Assignment
Assignment
Computer Network
BY PAN THU
LEVEL – 3 BATCH – 11
PAN THU (LEVEL – 3 BATCH – 11)
Contents
P1 - Types of networks available and how they relate to particular network standards and
protocols................................................................................................................................................ 2
P2 - Why different network standards and protocols are necessary ......................................... 6
P3 - The key components required for client workstations to connect to a network and
access network resources .................................................................................................................. 8
M1 - The benefits and disadvantages of peer-to-peer network and client/server networks
.............................................................................................................................................................. 10
P4 - The Function of Interconnection Devices............................................................................. 14
P6 - Making a networked system secure & ................................................................................... 16
M3 – Risks of Insecure Network and How they can be minimized .......................................... 16
M2 - Designing a networked solution to meet a particular situation with specific
requirements &................................................................................................................................... 21
D1 - Justifying the design and choice of components used in a particular networked
solution ................................................................................................................................................ 21
P5 - Typical Services provided by Networks ................................................................................ 23
D2 - evaluating typical services available from a network operating system directory
service .................................................................................................................................................. 29
Reference Websites ........................................................................................................................... 32
1|Page
PAN THU (LEVEL – 3 BATCH – 11)
2|Page
PAN THU (LEVEL – 3 BATCH – 11)
whole cities. MAN Networks are formed by connecting many LANs. As a result,
MAN Networks are bigger than LANs but smaller than wide-area networks (WAN).
A sustained connection to the internet is what the MAN's (Metropolitan Area
Network) main purpose is to achieve. A metropolitan region's local area networks
(LANs) are connected to wider area networks like the Internet and given Internet
connection through the MAN Network. The goal of MAN is to establish a
communication channel between two different LAN nodes.
Network Standards
3|Page
PAN THU (LEVEL – 3 BATCH – 11)
IEEE 802.15 is a working group of the IEEE 802 standards committee that
specifies wireless personal area network (WPAN) standards. They are:
• IEEE 802.15.1: WPAN / Bluetooth
• IEEE 802.15.2: Coexistence
• IEEE 802.15.3: High Rate WPAN
o IEEE 802.15.3-2003
o IEEE 802.15.3a
o IEEE 802.15.3a
o IEEE 802.15.3c-2009
• IEEE 802.15.4: Low Rate WPAN
PAN is the network area that is related to the IEEE 802.15 standard.
IEEE 802.3 is the name of the working group assigned to create Ethernet-
based networks by the Institute of Electrical and Electronics Engineers (IEEE). The
Ethernet standard, also known as IEEE 802.3, defines the physical layer and the
media access control (MAC) of the data link layer for wired Ethernet networks,
often known as Local area networks (LAN). IEEE 802.3 defines the physical and
networking properties of an Ethernet network, such as how physical connections
4|Page
PAN THU (LEVEL – 3 BATCH – 11)
between nodes (routers, switches, and hubs) are created using wired media such
as copper coaxial or fiber cable.
IEEE 802.3 is related to PAN.
Network Protocols
The phrase file transfer protocol (FTP) refers to the process of transferring
files through a network between devices. The process works, when one party
allows another to send or receive files via the internet. Originally intended to allow
users to communicate and exchange data between two physical devices, tit is now
commonly used to store files in the cloud, which is usually a secure location that
is held remotely.
Network areas such as PAN, LAN, MAN and WAN are related to this protocol.
SMTP is a protocol for sending and receiving email between email servers
and email clients (such as Microsoft Outlook or UNIX and Linux's sendmail) (such
as Microsoft Exchange).
5|Page
PAN THU (LEVEL – 3 BATCH – 11)
SMTP, POP and IMAP, all there of these protocols are probably use
in LAN, MAN, and WAN.
IP (Internet Protocol)
6|Page
PAN THU (LEVEL – 3 BATCH – 11)
Types of Standards
7|Page
PAN THU (LEVEL – 3 BATCH – 11)
may be transmitted and received, the instructions that can be used to do so, and
the procedures for verifying data transfers.
A protocol is similar to a language in terms of structure. Every language
has its own set of laws and lexicon. Each protocol has its own set of rules,
standards, and implementations. When two people speak the same language, they
will be able to converse quickly and efficiently. Similarly, two hosts that use the
same protocol can simply connect and communicate with one another. As a result,
protocols provide a common language for network devices that communicate data.
Types of Protocols
I'll go over the major components needed for client workstations to connect
to a network and access network resources in this following. Connecting
workstations to networks necessitates a number of components, including both
hardware and software.
