Camela H. Godilo (BSIT2-5)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

SUBMITTED BY:

WHAT IS THE PURPOSE


OF THIS PORTFOLIO?
Throughout this portfolio, you will find a
collection of projects, assignments, and
practical experiences that I have
undertaken during my studies. These have
allowed me to delve into various aspects of
networking, including network design,
configuration, troubleshooting, and
security.
My passion for networking stems from my
fascination with how data flows seamlessly
across devices, connecting people and
systems across the globe. I have honed my
abilities in designing efficient network
architectures, troubleshooting network
issues, and implementing robust security
measures to safeguard sensitive
information.
MODULE 1 NETWORK BASICS (NETWORK
INFRASTRUCTURE)

(INTRODUCING INFRASTRUCTURE)

Elaborate/Discuss why does this listed physical


elements is needed in building a network infrastructure

The first one physical element is the Cables, Network Cables is the backbone of the
network it allows the network hardware to communicate with each other, In short it
connects computers and other devices to a network and share information or
resources such as printer or internet access the second one is the Patch panels it is
effective and flexible networking devices that connect various IT devices. Used
within IP-networks, patch panels can keep your data center or server room
organized where you can move easily or manage your cabling infrastructure
smoothly and the last one is the Network switches forwards data packets between
devices it send packets directly to devices, rather than sending them to networks
like a router that connects devices within a network LAN(Local Area Network) and
forwards data packets to and from those devices.

Give/Illustrate/draw three (3) types of each of the physical


elements listed together with their brand and specification.

Cisco Console Rollover Cable (RJ45 M/M)


MODEL NUMBER: N205-010-BL-FCR
Description
The N205-010-BL-FCR Cisco Console Rollover Cable is a direct replacement for a
lost or damaged Cisco rollover cable.
Features
Connects Your Computer or Laptop to a Cisco Networking Device
• Direct replacement for lost or damaged Cisco rollover cable
•Ideal for routers, servers, switches, and other Cisco networking equipment
• Male RJ45 connectors
• 32 AWG copper wire
• Rugged PVC jacke
(CABLE INFRASTRUCTURE)

We encountered long-distance network construction


problems in the company, such as office buildings too
long, and the internet access point on the other side
of the building, to ensure that each floor has
internet access and fast, how to solve this problem?
Discuss your answer.

In this situation we can solve this by utilizing Ethernet switches and network
extenders by disseminating the internet connectivity throughout the
building by placing the switches and extenders on each floor to ensure that
all the floor can access the internet also by installing the fiber optic cable for
the high speed data transmission and it ensure that it can give faster and
reliable internet throughout the floor

) Our Company has a total of 3 floors of buildings, each floor has


80-100 computers, each floor of computer distribution area of more
than 300 square meters. Like this case, how can I do to do more
simple and effective completion of cabling layout? The current
plan is to place a 3-layer switch in the central area of each
floor, then connect the 3 switches through the PC server to
achieve network sharing, and then implement Internet access
through the router. Is that okay? Discuss your answer

In this situation we can recommend the network security to


measure and protect the network from unauthorized access and
make sure also the cable maintain its cleanliness and keep it
organized
(WIRELESS NETWORK)

How will you fix these most common Wi-Fi problems, discuss
your answer?

• Slow or no internet access in certain rooms.


❖ In this situation the possible cause of the issue is having blocking the
signals or the distance from the router to fix this the router must relocate to
a more central location in the room

• Slow internet everywhere.

❖ The possible cause of the slow internet everywhere is that it can be slow
internet plan, wi-fi interference, outdated or malfunctioning to solve this
issue check the internet speed with multiple devices and upgrade the router
to solve this issue always check the connected devices because sometimes
the issue isn’t with the internet connection it could be in the computer,
smartphone or causing many apps and programs open.

• One device can’t connect to the Wi-Fi

❖ In this situation the possible cause why the device can’t connect to wi-fi
is that it could be the password is incorrect, devices issues or the settings is
incompatible to solve this issue always check the password if it is correct or
restart the device and the router.

