SlideShare a Scribd company logo
1 of 11
NETWORKING SYSTEMS
1
NETWORKING SYSTEMS
5
Networking System
Sarju Thapa
Dr. Stephen Gardner
East Central University
Abstract
In this report, the planning to design the network will be
discussed and demonstrated in detail. The planning to design
the network layout will be made according to the scenario given
in the requirements. The plan will be implemented by the
evaluation of the aspects that are important to design the
network and other necessary things to design and implement the
network. After implementing the network, the network will be
tested by secure communication, WAN communication Channel,
Wireless network, and PAN network. The troubleshooting of the
network will also be discussed and elaborated in detail. The
protocols used in this network will also be taken into
consideration.
Introduction
Designing a network is not a simple task for someone.
There are different phases to design the network. Each phase
has a very important role to design the network. The first phase
is to collect all the requirements to design the network. The
second phase is to evaluate the requirements to make sure that
either requirement is enough to design the network or not. After
evaluating the requirements, the third phase is to implement all
the aspects that are gathered in requirements. The fourth and
last phase after implementing the network design is to optimize
the network by performance.
Network Layout
The physical arrangement of the network is called network
layout. The network layout of the given is scenario is shown
below:
Diagram created using CISCO PACKET TRACER 7.3.0
Demonstration
This network consists of two different places one place is
headquarter which is the main point of this network and another
place is Therall which is the working point of this network.
Headquarter
In headquarter, the Executive office, R&D, Reception, Guest
office, and accounting office’s host are connected with one
switch. Twisted pair cable is used in this part of the network.
Each device directly connected with the headquarter switch.
8P8C (Actually, RJ-45 is the more common term) jack is used in
this part of the network and it is located in the reception area.
Bus topology is used in this part of the network. (I think that
what you have in your diagram is a bus-star hybrid. The switch
is the bus, the individual cables to the hosts are the star)
Thrall
In Thrall Remote, the Engineering area, production area, and
reception area’s host are connected with the switch. Twisted
pair cable is used in this part of the network. Each device
directly connected with the headquarter switch. 8P8C jack is
used in this part of the network and it is located in the reception
area. Bus topology is used in this part of the network.
For both 1 and 2: type of cable, where do you map the runs and
place the jacks (I gave you a building layout), and what is in the
telecom room, e.g., server, patch panel, demarc, router, etc?
7 points each.
Secure Communication
Communication through this network is secure because it is a
private network and has less vulnerability. An unauthorized
person cannot reach this network. The transmission control
protocol is used in this network
Sarju, this is not secure from building to building (server to
server, or really, network to network) or from an employee
home to the server (host to network). A man in the middle
attack with a packet sniffer would eat your lunch. You are still
thinking like a computer person and not like a network person.
While what you say is true, it really doesn’t secure a network.
The only way to really do what I asked is with a VPN using PPP
and either PPtP or L2TP as the security wrapper. 5 points.
T3 WAN channel helps to transmit data over the network is a
secure and reliable way. The transmission of data in this
channel is fast and accurate. The bandwidth of this network is
1000 Mbps. For long-distance, TCP/IP protocol is used.
What is a T3 WAN provide for bandwidth and speed? How is it
formed and terminated. In other words, what is a T3 and how
does it work. And, it is not secure.
Wireless network
The wireless network is set up by radio signal frequency. It
used this frequency to connect two different devices. It is very
easy to set up and configure in the network. It is fast and easy
to understand and establish. Sarju, this was supposed to be
about the wireless networks? Devices, placement, bandwidth,
discussion of 802.11, etc. I think you missed something here.
PAN
PAN stands for Personal area network. PAN is used in personal
devices and is normally connected with the higher-level network
it is normally used to provide communication between devices
like computers, mobile, and laptop. The range of the PAN
network is very small. The range is10 meters. Its frequency for
Bluetooth is between 2.4 GHz to 2.48 GHz.
You didn’t really explain your network…just told me what a
PAN is. I would have liked you to discuss ICS with DCS and
maybe PLCs. A quick bite of SCADA would be good, too.
Troubleshooting
It is a very complex task to troubleshoot the network because
sometimes the fault is a miner and does not found easily. In the
given scenario, the network will be troubleshot by check the
wired connection and by checking the router configuration.
Where would you start? Probably at the demarcs and work in. If
that was okay, you should call the ISP. Need more detail. 4
points.
OSI model
OSI stands for open system interconnection. There are seven
layers in the OSI model. Each layer is used for a specific task.
The 7 layers of OSI are described below:
· Application layer
· Presentation layer
· Session layer
· Transport layer
· Network layer
· Datalink layer
· Physical layer
What about the TCP/IP Model and encapsulation /De-
encapsulation? What is that all about? And what about using the
example of a web page to explain the process? 2 points.
Overall, a lot more detail is needed…31/100
Conclusion
In this report, the planning to design the network layout
according to the given scenario is discussed and demonstrated
in detail. Different phases to design the network are also
discussed in detail. Some optimization of the network by testing
the network are also discussed. We also implement the project
plan to design this network. We also studied and implement the
different cases on this network.
Sources:
J. K. a. K. Ross. “Computer Networking: A Top-Down
Approach Using the Internet” Addison-Wesley, 2013.
L.L. Peterson and B.S. Davie. “ Computer Networks a system
approach, Morgan Kaufmann, 2012.
B.A. Forouzan, Data Communications and Networking”, 4rd
Edition, McGraw Hill, 2007.
A.S. Tanenbaum. “Computer Networks” 4th Edition, Prentice
Hall: 2003.
2
Dr. Steve Gardner, SP2020, April 22, 2020
BONUS QUESTION SP20 MIS3613 DATA
COMMUNICATION AND COMPUTER NETWORKS
You are an electrical engineer and the IT Director of Therall
