0% found this document useful (0 votes)
27 views33 pages

Assignment

The document provides an overview of various types of computer networks, including PAN, LAN, MAN, WAN, and VPN, along with their associated standards and protocols. It discusses the necessity of different network standards and protocols for interoperability, as well as the key components required for client workstations to connect to a network. Additionally, it evaluates the benefits and disadvantages of peer-to-peer and client/server networks, and highlights the importance of network security and the risks of insecure networks.

Uploaded by

williewispy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views33 pages

Assignment

The document provides an overview of various types of computer networks, including PAN, LAN, MAN, WAN, and VPN, along with their associated standards and protocols. It discusses the necessity of different network standards and protocols for interoperability, as well as the key components required for client workstations to connect to a network. Additionally, it evaluates the benefits and disadvantages of peer-to-peer and client/server networks, and highlights the importance of network security and the risks of insecure networks.

Uploaded by

williewispy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

ASSIGNMENT

Computer Network

BY PAN THU
LEVEL – 3 BATCH – 11
PAN THU (LEVEL – 3 BATCH – 11)

Contents
P1 - Types of networks available and how they relate to particular network standards and
protocols................................................................................................................................................ 2
P2 - Why different network standards and protocols are necessary ......................................... 6
P3 - The key components required for client workstations to connect to a network and
access network resources .................................................................................................................. 8
M1 - The benefits and disadvantages of peer-to-peer network and client/server networks
.............................................................................................................................................................. 10
P4 - The Function of Interconnection Devices............................................................................. 14
P6 - Making a networked system secure & ................................................................................... 16
M3 – Risks of Insecure Network and How they can be minimized .......................................... 16
M2 - Designing a networked solution to meet a particular situation with specific
requirements &................................................................................................................................... 21
D1 - Justifying the design and choice of components used in a particular networked
solution ................................................................................................................................................ 21
P5 - Typical Services provided by Networks ................................................................................ 23
D2 - evaluating typical services available from a network operating system directory
service .................................................................................................................................................. 29
Reference Websites ........................................................................................................................... 32

1|Page
PAN THU (LEVEL – 3 BATCH – 11)

P1 - Types of networks available and how they relate to


particular network standards and protocols

In today's enterprises and homes, a wide variety of networks, standards,


and protocols are available. One or more network standards and protocols are
associated to each type of network. The most popular network kinds, including
PAN, LAN, MAN, WAN, and VPN, are tied to specific network standards and
protocols in the following explanation.

Different Types of Network Area

PAN (Personla Area Network)

A computer network called a personal area network (PAN) connects


computers or other devices that are located close to a particular person. Personal
Area Networks (PANs) extend a network's range to within a person's physical
space, frequently within a 10 meter radius (33 feet). Computers, phones, tablets,
printers, PDAs (Personal Digital Assistants), and other entertainment systems like
speakers and gaming consoles make up a personal area network.

LAN (Local Area Network)

A local area network (LAN) is a collection of linked devices in a single


physical location, such as a house, office, or building. A LAN can be small or big,
supporting anything from a home network for a single user to an office or school
corporate network with thousands of users and devices. Cables, access points,
switches, routers, and other components make up a local area network (LAN),
which enables devices to connect to internal servers, web servers, and other LANs
across a wide area network. The two basic types of LANs are client/server and
peer-to-peer.

MAN (Metropolitan Area Network)


A large computer network that often connects many cities or campuses is
known as a metropolitan area network (MAN). In comparison to a LAN, a MAN
Network is intended to cover a larger geographic region, from a few buildings to

2|Page
PAN THU (LEVEL – 3 BATCH – 11)

whole cities. MAN Networks are formed by connecting many LANs. As a result,
MAN Networks are bigger than LANs but smaller than wide-area networks (WAN).
A sustained connection to the internet is what the MAN's (Metropolitan Area
Network) main purpose is to achieve. A metropolitan region's local area networks
(LANs) are connected to wider area networks like the Internet and given Internet
connection through the MAN Network. The goal of MAN is to establish a
communication channel between two different LAN nodes.