• Nothing can connect to Wi-Fi

❖ In this situation the possible cause of this is the router or it could be the
ISP problems to fix this issue restart the route and check the ISP status
(Network Protocols and Standards)

In the OSI model, which of the following functions are


performed at the Presentation layer? What are the two?
Discuss your answer.
Presentation Layer receives data from application layer it is in the form of data
and characters, the two main functions that performed in presentation layer is
the data translation and the data Encryption and Decryption in the data
translation it transform example is ASCII to EBCDIC before data transmitted it
reduces the number of bits that are used to used to original data, to maintain
the integrity of the data before transmission data is encrypted when we are
sending it is called the encryption while the receiver is the decryption.

Which of the OSI model layer is responsible for guaranteein


reliable messages delivery? Discuss your answer
For me the OSI model layer that are responsible for guaranteeing reliable
messages delivery is the Transport Layer which is by using the flow control it
manage the rate of data transmission between sender and receiver and can
manage the establishment and termination of connections between
communicating endpoints.

Which layer is closer to the user? Discuss your answer

For me the layer that is closer to the user is the Application layer why
because it can interact directly with the end user application it can interact
with the network and can access its services for example the email client to
send an email.

Your company purchases a new bridge, which filters packets


based on the MAC address of the destination computer. On which
layer of the OSI model is this device functioning?

Your company purchases a new bridge, which filters packets based on the
MAC address of the destination computer. On which layer of the OSI model
is this device functioning?
MODULE 2-NETWORKING
BASICS(SWITCHES,ROUTER AND VLANS)

SWITCH

Learning is the process of obtaining the MAC address of connected


devices. When a frame reaches into the port of a switch, the switch reads
the MAC address of the source device from Ethernet frame and compares
it to its MAC address table (also known as CAM(Content Addressable
Memory) table). If the switch cannot find a corresponding entry in MAC
address the switch will add the address to the table with the port number
via the Ethernet frame arrived. If the MAC address is already available in
the MAC address table, the switch compares the incoming port with the
port already available in the MAC table. If the port numbers are different,
the switch updates the MAC address table new port number. This will
normally happen when network administrators remove the cable from one
port and attach it to another port. Whenever switch updates an entry in the
MAC address table, the switch resets the timer for that entry. Timers are
used in aging process of old entries. Aging helps to remove old entries
and free memory of MAC address table to add new entries.
Forwarding is the process of passing network
traffic a device connected to one port of a
Network Switch to another device connected
to another port on the switch. When a Layer 2
Ethernet frame reaches a port on the Network
Switch the switch reads the source MAC
address of the Ethernet frame as a part of
learning function, and it also reads the
destination MAC address also as a part of
forwarding function. The destination MAC
address is important to determine the port
number which the destination device is
connected. If the destination MAC address is
found on the MAC address table, the switch
forwards the Ethernet frame via the
corresponding port of the MAC address.

Flooding means that the switch sends the incoming


frame to all occupied and active ports (except for the
one from which it was received). In essence, flooding
is when a switch pretends to be a hub. There are two
basic reasons why a switch will flood a frame.
✓ When the switch receives a broadcast, it has
no choice but to continue the broadcast.
Protocols like ARP and DHCP (among others) rely
on these broadcasts for their basic function.
The following diagram is an example of what an
Ethernet frame header might look like as a
broadcast.
✓ When the switch receives a frame dedicated
for a particular destination but that destination
does not have an entry in the MAC Address
Table, the switch has no choice but to flood the
frame. The goal of this flood is that the device
using the MAC address in the destination of the
frame will receive the flood and respond to the
message. If that device responds, then the
switch can learn their MAC address and map it
to the port into which the message arrives. The
following diagram is an example of what an
Ethernet frame header might look like. Notice
that the destination MAC address does not
match the MAC Address
ROUTER

Network design, or network topology, is


planning and mapping out the
infrastructure of an IT network. It requires
identifying the various design
requirements of the network and creating
a plan that is both aligned with those
requirements and can be successfully
implemented. Network design is necessary
because individual organizations will have
unique requirements for their computer
network.
VLAN

Discuss How VLAN Works?

