SlideShare a Scribd company logo
1 of 19
1
Contents
Task 1: Network Infrastructure and Protocols ………………………………………………
Error! Bookmark not defined.
Task 2: Addressing……………………………………………………………………………………………………………..6
Task 3: Security ………………………………………………………………………………….11
Task 4: Diagram and explanation …………………………………………………………….13
Task 5: Remote access …………………………………………………………………………16
2
A) Different between newer versions of Ethernet, and Wi-Fi and a
recommendation about the technology the company should use.
Criteria Fast
Ethernet(1
00base-TX)
Gigabit
Ethernet(1
000BASE-
T)
10 Gigabit
Ethernet(10
base-T)
WI-FI 10base T
Cable type It uses 5e
(fiber optic
and UTP
cable)
It uses 5e
(fiber optic
cable)
It is based
(it uses
concerning
cable type)
on cat 6a
cat 6 (fiber
optic)
It uses
wireless
system.
It uses cat 5
UPP for
cabling
Data rate Delivers
100
megabit per
seconds
Delivers 1
gigabit per
seconds
Delivers 10
gigabit per
seconds
It delivers
speeds
range from
433 Mbps
(megabits
per second)
up to
several
gigabits per
seconds
Delivers 10
megabit per
seconds
Network
contention
It has lower
speed than
the higher
categories
The
Internet is a
bottleneck,
faster
cables
won't help.
The Internet
is a
bottleneck,
faster
cables won't
help.
Has
interference
(‘signal
interference
’) which ca
e use to
connect
smart
phone,
tablet etc.
has high
electrical
interference
Recommendation
I advise to keep the network in the company as wired because WIFI has more high
interference and less secure.
COMPUTER NETWORKS
Task 1: Network Infrastructure and Protocols
3
Concerning their smart device, I recommend that the company should have a
separate wireless network as a guest. The most essential aspect of the LAN network
is that, their network would be more convenient if they upgrade to cat 5e version of
the Ethernet.
B) Below Differentiate between physical network device on the network. On where
it operate on the OSI model.
A Hub
It a physical network device that has multiple ports to connect different device on
the internal network. Hubs are not intelligent as compare to other network
swishes because it does not have any intelligent as to where a data packet
supposed to be send. For instance, when a packet arrives at one of it port. It will
send to all other port. Hub works at layer 1. That is, physical layer of the OSI
model that actas transmission of data.
A SWITCH
It is a network device with multiple port connections, that accept internal
connections from devices (network devices) such as PCs, servers etc. unlike
a hubs, which are not smart. A switch actually learns the physical addresses
(that is, MAC address) which will be connected to it. So when a data packet
arrives it its port, it only direct to the intended destination port. Switch works
at layer 2, to process/forward data. (“Data link layer”). (Christensson, 2014)
Wireless Access Point
It is a physical network device used to establish a wired-to-wireless
connection. Wireless access point operate at the layer 2 (“Physical layer”) of
the OSI model for the transmission of packet between nodes. (Mitchell, 2019)
Routers
4
They are physical networks devices on the network, that enable several
network devices to be exchange information based on their IP address.
Router makes the wireless device to access LAN network. Routers are very
intelligent because when it receives packets, it checks the IP address on the
device, and forward it to the intended destination. Router works at the network
layer (“layer 3”) of the OSI model managing the network. (Mitchell, 2019)
C) Purpose of the OSI model.
Application layer (layer 7)
 It provides services for network application such as Firefox
Chrome etc to exchange data over the network that enable the
user to interact with the application. (Bahl, 2018)
Presentation layer (layer 6)
 It receives data from application layer. This data is in a form of
characters/numbers, so the application layer converts these
numbers to the understanding of machine such as 0s/1s.
Presentation layer reduces the size of the data before it
transmitted to its original size (“data compression”). These help
data to be transmitted in a very high speed. Also presentation
layer handles encryption and decryption. (Bahl, 2018)
Session layer (layer 5)
 It is a layer that deals with communication. Session layer helps
in managing connections enabling sending and receiving data
and also termination of session. Session layer provides session
support such as NETBIOS (“Network Basic Input/output
System”) which allows application on different computers to
communicate to each other, Apple Talk Session Protocol (ASP)
etc. (Bahl, 2018)
Transport layer (layer 4).
 This is to ensure successful data is delivered includes checking
for errors and lost/duplicated frames. On the internet, it offers
traffic control and message recognition, such as TCP
5
(Transmission Control Protocol), UDB (User Datagram Protocol)
etc. (Moran, 2015)
Network layer (layer 3).
 This layer is where routers operate. It is in charge of managing
the logical address and controls how the subnet operates.
These help packets to be delivered to their intended destination.
Internet Protocol (IP) is one the example. (Bahl, 2018)
Data link layer (layer 2).
 It provide means of transferring data from one computer to
another via local media such as optical Fibber, LAN cable, Air
etc. It handles traffic control links and terminates frames, etc.
ATM, ARP, FDDI etc. are example protocols. (Bahl, 2018)
Physical layer (layer 1)
 This layer is where willing occurs. Physical stuffs that connect
computers together. It covers verity of medium devices including
repeaters, connectors, cabling etc. (Bahl, 2018)
D) Purpose of SEVEN (7) protocols.
i. TCP abbreviation stand for Transmission Control Protocol. It’s a
“connection-oriented protocol” which guarantees available data transfer,
when it detects data segment drops in a network, the lost/dropped
