of the maker, which is allocated by an Internet measures body. The second 3-bytes are serial number appointed by the maker. IP address is a 32-bit sequence of 1s and 0s which is unique identifier. IP address are of two type: Static IP address: it is process of assigning the IP address to the device due to which there may occur duplicity in address.
  • 6. Dynamic IP address: This type of IP address is assigned by server automatically by the help of DHCP protocol. E) > A subnet mask, which contains a binary bits of ones and zeros, is connected to a location to figure out if the location is on the nearby system or whether it must be directed outside the neighborhood system. The subnet cover is similar to a channel that is connected to a message's destination IP address. The capacity of a subnet cover is to tell gadgets which a piece of a location is the system number including the subnet, and which part is the host. Subnets additionally give security. Sub mesh serves to make its own sub network. No, this is not applicable for us as this is a small office there will be no need of it. F) > Each IP address has two sections, the system part (distinguishing the system number to which the PC is connected) and the host part (which recognizes the host inside of the nearby system). The procedure of conveying the packet starting with one point then onto the next point is referred as routing. Networks in the internet are connected to each other via routers. Routers carry packets from one network/subnet to another. Routers maintain a routing table to decide how to route the IP packets. In this way the packets gets from one point from another point by the help of routers. TASK 3: SECURITY a) Answer: Confidentiality: It is the privacy or to restrict unknown users so that only the needed user will see the required information. Data encryption is a best method for ensuring confidentially. It prevents the information from the wrong or unauthorized people. For the privacy it is used. Example: User ID and password will be needed in the office for using the FTP.
  • 7. Integrity: Integrity includes authenticity, non-repudiation and accountability. It controls maker/checker, quality assurance and audit logs. Integrity involves in maintain the accuracy, consistency of the data during whole cycle. Integrity also include file permissions and user access controls. Example: Sometime there need to change something in the file so only the authorized person will be able to do it. Availability: Availability helps to provide the Information and other critical assets to customers when needed. It helps to prevent the loss of data as it back up the data eventually. It also performs hardware repairs when needed and also helps to maintain the correctly functioning operating system. Example: There will be need of old files or document in the office to see old records so backup will be needed. b) Answer  DIGITAL SIGNATURES: The use of digital signature reduces risks of document interception, read, destroy while the document is in transit. A digitally signed document can easily tracked. By the help of digital signature only the recipient that we want will get document  IP ADDRESS FILTERING: For the network security IP address filtering is also an important method to protect network from threats. Only the known devices will be able to connect in the network. It will reduce the risk of access of an unauthorized PCs in the network from which the privacy of the company is maintain. c) Answer: The seven ways to keep the network secure are as follows:  Always change the name of your router do not keep default name. Router name should be unique.  Always use the firewall and antivirus software. There should be strong firewall maintained which prevent the hackers from entering into the network.  You should always perform the regular scan of the network for the better and secure performance of the network.  Always limit the remote access.  Ensure all the code, pins are encrypted.  Segment your network.
  • 8.  Updated version of the software should be used. d). Answer: In my view the biggest threat for the system is Eavesdropping. Since there will be a Wi-Fi network in the office and boundaries of Wi-Fi-signal will be outside the office which will be easy to access. Also there will be IP based calls in the office due to which eavesdropping will be easier to perform. Also the data will be transferred over internet in which the threat might occur. Task 4 – Diagram and explanation
  • 9. a) Answer: Switch helps to build full-duplex communication where there is no data collision. It works in Layer 2 of OSI model. Below we have used patch cable, switches and router for connecting to a network. Web server will be through cloud computing. It saves the storage for us. Cloud computing reduces the cost and increase the flexibility of use.
