Camela H. Godilo (BSIT2-5)
Camela H. Godilo (BSIT2-5)
Camela H. Godilo (BSIT2-5)
(INTRODUCING INFRASTRUCTURE)
The first one physical element is the Cables, Network Cables is the backbone of the
network it allows the network hardware to communicate with each other, In short it
connects computers and other devices to a network and share information or
resources such as printer or internet access the second one is the Patch panels it is
effective and flexible networking devices that connect various IT devices. Used
within IP-networks, patch panels can keep your data center or server room
organized where you can move easily or manage your cabling infrastructure
smoothly and the last one is the Network switches forwards data packets between
devices it send packets directly to devices, rather than sending them to networks
like a router that connects devices within a network LAN(Local Area Network) and
forwards data packets to and from those devices.
In this situation we can solve this by utilizing Ethernet switches and network
extenders by disseminating the internet connectivity throughout the
building by placing the switches and extenders on each floor to ensure that
all the floor can access the internet also by installing the fiber optic cable for
the high speed data transmission and it ensure that it can give faster and
reliable internet throughout the floor
How will you fix these most common Wi-Fi problems, discuss
your answer?
❖ The possible cause of the slow internet everywhere is that it can be slow
internet plan, wi-fi interference, outdated or malfunctioning to solve this
issue check the internet speed with multiple devices and upgrade the router
to solve this issue always check the connected devices because sometimes
the issue isn’t with the internet connection it could be in the computer,
smartphone or causing many apps and programs open.
❖ In this situation the possible cause why the device can’t connect to wi-fi
is that it could be the password is incorrect, devices issues or the settings is
incompatible to solve this issue always check the password if it is correct or
restart the device and the router.
❖ In this situation the possible cause of this is the router or it could be the
ISP problems to fix this issue restart the route and check the ISP status
(Network Protocols and Standards)
For me the layer that is closer to the user is the Application layer why
because it can interact directly with the end user application it can interact
with the network and can access its services for example the email client to
send an email.
Your company purchases a new bridge, which filters packets based on the
MAC address of the destination computer. On which layer of the OSI model
is this device functioning?
MODULE 2-NETWORKING
BASICS(SWITCHES,ROUTER AND VLANS)
SWITCH
PUBLIC CLOUD
Some public cloud examples include those offered by Amazon, Microsoft, or
Google. These companies provide both services and infrastructure, which
are shared by all customers. Public clouds typically have massive amounts
of available space, which translates into easy scalability. A public cloud is
often recommended for software development and collaborative projects.
Companies can design their applications to be portable, so that a project
that’s tested in the public cloud can be moved to the private cloud for
production. Most cloud providers package their computing resources as
part of a service. Public cloud examples range from access to a completely
virtualized infrastructure that provides little more than raw processing
power and storage (Infrastructure as a Service, or IaaS) to specialized
software programs that are easy to implement and use (Software as a
Service, or SaaS).
PRIVATE CLOUD
Private clouds usually reside behind a firewall and are
utilized by a single organization. A completely on-
premises cloud may be the preferred solution for
businesses with very tight regulatory requirements,
though private clouds implemented through a colocation
provider are gaining in popularity. Authorized users can
access, utilize, and store data in the private cloud from
anywhere, just like they could with a public cloud. The
difference is that no one else can access or utilize those
computing resources.
HYBRID CLOUD
Simply put, hybrid clouds combine public clouds with
private clouds. They are designed to allow the two
platforms to interact seamlessly, with data and
applications moving smoothly from one to the other. It’s
the perfect solution for a business or organization who
needs a little bit of both options, usually dependent upon
industry and size. The second type of hybrid cloud model
also runs most applications and houses data in a private
cloud environment, but outsources non-critical
applications to a public cloud provider. This
arrangement is common for organizations that need to
access specialized development tools (like Adobe
Creative Cloud), basic productivity software (like
Microsoft Office 365), or CRM platforms (like Sales
force). Multi-cloud architecture is often deployed here,
incorporating multiple cloud service providers to meet a COMMUNITY CLOUD
variety of unique organizational needs.
Although not as commonly used as the other three
models, community clouds are a collaborative,
multi-tenant platform used by several distinct
organizations to share the same applications. The
users are typically operating within the same
industry or field and share common concerns in
terms of security, compliance, and performance.