network will be transmitted. Therefore, sender will determine the
success of transmission following the acceptance of the segment it
receives on the basis of an acknowledgement from the recipient. On the
OSI model TCP works in transport layer. (Rouse, August)
ii. File Transfer Protocol (FTP). It is set of protocol ‘rules’ (TCP/IP) which
provide facilities that enable the user to upload and download files over
the server. FTP receives and sends data in an unscripted format
between the recipient and the sender, making them unsure and more
reverent for attacks. FTP works at Application Layer. (Margaret, 2015)
6
iii. Hyper Text Transfer Protocol Secure (HTTPS). It a protocol that
encrypts data/communication (sending data and receiving) over the
network. It operates at the Application layer. (Hoffman, 2018)
iv. ISDN (Integrated Services for Digital Network).It is a set of standard
for communication that ensures that, voices, videos etc. are transmitted
simultaneously over the internet. On the OSI model it operate in the
physical layer (Margaret, 2016).
v. AFP (Apple Talk Filling Protocol). It a client protocol of the Mac OS
file that permits users to access external system files. AFP offers
security features which ensure that user do not access into a certain
data. It operate at the Presentation Layer of the OSI model. (Techopedi,
2019)
vi. TLS (Transport Layer Security).It a protocol designed to encrypt
communication between applications. It works at the Session Layer.
(Kerravala, 2019)
vii. ARP (Address Resolution Protocol). It is a protocol, that resolves an
IP address to media address to be recognise in the LAN. It operates at
the network layer (Rouse, 2019)
a.
Reasons network need addressing
Addresses are very important in network component basically because to allow
devices to communicate over the network. For example, if there are two PCs on a
LAN (Local Area Network) and if PC1 want to send a request to PC2. The one
sending the request will use the IP address of the other network to locate it.
MAC ADDRESS
Task 2: Addressing.
Different between MAC address and an IP address.
7
 It is a physical unique address on the network. The address is
assigned to the NIC card by the manufacturer.It consists of 48-bit
hexadecimal which cannot be change or reset and has 48 bit layer 2
within LAN. (NETGEAR, 2018)
IP ADDRESS
 Internet Protocol address is dynamic address that is used to assign on
Local Area Network to defines the connection between different
computers on the same network. IP address is uniquely assigned via
Dynamic Host Configuration Protocol (DHCP). The administrator
assigns the IP addresses, and also be static. (IP Location Logo, 2018)
IPv4
 IPv4 has 32-bit address space.
 IPV4 are required to be able to reassemble a packet size of 576 bytes
(fragmentation optional).
 It has 4 division block.
IPv6
 With IPv6, it uses 128-bit address space.
 In IPv6 data fragmentation and reassembly are not handled by the
router. Fragmentation is performed at the destination host.
 It has 8 division blocks.
b.
Difference between a private IPv4 address and a public IPv4 address
Private IPv4 address
 Private IP is designed use unique IP number to allow two or more
computers to exchange data on LAN (Local Area Network)
network.Network devices, such as routers, use Network Address
Translation (NAT) to provide private IP addresses. Private IP address
cannot be connected to the internet directly. This provides security
area to the network. For instance, a network NAT device uses ISP to
Difference between IPv4 and IPv6
8
communicate with the Internet and check whether incoming data was
sent from the private IP computer assign to. If not, it will reject it. (IP
Location Logo, 2018)
Public IPv4 address
 A public IP address are required to be access the internet. For a device
to connect to the web, it must have a unique IP for it to be easily
locating the internet and allow other nodes and device to connect. It is
usually assigned to the web server, email server etc. (IP Location
Logo, 2018)
Private IP address ranges.
c. DHCP
DHCP
 It is a client/server protocol that automatically provides IP address to
devices on the LAN (Local Area Network) so that the device can
exchange data using IP.DHCP is generally used for the configuration of
device subnet mask, default gateway and DNS servers. It has been
defined by RFCs 2131 and 2132 as IETF (Internet Engineering Task
Force), based on Bootstrap Protocol (BOOTP). (Rouse M. ,
SearchNetworking, 2017)
Where DHCP is located and why it will be used.
 In the IT centre network, DHCP would be in the router that gives out
the LAN addresses to IP’s on the same subnet.
 In the remote office it can be used to configure the RRAS server to
allocate IP addresses to remote clients from a static range of IP
addresses, by relaying client to the DHCP server for address allocation
Class Address Range Subnet Mask
A 10.0.0.0 to
10.255.255.255
255.0.0.0
B 172.16.0.0 to
172.31.255.255
255.240.0.0
C 192.168.0.0 to
192.168.255.255
255.255.0.0
9
Why use DHCP?
 Efficiency. It is makes it easy when configuring than configuring each
node/host manually (statically).
 Simplicity. DHCP offers the capability to assign/manage several
parameters required on the network this include, subnet mask, default
gateway DNS servers etc.
d. ARP
ARP
Address Resolution Protocol (ARP). It a protocol that is used to
detect/discover the link layer address that is, MAC address.
Why is ARP needed?
ARP is needed because it enable computers to communicate using
Ethernet addresses. For instance, assuming there are two computers
within a network with IP address 1 and 5, and if computer with address
1 want to speak to computer with address 5. Both machine uses ARP
in order to communicate. Concerning IP routing, ARP identifies the
hardware address (MAC) of a host that is known from its IP address
