0% found this document useful (0 votes)
91 views13 pages

Task 1: Network Infrastructure and Protocols

This document discusses network infrastructure and protocols. It provides information on Wi-Fi standards such as 802.11a/b/g/n/ac and their data rates and ranges. It also discusses Ethernet cable categories like Cat5e, Cat6, Cat6a etc and their supported data rates. The document recommends using 802.11n or 802.11ac Wi-Fi and Cat7 cables for business networks. It also describes networking components like hubs, switches, wireless access points and routers along with the OSI layers they operate on. The seven OSI layers and common protocols for each layer are defined as well. Network addressing schemes like IP addresses, MAC addresses, private vs public IP ranges are explained
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views13 pages

Task 1: Network Infrastructure and Protocols

This document discusses network infrastructure and protocols. It provides information on Wi-Fi standards such as 802.11a/b/g/n/ac and their data rates and ranges. It also discusses Ethernet cable categories like Cat5e, Cat6, Cat6a etc and their supported data rates. The document recommends using 802.11n or 802.11ac Wi-Fi and Cat7 cables for business networks. It also describes networking components like hubs, switches, wireless access points and routers along with the OSI layers they operate on. The seven OSI layers and common protocols for each layer are defined as well. Network addressing schemes like IP addresses, MAC addresses, private vs public IP ranges are explained
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Task 1: Network Infrastructure and Protocols

a)

WI-FI Frequency Data rate Range Backward


Standard Compatibility
802.11a 5 GHz 54mbps 35m-120m No
802.11b 2.4 GHz 11mbps 35m-140m No
802.11g 2.4 GHz 54mbps 38m-140m No
802.11n 2.4 GHz and 5 600mbps 70m-250m With a, b and g
GHz
802.11ac 2.4 GHz and 5 1.3gbps 35m With b, g and n
GHz
802.11ad 5 GHz 7000mbps 60m-100m With ac

Ethernet Cable:

Cable Data rate Frequency Connection Telephone line


Type
Cat 5e 1.2mbps 360 MHz RJ45 Supported
Cat 6 1gbps 500 MHz RJ45 8P8C Supported
Cat 6a 1gbps 560 MHz RJ45 Supported
Cat 6e 1gbps 600 MHz Rj45 Not Supported
Cat 7 1.2gbps 750 MHz GG45 Not Supported

The business need the high data transfer rate Cat7 cable can be used in the business as it
supports up to 1.2gbps which is enough for business work. It also support telephone
connection. The 802.11n and 802.11ac WI-FI can use as they have good rate and backward
Compatibility and can used for old device too.

b) Networking component:

Hub: It is a networking components which is used connect Computer networks (local area
network).
Switch: It a device which is used to connect devices like, server, router, networking printer and
other devices (electronic).
Wireless access point: It helps in connecting wireless device by using Wi-Fi.
Router: It is a networking device which help in sharing packets from one devices to another
devices.

Networking Components OSI layer


Hub It is operated at physical layer (Layer 1) for
transmission of data
Switch It is operated at data link layer (Layer 2) for
processing and data forward
Wireless access point It is operated at data link layer (Layer 2) for
transferring of data in connecting by the
physical layers of nodes.
Router It is operated at application layer (Layer 7) for
the management of the networks.

c) Seven OSI layer are as follow:

1. Physical (Layer 1): The purpose of the layer is that it covers different type of devices,
among the devices connectors, cabling, receivers, repeaters and transceivers. With the
help of radio waves it covers the stream throughout the networks.

2. Data-link (Layer 2): The purpose of this layer is that it link (set up) with the physical
network by keeping packet into frames of network. As it has two sub-layers.

3. Network (Layer 3): Its purpose is that it manage the addressing and routing the sending
of data in correct place to correct destination and receiving it in level packet. Its IP is
internet.

4. Transport (Layer 4): The purpose of this layer is that it help in managing packet of data,
then delivering the packet with checking of the errors of data. TCP and UDP has the
same service as well.

5. Session (Layer 5): The purpose of this layer is that it provide services which includes
reconnection and authentication. It also conversation, terminates and coordinates while
setting up.