WAN (Wide Area Network)

A large information network that is not connected to a single place is


referred to as a wide area network (WAN). They are a kind of communication
network that may link equipment from around the globe. The biggest and most
comprehensive computer networks now available are WANs. WANs may enable
communication, information exchange, and much more between devices all over
the world through a WAN provider. WANs are essential for global corporations
since the internet is the biggest WAN in the world, but they are also required for
regular usage.

VPN (Virtual Area Network)

VPN refers to the capability of establishing a secure network connection


when utilizing public networks. VPNs mask your real identity online and encrypt
your internet traffic. Your internet data transfer is concealed and shielded from
prying eyes. Anyone who wants to view unencrypted data can do so if they have
network access. When utilizing a VPN, hackers and online criminals are unable to
decipher this data. As a consequence, it will be more difficult for other parties to
monitor your online activity and steal data. Real-time encryption is used
throughout.

Network Standards

IEEE 802.11 Standard

3|Page
PAN THU (LEVEL – 3 BATCH – 11)

Another name of 802.11 is Wi-Fi, and it allows users to communicate


wirelessly within a wireless local area network, usually to a router or hotspot. The
Institute of Electrical and Electronic Engineers (IEEE) created it as a standard and
it is the original wireless specification. The 802.11 standard's extensions were
given the same number with a letter suffix.
• 802.11 Provides up to 2Mbps transmission in the 2.4GHz band
• 802.11b Provides up to 11Mbps transmission in the 2.4GHz band
• 802.11a Provides up to 54Mbps transmission in the 5GHz band
• 802.11g Provides up to 54Mbps transmission in the 2.4GHz band
• 802.11n Provides up to 450Mbps transmission in the 2.4/5GHz band
Network types that are related to IEEE 802.11 might be LAN, MAN,
WAN and VPN.

IEEE 802.15 Standard

IEEE 802.15 is a working group of the IEEE 802 standards committee that
specifies wireless personal area network (WPAN) standards. They are:
• IEEE 802.15.1: WPAN / Bluetooth
• IEEE 802.15.2: Coexistence
• IEEE 802.15.3: High Rate WPAN
o IEEE 802.15.3-2003
o IEEE 802.15.3a
o IEEE 802.15.3a
o IEEE 802.15.3c-2009
• IEEE 802.15.4: Low Rate WPAN
PAN is the network area that is related to the IEEE 802.15 standard.

IEEE 802.3 Standard

IEEE 802.3 is the name of the working group assigned to create Ethernet-
based networks by the Institute of Electrical and Electronics Engineers (IEEE). The
Ethernet standard, also known as IEEE 802.3, defines the physical layer and the
media access control (MAC) of the data link layer for wired Ethernet networks,
often known as Local area networks (LAN). IEEE 802.3 defines the physical and
networking properties of an Ethernet network, such as how physical connections

4|Page
PAN THU (LEVEL – 3 BATCH – 11)

between nodes (routers, switches, and hubs) are created using wired media such
as copper coaxial or fiber cable.
IEEE 802.3 is related to PAN.

Network Protocols

HTTP (Hypertext Transfer Protocol)

The Hypertext Transfer Protocol (HTTP) is an application-level protocol for


hypermedia information systems that are dispersed and collaborative. Since 1990,
this has been the foundation for data transfer on the World Wide Web (i.e. the
internet). HTTP is a stateless protocol that can be extended to serve additional
purposes by modifying its request methods, error codes, and headers. HTTP is a
TCP/IP-based communication protocol for delivering data (HTML files, picture files,
query results, and so on) across the Internet.
There are a lot of network areas that are related to HTTP like WAN, LAN,
and VPN.

FTP (File Transfer Protocol)

The phrase file transfer protocol (FTP) refers to the process of transferring
files through a network between devices. The process works, when one party
allows another to send or receive files via the internet. Originally intended to allow
users to communicate and exchange data between two physical devices, tit is now
commonly used to store files in the cloud, which is usually a secure location that
is held remotely.
Network areas such as PAN, LAN, MAN and WAN are related to this protocol.