and maintains a cache (table) where the MAC address is mapped to IP
addresses.
e. Default Gateway and Subnet Mask
A default gateway
 A default gateway provides access point or IP based computers uses to
transmit data to a device in another network/the internet. It is the exit point on
the local network that handles outgoing network connections.
10
Reasons Default gateway is required.
 Default gateway is needed because it helps IP enable device to share data to
each other outside the network (communication with the subnet). It has a local
network exit point that control outgoing network connections.
Subnet mark
 Subnet mark is used is used to determine one side of the address that the
network uses and another side that the host uses. It uses 32bite that mark up
the IP address. It is made of 0’s (network bit) and 1’s (host bit).
 Reasons why subnet mark is required are below:
I. To allow device different device to communicate to each other on the
network.
II. It offers security factors because it avoids devices such as computers
to communicating on other networks.
III. It helps to provide limitation to IP address on the network.
f. IP Routing Table
Routing table consist of rules which is in a form of table format that is used
to identify where data packet travels via the IP (internet protocol). IP
routing table is used by all enable IP devices. Routing table is made of IP
addresses on distinctive device that help to determines how to reach each
device on the same network. It is predefined patch, used to transmit
packets. On the routing table, router preforms a function as database that
keeps all the IP addresses of the linked computers. When a package
reaches to the router, it sends the package to where the it belongs using
the IP. (Rouse, Searchnetworking, 2007)
11
Task 3: Security
a. Measures to be taken to keep the network safe
a) Firewall filtering. I recommend that, firewall to be install to prevent
internal/external threats and other domestic behaviour.
12
b) Installingantivirus and anti-malware software. I recommend that this
software should be installed to avoid threat suchmalwares and
spywares and also to improve the device performance.
c) MAC addresses filtering. This will help to define and connect devices to
the network even if the password appears unknown.
d) Security access. It ensures that network component and applications
necessary for the work are accessible to users only.
e) Sub-netting. This will be good method to safeguard information
travelling from one section of the employee to another part since there
are logically divided.
f) VPN. Assigning to this will guarantee that our network are not tracked
and captured. VPN will tunnel our activities online via various servers
to ensure our sensitive information are safe.
g) Maintenance. In order to maintain a good working environment for the
business requires regular maintenance forhardware and software’s.
This should be carried out because of software containing flaws and
old hardware. Regular upgrade will add new security features to the
system.
b. Biggest threat
In my opinion, the greatest threat to the system is spyware and virus
because someone might affect the systems with spyware, to purposely
truck information over the internet. Someone who captures internal
business activity would be regarded as a significant problem. Spyware
can get access to all activities that occur over the network. For
example, spyware can edit/retype information transmitting to a
particular network, it can also redirects webpage and pop-up ads from
flood screen. Spyware can change user’s configuration and can send
viruses that can crash the system.
13
Task 4: Diagramand explanation
a.
s
14
b. IP address allocation table.
c. Hardware Components
- Firewall. Since there shouldn’t be any case of threat issues, this
will provide service that will help to remove every threat.
- Router. It will help to join different network component together,
and for the reason, it will be use to connect LAN with the
network.
- Sever. They hold document in the cloud. It offers service that
allow data and file to be exchange over the network. Therefore,
this will be adopted to allow files and other document to be sent
over the network
- During cabling lining, shielded twisted pair was used since we
want we went clear communication over the internet. unlike the
unshielded which is more prone to noise.
15
- Switches. It has a multi-port connection that connect different
devices. Switches was used since devices(router, computer,
server) need to communicate to each other.
d. Prices and specification of suitable hardware/ software
Devices Details Specification Price
PCs Toshiba C5d - CPU type. Intel i3
- Display graphic. HD
Graphics.
- RAM: 8GB.
- Storage: 512 HDD.
- Connectivity: Gigabit
Ethernet
£290.00
Server
used
Dell Edge
Power 30
- CPU: Intel Xon E3-125
v2.
- RAM: 50GB.
- Uses six SATA HDD.
- Connectivitytype: 10 x
USB ports, HDMI,
DisplayPort, VGA etc.
£ 495.00
Router NETGEAR
R800
Nigthawk X3
Tri-Band
A3200
- Speed (3.2 Gbps).
- 1 GHz dual core
processor.
- Handle 200 users
£149.99
Firewall Zyxel ZyWALL - More secure and have
upgrade Cloud
assistance.
£1,508.00
16
- Has average throughput
Gb Ports, 1x WAN, etc.
- Uses 10 concurrent Ipsec
VPN, encryption
supported.
- Capable to offer up to
550 Mbps firewall
throughput and 94 Mbps.
Switch TP-SG1005D - Gigabitport. £14.99
a. VPN would be more secure method incorporate in remote access into the
system. Public networks in a group, exchanges data in more secure way-
using VPN. VPN can be create using different types of protocol to
establish virtual point-to-point connections to tunnel the traffic.
Component required to build VPPN
 VPN client.This system is used with credentials, this will connect the main
server. VPN client will be configured on both computer and router.
 VPN server. The link port for the VPN client will be the VPN server. It operate