6. Presentation (Layer 6): The purpose of this layer is that, from one format to next it covert
the data of incoming and outgoing.

7. Application (Layer 7): The purpose of this layer is that it identified the partner’s
communication.
d) Seven protocol are been described as below:

Protocol is defined as rule or the guidelines for the data communication. We can say it is the
simple rile of conversation. Different protocols can be used in variety of conversations.
The seven protocols and the layer which they operates are as follow:

Protocols Definition OSI Layers


ISDN It a communication device Physical
which allows in transmission
of data like video, voice and
other services through
network telephone.
Point to Point As it can be used in many Data Link
networks. It can connect
directly and was developed
for compression and
transmission of the data.
IPV6 It helps in assigning of IP Network
address for the identification
of the networks and the
location. It for the
communication purpose.
TCP It is a protocol which disable Transport
the connection and data of
stream of two hosts. It
segments data in between
network on the point.
TLS It is a protocol which is Session
mainly used in the private
protection and integrity of the
data (communication of
network). It is used in session
managing.
AFP It is a protocol which offers Presentation
the different devices for
services of files. It is one of
the services file.
FTP It is a protocol which is used Application
in transmission of file from
one device to another
through network.
TASK 2: Addressing

a.
Network components are important in addressing. Addressing are manage in such a
way that without it network component cannot be assessed or run. It helps to search
path for network. Network component has usually its own address where data,
information or files can be transfer in the required devices. For routing, network
component show have specific address. IP and MAC address are known addressing.

IP address and MAC address difference:

IP address MAC address


The purpose of IP address is to identify The purpose of MAC address is to known the
connection of a computer on internet physical address of a computer on the
internet
IPv4 is 32 bit and IPv6 is 128 bits It is 48 bits
It is assigned by administration of network or IT is assigned by NIC card
ISP
The retrieve IP can be done by RARP The retrieve MAC can be done by ARP

IPv4 and IPv6:

IPv4 IPv6
They are 32-bit length They are 128 bit length
It is represented in decimals It is represented in hexadecimals
Static or dynamic addressing is required Auto-configuration of address is available.
to configure IPv4 address
Packet flow identification is not available Packet flow identification is available.

b.
Private and public IPv4 address difference:
Private IP Public IP
It is used with the LAN or with It is used in public network
organization
It doesn’t recognized in internet It is recognized in internet
Administration can only provide Servicer provider can only given
IT is free It is payed to service provider
The IP is not registered It is registered
We can used both public and private IPv4 as both are same but difference is that one is
provided by administration and other is provided by services. We can use anything in
public as it is given to public used but not in private as it is secured and given the
permission for administration wish.

Private IP address range:

c.
DHCP stands for Dynamic Host Configuration Protocol which is used to configure DNS,
subnet mask and default gateway on the devices. It supports dynamic and static IP
address. The network ranging size of DHCP home to campus networks and regional ISP
networks.
d.
ARP (Address Resolution Protocol): ARP is IP layer of TCP/IP protocol stack and
required TCP standard for control of media. It is also defined as resolution of network
layer address into link layer address.

ARP is needed for given reason:


 ARP control address for local traffic: As ARP it hosts on same network to resolve
IP to hardware address.

 ARP control address of remote traffic: For its destination ARP forward the IP
datagrams to router. Below diagram shows how to hosts on different network
with its IP is connected by the help of router.
e. Default Gateway and Subnet Mask

Default gateway: It is a networking node which is used to the forward packets on the
network.

Subnet mask: It is a 32 bit which masks an IP address. It is a screen numbers which is


used in routing traffic within a subnet. It is made by ‘1’s as network bits and ‘0’ as host’s
bits. By using subnet number the router can be destined in the internal gateway.

Reasons:
 As the schools and organizations need default gateway to work. Default gateway
allows the network communication with the subnet as it is the IP address of
devices.
 Subnet mask has many different information which provided by IP address on
default gateway.
 By performing operation subnet mask identify the network and IP address on
default gateway.

f. IP routing table

It stores the information and data of IP networks. It is used to known forwarding IP


address and interface use.
Fig: IP routing table examples

TASK 3: Security

a. Network secure

Following hardware, software, policies are used to keep network security more safe or
secure.

