0% found this document useful (0 votes)
9 views

Module10 Euc

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Module10 Euc

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

EUC1501-Y-3E

Module 10 – Networks
19689322
9911150038080
1. Prepare six presentation slides (On the Online Assessment Tool – your
answer - just say Slide 1 then include your notes and then Slide 2 then
include your notes, etc.) on one of the following categories: client/server
network, peer-to-peer network, and cloud computing. In your notes discuss
the pros and cons of their network architecture type, as well as discuss a
model that incorporates the hardware/software components that would be
needed. (6)
SLIDE 1:

Client/Server Network:

A client/server network architecture involves centralized servers that


provide resources and services to client devices.

A client-server network is a computing model in which multiple clients


connect to a central server to access resources, such as files,
applications, and data. The server acts as a central hub, managing and
providing services to the connected clients.

SLIDE 2:

Pros of Client/Server Network:


o Centralized data management and security
o Scalability for large organizations
o Efficient resource utilization

SLIDE 3:
Pros of Client/Server Network continued:
o enables efficient sharing of resources among multiple clients
o improved overall productivity and collaboration
o easier to maintain and update the system

SLIDE 4:
Cons of Client/Server Network:
o Costly to set up and maintain
o Dependency on the server for network operations
o Single point of failure
SLIDE 5:
Cons of Client/Server Network continued:
o Performance Limitations
o cost of servers
o decreased privacy
o autonomy of nodes due to their need to communicate with a
central server
SLIDE 6:
• model that incorporates the hardware/software components that would
be needed:
Component Description

Server High-performance hardware

Network Switch For data routing

Client Devices Computers, laptops, terminals

Database Server For data storage and retrieval

2. Explain the process of setting up a virtual private network (VPN). (3)


o Choose a VPN Service: Select a VPN service provider and sign up
for a plan.
o Install VPN Software: Download and install the VPN software on
your device.
o Configure VPN Settings: Enter the login credentials provided by
the VPN service and configure the settings as per your
requirements.
o Connect to VPN: Open the VPN software, choose a server
location, and connect to the VPN

3. What are some reasons that an individual or corporation might set up a VPN?
(2)
Security: Protect sensitive data from unauthorized access or cyber
threats.
Privacy: Safeguard online activities from surveillance or tracking.
Remote Access: Access resources on a private network from a remote
location.

4. Are there any drawbacks to having one? (2)


Reduced Speed: VPNs can sometimes slow down internet connection
speed.
Complexity: Setting up and managing a VPN can be complex for non-
technical users.

5. Research and present findings on different software solutions for a VPN. Is


any special hardware required? (3)
ExpressVPN: Known for its speed and user-friendly interface.
NordVPN: Offers strong security features and a large server network.
CyberGhost: Focuses on user privacy and accessibility.

6. The method by which computers and devices are physically arranged on a


network is referred to as the ___________. (1)
Network topology.

7. Research different types of CAD software. Present the comparison of the


pros and cons of each type. Factors to consider include professional uses,
ease of use, cost, availability, and features. (10)
2D CAD Software
Professional Ease of
Software Cost Availability Features
Uses Use

Engineering, Advanced
Widely
AutoCAD architecture, Moderate Expensive drafting tools,
available
construction 3D modeling

Engineering, Free and 2D drafting,


Widely
DraftSight architecture, Easy paid DWG file
available
construction versions compatibility

3D CAD Software
Professional Ease of
Software Cost AvailabilityFeatures
Uses Use

Parametric
Engineering,
Widely modeling,
SolidWorks product Moderate Expensive
available simulation
design
tools
Professional Ease of
Software Cost AvailabilityFeatures
Uses Use

Engineering, Cloud-based,
Free and
product Widely collaboration
Fusion 360 Moderate paid
design, available tools, CAM
versions
manufacturing capabilities

BIM Software
Professional Ease of
Software Cost Availability Features
Uses Use

Building
Architecture, information
Widely
Revit engineering, Moderate Expensive modeling,
available
construction collaboration
tools

BIM, 3D
Architecture,
Limited visualization,
ArchiCAD urban Moderate Expensive
availability teamwork
planning
features

Pros and Cons


• AutoCAD: Widely used, advanced features, but expensive and has a
learning curve.
• DraftSight: Easy to use, cost-effective, but lacks advanced 3D modeling
capabilities.
• SolidWorks: Powerful 3D modeling, simulation tools, but costly and may
require training.
• Fusion 360: Cloud-based, collaboration features, suitable for startups,
but may have limited offline functionality.
• Revit: Comprehensive BIM capabilities, widely used, but expensive and
may require powerful hardware.
• ArchiCAD: Strong BIM and visualization features, but limited availability
and higher cost.