Industries, a small company that makes a very intricate high
technology device, the metapolar refractive pilfrometer for
Rockwell Industries Turboencabulator. If you wish to know
more about the device, you may watch the video at
https://www.youtube.com/watch?v=2fjcJp_Nwvk .
Your company works out of two small locations in two different
cities. The two offices, almost identical on the outside to be
easily recognizable as a Therall facility (an icon featuring the
buildings is on the company logo), are approximately 600 feet
long and 400 feet wide. The first location, Headquarters, houses
Executive Management and Research and Development
Engineering. The second, Remote, is where other engineering
and production takes place.
Therall Industries
Your boss, Tom Frantype, has asked you to, 1) develop an
internal network leading to a secure wired communication
system between the two offices, and, 2) install a wireless
network in each facility.
The facility layouts are available on the accompanying
Powerpoint Presentation and reproduced above.
Here are the exact tasks.
1. Discuss your intrabuilding networks. At Headquarters, you
will need:
a. Two hosts in the Executive offices
b. Four hosts in R&D
c. One host in Reception
d. Four hosts in Guest Offices
e. Two hosts in Accounting
f. VoIP service to each area
Layout your hosts on the diagram, being sure to discuss what
type and grade of structured cabling you will use, where the
runs will map, what jacks you will use and where they will be
located, and the physical and logical topology to be used. Also
discuss your building connection to the ISP through your
telecom room, including type of patch panels and what your
demarc looks like and where it is connected. (10 Points)
2. At Therall Remote, you will need:
a. Sixteen hosts in Engineering
b. Four hosts in each production area
c. One host in Reception
d. POTS service throughout
Layout your hosts on the diagram, being sure to discuss what
type and grade of structured cabling you will use, where the
runs will map, what jacks you will use and where they will be
located, and the physical and logical topology to be used. Also
discuss your building connection to the ISP through your
telecom room, including type of patch panels and what your
demarc looks like and where it is connected. (10 Points)
3. The secure communications channel should allow the
employees of both offices to communicate securely with each
other and the servers located at Headquarters. It should also
allow employees to work remotely using the network at either
Headquarters or Remote. What is this secure network, how it is
formed, what protocol(s)does it use, etc? Convince Tom
Frantype that you can secure it by explaining how it works. (10
points).
4. The WAN communication channel from both ISPs to the
facilities is a T3. Explain how a T3 WAN channel works, what
the available bandwidth is, what sort of communication protocol
it uses, how it might communicate over long distances
(Headquarters is in Houston, Remote is in Ada), and how it is
terminated at the demarc. (10 points).
5. Now it is time to setup the wireless network in each facility.
Explain how you will set it up, what type of communication
device you will use, what band it operates in, where the
device(s) will be positioned, and how fast the connection will
probably be and why. Don’t forget your most important wireless
connection will be at Headquarters between the receptionist and
the CEO in the Executive Suite. To make the CEO happy, that
connection needs to be fast and certain to make. (10 points).
6. At Remote, there are 6 dapoplar presserstops in Production 1,
and 7 in Production 2. These machines are controlled from a
central control booth in each room. The machines are monitored
via a PAN in each room. Explain how this PAN works,
including the communication method, the frequency, the range
of the devices, and anything else Tom Frantype may ask about
these smaller networks. Try to anticipate his questions. (10
points).
7. Oh no! Interbuilding comms are down and R&D in
Headquarters cannot talk to Engineering at Remote. Explain the
steps you would go through to troubleshoot this problem. (10
points).
8. While one of your engineers was on a chat line discussing
one of the dapoplar presserstops that was acting up with a
representative from Shadrach (the company that makes the
machine), his monitor went blank. After a few moments, a
message popped up that said, “If you want your data back, you
must send a certified check for £500,000 to Cayman National
Bank, Peter A. Tomkins Building, 200 Elgin Ave, George Town
KY1-1102, Cayman Islands”. No matter how he tried, the
engineer was unable to access the secure data folder on the
server where the Therall company proprietary manufacturing
data is kept. What has happened? Is there a way to fix this? (10
Points).
9. Wow, you have done a great job on your system! In fact, Tom
(was MISTER Frantype, but now you are on a first name basis)
was so impressed he gave you a raise and a part of the profit-
sharing bonus pool. This almost doubled your salary. Last
Friday night when you were at a barbeque at Tom and Marie’s
house in the Woodlands outside of Dallas, Tom told you, “You
know, I have heard a lot about this networking thing but I really
don’t understand how a computer forms a message, asks for a
webpage and gets the correct one, or really anything about it. It
all seems like magic to me. I said something to Fred over in
R&D and he said, ‘It’s simple, it’s all about the OSI model and
encapsulation and de-encapsulation. That explains everything.’
I must admit I felt a bit foolish asking anymore because Fred
said it was so simple. Can you explain to me what he was
talking about? What does he mean, ‘Seven layers?’, and
‘Headers and Footers’? And then he said something about
another model, the TCP/IP? Can you help me here?”
It appears staying in Frantype’s good graces is going to require
you to explain what the two models are, what they do, and how
they work. You should do that by, 1) explaining the OSI model,
and, 2) explaining the TCP/IP model by helping him understand
how a web page is requested and received, including protocols,
etc. Your new salary, in fact, your entire job, may depend on
this. Good luck. (10 points).
10. Please ensure your submission is neat and easily readable.
Do your best work. (10 points)
Thank you.
If you want a full explanation of the Turboencabulator,
including history, uses, and companies that employ it, visit
https://www.youtube.com/watch?v=kkH20fNavoI or reference
the Wikipedia article on this amazing invention.
Therall Industries
Therall Industries Headquarters
Executive Suite
Accounting
Reception
R & D Engineering
Guest Offices
Storage
Telecom Room
Brick Firewall
Therall Industries Remote
Production 2
Reception
Engineering
Production 1
Telecom Room
Therall