SMTP (Simple mail transport Protocol)

SMTP is a protocol for sending and receiving email between email servers
and email clients (such as Microsoft Outlook or UNIX and Linux's sendmail) (such
as Microsoft Exchange).

POP (Post office Protocol)

5|Page
PAN THU (LEVEL – 3 BATCH – 11)

For transmitting messages from an e-mail server to an e-mail client, the


post office protocol (POP) is the most widely used message request protocol on
the Internet.

IMAP (Internet Message Access Protocol)

IMAP is a protocol for accessing email or bulletin board messages from a


(potentially shared) mail server or service. IMAP enables clients to access remote
message stores as if they were local.

SMTP, POP and IMAP, all there of these protocols are probably use
in LAN, MAN, and WAN.

IP (Internet Protocol)

The method or protocol by which data is exchanged from one computer to


another over the internet is known as Internet Protocol (IP). Every computer on
the internet, known as a host, has at least one IP address that distinguishes it
from all other computers on the internet.
LAN, MAN, WAN and VPN network areas might relate to Internet Protocol.

P2 - Why different network standards and protocols are


necessary

The common language used by computers to communicate with one


another is called a protocol. Standards are requirements that organizations should
follow to while developing and producing equipment. To guarantee that networks
and the devices connected to them, such as mobile phones, tablets, laptops,
switches, and routers, can easily interact with one another, several network
standards and protocols are needed.

Why Standards are necessary

6|Page
PAN THU (LEVEL – 3 BATCH – 11)

Practically every company and government organization has standards. The


main objective of standards is to enable interoperability of hardware and software
from different suppliers. Without networking standards, it would be difficult, if not
impossible, to design networks that effortlessly transfer information. Standards
also prevent customers from being tied to a particular provider. Any supplier
whose products meet the standards may offer them hardware and software.
Standards help to create more competition and keep prices low in this way.
Since software and hardware can be developed one layer at a time, using
standards makes it much easier to develop software and hardware that connects
different networks.

Types of Standards

Formal and de facto standards are the two sorts of standards.


An official industry or government group creates a formal standard. For
example, formal standards exist for Web browsers (e.g., HTTP, HTML), network
layer software (e.g., IP), data link layer software (e.g., Ethernet IEEE 802.3), and
physical hardware (e.g., Ethernet IEEE 802.3). (e.g., V.90 modems). Formal
standards take several years to produce, during which time technology evolves
and makes them outdated.
De facto standards are those that originate in the marketplace and are
supported by a number of suppliers, but do not have official status. Microsoft
Windows, for example, is a single-company product that has yet to be formally
recognized by any standards organization, even though it is a de facto standard.
Once generally established, de facto standards in the communications industry
frequently become formal standards.

Why Protocols are necessary

Every industry, including society, research and technology, data


transmission, and the media, requires protocols, just like they require standards.
Protocols play a crucial role in digital communication because they define the
format, transmission, and reception of data. They are a collection of guidelines
that control the transmission of data through a network. It may also be explained
as a method of communication employed by the sender and receiver, the two
important players in a computer network. It outlines the many kinds of data that

7|Page
PAN THU (LEVEL – 3 BATCH – 11)

may be transmitted and received, the instructions that can be used to do so, and
the procedures for verifying data transfers.
A protocol is similar to a language in terms of structure. Every language
has its own set of laws and lexicon. Each protocol has its own set of rules,
standards, and implementations. When two people speak the same language, they
will be able to converse quickly and efficiently. Similarly, two hosts that use the
same protocol can simply connect and communicate with one another. As a result,
protocols provide a common language for network devices that communicate data.

Types of Protocols

Protocols can be divided into Standard Protocols and Proprietary Protocols.


A standard protocol is a protocol that must be followed by all devices. It is
a standard that supports many devices. Standard protocols aren't vendor-specific,
which means they don't apply to just one company or organization. They are
created by a team of professionals from various organizations. These protocols
are open source; therefore, we don't have to pay for them. FTP, DNS, DHCP,
SMTP, TELNET, TFTP, and other standard protocols are examples.
Individual organizations create proprietary protocols for their specific
devices. If we wish to use the organization's protocols, we must first obtain
authorization from them. It isn't a standard protocol, and it only works with a few
devices. These protocols may have to be paid for. Some of the examples of
Proprietary Protocols are IMessage, Apple Talk, etc.