precisely like a router. The VPN will give private access to users over the
network.
Task 5 Remote access
17
 IAS Server. To proceed the task given, we will require ADIUS in order to build
VPN, this will authenticates people that connect to the network via the VPN.
 Firewall. Since the VPN will accept external connection (outside world).Users
has a direct access to the server. And for that reason, Firewall is required in
order to block users who are not supposed to be part in our network.
 Tunnelling Protocol.There are several examples of tunnelling protocol, such
as PPTP (Point-To-Point Tunnelling Protocol), L2TP (Layer 2 tunnelling
Protocol). PPTP has characteristics such as authentication, encryption etc.
Concerning L2TP, it does not offer authentication, encryptioncharacteristics.
On L2TP, it transmit packets within UDP datagram. (Rouse M. ,
www.searchnetworking.techtarget.com, 2017)
 IPsec. It is a protocol suite, which offer privacy and authenticate the data sent
through the network. IPsec have two sub protocols, that is, ESP and AH. AH
uses hash operation to cover up packets headers and other data packet.
IPsec has two modes of operation that are Transport Mode and Tunnel Mode.
Transport Mode encrypts data only, while both data and header are encrypted
in tunnel Mode (TM). (Geeksforgeeks, n.d)
 Google docs. This will not be a good way to share information over the
internet because the authority of the security can spread business data.
b. How Mobile devicecan influence the network security
If smart (mobile) devices have remote access to the organization network,
there would be an open port to hacker. If the system is less secure, the
more it will be attack and influence by hackers. If an inflected device
(phone) have remote access to the network, the device can transmit files
to the system, which can change the behaviour of the systems (failure).
c. security concerns relating to introducing Office 365
 Introducing office 360 will provide a service where document can
be access anywhere using the cloud. Concerning their security
factors. Also security can be strict meaning that not everyone will
have permission to access document. (Moran, 2015)
18
 As far as computer systems can damaged. using office 360 will
serve as a backup system which will safeguard all your crucial
data. (Moran,2015)
d. Benefits of using VoIP
 It serves as multi function. VoIP system helps to conduct
videoconferencing, call forwarding, call waiting, paging etc. Help
users to get in touch with each other by discussing important deals,
affairs, meetings etc. (Collins, 2019)
 Efficient and secure. VoIP is efficient and secure. It allow data/
communication to run smoothly over the network that save
business cost. Concerning about organization security, VoIP uses
standardized encryption protocols which is difficult to provide on
telephone connections. (Collins, 2019)
Bibliography
Bahl,M. (2018, April 14). Medium.RetrievedJuly10,2019, from www.medium.com:
https://medium.com/@madhavbahl10/osi-model-layers-explained-ee1d43058c1f
Christensson,P.(2014,February20). PC.net.RetrievedJuly17,2019, fromwww.pc.net.com:
https://pc.net/helpcenter/answers/difference_between_switch_and_router
Collins,T.(2019, n.d n.d). Atlantech.Retrievedfromwww.atlantech.net:
https://www.atlantech.net/blog/the-top-6-benefits-of-moving-to-a-voip-telephone-system
Geeksforgeeks.(n.d,n.dn.d). Geeksforgeeks.RetrievedJuly19,2019, fromwww.geeksforgeeks.org:
https://www.geeksforgeeks.org/computer-network-ip-security-ipsec/
Hoffman,C.(2018, October15). How-To Geek.RetrievedJuly10,2019, from www.howtogeek.com:
https://www.howtogeek.com/181767/htg-explains-what-is-https-and-why-should-i-care/
IP LocationLogo.(2018, November18). IP Location Logo.Retrievedfromwww.iplocation.net:
https://www.iplocation.net/public-vs-private-ip-address
Kerravala,Z.(2019, November09). Networkworld.RetrievedJuly10,2019, from
www.networkworld.com:https://www.networkworld.com/article/2303073/lan-wan-what-
is-transport-layer-security-protocol.html
19
Margaret. (2016, March n.d). Techtarge.RetrievedJuly10,2019, from
www.searchnetworking.techtarget.com:
https://searchnetworking.techtarget.com/definition/ISDN-Integrated-Services-Digital-
Network
Margaret, R. (2015, Julyn.d). Techtarget.RetrievedJuly10,2019, from
www.searchnetworking.techtarget.com:
https://searchnetworking.techtarget.com/definition/File-Transfer-Protocol-FTP
Mitchell,B.(2019, July14). Lifewire. RetrievedJuly17,2019, from www.lifewire.com:
https://www.lifewire.com/wireless-access-point-816545
Moran, M. (2015, September22). inkedin.RetrievedJuly10,2019, fromwww.linkedin.com:
https://www.linkedin.com/pulse/top-10-benefits-microsoft-office-365-michael-j-moran/
NETGEAR. (2018, October15). NETGEAR. RetrievedJuly19,2019, fromwww.kb.netgear.com/:
https://kb.netgear.com/1005/How-do-I-find-my-device-s-MAC-address
Rouse.(2007, April n.d). Searchnetworking.RetrievedJuly10,2019, from
www.searchnetworking.techtarget.com:
https://searchnetworking.techtarget.com/archive/2007/4
Rouse.(2019, Julyn.d). Techtarge.RetrievedJuly10,2019, from
www.searchnetworking.techtarget.com:
https://searchnetworking.techtarget.com/definition/Address-Resolution-Protocol-ARP
Rouse,M. (2017, Julyn.d). SearchNetworking.RetrievedJuly19,2019, from
www.searchnetworking.techtarget.com:
https://searchnetworking.techtarget.com/definition/DHCP
Rouse,M. (2017, May n.d). www.searchnetworking.techtarget.com.RetrievedJuly19,2019, from
SearchNetworking:https://searchnetworking.techtarget.com/definition/tunneling-or-port-
forwarding
Rouse,M. (August,n.d14). Techtarget.RetrievedJuly10,2019, from
www.searchnetworking.techtarget.com:
https://searchnetworking.techtarget.com/definition/TCP
Techopedi.(2019). Techopedi.RetrievedJuly10,2019, fromwww.techopedia.com:
https://www.techopedia.com/definition/25674/appletalk-filing-protocol-afp