More Related Content

Similar to NETWORKING SYSTEMS .docx

Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
 
ComputerNetworksAssignment
ComputerNetworksAssignmentComputerNetworksAssignment
ComputerNetworksAssignmentRebecca Patient
 
Experiment no. 1,2 and assignment no.1 cn
Experiment no. 1,2 and assignment no.1 cnExperiment no. 1,2 and assignment no.1 cn
Experiment no. 1,2 and assignment no.1 cnHusainGadiwala1
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docxhoney725342
 
Week 4_Project Part 2_DNesbit
Week 4_Project Part 2_DNesbitWeek 4_Project Part 2_DNesbit
Week 4_Project Part 2_DNesbitDavid Nesbit II
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwoAKHIL969626
 
ProjectPurposeThe purpose of this project is to provide an o.docx
ProjectPurposeThe purpose of this project is to provide an o.docxProjectPurposeThe purpose of this project is to provide an o.docx
ProjectPurposeThe purpose of this project is to provide an o.docxwoodruffeloisa
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address SchemeErin Rivera
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]Avijit Nath
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)ateeq85905
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheHansa Edirisinghe
 
NTC/362 ENTIRE CLASS UOP TUTORIALS
NTC/362 ENTIRE CLASS UOP TUTORIALSNTC/362 ENTIRE CLASS UOP TUTORIALS
NTC/362 ENTIRE CLASS UOP TUTORIALSSharon Reynolds
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignmentBijay Bista
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesIJARIIT
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 
Netw 208 Success Begins / snaptutorial.com
Netw 208  Success Begins / snaptutorial.comNetw 208  Success Begins / snaptutorial.com
Netw 208 Success Begins / snaptutorial.comWilliamsTaylor65
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersITExamAnswers.net
 

Similar to NETWORKING SYSTEMS .docx (20)

Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
 
ComputerNetworksAssignment
ComputerNetworksAssignmentComputerNetworksAssignment
ComputerNetworksAssignment
 
Experiment no. 1,2 and assignment no.1 cn
Experiment no. 1,2 and assignment no.1 cnExperiment no. 1,2 and assignment no.1 cn
Experiment no. 1,2 and assignment no.1 cn
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
 