Network Adapters
8|Page
PAN THU (LEVEL – 3 BATCH – 11)
Cables
To connect devices to a network, you'll need the proper type and length of
cable unless you're operating a wireless network. Cable connections are always
the better option because wireless networks are rarely trustworthy, scalable, or
economical ways to run a network in a business. There are many different varieties
of networking cables, including twisted pair, ethernet crossover, fiber optic,
coaxial, patch, and power lines. The amount of data flow a cable can deliver as
well as the length over which data may travel must be taken into account while
choosing cable. You must also take noise-related data loss into account.
Wi-Fi
Network Hardware
Using network wires to connect two computers does not create a network;
hubs and/or switches are required. However, you can link two PCs using crossover
cables, which are network cables that can send and receive data, but data transfer
is limited to just those two PCs.
9|Page
PAN THU (LEVEL – 3 BATCH – 11)
A hub is a device containing several RJ-45 (or ethernet) ports to which each
computer on a network connects through an ethernet connection. Each computer
on a network has a connecting point in a hub. When a computer sends data, it
goes to the hub, which then passes it on to the receiver. Data loss is a problem
with hubs. When computers are connected to a hub, each packet of data is
delivered to all computers connected to the hub, which can result in data loss and
collisions. It's similar to a group chat. It tends to get noisy and is ineffective for
one-on-one intimate communication.
A switch is similar to a hub in that it performs all of the same functions as
a hub, but it uses internal logic to create a dedicated, logical channel between
computers. This implies computers can interact without risk of data loss due to
collisions.
Routers link to broadband, DSL, and modems, but their role isn't to connect
to the internet; rather, it's to provide data paths from one network to another.
Some routers include an inbuilt hub that allows additional computers on a network
to connect. PCs are viewed as nodes on a network by routers.
Network Software
10 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
Peer to peer networking has a lower level of security for individual files. Other
than assigning permissions, there is no security. Even if permissions are set,
anyone with access to the system will be able to log in.
11 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
12 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
13 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
Functions of NIC
Router
14 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
Functions of Router
Switch
15 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
Functions of Switch
Functions of WAP
16 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
Even the smallest enterprises may now put up a network thanks to the
affordable prices and simple setup of wireless equipment. Wireless routers and
network cards are affordable, and a small amount of time is all it takes for the
average computer user to network a few devices. However, running a wireless
network that is unsecure or insufficiently secured exposes your business to a
number of risks.
Data Breaches
17 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
some criminals even set up their own wireless nodes while disguising them as
components of your network.
Malware Distribution
Loss of Customers
The clients and their willingness to do business with you in the future are
the lifeblood of any business. The consequences can be severe if a cyber attack
exposes the personal or financial information of your clients, or if private
information is made public. Fixing the issue will be expensive, time-consuming,
and, at the very least, cause your clients great discomfort. At worst, it can cost
them a substantial sum. If you gain a reputation as a company that doesn't
adequately protect customer data, you've given your clients a strong reason to go
elsewhere. Additionally, you can expose yourself to legal action.
A data breach may have serious legal and financial consequences. Banks
are typically the first point of call for customers who lose money as a result of
identity theft, but as a business, you might not. More importantly, your customers,
suppliers, or other parties can try to sue your business to recover their losses.
Even if your case is won in the end, lawsuit takes time and money. A judgment
holding your business responsible could have a negative impact, especially if it
exceeds the limits of your liability insurance. At the very least, such suits are
damaging to your reputation.
18 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
There are some essential network security procedures you should take to
cover the basics and make sure you have a first line of defense against potential
attacks, whether you work for yourself, own a small business, or are in charge of
the security of a large enterprise network.
Naturally, network security requirements will depend on how many devices
connect to the network. If your business has a large network with thousands of
linked devices, there will be a lot more actions you need to take to safeguard and
secure your network.
Install a Firewall
The first and most important step in creating a secure network is selecting
a firewall that fits the size and scope of your business. A network firewall aids in
securing the "ports" that cybercriminals use to breach your company's security
and steal your data. You can prevent opportunistic hackers from finding a weak
target by installing a powerful firewall.
Set up a VPN
19 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
The unthinkable does occasionally occur, when you are attacked and your
data is taken. The only thing that could save you in that situation would be your
data backups. For maximum security, you should back up your data every single
day, or at least once a week, and keep it offsite in a secure, flood- and fireproof
location.
Data backup should now be a part of a bigger disaster recovery plan (DRP).