Firewall: Firewall helps to secure external (outside) computer to control the devices or
hack. It is very important to computer networks and software as it secure the most. To
check destination and source in broadband routers, firewall hardware is used as stand-
alone products and it is used in filtering packets. Schools network choose firewall for the
security of computer networks and software.

Fig: Firewall diagram

VPN (Virtual Private Network): It is a private network which allow to use public
communication rather lines to communicate. As schools and other organization support
VPN to control the access of the networks. With the help of VPN, networks will be
secured with outside users and the data will be also secure.

Remote user VPN device VPN device


Internet (VPN tunnel )
Business

Fig: VPN diagram


Anti-virus software: Virus can transfer while exchanging data through external devices
through network, from internet and email. So antivirus software should be kept in
computer from protection of virus. It prevents virus attacking the computer or systems.

Fingerprint: Fingerprint can save our data in protection as it is locked with biometric
method. It can be used in electronic and computer devices. School and organization
support and keeps the fingerprint for the staff. With the help of fingerprint head officer
can know the presence and absent of the staff.

Fig: Fingerprint

Port scanner: It is software application which is designed to the ports (open) and used
by administration network to test. It is used to scan ports and fix the problems.

Fig: Scan open ports

Service Auditing: It is a process which discovers what services are running on the
server. This can helps in configuring firewall settings.

b. Threat of system
I think Dropbox is the biggest threat of the system. Dropbox helps in storing data and
information of people. The share system of Dropbox is weak and they might bring effect.

Dropbox is perfect for normal user especially but not fir big companies or organization. It
can cause many problem in securing of data. The download link and pages are public so
everyone can assess without owner permission. So I think Dropbox is the biggest
threat for this system.
TASK 4: Diagram and explanation

a. Logical network diagram:


Fig: Logical network diagram (topology)
b.

Network Hardware Type of IP Address IP Address Subnet Mask


Computer DHCP 192.168.30.1 – 255.255.255.0
192.168.30.10
Laptop DHCP 192.168.30.11 – 255.255.255.0
192.168.30.13
Network Printer DHCP 192.168.30.14 255.255.255.0
Server STATIC 192.168.0.100 – 255.255.255.0
192.168.0.104
Router STATIC 192.168.1.1 255.255.255.0
Switch STATIC 192.168.1.3 255.255.255.0
Patch Panel STATIC 192.168.1.2 255.255.255.0
Wireless AP STATIC 192.168.1.0 255.255.255.0
Mobile and tablet DHCP 192.168.30.14- 255.255.255.0
192.168.39.20

c. Hardware components

I have choose the hardware component because as the components uses star topology
to connect the devices. To connect the internet access main server is required and keep
data like database. For the local area network Hub is required and topology (star
topology) is connected in switch. PC, laptops, network printer, mobiles are connected
from sub-divided switches.
I used star topology because it is easier and data transmission is also faster than other
topology. All the devices get internet access to control and share files from network
communication.

d. Prices and specification

 Wireless router: I used D-link router as it is fast than other. Its model is DIR-655
and it cost around 65$-70$. Its specification is that it has max speed 1 GB and
doesn’t weaken signal while pass through other objects
 Switch: I used D-link switch. Its model number is DGS-11240 and cost around $
%.98$. Its specification is that many devices can be link up and increase the
network on individual
 Access point: I recommended Cisco as it is lower in price which cost around 70$.
The specification of cisco is that it uses wireless communication
 Server: The device I used is Sentinel. It is costly around 900$. Its specification is
that it is used in storing network communication and data.
 Desktop computer casing: I used ASUS. It cost around 755-800$. The
specification of this device is that to keep or maintain files mail and to provide
information to client computer.
 Laptop: I used acer as it cost around 219,15$ and it is used for easy networking
vice versa
 Network printer: I used Epson as it cost almost 80$ and has the specification to
print in color also in scanner.
 Mobile: I uses SAMSUNG Note8 as it popular mobile and cost around 225$ and
its specification is that it is used for communication of mobiles.

You might also like