Week 4_Project Part 2_DNesbit
Week 4_Project Part 2_DNesbitWeek 4_Project Part 2_DNesbit
Week 4_Project Part 2_DNesbit
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
Cisco Activity
Cisco ActivityCisco Activity
Cisco Activity
 
ProjectPurposeThe purpose of this project is to provide an o.docx
ProjectPurposeThe purpose of this project is to provide an o.docxProjectPurposeThe purpose of this project is to provide an o.docx
ProjectPurposeThe purpose of this project is to provide an o.docx
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)
 
ccna presentation
ccna presentationccna presentation
ccna presentation
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
 
NTC/362 ENTIRE CLASS UOP TUTORIALS
NTC/362 ENTIRE CLASS UOP TUTORIALSNTC/362 ENTIRE CLASS UOP TUTORIALS
NTC/362 ENTIRE CLASS UOP TUTORIALS
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignment
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Netw 208 Success Begins / snaptutorial.com
Netw 208  Success Begins / snaptutorial.comNetw 208  Success Begins / snaptutorial.com
Netw 208 Success Begins / snaptutorial.com
 
Opnet tutorial
Opnet tutorialOpnet tutorial
Opnet tutorial
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
 

More from dohertyjoetta

NEURAL NETWORKS 3Neural NetworksName Group .docx
NEURAL NETWORKS 3Neural NetworksName Group .docxNEURAL NETWORKS 3Neural NetworksName Group .docx
NEURAL NETWORKS 3Neural NetworksName Group .docxdohertyjoetta
 
Neo-psychoanalytic approaches to personality include theorists such .docx
Neo-psychoanalytic approaches to personality include theorists such .docxNeo-psychoanalytic approaches to personality include theorists such .docx
Neo-psychoanalytic approaches to personality include theorists such .docxdohertyjoetta
 
Neoliberalism In what ways does the world of Oryx and Crake reflect.docx
Neoliberalism In what ways does the world of Oryx and Crake reflect.docxNeoliberalism In what ways does the world of Oryx and Crake reflect.docx
Neoliberalism In what ways does the world of Oryx and Crake reflect.docxdohertyjoetta
 
Negligent Tort LiabilityPrior to beginning work on this assi.docx
Negligent Tort LiabilityPrior to beginning work on this assi.docxNegligent Tort LiabilityPrior to beginning work on this assi.docx
Negligent Tort LiabilityPrior to beginning work on this assi.docxdohertyjoetta
 
Needs to be at least 250 words with at least 1 scholarly article wit.docx
Needs to be at least 250 words with at least 1 scholarly article wit.docxNeeds to be at least 250 words with at least 1 scholarly article wit.docx
Needs to be at least 250 words with at least 1 scholarly article wit.docxdohertyjoetta
 
Need to write a Research proposal for 5 to 6 pages for above top.docx
Need to write a Research proposal for 5 to 6 pages for above top.docxNeed to write a Research proposal for 5 to 6 pages for above top.docx
Need to write a Research proposal for 5 to 6 pages for above top.docxdohertyjoetta
 
New England Journal of Public Policy Reconnecting the Brok.docx
New England Journal of Public Policy Reconnecting the Brok.docxNew England Journal of Public Policy Reconnecting the Brok.docx
New England Journal of Public Policy Reconnecting the Brok.docxdohertyjoetta
 
Neuroscience meets cryptography ( This is the topic for research p.docx
Neuroscience meets cryptography ( This is the topic for research p.docxNeuroscience meets cryptography ( This is the topic for research p.docx
Neuroscience meets cryptography ( This is the topic for research p.docxdohertyjoetta
 
Network Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxNetwork Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxdohertyjoetta
 
NETW204 Class Project This project includes three phases. .docx
NETW204 Class Project This project includes three phases. .docxNETW204 Class Project This project includes three phases. .docx
NETW204 Class Project This project includes three phases. .docxdohertyjoetta
 
Network forensics is considered a very hard problem for a number of .docx
Network forensics is considered a very hard problem for a number of .docxNetwork forensics is considered a very hard problem for a number of .docx
Network forensics is considered a very hard problem for a number of .docxdohertyjoetta
 
Network Design Proposal TemplateNetwork Design Proposal.docx
Network Design Proposal TemplateNetwork Design Proposal.docxNetwork Design Proposal TemplateNetwork Design Proposal.docx
Network Design Proposal TemplateNetwork Design Proposal.docxdohertyjoetta
 
Netflix’s strategy of moving to a streaming service has been widely .docx
Netflix’s strategy of moving to a streaming service has been widely .docxNetflix’s strategy of moving to a streaming service has been widely .docx
Netflix’s strategy of moving to a streaming service has been widely .docxdohertyjoetta
 