One surefire strategy to stop serious harm in the event of a network breach is to
create a DRP. A mid-level manager or IT manager should be in charge of its
creation, storage, and retrieval during emergencies. It should have processes for
all types of attacks and disasters. Of course, you should give each employee a set
of tasks to complete, and you should regularly evaluate your strategies to make
sure they work.
20 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
First of all, to start building a network, the first thing we need is a router.
Without router, there won’t be any internet. So, I take a home router and connect
it with the internet. Then we need to give IP address which is essential. I go to
router GUI tab and give it a IP address as 192.168.0.1 as you can see in the
screenshot. I enable DHCP server which is to give IP address automatically to the
devices that connect to the router. I set the start-point of the IP address as
192.168.0.2 and maximum number of users as 50. That means if a device is the
first one to connect to this router, it IP address will be 192.168.0.2 and it will go
on until it reaches the maximum number of users and the IP address for the last
device will be 192.168.0.52. I set the maximum users as 50 because we are
building a network for a small office and the average users a day might be around
30. If we set a high number of users and there is only a few users in reality, it is
a waste of money and resources.
21 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
So I take 15 PC for 15 employees. I can just connect them to the router. But
router does have enough ports for 15 PC. We need to use switch. I take a switch
and connect the 15 PC to that switch and the switch to the router with the cables
as in the screenshot. If you check the IP configuration of the PCs, you can see
they has the order of IP address because of the DHCP server we set up in router.
After that we need to configure for the visitors. For the visitors, we need to
use wireless connection. Visitors might be using any devices such as laptop,
smartphone, or tablet. So I take two devices for each type to represent them. But
in reality, the number can be more or less. In this case, we can do the same as
the PCs for employees by connecting wirelessly to the router. It would be cheap
but it has disadvantages like junks or slow internet connections. There might be
because a lot of devices are connected to the same router, at the same time. I
use Access Point (AP) to avoid this. What AP do is that it gets the internet from
the router directly and gives it to those devices which connect it wirelessly without
losing any bandwidth. It might be a little expensive, but it worth the price. I
connect the AP to router with cable and visitors’ device to the AP with wireless
22 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
1. Directory Services
2. File Services
3. Telecommunication Services
4. Application Services
Directory Services
In order for a user to access the information, the protocols and network
topology are transparent in the Directory Services software system, which stores,
23 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
arranges, and provides access to the data from an operating system. This service
is a network service; therefore it will identify all resources, including email
addresses. The user can access these resources thanks to peripheral devices and
computers connected to the network. There are three categories related to the
directory service. They are Account Management, Authentication Management and
DNS.
Account Management
Users may control their accounts, network connectivity, and other things
using a service called account management. The network can be updated, added
to, or even changed by the user. Users of this service have complete control over
how they manage their accounts. The domain of network management is where
connections throughout the whole network are monitored. Users may manage
their accounts to access all resources and manage all device processes. Other
users who have been added have installed all of the network accounts, data, and
documents there. Without this service, a user couldn't edit anything in their
account if they needed to.
Authentication Management
DNS
24 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
letters. They may store the domain names in a large database and use the DNS
to convert them to IP addresses. If the IP address could not be found, the domain
name server would have to request that the correct IP address be found. One of
the key benefits of a DNS is the ability to access any website. The Internet
wouldn't exist if there weren't domain name servers.
File Services
File Transfer
The user may transmit and receive files and documents from other network
users via file transfer. In order to connect to the internet and transmit a few or a
single number of files to another device, the user would need the File Transfer
Protocol. A user must first lower the file's size if they must transmit a larger one
in order to send it. For instance, they have to deliver the file across the network
using a zip or compressed file. There are several services that let users to transfer
files from one computer to another, but the file transfer protocol is most typically
used by the user when downloading or uploading a file to a server. The user can
modify the file format while sending their data. Without the need for authentication
such as a username and password, several file transfer protocols allow users to
access files and data via the internet.
File Sharing
Users may share data with one another in the form of programs, images,
videos, documents, and more. You may decide whether to share your data openly
with lots of people or privately with only one or two people. A team of people may
finish a task by everyone reading, viewing, and modifying the same file at the
same time. This could involve the usage of online sharing services like Google
25 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
Drive and others. When a file is created, the user chooses and specifies the
individuals who have access to it. This allows for quicker and safer information
sharing and file access inside the firm. File sharing is mostly used in business and
in education.