• A virtual LAN (VLAN) is a logical overlay network that


groups together a subset of devices that share a
physical LAN, isolating the traffic for each group. A
VLAN is identified on network switches by a VLAN ID.
Each port on a switch can have one or more VLAN IDs
assigned to it and will land in a default VLAN if no
other one is assigned. Each VLAN provides data-link
access to all hosts connected to switch ports
configured with its VLAN ID.

Discuss what is the purpose of VLANs?


The purpose of a VLAN Network engineers use
VLANs for multiple reasons
including the following:
✓ to improve performance
✓ to tighten security
✓ to ease administration
Also, VLAN is a collection of devices or network
nodes that communicate with one
another as if they made up a single LAN, when
they exist in one or several LAN
segments. In a technical sense, a segment is
separated from the rest of the LAN by a
bridge, router, or switch, and is typically used for
a particular department. This means
that when a workstation broadcasts packets, they
reach all other workstations on the
VLAN but none outside it.
VLAN
Why would you use a VLAN?
Using this VLAN it cost-effective because
workstations on VLANs communicate with
one another through VLAN switches and
don’t require routers unless they are
sending data outside the VLAN. VLANs offer
more flexibility than nonvirtual networking
solutions. VLANs can be configured and
assigned based on port, protocol, or subnet
criteria, making it possible to alter VLANs
and change network design when necessary.
Furthermore, because VLANs are configured
on a basis outside their physical connection
to hardware or proximity to other devices,
they allow for groups who collaborate—and
presumably transfer a great deal of data to
one another’s devices—to share a VLAN even
if they work on separate floors or in
different buildings.

What is an example of a VLAN?


VLANs have their own complications,
such as VLAN mismatches, MSPs who
know how to configure a VLAN
properly can leverage their powerful
network segmentation benefits to make
their clients’ networks faster and more
secure while giving them physical
flexibility. As all networks evolve over
time, MSPs who know how to conduct
VLAN maintenance and check device
distribution can increase and sustain
network performance.
SERVERS AND VISUALIZATION(UNDERSTAN
DING NETWORK OPERATING SYSTEM)

Network Services include IP addressing, Domain Name System


(DNS), primary domain email service, Internet access, and web
content filtering. Security products include firewalls, VPN
termination and intrusion prevention systems (IPS), and the
necessary tools and staff to support these services. Active Directory
Domain Services (AD DS) are the core functions in Active Directory
that manage users and computers and allow sysadmins to organize
the data into logical hierarchies. A directory is a hierarchical
structure that stores information about objects on the network. A
directory service, such as Active Directory Domain Services (AD DS),
provides the methods for storing directory data and making this
data available to network users and administrators. For example, AD
DS stores information about user accounts, such as names,
passwords, phone numbers, and so on, and enables other authorized
users on the same network to access this information.Active
Directory stores information about objects on the network and
makes this information easy for administrators and users to find and
use. Active Directory uses a structured data store as the basis for a
logical, hierarchical organization of directory information. This data
store, also known as the directory, contains information about
Active Directory objects. These objects typically include shared
resources such as servers, volumes, printers, and the network user
and computer accounts. For more information about the Active
Directory data store, see Directory data store. Security is integrated
with Active Directory through logon authentication and access
control to objects in the directory. With a single network logon,
administrators can manage directory data and organization
throughout their network, and authorized network users can access
resources anywhere on the network. Policy-based administration
eases the management of even the most complex network. For more
information about Active Directory security,
CLOUD COMPUTING(INTRODUCTION TYPES,
AND KIND OF SERVICES)
Identify the different types of cloud computing
and discuss how they differ

PUBLIC CLOUD
Some public cloud examples include those offered by Amazon, Microsoft, or
Google. These companies provide both services and infrastructure, which
are shared by all customers. Public clouds typically have massive amounts
of available space, which translates into easy scalability. A public cloud is
often recommended for software development and collaborative projects.
Companies can design their applications to be portable, so that a project
that’s tested in the public cloud can be moved to the private cloud for
production. Most cloud providers package their computing resources as
part of a service. Public cloud examples range from access to a completely
virtualized infrastructure that provides little more than raw processing
power and storage (Infrastructure as a Service, or IaaS) to specialized
software programs that are easy to implement and use (Software as a
Service, or SaaS).

PRIVATE CLOUD
Private clouds usually reside behind a firewall and are
utilized by a single organization. A completely on-
premises cloud may be the preferred solution for
businesses with very tight regulatory requirements,
though private clouds implemented through a colocation
provider are gaining in popularity. Authorized users can
access, utilize, and store data in the private cloud from
anywhere, just like they could with a public cloud. The
difference is that no one else can access or utilize those
computing resources.

HYBRID CLOUD
Simply put, hybrid clouds combine public clouds with
private clouds. They are designed to allow the two
platforms to interact seamlessly, with data and
applications moving smoothly from one to the other. It’s
the perfect solution for a business or organization who
needs a little bit of both options, usually dependent upon
industry and size. The second type of hybrid cloud model
also runs most applications and houses data in a private
cloud environment, but outsources non-critical
applications to a public cloud provider. This
arrangement is common for organizations that need to
access specialized development tools (like Adobe
Creative Cloud), basic productivity software (like
Microsoft Office 365), or CRM platforms (like Sales
force). Multi-cloud architecture is often deployed here,
incorporating multiple cloud service providers to meet a COMMUNITY CLOUD
variety of unique organizational needs.
Although not as commonly used as the other three
models, community clouds are a collaborative,
multi-tenant platform used by several distinct
organizations to share the same applications. The
users are typically operating within the same
industry or field and share common concerns in
terms of security, compliance, and performance.
These deployments are commonly used by
government agencies, healthcare organizations,
financial services firms, and other professional
communities.
What is a Multi-Cloud Model?

In some cases, a single public cloud isn’t enough to meet an


organization’s computing needs. They turn instead to
multi-clouds, a more complex hybrid cloud example that
combines a private cloud with multiple public cloud
services. While a hybrid cloud always consists of a public
and private cloud, a multi-cloud environment is a bit more
varied on a case-to-case basis. In this arrangement, an
organization’s IT infrastructure consists of multiple public
clouds from multiple providers, although it may access
those clouds through a single software-defined network. A
private cloud could certainly be part of a multi-cloud
architecture, but it is usually more isolated from its public
cloud counterparts. The purpose of a multi-cloud model is
versatility and specialization. In enterprise-level
organizations, for example, not every department has the
same cloud needs. A marketing department, for instance,
needs different types of cloud computing tools than a
research or human resources department. Multi-cloud
models also offer reassurance because they don’t leave
organizations dependent upon a single cloud provider. This
can decrease costs and increase flexibility in the long run
while also avoiding the problem of vendor lock-in. When
combined with private cloud assets, multi-cloud
deployments allow organizations to accomplish multiple
goals at one time without having to radically expand or
rethink their existing infrastructure
Make a simple research on Best cloud
computing services this year 2021.
Discuss why they are considered one of the best
cloud computing services
The first thing that I’ve searched for the best cloud computing
services is the Amazon Web Services because When it comes to
the largest cloud providers, Amazon Web Services undoubtedly
tops the list. It is one of the safest platforms for cloud service. It
offers cloud-based toolsets that are unique and stands out from
the other providers in the industry. AWS provides more than 200
fully featured services which include storage, database, and
computing. By using the services of AWS, you can easily develop
flexible, scalable, and reliable applications. The company keeps
launching new service vices to expand its reach and benefit the
users more Amazon has built an unbelievable catalog of more
than 12 million products, books, media, wine, and services. If you
expand this to Amazon Marketplace sellers, as well, the number
is closer to more than 350 million products. Next is the Google
Cloud Platform because It ranks third among the largest cloud
computing companies in the world. Google Cloud Platform is a
global leader in AI, machine learning, and data analytics. It
provides enterprise-ready cloud services and enables developers
to develop, deploy, and test applications on its scalable
infrastructure. GCP serves as integrated storage that is leveraged
by enterprises and developers for live data. Besides the free trial,
the services of Google Cloud Platform are made available to the
users at flexible payment plans, Next one is the Alibaba Cloud
Platform because it is known as the fourth largest cloud provider
platform in the world. The Singapore-based company boasts a
robust cloud infrastructure and provides a wide range of cloud
services to users. Some prominent cloud services offered by
Alibaba Cloud include database storage, large-scale computing,
network visualization, elastic computing, big data analytics, and
management services.
After understanding/reading this module you can now
determine how cool cloud computing can be: in a simple essay
discuss the following:
What should you do to take your network toward the cloud?

Discuss few recommendations on choosing a cloud computing


service provider.

Conduct Pre-Deployment and Readiness Assessments. Determine


existing bandwidth demandsper user, per department, and for the
organization as a whole. With the service provider’s help,calculate
the average bandwidth demand per user for each new service you
plan to deploy. Thisallows the IT staff to appropriately scale the
Internet connection and prioritize and shape trafficto meet the
bandwidth demands of cloud applications.

Shift the Network Management Focus. Cloud computing’s advantage


lies in placing the burdenof applications and data storage and
processing on another network. This shifts management priorities
from internal data concerns to external ones. Currently,
organizations have largernetwork pipes and infrastructure at the
network core, where the computer processing power is located.
With cloud computing and Software as a Service (SaaS) applications,
the importance of large bandwidth capacities shift away from the
core to the Internet connection. The shift in focus will significantly
impact the decisions you make from whether your monitoring tools
adequately track WAN performance to the personnel and resources
you devote to managing WAN-related issues.

Cloud computing is more than the latest IT buzzword; it’s a real way for
companies to quickly obtain greater network flexibility, scalability, and
computing power for less money. But like most technologies, these
services are not without risk and require proper preparation and
refocused management efforts succeed
NETWORK ADDRESSING AND PROTOCOLS
(IP ADDRESSING)

You are the IT manager for a rapidly growing company. Your network, originally designed for
a small office, is now struggling to accommodate the increasing number of devices. The
network administrator suggests migrating from a Class C network to a subnetted scheme.
Explain the limitations of Class C networks in your situation and how subnetting can address
these limitations. In your explanation, discuss the concept of usable IP addresses and how
subnetting allows for more efficient use of the available address space.

n your situation as the IT manager, I understand that your network, initially designed
for a small office, is facing challenges in accommodating the growing number of
devices. Now, the network administrator has proposed migrating from a Class C
network to a subnetted scheme. Let me explain the limitations of Class C networks
and how subnetting can address these limitations.
Class C networks have some limitations when it comes to accommodating a large
number of devices. In a Class C network, the first three octets (or 24 bits) are used to
identify the network, while the last octet (or 8 bits) is used to identify individual
devices within that network. This allows for a maximum of 256 unique IP addresses,
ranging from 192.0.0.1 to 223.255.255.254. However, considering that some addresses
are reserved for network-related purposes, the usable IP addresses are further
reduced.
With the increasing number of devices in your rapidly growing company, a Class C
network may not provide enough usable IP addresses to meet your requirements. This
limitation can lead to IP address exhaustion and the inability to connect new devices
to the network.

You are troubleshooting internet connectivity issues at a friend's house. They suspect their router
might be malfunctioning, but you notice some unusual settings related to the IP address and subnet
mask. Based on the IP address (e.g., 172.16.0.50) and subnet mask (e.g., 255.255.0.0), what can you
determine about the type of network your friend is likely connected to (Class A, B, or C)? Are these
network classes commonly used for home networks today? Explain why or why not. What potential
issue might the unusual subnet mask indicate?

Based on the IP address (e.g., 172.16.0.50) and subnet mask (e.g., 255.255.0.0) that you
mentioned, we can determine that your friend is likely connected to a Class B network. Class
B networks have the first two octets (or 16 bits) reserved for identifying the network, and the
remaining two octets (or 16 bits) are used to identify individual devices within that network.

Nowadays, home networks typically use Class C networks rather than Class A or B
networks. Class C networks have the first three octets (or 24 bits) reserved for identifying
the network, allowing for more flexibility and accommodating a larger number of home
devices. Class C networks also align better with the size and requirements of most home
networks.

The unusual subnet mask of 255.255.0.0 can indicate a potential issue. Typically, for a Class
B network, the default subnet mask is 255.255.255.0, which means that the first two octets
identify the network, and the last two octets identify individual devices within that network.
However, if the subnet mask is set to 255.255.0.0, it means that the network is divided into
smaller subnets, and the last octet is no longer used to identify individual devices within the
network.
NETWORK SECURITY

Essay Question (Network security)


Explain the significance of network security in the context of modern society. Consider the
interconnectivity of businesses, governments, and individuals through networks. Discuss
the potential consequences of a network security breach on financial, personal, and
operational levels. Provide examples to illustrate the impact and emphasize the critical
role network security plays in safeguarding sensitive information and ensuring the
integrity of communication and transactions.

Network security plays a crucial role in modern society due to the interconnectivity of
businesses, governments, and individuals through networks. With the increasing reliance
on digital systems and the exchange of sensitive information, the significance of network
security cannot be overstated. Let's discuss the potential consequences of a network
security breach on financial, personal, and operational levels, and provide examples to
highlight its impact.

Essay Question ( Phishing attacks)


Analyze the evolving landscape of phishing attacks in the digital age. Describe the various
tactics employed by perpetrators, as highlighted in the provided examples. Explore the
psychological aspects of social engineering and how attackers exploit human
vulnerabilities. Discuss the challenges organizations face in mitigating phishing threats
and propose effective countermeasures. Additionally, consider the future trajectory of
phishing attacks and potential innovations in defense strategies.

The evolving landscape of phishing attacks in the digital age presents a significant challenge for
individuals and organizations. Attackers employ various tactics to deceive unsuspecting victims,
and understanding these tactics is crucial in developing effective countermeasures. Let's analyze
the evolving landscape of phishing attacks, the psychological aspects of social engineering, the
challenges organizations face in mitigating threats, and propose potential countermeasures and
future defense strategies.

Essay Question ( Man-in-the-middle)


Examine the complexities and challenges associated with preventing man-in-the-middle
(MitM) attacks. Define the different types of MitM attacks, such as IP spoofing, DNS
spoofing, and SSL/TLS hijacking, and elaborate on their mechanisms. Discuss preventive
measures, including the use of VPNs, HTTPS, and avoiding public Wi-Fi. Explore the
importance of awareness and early detection in mitigating the impact of MitM attacks.
Finally, provide recommendations for organizations to strengthen their defenses against
this pervasive and sophisticated form of cyber threat.

Preventing man-in-the-middle (MitM) attacks is complex and challenging due to the various types
of attacks and the techniques employed by attackers. MitM attacks occur when an attacker
intercepts and alters communication between two parties, allowing them to eavesdrop,
manipulate, or steal sensitive information. Let's examine the complexities, different types of MitM
attacks, preventive measures, the importance of awareness and early detection, and
recommendations to strengthen defenses against this form of cyber threat.
THANK YOU!!

You might also like