These deployments are commonly used by
government agencies, healthcare organizations,
financial services firms, and other professional
communities.
What is a Multi-Cloud Model?
Cloud computing is more than the latest IT buzzword; it’s a real way for
companies to quickly obtain greater network flexibility, scalability, and
computing power for less money. But like most technologies, these
services are not without risk and require proper preparation and
refocused management efforts succeed
NETWORK ADDRESSING AND PROTOCOLS
(IP ADDRESSING)
You are the IT manager for a rapidly growing company. Your network, originally designed for
a small office, is now struggling to accommodate the increasing number of devices. The
network administrator suggests migrating from a Class C network to a subnetted scheme.
Explain the limitations of Class C networks in your situation and how subnetting can address
these limitations. In your explanation, discuss the concept of usable IP addresses and how
subnetting allows for more efficient use of the available address space.
n your situation as the IT manager, I understand that your network, initially designed
for a small office, is facing challenges in accommodating the growing number of
devices. Now, the network administrator has proposed migrating from a Class C
network to a subnetted scheme. Let me explain the limitations of Class C networks
and how subnetting can address these limitations.
Class C networks have some limitations when it comes to accommodating a large
number of devices. In a Class C network, the first three octets (or 24 bits) are used to
identify the network, while the last octet (or 8 bits) is used to identify individual
devices within that network. This allows for a maximum of 256 unique IP addresses,
ranging from 192.0.0.1 to 223.255.255.254. However, considering that some addresses
are reserved for network-related purposes, the usable IP addresses are further
reduced.
With the increasing number of devices in your rapidly growing company, a Class C
network may not provide enough usable IP addresses to meet your requirements. This
limitation can lead to IP address exhaustion and the inability to connect new devices
to the network.
You are troubleshooting internet connectivity issues at a friend's house. They suspect their router
might be malfunctioning, but you notice some unusual settings related to the IP address and subnet
mask. Based on the IP address (e.g., 172.16.0.50) and subnet mask (e.g., 255.255.0.0), what can you
determine about the type of network your friend is likely connected to (Class A, B, or C)? Are these
network classes commonly used for home networks today? Explain why or why not. What potential
issue might the unusual subnet mask indicate?
Based on the IP address (e.g., 172.16.0.50) and subnet mask (e.g., 255.255.0.0) that you
mentioned, we can determine that your friend is likely connected to a Class B network. Class
B networks have the first two octets (or 16 bits) reserved for identifying the network, and the
remaining two octets (or 16 bits) are used to identify individual devices within that network.
Nowadays, home networks typically use Class C networks rather than Class A or B
networks. Class C networks have the first three octets (or 24 bits) reserved for identifying
the network, allowing for more flexibility and accommodating a larger number of home
devices. Class C networks also align better with the size and requirements of most home
networks.
The unusual subnet mask of 255.255.0.0 can indicate a potential issue. Typically, for a Class
B network, the default subnet mask is 255.255.255.0, which means that the first two octets
identify the network, and the last two octets identify individual devices within that network.
However, if the subnet mask is set to 255.255.0.0, it means that the network is divided into
smaller subnets, and the last octet is no longer used to identify individual devices within the
network.
NETWORK SECURITY
Network security plays a crucial role in modern society due to the interconnectivity of
businesses, governments, and individuals through networks. With the increasing reliance
on digital systems and the exchange of sensitive information, the significance of network
security cannot be overstated. Let's discuss the potential consequences of a network
security breach on financial, personal, and operational levels, and provide examples to
highlight its impact.
The evolving landscape of phishing attacks in the digital age presents a significant challenge for
individuals and organizations. Attackers employ various tactics to deceive unsuspecting victims,
and understanding these tactics is crucial in developing effective countermeasures. Let's analyze
the evolving landscape of phishing attacks, the psychological aspects of social engineering, the
challenges organizations face in mitigating threats, and propose potential countermeasures and
future defense strategies.
Preventing man-in-the-middle (MitM) attacks is complex and challenging due to the various types
of attacks and the techniques employed by attackers. MitM attacks occur when an attacker
intercepts and alters communication between two parties, allowing them to eavesdrop,
manipulate, or steal sensitive information. Let's examine the complexities, different types of MitM
attacks, preventive measures, the importance of awareness and early detection, and
recommendations to strengthen defenses against this form of cyber threat.
THANK YOU!!