Telecommunication Services
Email is now used for a sizable amount of business communication, both between
organizations and with clients. Communication is sped up when communications
are sent and received electronically. Email servers send, receive, store, and filter
data. Simple Mail Transfer Protocol (SMTP) servers, MX (mail exchange) servers,
and DNS servers all work together to decide how and where emails are sent based
on the email address entered in the "to" field.
Similar to texting, users could quickly and easily connect with other users
inside different divisions of a business or outside of a business using the instant
chat feature found on many social networking platforms today.
26 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
Social Networking
Remote Access
Application Services
Database
Application software helps the user do a variety of tasks. This might be done
for a variety of reasons, including academic, professional, and general ones. A
database is a sort of application software that lets you keep a lot of crucial data
organized or in a certain format on a device. Data is safely stored in databases.
Databases are mostly used by businesses to track their sales and consumer data.
Schools use databases to keep track of information such as student attendance.
When a database has a large amount of data, it is easy to find any given piece of
information. Additionally, you may create forms, queries, reports, etc. using
databases. This keeps your database structured and organized.
27 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
Proxy
A proxy server is a safe service that secures your network by filtering out
hazardous websites, just like a VPN does. Computer networks can link silently to
other network services like internet sources, photos, files, etc. using a specialized
device called a proxy server. A client and an internet source are not directly
connected. He or she is connected to a proxy server, which helps the client access
the internet and, among other things, request files that are kept on other servers.
When a person sees a website online, a proxy server keeps a record of it. This
makes it possible for the proxy server to more rapidly retrieve that webpage from
cached memory. Therefore, if many websites are opened or used regularly, they
can be saved in the proxy cache. The main functions of a proxy server are to speed
up internet resource access and scan for viruses and malware. Internet speed is
aided by proxy servers. It is used in schools to prevent unsuitable or harmful
websites.
Analog impulses are transformed into digital data through the voice over
internet protocol, or voice over ip. Online audio or video communication is made
possible by an application service called voice over. These days, this service
enables voice messaging and video chats between mobile devices (Smartphones)
via Wi-Fi or 4G. Additionally, a user can use an IP phone or another program that
consumes data packets to make a phone call via the internet. However, if two
customers communicate using the same service provider, VoIP may be free.
People increasingly utilize online voice through services like Skype to communicate
with friends and family who are located abroad. These voice-over systems are
more user-friendly and less costly.
28 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
Account Management
User accounts are crucial for networks because they let the network
administrator monitor each user's behavior. On a network, account management
is in charge of carrying out several responsibilities. The ability for users to have
accounts is the responsibility of account administration. Account management
helps to keep information private since, in contrast to this case, where only the
information's owner can access it, if a user saves information on the network,
anybody may be able to access it.
Advantages
29 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
Disadvantages
Users won't be able to log in to the network or access any of their personal
data kept on the network if a network active directory encounters downtime.
This is because if the active directory is down, the entire network would be
affected.
Another disadvantage of employing active directory account management on
a network is that users may not have complete authority over their devices,
making it impossible for them to install any necessary software.
Account Authentication
Advantages
Disadvantages
30 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
Domain names are changed into IP addresses using a DNS (Domain Name
Server) internet-based mechanism. TCP/IP protocols, a collection of rules used in
conjunction with how devices transmit data on the Internet and many private
networks, are utilized by DNS servers. Domain names are converted into readable
IP addresses and formatted alphabetically after that. Every web address starts
with a domain name, which must be converted into an IP address in order to be
read since they are easier for consumers to remember than IP addresses.
Advantages
Disadvantages
DNS redirection may result from improper DNS configuration. This means that
an user is taken to an entirely different place when they search for a website
and type the domain name into their web browser.
Another disadvantage of DNS is that it has some security flaws which could
make networks susceptible to third party threats relating to hacking.
31 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)
Reference Websites
https://www.belden.com/blogs/network-types
https://www.w3schools.in/types-of-network-protocols-and-their-uses
https://www.hitechwhizz.com/2020/11/7-advantages-and-disadvantages-drawbacks-benefits-
of-p2p-network.html
https://www.hitechwhizz.com/2020/11/5-advantages-and-disadvantages-drawbacks-benefits-
of-client-server-network.html
https://www.technologyuk.net/computing/computer-networks/network-
technologies/interconnection-devices.shtml
https://en.wikipedia.org/wiki/Network_service
https://www.nec.co.nz/market-leadership/publications-media/network-security-best-practices-
5-ways-to-make-your-company-network-secure/
https://tdwi.org/articles/2019/04/23/dwt-all-9-ways-to-make-your-company-network-
secure.aspx
32 | P a g e