  • 11. C) Answer: Suitable IP addresses for the devices are as follows: Network Hardware Type of IP Address IP Address Subnet Mask Computer DHCP 192.168.30.1 – 192.168.30.10 255.255.255.0 Laptop DHCP 192.168.30.11 – 192.168.30.13 255.255.255.0 Network Printer DHCP 192.168.30.14 255.255.255.0 Server STATIC 192.168.0.100 – 192.168.0.104 255.255.255.0 Router STATIC 192.168.1.1 255.255.255.0 Switch STATIC 192.168.1.3 255.255.255.0 Patch Panel STATIC 192.168.1.2 255.255.255.0 Wireless AP STATIC 192.168.1.0 255.255.255.0 Mobile and tablet DHCP 192.168.30.14- 192.168.39.20 255.255.255.0 D) Answer: The hardware components that we have chosen are as follows: i) Patch Panel: A patch panel gives a helpful spot to end the link's majority runs originating from diverse rooms into the wiring storage room. The progressions can be made rapidly and effortlessly. ii) Switches: Switch helps to connect the device on network. Switches are more hardware oriented. Multi ports switches cost less. It is simple to manage. It is highly reliable. iii) Router: Routers finds the brief and the least demanding way to exchange the information, data between the diverse sending and getting PCs. iv) Wireless Access Point: Though there will be smart phones, laptops and tablets on the office there will be need for wireless access point for the convenient use of the internet. And also there are CAT cables and server computers.
  • 12. E) The prices of different components are given below: Component Price Quantity Specification Router TP-LINK Archer D20 AC750 Dual Band Modem Router. £39.99 1 Dual Band-300Mbps on 2.4GHz + 433Mbps on 5GHz, cable or fiber modem. Net gear ProSafe GS116 16-port Gigabit Switch £70.36 1 quickly upgrading workstations to full Gigabit speed, packed with ease- of-use features. NEW Link 1U 24 Port CAT5E Patch Panel £13.99 2 High quality angled terminal block contacts NETGEAR WN604- 100UKS N150 Wireless Access Point £28.69 1 Easy to configure business-class security, including WPA2 and MAC authentication TRIXES Network CAT5e RJ45 Ethernet LAN Cable Patch Lead 50M £9.99 2 Pre-fitted network plugs on both ends Easy to use - Plug and Play Lenovo C40 21.5-Inch HD All-in-One Desktop PC £490.82 10 despite the large screen and full metal stand, the C260 can fit almost anywhere HP 736958-421 ProLiant ML350p Gen8 1P PS Server £1,521.56 5 Processor: Intel Xeon E5- 2620 v2 six core, 2.1 GHz, 15 MB, 7.2 GT/s QPI Samsung Chromebook XE303C12-A01UK 11.6- inch Laptop £159.90 3 Portable and powerful - dual core Epson Workforce WF- 2630 Four-in-One for the Small Printer £59.99 1 Easy to use - 30-page automatic document feeder Sage Instant Account Software £86.39 1 Perfect for new office, leading account software
  • 13. Norton Security with Backup 2.0 25Gb: 1 user 10 device £29.99 2 at cheaper price with extra features Microsoft Lumia 435 £59.89 8 3G Capacitive touchscreen Microsoft Surface 2 64GB Tablet £479 8 Fast processor, 2 GB memory MICROSOFT OFFICE HOME AND BUSINESS 2016 £200.13 1 With more updates available Sage 50 Payroll £126.7 1 Can Support Up to 15 employees TASK 5: Remote access a) > Remote access network is the technology of getting able to access to a computer or a network from a remote distance. The method for performing remote access in a less cost is by establishing a VPN. VPN is a network technology that helps to establish secure connection over the network. The component for remote access network are: 1) Dial-up Remote access: The innovation is accessible as a directing's piece and remote access administration. It permits customer to utilize the information transfers framework like making a physical or virtual circuit to a port on a remote access server. 2) Telnet: its protocol (Telnet protocol) helps users to make remote connections. By using telnet user can create a remote command console on a host. 3) Terminal services: It provides remote desktop for administration. It is specifically designed for server management. Multiple host and simultaneous client sessions can be hosted through the terminal services. b) > There are lots of impact on network security by remote access network. Remote access network establish VPN for secure connection over a network. There are lots of VPN protocol for securing the data some of them are:
  • 14.  IP Security  Secure Sockets layer and Transport Layer Security  Point-to-point Tunneling Protocol  Layer 2 Tunneling Protocol VPN technology use encryption method to ensure security. All traffic over VPN secure data integrity and privacy by encryption. VPN needs administrators to ensure communications are kept private.
  翻译: