Task 1: Network Infrastructure and Protocols
Task 1: Network Infrastructure and Protocols
a)
Ethernet Cable:
The business need the high data transfer rate Cat7 cable can be used in the business as it
supports up to 1.2gbps which is enough for business work. It also support telephone
connection. The 802.11n and 802.11ac WI-FI can use as they have good rate and backward
Compatibility and can used for old device too.
b) Networking component:
Hub: It is a networking components which is used connect Computer networks (local area
network).
Switch: It a device which is used to connect devices like, server, router, networking printer and
other devices (electronic).
Wireless access point: It helps in connecting wireless device by using Wi-Fi.
Router: It is a networking device which help in sharing packets from one devices to another
devices.
1. Physical (Layer 1): The purpose of the layer is that it covers different type of devices,
among the devices connectors, cabling, receivers, repeaters and transceivers. With the
help of radio waves it covers the stream throughout the networks.
2. Data-link (Layer 2): The purpose of this layer is that it link (set up) with the physical
network by keeping packet into frames of network. As it has two sub-layers.
3. Network (Layer 3): Its purpose is that it manage the addressing and routing the sending
of data in correct place to correct destination and receiving it in level packet. Its IP is
internet.
4. Transport (Layer 4): The purpose of this layer is that it help in managing packet of data,
then delivering the packet with checking of the errors of data. TCP and UDP has the
same service as well.
5. Session (Layer 5): The purpose of this layer is that it provide services which includes
reconnection and authentication. It also conversation, terminates and coordinates while
setting up.
6. Presentation (Layer 6): The purpose of this layer is that, from one format to next it covert
the data of incoming and outgoing.
7. Application (Layer 7): The purpose of this layer is that it identified the partner’s
communication.
d) Seven protocol are been described as below:
Protocol is defined as rule or the guidelines for the data communication. We can say it is the
simple rile of conversation. Different protocols can be used in variety of conversations.
The seven protocols and the layer which they operates are as follow:
a.
Network components are important in addressing. Addressing are manage in such a
way that without it network component cannot be assessed or run. It helps to search
path for network. Network component has usually its own address where data,
information or files can be transfer in the required devices. For routing, network
component show have specific address. IP and MAC address are known addressing.
IPv4 IPv6
They are 32-bit length They are 128 bit length
It is represented in decimals It is represented in hexadecimals
Static or dynamic addressing is required Auto-configuration of address is available.
to configure IPv4 address
Packet flow identification is not available Packet flow identification is available.
b.
Private and public IPv4 address difference:
Private IP Public IP
It is used with the LAN or with It is used in public network
organization
It doesn’t recognized in internet It is recognized in internet
Administration can only provide Servicer provider can only given
IT is free It is payed to service provider
The IP is not registered It is registered
We can used both public and private IPv4 as both are same but difference is that one is
provided by administration and other is provided by services. We can use anything in
public as it is given to public used but not in private as it is secured and given the
permission for administration wish.
c.
DHCP stands for Dynamic Host Configuration Protocol which is used to configure DNS,
subnet mask and default gateway on the devices. It supports dynamic and static IP
address. The network ranging size of DHCP home to campus networks and regional ISP
networks.
d.
ARP (Address Resolution Protocol): ARP is IP layer of TCP/IP protocol stack and
required TCP standard for control of media. It is also defined as resolution of network
layer address into link layer address.
ARP control address of remote traffic: For its destination ARP forward the IP
datagrams to router. Below diagram shows how to hosts on different network
with its IP is connected by the help of router.
e. Default Gateway and Subnet Mask
Default gateway: It is a networking node which is used to the forward packets on the
network.
Reasons:
As the schools and organizations need default gateway to work. Default gateway
allows the network communication with the subnet as it is the IP address of
devices.
Subnet mask has many different information which provided by IP address on
default gateway.
By performing operation subnet mask identify the network and IP address on
default gateway.
f. IP routing table
TASK 3: Security
a. Network secure
Following hardware, software, policies are used to keep network security more safe or
secure.
Firewall: Firewall helps to secure external (outside) computer to control the devices or
hack. It is very important to computer networks and software as it secure the most. To
check destination and source in broadband routers, firewall hardware is used as stand-
alone products and it is used in filtering packets. Schools network choose firewall for the
security of computer networks and software.
VPN (Virtual Private Network): It is a private network which allow to use public
communication rather lines to communicate. As schools and other organization support
VPN to control the access of the networks. With the help of VPN, networks will be
secured with outside users and the data will be also secure.
Fingerprint: Fingerprint can save our data in protection as it is locked with biometric
method. It can be used in electronic and computer devices. School and organization
support and keeps the fingerprint for the staff. With the help of fingerprint head officer
can know the presence and absent of the staff.
Fig: Fingerprint
Port scanner: It is software application which is designed to the ports (open) and used
by administration network to test. It is used to scan ports and fix the problems.
Service Auditing: It is a process which discovers what services are running on the
server. This can helps in configuring firewall settings.
b. Threat of system
I think Dropbox is the biggest threat of the system. Dropbox helps in storing data and
information of people. The share system of Dropbox is weak and they might bring effect.
Dropbox is perfect for normal user especially but not fir big companies or organization. It
can cause many problem in securing of data. The download link and pages are public so
everyone can assess without owner permission. So I think Dropbox is the biggest
threat for this system.
TASK 4: Diagram and explanation
c. Hardware components
I have choose the hardware component because as the components uses star topology
to connect the devices. To connect the internet access main server is required and keep
data like database. For the local area network Hub is required and topology (star
topology) is connected in switch. PC, laptops, network printer, mobiles are connected
from sub-divided switches.
I used star topology because it is easier and data transmission is also faster than other
topology. All the devices get internet access to control and share files from network
communication.
Wireless router: I used D-link router as it is fast than other. Its model is DIR-655
and it cost around 65$-70$. Its specification is that it has max speed 1 GB and
doesn’t weaken signal while pass through other objects
Switch: I used D-link switch. Its model number is DGS-11240 and cost around $
%.98$. Its specification is that many devices can be link up and increase the
network on individual
Access point: I recommended Cisco as it is lower in price which cost around 70$.
The specification of cisco is that it uses wireless communication
Server: The device I used is Sentinel. It is costly around 900$. Its specification is
that it is used in storing network communication and data.
Desktop computer casing: I used ASUS. It cost around 755-800$. The
specification of this device is that to keep or maintain files mail and to provide
information to client computer.
Laptop: I used acer as it cost around 219,15$ and it is used for easy networking
vice versa
Network printer: I used Epson as it cost almost 80$ and has the specification to
print in color also in scanner.
Mobile: I uses SAMSUNG Note8 as it popular mobile and cost around 225$ and
its specification is that it is used for communication of mobiles.