More Related Content

What's hot

Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing marwan aldulaimy
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Modelfarhan516
 
Networking
NetworkingNetworking
NetworkingRashmi
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IPMannu Khani
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )AAKASH S
 
Internet protocol concepts and overview
Internet protocol concepts and overviewInternet protocol concepts and overview
Internet protocol concepts and overviewAGhaKhan01
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALASaikiran Panjala
 
Network essentials chapter 4
Network essentials  chapter 4Network essentials  chapter 4
Network essentials chapter 4Raghu nath
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP modelRubal Sagwal
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORTRajat Kumar
 
Protocol
ProtocolProtocol
ProtocolShi Na
 
Network protocols
Network protocolsNetwork protocols
Network protocolsHemnath R.
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPMukesh Chinta
 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference ModelJohnson Ubah
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 

What's hot (20)

Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
 
Networking
NetworkingNetworking
Networking
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
Internet protocol concepts and overview
Internet protocol concepts and overviewInternet protocol concepts and overview
Internet protocol concepts and overview
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
 
Mcse notes
Mcse notesMcse notes
Mcse notes
 
Network essentials chapter 4
Network essentials  chapter 4Network essentials  chapter 4
Network essentials chapter 4
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORT
 
OSI 7 Layer Model
OSI 7 Layer ModelOSI 7 Layer Model
OSI 7 Layer Model
 
Protocol
ProtocolProtocol
Protocol
 
CCNA
CCNACCNA
CCNA
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference Model
 
53426980 tcp-ip
53426980 tcp-ip53426980 tcp-ip
53426980 tcp-ip
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 

Similar to Emmanuel impraim computer networks

Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingMohsen Sarakbi
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer ) dimuthu22
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment David Parker
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxgadisaAdamu
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modifiedrajesh531
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1ahmady
 
Network File System Version 4.2
Network File System Version 4.2Network File System Version 4.2
Network File System Version 4.2Nicole Gomez
 
Network Reference Model (Computer Networks) - Cybernetics Robo Academy
Network Reference Model  (Computer Networks) - Cybernetics Robo AcademyNetwork Reference Model  (Computer Networks) - Cybernetics Robo Academy
Network Reference Model (Computer Networks) - Cybernetics Robo AcademyTutulAhmed3
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3Raghu nath
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi modelNaiyan Noor
 
Questions On Protocol And Protocol
Questions On Protocol And ProtocolQuestions On Protocol And Protocol
Questions On Protocol And ProtocolMonique Jones
 

Similar to Emmanuel impraim computer networks (20)

7 layer OSI model
7 layer OSI model7 layer OSI model
7 layer OSI model
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer )
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modified
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
 
Avani
AvaniAvani
Avani
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
 
Network File System Version 4.2
Network File System Version 4.2Network File System Version 4.2
Network File System Version 4.2
 
Network Reference Model (Computer Networks) - Cybernetics Robo Academy
Network Reference Model  (Computer Networks) - Cybernetics Robo AcademyNetwork Reference Model  (Computer Networks) - Cybernetics Robo Academy
Network Reference Model (Computer Networks) - Cybernetics Robo Academy
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Basics of Computer Networks
Basics of Computer NetworksBasics of Computer Networks
Basics of Computer Networks
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi model
 
Learn basics of ip addressing
Learn basics of  ip addressingLearn basics of  ip addressing
Learn basics of ip addressing
 
Questions On Protocol And Protocol
Questions On Protocol And ProtocolQuestions On Protocol And Protocol
Questions On Protocol And Protocol
 