Network DesignScenarioThe Corporation Techs’ current network.docx
Network DesignScenarioThe Corporation Techs’ current network.docxNetwork DesignScenarioThe Corporation Techs’ current network.docx
Network DesignScenarioThe Corporation Techs’ current network.docxdohertyjoetta
 
Netflix is glowing. We had a beautiful Q4,” the company preen.docx
Netflix is glowing. We had a beautiful Q4,” the company preen.docxNetflix is glowing. We had a beautiful Q4,” the company preen.docx
Netflix is glowing. We had a beautiful Q4,” the company preen.docxdohertyjoetta
 
Netflix is an American media service provider founded by Reed Hastin.docx
Netflix is an American media service provider founded by Reed Hastin.docxNetflix is an American media service provider founded by Reed Hastin.docx
Netflix is an American media service provider founded by Reed Hastin.docxdohertyjoetta
 
Nelson v. James H. Knight DDS, P.C., 834 N.W.2d 64 (Iowa 2013).docx
Nelson v. James H. Knight DDS, P.C., 834 N.W.2d 64 (Iowa 2013).docxNelson v. James H. Knight DDS, P.C., 834 N.W.2d 64 (Iowa 2013).docx
Nelson v. James H. Knight DDS, P.C., 834 N.W.2d 64 (Iowa 2013).docxdohertyjoetta
 
Negrin 1Negrin 5Claudia NegrinProfessor Oscar GonzalezENC1.docx
Negrin 1Negrin 5Claudia NegrinProfessor Oscar GonzalezENC1.docxNegrin 1Negrin 5Claudia NegrinProfessor Oscar GonzalezENC1.docx
Negrin 1Negrin 5Claudia NegrinProfessor Oscar GonzalezENC1.docxdohertyjoetta
 
Needs to be 2 pages. APA format. Tie the three interpersonal concept.docx
Needs to be 2 pages. APA format. Tie the three interpersonal concept.docxNeeds to be 2 pages. APA format. Tie the three interpersonal concept.docx
Needs to be 2 pages. APA format. Tie the three interpersonal concept.docxdohertyjoetta
 
need two pages in the uploaded documents they ask about the team.docx
need two pages in the uploaded documents they ask about the team.docxneed two pages in the uploaded documents they ask about the team.docx
need two pages in the uploaded documents they ask about the team.docxdohertyjoetta
 

More from dohertyjoetta (20)

NEURAL NETWORKS 3Neural NetworksName Group .docx
NEURAL NETWORKS 3Neural NetworksName Group .docxNEURAL NETWORKS 3Neural NetworksName Group .docx
NEURAL NETWORKS 3Neural NetworksName Group .docx
 
Neo-psychoanalytic approaches to personality include theorists such .docx
Neo-psychoanalytic approaches to personality include theorists such .docxNeo-psychoanalytic approaches to personality include theorists such .docx
Neo-psychoanalytic approaches to personality include theorists such .docx
 
Neoliberalism In what ways does the world of Oryx and Crake reflect.docx
Neoliberalism In what ways does the world of Oryx and Crake reflect.docxNeoliberalism In what ways does the world of Oryx and Crake reflect.docx
Neoliberalism In what ways does the world of Oryx and Crake reflect.docx
 
Negligent Tort LiabilityPrior to beginning work on this assi.docx
Negligent Tort LiabilityPrior to beginning work on this assi.docxNegligent Tort LiabilityPrior to beginning work on this assi.docx
Negligent Tort LiabilityPrior to beginning work on this assi.docx
 
Needs to be at least 250 words with at least 1 scholarly article wit.docx
Needs to be at least 250 words with at least 1 scholarly article wit.docxNeeds to be at least 250 words with at least 1 scholarly article wit.docx
Needs to be at least 250 words with at least 1 scholarly article wit.docx
 
Need to write a Research proposal for 5 to 6 pages for above top.docx
Need to write a Research proposal for 5 to 6 pages for above top.docxNeed to write a Research proposal for 5 to 6 pages for above top.docx
Need to write a Research proposal for 5 to 6 pages for above top.docx
 
New England Journal of Public Policy Reconnecting the Brok.docx
New England Journal of Public Policy Reconnecting the Brok.docxNew England Journal of Public Policy Reconnecting the Brok.docx
New England Journal of Public Policy Reconnecting the Brok.docx
 
Neuroscience meets cryptography ( This is the topic for research p.docx
Neuroscience meets cryptography ( This is the topic for research p.docxNeuroscience meets cryptography ( This is the topic for research p.docx
Neuroscience meets cryptography ( This is the topic for research p.docx
 
Network Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxNetwork Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docx
 