8. Research net neutrality, including history and current legal status. Provide
arguments for or against net neutrality and decide whether or not it is
beneficial. (6)
Net neutrality is the principle that Internet service providers (ISPs)
should treat all data on the Internet equally, without discriminating or
charging differently based on user, content, website, platform,
application, or method of communication.
o History:
The concept of net neutrality emerged in the early 2000s as the
Internet became more widely used. In 2015, the Federal
Communications Commission (FCC) in the United States
implemented strong net neutrality rules to ensure an open
Internet. However, in 2017, the FCC under the new administration
repealed these regulations, leading to a more relaxed approach to
net neutrality.
o Current Legal Status:
As of now, the legal status of net neutrality varies by country.
Some countries have implemented strong net neutrality
regulations, while others have taken a more relaxed approach. In
the United States, the situation remains contentious, with ongoing
debates and legal battles at both the federal and state levels.
o For Net Neutrality:
• Preservation of Open Internet: Net neutrality ensures that all online
content is treated equally, preventing ISPs from favoring certain
websites or services over others.
• Promotion of Innovation: It fosters a level playing field for startups and
small businesses, allowing them to compete with larger, established
entities.
• Consumer Protection: Net neutrality safeguards consumers from
potential price discrimination and ensures access to a diverse range of
online content.
o Beneficial or Not?
The debate over net neutrality is complex and multifaceted. While
proponents argue that it is essential for preserving a free and
open Internet, opponents raise concerns about its potential
impact on investment and innovation. Ultimately, the benefits of
net neutrality depend on one's perspective and the specific
context of the regulatory environment.

9. A ________ password is always more secure, regardless of complex.(1)


strong
10. Brainstorm the home in which you will need to set up a wireless network.
Things to consider include: how large the house is, the number of devices
that will be regularly connecting, and the type of Internet activities that will be
engaged in. Research the type of hardware/software that should be used,
and then discuss the steps in the wireless setup. (6)
• Description of the house
The residence is a 3,000 square foot, two-story house with numerous
rooms and a backyard. Five family members possess a minimum of two
devices each, such as smartphones, laptops, tablets, smart TVs, and
gaming consoles. The family participates in a range of online activities
such as watching videos, playing games, having video calls, and using
smart home devices.
• Suggestions for hardware and software.
It is recommended to use a high-performance wireless router with
strong coverage and multiple antennas for this configuration. Moreover,
a network switch could potentially be necessary to link wired devices
spread across various rooms. We suggest using the following hardware
and software:
o Wireless Router: Dual-band or tri-band router equipped with MU-
MIMO technology to efficiently manage multiple devices.
o Gigabit Ethernet switch used for wired connections in various
rooms of a network.
o A range extender can be utilized to enhance the Wi-Fi signal in
case of dead spots within the house.
o Software for network security: Install strong security software to
safeguard the network from cyber threats.
• Steps for Setting up a Wireless Connection
o Position the router centrally on the first floor for best coverage in
the entire house.
o Initial setup: Link the router with the modem and turn it on. Use a
web browser to enter the router's settings and set up the network
name (SSID) and password.
o Segment your network by creating individual SSIDs for the 2.4GHz
and 5GHz bands to enhance device connections according to
their abilities.
o Device Connection: Use the given SSID and password to connect
devices to the wireless network. Connect wired devices to the
network switch.
o Security settings: Activate WPA3 encryption and establish a
secure network password. Set up the firewall and add network
security software to safeguard against cyber threats.
o Optimization and Testing: Modify the router's configurations for
best results, including choosing the right channel and configuring
Quality of Service (QoS). Check the network speed and coverage
in various parts of the house to confirm a dependable connection.

11. Discuss what steps you will take to make a home’s wireless network more
secure. Why is each step necessary to protect the network’s security?
Research and discuss both hardware and software that might help with
security, including authentication, encryption, firewalls, and network
maintenance. Pay particular attention to the password protocols that should
be followed. (10)
• Modify the SSID and password that is set as the default.
It is important to change the default Service Set Identifier (SSID) and
password because attackers can easily exploit widely known default
settings.
• Activate encryption (either WPA2 or WPA3)
Encryption hinders unauthorized entry to the network. Enable either
WPA2 or WPA3 encryption protocols to protect the data being sent over
the network.
• Utilize secure passwords
Having strong passwords is crucial in order to avoid unauthorized
access. Long passwords with a combination of letters, numbers, and
special characters are essential for every device and service and should
be distinct.
• Firmware for the Router needs to be updated.
Consistently updating the firmware of the router is essential to fix any
security flaws and guarantee the most recent security enhancements
are activated.
• Activate MAC Address Filtering.
MAC address filtering adds an additional level of security by permitting
only designated devices to access the network.
• Set up a firewall.
A firewall watches and regulates both inbound and outbound internet
traffic, stopping unauthorized entry and defending against online
dangers.
• Utilize Virtual Private Network (VPN) technology
A VPN secures internet traffic by encrypting it, providing additional
security measures, particularly for remote network access.
• Turn off Remote Management
Preventing unauthorized users from accessing the router's settings
externally is done by disabling remote management.

Network Security Hardware and Software


• Verification: Two-factor authentication (2FA) can be utilized to add an
extra level of security. Users must present two forms of identification in
order to access the network.
• Encryption: Along with WPA2 or WPA3 encryption, employing a Virtual
Private Network (VPN) software can provide additional encryption for
data sent through the network.
• Firewalls, either in hardware form on routers or as software on
individual devices, offer thorough defense against unauthorized access
and cyber threats.
• Regular maintenance of a network is crucial, including updating router
firmware, regularly checking for security patches, and monitoring
network activity to ensure security
Protocols for Passwords
• Passwords need to have a minimum length of 12 characters, with a
combination of uppercase and lowercase letters, digits, and special
symbols.
• Refrain from using predictable details like names, birthdates, or
commonly used words.
• Use a distinct password for every device and service to avoid one
breach jeopardizing multiple accounts.

12. The _________ address is a unique hardware address identified for your
computer or device. (1)
MAC (Media Access Control) address

You might also like