Recently uploaded

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 

Emmanuel impraim computer networks

  • 1. 1 Contents Task 1: Network Infrastructure and Protocols ……………………………………………… Error! Bookmark not defined. Task 2: Addressing……………………………………………………………………………………………………………..6 Task 3: Security ………………………………………………………………………………….11 Task 4: Diagram and explanation …………………………………………………………….13 Task 5: Remote access …………………………………………………………………………16
  • 2. 2 A) Different between newer versions of Ethernet, and Wi-Fi and a recommendation about the technology the company should use. Criteria Fast Ethernet(1 00base-TX) Gigabit Ethernet(1 000BASE- T) 10 Gigabit Ethernet(10 base-T) WI-FI 10base T Cable type It uses 5e (fiber optic and UTP cable) It uses 5e (fiber optic cable) It is based (it uses concerning cable type) on cat 6a cat 6 (fiber optic) It uses wireless system. It uses cat 5 UPP for cabling Data rate Delivers 100 megabit per seconds Delivers 1 gigabit per seconds Delivers 10 gigabit per seconds It delivers speeds range from 433 Mbps (megabits per second) up to several gigabits per seconds Delivers 10 megabit per seconds Network contention It has lower speed than the higher categories The Internet is a bottleneck, faster cables won't help. The Internet is a bottleneck, faster cables won't help. Has interference (‘signal interference ’) which ca e use to connect smart phone, tablet etc. has high electrical interference Recommendation I advise to keep the network in the company as wired because WIFI has more high interference and less secure. COMPUTER NETWORKS Task 1: Network Infrastructure and Protocols
  • 3. 3 Concerning their smart device, I recommend that the company should have a separate wireless network as a guest. The most essential aspect of the LAN network is that, their network would be more convenient if they upgrade to cat 5e version of the Ethernet. B) Below Differentiate between physical network device on the network. On where it operate on the OSI model. A Hub It a physical network device that has multiple ports to connect different device on the internal network. Hubs are not intelligent as compare to other network swishes because it does not have any intelligent as to where a data packet supposed to be send. For instance, when a packet arrives at one of it port. It will send to all other port. Hub works at layer 1. That is, physical layer of the OSI model that actas transmission of data. A SWITCH It is a network device with multiple port connections, that accept internal connections from devices (network devices) such as PCs, servers etc. unlike a hubs, which are not smart. A switch actually learns the physical addresses (that is, MAC address) which will be connected to it. So when a data packet arrives it its port, it only direct to the intended destination port. Switch works at layer 2, to process/forward data. (“Data link layer”). (Christensson, 2014) Wireless Access Point It is a physical network device used to establish a wired-to-wireless connection. Wireless access point operate at the layer 2 (“Physical layer”) of the OSI model for the transmission of packet between nodes. (Mitchell, 2019) Routers
  • 4. 4 They are physical networks devices on the network, that enable several network devices to be exchange information based on their IP address. Router makes the wireless device to access LAN network. Routers are very intelligent because when it receives packets, it checks the IP address on the device, and forward it to the intended destination. Router works at the network layer (“layer 3”) of the OSI model managing the network. (Mitchell, 2019) C) Purpose of the OSI model. Application layer (layer 7)  It provides services for network application such as Firefox Chrome etc to exchange data over the network that enable the user to interact with the application. (Bahl, 2018) Presentation layer (layer 6)  It receives data from application layer. This data is in a form of characters/numbers, so the application layer converts these numbers to the understanding of machine such as 0s/1s. Presentation layer reduces the size of the data before it transmitted to its original size (“data compression”). These help data to be transmitted in a very high speed. Also presentation layer handles encryption and decryption. (Bahl, 2018) Session layer (layer 5)  It is a layer that deals with communication. Session layer helps in managing connections enabling sending and receiving data and also termination of session. Session layer provides session support such as NETBIOS (“Network Basic Input/output System”) which allows application on different computers to communicate to each other, Apple Talk Session Protocol (ASP) etc. (Bahl, 2018) Transport layer (layer 4).  This is to ensure successful data is delivered includes checking for errors and lost/duplicated frames. On the internet, it offers traffic control and message recognition, such as TCP
  • 5. 5 (Transmission Control Protocol), UDB (User Datagram Protocol) etc. (Moran, 2015) Network layer (layer 3).  This layer is where routers operate. It is in charge of managing the logical address and controls how the subnet operates. These help packets to be delivered to their intended destination. Internet Protocol (IP) is one the example. (Bahl, 2018) Data link layer (layer 2).  It provide means of transferring data from one computer to another via local media such as optical Fibber, LAN cable, Air etc. It handles traffic control links and terminates frames, etc. ATM, ARP, FDDI etc. are example protocols. (Bahl, 2018) Physical layer (layer 1)  This layer is where willing occurs. Physical stuffs that connect computers together. It covers verity of medium devices including repeaters, connectors, cabling etc. (Bahl, 2018) D) Purpose of SEVEN (7) protocols. i. TCP abbreviation stand for Transmission Control Protocol. It’s a “connection-oriented protocol” which guarantees available data transfer, when it detects data segment drops in a network, the lost/dropped network will be transmitted. Therefore, sender will determine the success of transmission following the acceptance of the segment it receives on the basis of an acknowledgement from the recipient. On the OSI model TCP works in transport layer. (Rouse, August) ii. File Transfer Protocol (FTP). It is set of protocol ‘rules’ (TCP/IP) which provide facilities that enable the user to upload and download files over the server. FTP receives and sends data in an unscripted format between the recipient and the sender, making them unsure and more reverent for attacks. FTP works at Application Layer. (Margaret, 2015)
  • 6. 6 iii. Hyper Text Transfer Protocol Secure (HTTPS). It a protocol that encrypts data/communication (sending data and receiving) over the network. It operates at the Application layer. (Hoffman, 2018) iv. ISDN (Integrated Services for Digital Network).It is a set of standard for communication that ensures that, voices, videos etc. are transmitted simultaneously over the internet. On the OSI model it operate in the physical layer (Margaret, 2016). v. AFP (Apple Talk Filling Protocol). It a client protocol of the Mac OS file that permits users to access external system files. AFP offers security features which ensure that user do not access into a certain data. It operate at the Presentation Layer of the OSI model. (Techopedi, 2019) vi. TLS (Transport Layer Security).It a protocol designed to encrypt communication between applications. It works at the Session Layer. (Kerravala, 2019) vii. ARP (Address Resolution Protocol). It is a protocol, that resolves an IP address to media address to be recognise in the LAN. It operates at the network layer (Rouse, 2019) a. Reasons network need addressing Addresses are very important in network component basically because to allow devices to communicate over the network. For example, if there are two PCs on a LAN (Local Area Network) and if PC1 want to send a request to PC2. The one sending the request will use the IP address of the other network to locate it. MAC ADDRESS Task 2: Addressing. Different between MAC address and an IP address.