NETW204 Class Project This project includes three phases. .docx
NETW204 Class Project This project includes three phases. .docxNETW204 Class Project This project includes three phases. .docx
NETW204 Class Project This project includes three phases. .docx
 
Network forensics is considered a very hard problem for a number of .docx
Network forensics is considered a very hard problem for a number of .docxNetwork forensics is considered a very hard problem for a number of .docx
Network forensics is considered a very hard problem for a number of .docx
 
Network Design Proposal TemplateNetwork Design Proposal.docx
Network Design Proposal TemplateNetwork Design Proposal.docxNetwork Design Proposal TemplateNetwork Design Proposal.docx
Network Design Proposal TemplateNetwork Design Proposal.docx
 
Netflix’s strategy of moving to a streaming service has been widely .docx
Netflix’s strategy of moving to a streaming service has been widely .docxNetflix’s strategy of moving to a streaming service has been widely .docx
Netflix’s strategy of moving to a streaming service has been widely .docx
 
Network DesignScenarioThe Corporation Techs’ current network.docx
Network DesignScenarioThe Corporation Techs’ current network.docxNetwork DesignScenarioThe Corporation Techs’ current network.docx
Network DesignScenarioThe Corporation Techs’ current network.docx
 
Netflix is glowing. We had a beautiful Q4,” the company preen.docx
Netflix is glowing. We had a beautiful Q4,” the company preen.docxNetflix is glowing. We had a beautiful Q4,” the company preen.docx
Netflix is glowing. We had a beautiful Q4,” the company preen.docx
 
Netflix is an American media service provider founded by Reed Hastin.docx
Netflix is an American media service provider founded by Reed Hastin.docxNetflix is an American media service provider founded by Reed Hastin.docx
Netflix is an American media service provider founded by Reed Hastin.docx
 
Nelson v. James H. Knight DDS, P.C., 834 N.W.2d 64 (Iowa 2013).docx
Nelson v. James H. Knight DDS, P.C., 834 N.W.2d 64 (Iowa 2013).docxNelson v. James H. Knight DDS, P.C., 834 N.W.2d 64 (Iowa 2013).docx
Nelson v. James H. Knight DDS, P.C., 834 N.W.2d 64 (Iowa 2013).docx
 
Negrin 1Negrin 5Claudia NegrinProfessor Oscar GonzalezENC1.docx
Negrin 1Negrin 5Claudia NegrinProfessor Oscar GonzalezENC1.docxNegrin 1Negrin 5Claudia NegrinProfessor Oscar GonzalezENC1.docx
Negrin 1Negrin 5Claudia NegrinProfessor Oscar GonzalezENC1.docx
 
Needs to be 2 pages. APA format. Tie the three interpersonal concept.docx
Needs to be 2 pages. APA format. Tie the three interpersonal concept.docxNeeds to be 2 pages. APA format. Tie the three interpersonal concept.docx
Needs to be 2 pages. APA format. Tie the three interpersonal concept.docx
 
need two pages in the uploaded documents they ask about the team.docx
need two pages in the uploaded documents they ask about the team.docxneed two pages in the uploaded documents they ask about the team.docx
need two pages in the uploaded documents they ask about the team.docx
 

Recently uploaded

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 

Recently uploaded (20)