  • 7. 7  It is a physical unique address on the network. The address is assigned to the NIC card by the manufacturer.It consists of 48-bit hexadecimal which cannot be change or reset and has 48 bit layer 2 within LAN. (NETGEAR, 2018) IP ADDRESS  Internet Protocol address is dynamic address that is used to assign on Local Area Network to defines the connection between different computers on the same network. IP address is uniquely assigned via Dynamic Host Configuration Protocol (DHCP). The administrator assigns the IP addresses, and also be static. (IP Location Logo, 2018) IPv4  IPv4 has 32-bit address space.  IPV4 are required to be able to reassemble a packet size of 576 bytes (fragmentation optional).  It has 4 division block. IPv6  With IPv6, it uses 128-bit address space.  In IPv6 data fragmentation and reassembly are not handled by the router. Fragmentation is performed at the destination host.  It has 8 division blocks. b. Difference between a private IPv4 address and a public IPv4 address Private IPv4 address  Private IP is designed use unique IP number to allow two or more computers to exchange data on LAN (Local Area Network) network.Network devices, such as routers, use Network Address Translation (NAT) to provide private IP addresses. Private IP address cannot be connected to the internet directly. This provides security area to the network. For instance, a network NAT device uses ISP to Difference between IPv4 and IPv6
  • 8. 8 communicate with the Internet and check whether incoming data was sent from the private IP computer assign to. If not, it will reject it. (IP Location Logo, 2018) Public IPv4 address  A public IP address are required to be access the internet. For a device to connect to the web, it must have a unique IP for it to be easily locating the internet and allow other nodes and device to connect. It is usually assigned to the web server, email server etc. (IP Location Logo, 2018) Private IP address ranges. c. DHCP DHCP  It is a client/server protocol that automatically provides IP address to devices on the LAN (Local Area Network) so that the device can exchange data using IP.DHCP is generally used for the configuration of device subnet mask, default gateway and DNS servers. It has been defined by RFCs 2131 and 2132 as IETF (Internet Engineering Task Force), based on Bootstrap Protocol (BOOTP). (Rouse M. , SearchNetworking, 2017) Where DHCP is located and why it will be used.  In the IT centre network, DHCP would be in the router that gives out the LAN addresses to IP’s on the same subnet.  In the remote office it can be used to configure the RRAS server to allocate IP addresses to remote clients from a static range of IP addresses, by relaying client to the DHCP server for address allocation Class Address Range Subnet Mask A 10.0.0.0 to 10.255.255.255 255.0.0.0 B 172.16.0.0 to 172.31.255.255 255.240.0.0 C 192.168.0.0 to 192.168.255.255 255.255.0.0
  • 9. 9 Why use DHCP?  Efficiency. It is makes it easy when configuring than configuring each node/host manually (statically).  Simplicity. DHCP offers the capability to assign/manage several parameters required on the network this include, subnet mask, default gateway DNS servers etc. d. ARP ARP Address Resolution Protocol (ARP). It a protocol that is used to detect/discover the link layer address that is, MAC address. Why is ARP needed? ARP is needed because it enable computers to communicate using Ethernet addresses. For instance, assuming there are two computers within a network with IP address 1 and 5, and if computer with address 1 want to speak to computer with address 5. Both machine uses ARP in order to communicate. Concerning IP routing, ARP identifies the hardware address (MAC) of a host that is known from its IP address and maintains a cache (table) where the MAC address is mapped to IP addresses. e. Default Gateway and Subnet Mask A default gateway  A default gateway provides access point or IP based computers uses to transmit data to a device in another network/the internet. It is the exit point on the local network that handles outgoing network connections.
  • 10. 10 Reasons Default gateway is required.  Default gateway is needed because it helps IP enable device to share data to each other outside the network (communication with the subnet). It has a local network exit point that control outgoing network connections. Subnet mark  Subnet mark is used is used to determine one side of the address that the network uses and another side that the host uses. It uses 32bite that mark up the IP address. It is made of 0’s (network bit) and 1’s (host bit).  Reasons why subnet mark is required are below: I. To allow device different device to communicate to each other on the network. II. It offers security factors because it avoids devices such as computers to communicating on other networks. III. It helps to provide limitation to IP address on the network. f. IP Routing Table Routing table consist of rules which is in a form of table format that is used to identify where data packet travels via the IP (internet protocol). IP routing table is used by all enable IP devices. Routing table is made of IP addresses on distinctive device that help to determines how to reach each device on the same network. It is predefined patch, used to transmit packets. On the routing table, router preforms a function as database that keeps all the IP addresses of the linked computers. When a package reaches to the router, it sends the package to where the it belongs using the IP. (Rouse, Searchnetworking, 2007)
  • 11. 11 Task 3: Security a. Measures to be taken to keep the network safe a) Firewall filtering. I recommend that, firewall to be install to prevent internal/external threats and other domestic behaviour.
  • 12. 12 b) Installingantivirus and anti-malware software. I recommend that this software should be installed to avoid threat suchmalwares and spywares and also to improve the device performance. c) MAC addresses filtering. This will help to define and connect devices to the network even if the password appears unknown. d) Security access. It ensures that network component and applications necessary for the work are accessible to users only. e) Sub-netting. This will be good method to safeguard information travelling from one section of the employee to another part since there are logically divided. f) VPN. Assigning to this will guarantee that our network are not tracked and captured. VPN will tunnel our activities online via various servers to ensure our sensitive information are safe. g) Maintenance. In order to maintain a good working environment for the business requires regular maintenance forhardware and software’s. This should be carried out because of software containing flaws and old hardware. Regular upgrade will add new security features to the system. b. Biggest threat In my opinion, the greatest threat to the system is spyware and virus because someone might affect the systems with spyware, to purposely truck information over the internet. Someone who captures internal business activity would be regarded as a significant problem. Spyware can get access to all activities that occur over the network. For example, spyware can edit/retype information transmitting to a particular network, it can also redirects webpage and pop-up ads from flood screen. Spyware can change user’s configuration and can send viruses that can crash the system.
  • 13. 13 Task 4: Diagramand explanation a. s
  • 14. 14 b. IP address allocation table. c. Hardware Components - Firewall. Since there shouldn’t be any case of threat issues, this will provide service that will help to remove every threat. - Router. It will help to join different network component together, and for the reason, it will be use to connect LAN with the network. - Sever. They hold document in the cloud. It offers service that allow data and file to be exchange over the network. Therefore, this will be adopted to allow files and other document to be sent over the network - During cabling lining, shielded twisted pair was used since we want we went clear communication over the internet. unlike the unshielded which is more prone to noise.
  • 15. 15 - Switches. It has a multi-port connection that connect different devices. Switches was used since devices(router, computer, server) need to communicate to each other. d. Prices and specification of suitable hardware/ software Devices Details Specification Price PCs Toshiba C5d - CPU type. Intel i3 - Display graphic. HD Graphics. - RAM: 8GB. - Storage: 512 HDD. - Connectivity: Gigabit Ethernet £290.00 Server used Dell Edge Power 30 - CPU: Intel Xon E3-125 v2. - RAM: 50GB. - Uses six SATA HDD. - Connectivitytype: 10 x USB ports, HDMI, DisplayPort, VGA etc. £ 495.00 Router NETGEAR R800 Nigthawk X3 Tri-Band A3200 - Speed (3.2 Gbps). - 1 GHz dual core processor. - Handle 200 users £149.99 Firewall Zyxel ZyWALL - More secure and have upgrade Cloud assistance. £1,508.00
  • 16. 16 - Has average throughput Gb Ports, 1x WAN, etc. - Uses 10 concurrent Ipsec VPN, encryption supported. - Capable to offer up to 550 Mbps firewall throughput and 94 Mbps. Switch TP-SG1005D - Gigabitport. £14.99 a. VPN would be more secure method incorporate in remote access into the system. Public networks in a group, exchanges data in more secure way- using VPN. VPN can be create using different types of protocol to establish virtual point-to-point connections to tunnel the traffic. Component required to build VPPN  VPN client.This system is used with credentials, this will connect the main server. VPN client will be configured on both computer and router.  VPN server. The link port for the VPN client will be the VPN server. It operate precisely like a router. The VPN will give private access to users over the network. Task 5 Remote access
  • 17. 17  IAS Server. To proceed the task given, we will require ADIUS in order to build VPN, this will authenticates people that connect to the network via the VPN.  Firewall. Since the VPN will accept external connection (outside world).Users has a direct access to the server. And for that reason, Firewall is required in order to block users who are not supposed to be part in our network.  Tunnelling Protocol.There are several examples of tunnelling protocol, such as PPTP (Point-To-Point Tunnelling Protocol), L2TP (Layer 2 tunnelling Protocol). PPTP has characteristics such as authentication, encryption etc. Concerning L2TP, it does not offer authentication, encryptioncharacteristics. On L2TP, it transmit packets within UDP datagram. (Rouse M. , www.searchnetworking.techtarget.com, 2017)  IPsec. It is a protocol suite, which offer privacy and authenticate the data sent through the network. IPsec have two sub protocols, that is, ESP and AH. AH uses hash operation to cover up packets headers and other data packet. IPsec has two modes of operation that are Transport Mode and Tunnel Mode. Transport Mode encrypts data only, while both data and header are encrypted in tunnel Mode (TM). (Geeksforgeeks, n.d)  Google docs. This will not be a good way to share information over the internet because the authority of the security can spread business data. b. How Mobile devicecan influence the network security If smart (mobile) devices have remote access to the organization network, there would be an open port to hacker. If the system is less secure, the more it will be attack and influence by hackers. If an inflected device (phone) have remote access to the network, the device can transmit files to the system, which can change the behaviour of the systems (failure). c. security concerns relating to introducing Office 365  Introducing office 360 will provide a service where document can be access anywhere using the cloud. Concerning their security factors. Also security can be strict meaning that not everyone will have permission to access document. (Moran, 2015)
  • 18. 18  As far as computer systems can damaged. using office 360 will serve as a backup system which will safeguard all your crucial data. (Moran,2015) d. Benefits of using VoIP  It serves as multi function. VoIP system helps to conduct videoconferencing, call forwarding, call waiting, paging etc. Help users to get in touch with each other by discussing important deals, affairs, meetings etc. (Collins, 2019)  Efficient and secure. VoIP is efficient and secure. It allow data/ communication to run smoothly over the network that save business cost. Concerning about organization security, VoIP uses standardized encryption protocols which is difficult to provide on telephone connections. (Collins, 2019) Bibliography Bahl,M. (2018, April 14). Medium.RetrievedJuly10,2019, from www.medium.com: https://medium.com/@madhavbahl10/osi-model-layers-explained-ee1d43058c1f Christensson,P.(2014,February20). PC.net.RetrievedJuly17,2019, fromwww.pc.net.com: https://pc.net/helpcenter/answers/difference_between_switch_and_router Collins,T.(2019, n.d n.d). Atlantech.Retrievedfromwww.atlantech.net: https://www.atlantech.net/blog/the-top-6-benefits-of-moving-to-a-voip-telephone-system Geeksforgeeks.(n.d,n.dn.d). Geeksforgeeks.RetrievedJuly19,2019, fromwww.geeksforgeeks.org: https://www.geeksforgeeks.org/computer-network-ip-security-ipsec/ Hoffman,C.(2018, October15). How-To Geek.RetrievedJuly10,2019, from www.howtogeek.com: https://www.howtogeek.com/181767/htg-explains-what-is-https-and-why-should-i-care/ IP LocationLogo.(2018, November18). IP Location Logo.Retrievedfromwww.iplocation.net: https://www.iplocation.net/public-vs-private-ip-address Kerravala,Z.(2019, November09). Networkworld.RetrievedJuly10,2019, from www.networkworld.com:https://www.networkworld.com/article/2303073/lan-wan-what- is-transport-layer-security-protocol.html
  • 19. 19 Margaret. (2016, March n.d). Techtarge.RetrievedJuly10,2019, from www.searchnetworking.techtarget.com: https://searchnetworking.techtarget.com/definition/ISDN-Integrated-Services-Digital- Network Margaret, R. (2015, Julyn.d). Techtarget.RetrievedJuly10,2019, from www.searchnetworking.techtarget.com: https://searchnetworking.techtarget.com/definition/File-Transfer-Protocol-FTP Mitchell,B.(2019, July14). Lifewire. RetrievedJuly17,2019, from www.lifewire.com: https://www.lifewire.com/wireless-access-point-816545 Moran, M. (2015, September22). inkedin.RetrievedJuly10,2019, fromwww.linkedin.com: https://www.linkedin.com/pulse/top-10-benefits-microsoft-office-365-michael-j-moran/ NETGEAR. (2018, October15). NETGEAR. RetrievedJuly19,2019, fromwww.kb.netgear.com/: https://kb.netgear.com/1005/How-do-I-find-my-device-s-MAC-address Rouse.(2007, April n.d). Searchnetworking.RetrievedJuly10,2019, from www.searchnetworking.techtarget.com: https://searchnetworking.techtarget.com/archive/2007/4 Rouse.(2019, Julyn.d). Techtarge.RetrievedJuly10,2019, from www.searchnetworking.techtarget.com: https://searchnetworking.techtarget.com/definition/Address-Resolution-Protocol-ARP Rouse,M. (2017, Julyn.d). SearchNetworking.RetrievedJuly19,2019, from www.searchnetworking.techtarget.com: https://searchnetworking.techtarget.com/definition/DHCP Rouse,M. (2017, May n.d). www.searchnetworking.techtarget.com.RetrievedJuly19,2019, from SearchNetworking:https://searchnetworking.techtarget.com/definition/tunneling-or-port- forwarding Rouse,M. (August,n.d14). Techtarget.RetrievedJuly10,2019, from www.searchnetworking.techtarget.com: https://searchnetworking.techtarget.com/definition/TCP Techopedi.(2019). Techopedi.RetrievedJuly10,2019, fromwww.techopedia.com: https://www.techopedia.com/definition/25674/appletalk-filing-protocol-afp