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 

NETWORKING SYSTEMS .docx

  • 1. NETWORKING SYSTEMS 1 NETWORKING SYSTEMS 5 Networking System Sarju Thapa Dr. Stephen Gardner East Central University Abstract In this report, the planning to design the network will be discussed and demonstrated in detail. The planning to design the network layout will be made according to the scenario given in the requirements. The plan will be implemented by the
  • 2. evaluation of the aspects that are important to design the network and other necessary things to design and implement the network. After implementing the network, the network will be tested by secure communication, WAN communication Channel, Wireless network, and PAN network. The troubleshooting of the network will also be discussed and elaborated in detail. The protocols used in this network will also be taken into consideration. Introduction Designing a network is not a simple task for someone. There are different phases to design the network. Each phase has a very important role to design the network. The first phase is to collect all the requirements to design the network. The second phase is to evaluate the requirements to make sure that either requirement is enough to design the network or not. After evaluating the requirements, the third phase is to implement all the aspects that are gathered in requirements. The fourth and last phase after implementing the network design is to optimize the network by performance. Network Layout The physical arrangement of the network is called network layout. The network layout of the given is scenario is shown below: Diagram created using CISCO PACKET TRACER 7.3.0 Demonstration This network consists of two different places one place is headquarter which is the main point of this network and another place is Therall which is the working point of this network. Headquarter In headquarter, the Executive office, R&D, Reception, Guest office, and accounting office’s host are connected with one
  • 3. switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C (Actually, RJ-45 is the more common term) jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network. (I think that what you have in your diagram is a bus-star hybrid. The switch is the bus, the individual cables to the hosts are the star) Thrall In Thrall Remote, the Engineering area, production area, and reception area’s host are connected with the switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network. For both 1 and 2: type of cable, where do you map the runs and place the jacks (I gave you a building layout), and what is in the telecom room, e.g., server, patch panel, demarc, router, etc? 7 points each. Secure Communication Communication through this network is secure because it is a private network and has less vulnerability. An unauthorized person cannot reach this network. The transmission control protocol is used in this network Sarju, this is not secure from building to building (server to server, or really, network to network) or from an employee home to the server (host to network). A man in the middle attack with a packet sniffer would eat your lunch. You are still thinking like a computer person and not like a network person. While what you say is true, it really doesn’t secure a network. The only way to really do what I asked is with a VPN using PPP and either PPtP or L2TP as the security wrapper. 5 points. T3 WAN channel helps to transmit data over the network is a secure and reliable way. The transmission of data in this channel is fast and accurate. The bandwidth of this network is
  • 4. 1000 Mbps. For long-distance, TCP/IP protocol is used. What is a T3 WAN provide for bandwidth and speed? How is it formed and terminated. In other words, what is a T3 and how does it work. And, it is not secure. Wireless network The wireless network is set up by radio signal frequency. It used this frequency to connect two different devices. It is very easy to set up and configure in the network. It is fast and easy to understand and establish. Sarju, this was supposed to be about the wireless networks? Devices, placement, bandwidth, discussion of 802.11, etc. I think you missed something here. PAN PAN stands for Personal area network. PAN is used in personal devices and is normally connected with the higher-level network it is normally used to provide communication between devices like computers, mobile, and laptop. The range of the PAN network is very small. The range is10 meters. Its frequency for Bluetooth is between 2.4 GHz to 2.48 GHz. You didn’t really explain your network…just told me what a PAN is. I would have liked you to discuss ICS with DCS and maybe PLCs. A quick bite of SCADA would be good, too. Troubleshooting It is a very complex task to troubleshoot the network because sometimes the fault is a miner and does not found easily. In the given scenario, the network will be troubleshot by check the wired connection and by checking the router configuration. Where would you start? Probably at the demarcs and work in. If that was okay, you should call the ISP. Need more detail. 4 points. OSI model OSI stands for open system interconnection. There are seven layers in the OSI model. Each layer is used for a specific task. The 7 layers of OSI are described below:
  • 5. · Application layer · Presentation layer · Session layer · Transport layer · Network layer · Datalink layer · Physical layer What about the TCP/IP Model and encapsulation /De- encapsulation? What is that all about? And what about using the example of a web page to explain the process? 2 points. Overall, a lot more detail is needed…31/100 Conclusion In this report, the planning to design the network layout according to the given scenario is discussed and demonstrated in detail. Different phases to design the network are also discussed in detail. Some optimization of the network by testing the network are also discussed. We also implement the project plan to design this network. We also studied and implement the different cases on this network. Sources: J. K. a. K. Ross. “Computer Networking: A Top-Down Approach Using the Internet” Addison-Wesley, 2013. L.L. Peterson and B.S. Davie. “ Computer Networks a system approach, Morgan Kaufmann, 2012. B.A. Forouzan, Data Communications and Networking”, 4rd Edition, McGraw Hill, 2007. A.S. Tanenbaum. “Computer Networks” 4th Edition, Prentice Hall: 2003.
  • 6. 2 Dr. Steve Gardner, SP2020, April 22, 2020 BONUS QUESTION SP20 MIS3613 DATA COMMUNICATION AND COMPUTER NETWORKS You are an electrical engineer and the IT Director of Therall Industries, a small company that makes a very intricate high technology device, the metapolar refractive pilfrometer for Rockwell Industries Turboencabulator. If you wish to know more about the device, you may watch the video at https://www.youtube.com/watch?v=2fjcJp_Nwvk . Your company works out of two small locations in two different cities. The two offices, almost identical on the outside to be easily recognizable as a Therall facility (an icon featuring the buildings is on the company logo), are approximately 600 feet long and 400 feet wide. The first location, Headquarters, houses Executive Management and Research and Development Engineering. The second, Remote, is where other engineering and production takes place. Therall Industries Your boss, Tom Frantype, has asked you to, 1) develop an internal network leading to a secure wired communication system between the two offices, and, 2) install a wireless network in each facility.
  • 7. The facility layouts are available on the accompanying Powerpoint Presentation and reproduced above. Here are the exact tasks. 1. Discuss your intrabuilding networks. At Headquarters, you will need: a. Two hosts in the Executive offices b. Four hosts in R&D c. One host in Reception d. Four hosts in Guest Offices e. Two hosts in Accounting f. VoIP service to each area Layout your hosts on the diagram, being sure to discuss what type and grade of structured cabling you will use, where the runs will map, what jacks you will use and where they will be located, and the physical and logical topology to be used. Also discuss your building connection to the ISP through your telecom room, including type of patch panels and what your demarc looks like and where it is connected. (10 Points) 2. At Therall Remote, you will need: a. Sixteen hosts in Engineering b. Four hosts in each production area c. One host in Reception d. POTS service throughout Layout your hosts on the diagram, being sure to discuss what type and grade of structured cabling you will use, where the runs will map, what jacks you will use and where they will be located, and the physical and logical topology to be used. Also discuss your building connection to the ISP through your telecom room, including type of patch panels and what your demarc looks like and where it is connected. (10 Points) 3. The secure communications channel should allow the employees of both offices to communicate securely with each other and the servers located at Headquarters. It should also
  • 8. allow employees to work remotely using the network at either Headquarters or Remote. What is this secure network, how it is formed, what protocol(s)does it use, etc? Convince Tom Frantype that you can secure it by explaining how it works. (10 points). 4. The WAN communication channel from both ISPs to the facilities is a T3. Explain how a T3 WAN channel works, what the available bandwidth is, what sort of communication protocol it uses, how it might communicate over long distances (Headquarters is in Houston, Remote is in Ada), and how it is terminated at the demarc. (10 points). 5. Now it is time to setup the wireless network in each facility. Explain how you will set it up, what type of communication device you will use, what band it operates in, where the device(s) will be positioned, and how fast the connection will probably be and why. Don’t forget your most important wireless connection will be at Headquarters between the receptionist and the CEO in the Executive Suite. To make the CEO happy, that connection needs to be fast and certain to make. (10 points). 6. At Remote, there are 6 dapoplar presserstops in Production 1, and 7 in Production 2. These machines are controlled from a central control booth in each room. The machines are monitored via a PAN in each room. Explain how this PAN works, including the communication method, the frequency, the range of the devices, and anything else Tom Frantype may ask about these smaller networks. Try to anticipate his questions. (10 points). 7. Oh no! Interbuilding comms are down and R&D in Headquarters cannot talk to Engineering at Remote. Explain the steps you would go through to troubleshoot this problem. (10 points).
  • 9. 8. While one of your engineers was on a chat line discussing one of the dapoplar presserstops that was acting up with a representative from Shadrach (the company that makes the machine), his monitor went blank. After a few moments, a message popped up that said, “If you want your data back, you must send a certified check for £500,000 to Cayman National Bank, Peter A. Tomkins Building, 200 Elgin Ave, George Town KY1-1102, Cayman Islands”. No matter how he tried, the engineer was unable to access the secure data folder on the server where the Therall company proprietary manufacturing data is kept. What has happened? Is there a way to fix this? (10 Points). 9. Wow, you have done a great job on your system! In fact, Tom (was MISTER Frantype, but now you are on a first name basis) was so impressed he gave you a raise and a part of the profit- sharing bonus pool. This almost doubled your salary. Last Friday night when you were at a barbeque at Tom and Marie’s house in the Woodlands outside of Dallas, Tom told you, “You know, I have heard a lot about this networking thing but I really don’t understand how a computer forms a message, asks for a webpage and gets the correct one, or really anything about it. It all seems like magic to me. I said something to Fred over in R&D and he said, ‘It’s simple, it’s all about the OSI model and encapsulation and de-encapsulation. That explains everything.’ I must admit I felt a bit foolish asking anymore because Fred said it was so simple. Can you explain to me what he was talking about? What does he mean, ‘Seven layers?’, and ‘Headers and Footers’? And then he said something about another model, the TCP/IP? Can you help me here?” It appears staying in Frantype’s good graces is going to require you to explain what the two models are, what they do, and how they work. You should do that by, 1) explaining the OSI model, and, 2) explaining the TCP/IP model by helping him understand how a web page is requested and received, including protocols,
  • 10. etc. Your new salary, in fact, your entire job, may depend on this. Good luck. (10 points). 10. Please ensure your submission is neat and easily readable. Do your best work. (10 points) Thank you. If you want a full explanation of the Turboencabulator, including history, uses, and companies that employ it, visit https://www.youtube.com/watch?v=kkH20fNavoI or reference the Wikipedia article on this amazing invention. Therall Industries Therall Industries Headquarters Executive Suite Accounting Reception R & D Engineering Guest Offices Storage Telecom Room Brick Firewall Therall Industries Remote Production 2