P3 - The key components required for client workstations to


connect to a network and access network resources

I'll go over the major components needed for client workstations to connect
to a network and access network resources in this following. Connecting
workstations to networks necessitates a number of components, including both
hardware and software.

Network Adapters

8|Page
PAN THU (LEVEL – 3 BATCH – 11)

Network adapters, commonly referred to as network interface cards or


"NIC" cards, are plug-in devices that link a computer to a network and enable
communication between the machine and the network. I'll go through the key
elements required for client workstations to connect to a network and access
network resources in the section that follows. In the past, there were many
different types of network adapters available, including coaxial and arc net. It
takes a variety of hardware and software components to connect workstations to
networks.

Cables

To connect devices to a network, you'll need the proper type and length of
cable unless you're operating a wireless network. Cable connections are always
the better option because wireless networks are rarely trustworthy, scalable, or
economical ways to run a network in a business. There are many different varieties
of networking cables, including twisted pair, ethernet crossover, fiber optic,
coaxial, patch, and power lines. The amount of data flow a cable can deliver as
well as the length over which data may travel must be taken into account while
choosing cable. You must also take noise-related data loss into account.

Wi-Fi

A wireless network adapter, as well as a wireless switch, hub, or router, are


required if you wish to use wireless networking. A big facility will almost always
require several wireless access points to provide coverage in every location
because range is a significant problem with Wi-Fi. Thick flooring, walls, and
electrical interference from phones, microwaves, and other devices can all
contribute to signal problems by reducing or obstructing signals and causing
intermittent connections.

Network Hardware

Using network wires to connect two computers does not create a network;
hubs and/or switches are required. However, you can link two PCs using crossover
cables, which are network cables that can send and receive data, but data transfer
is limited to just those two PCs.

9|Page
PAN THU (LEVEL – 3 BATCH – 11)

A hub is a device containing several RJ-45 (or ethernet) ports to which each
computer on a network connects through an ethernet connection. Each computer
on a network has a connecting point in a hub. When a computer sends data, it
goes to the hub, which then passes it on to the receiver. Data loss is a problem
with hubs. When computers are connected to a hub, each packet of data is
delivered to all computers connected to the hub, which can result in data loss and
collisions. It's similar to a group chat. It tends to get noisy and is ineffective for
one-on-one intimate communication.
A switch is similar to a hub in that it performs all of the same functions as
a hub, but it uses internal logic to create a dedicated, logical channel between
computers. This implies computers can interact without risk of data loss due to
collisions.
Routers link to broadband, DSL, and modems, but their role isn't to connect
to the internet; rather, it's to provide data paths from one network to another.
Some routers include an inbuilt hub that allows additional computers on a network
to connect. PCs are viewed as nodes on a network by routers.

Network Software

Network software is what is needed to connect devices to a network. For


instance, drivers are necessary to ensure that network cards operate correctly in
a network. Drivers provide information and setup instructions that make sure a
variety of hardware parts are prepared for operation with a certain operating
system. TCP/IP protocols are an example of a software. Data is divided up into
"packets" for transmission using TCP, which helps speed up data transfer and
ensure data security by lowering data loss. The route information includes the IP
addresses of the sender and receiver. This can require configuration in order to
operate across a network.

M1 - The benefits and disadvantages of peer-to-peer network


and client/server networks

What is Peer-to-Peer Network

10 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

A peer-to-peer network allows computers to interact without the the need


of a central server, and each peer on the network can provide services that others
can use. Peer-to-peer networks, for example, are frequently less expensive since
they do not require the purchase of expensive servers or server software. This is
a very small network, with little more than 10 users. Users manage their own
devices; therefore, network managers are unnecessary. It can all be done using
the OS's features, which makes it a lot easier. There are a lot of home networking
books, so if one peer goes down, only that peer's service is lost.

Advantages of Peer-to-Peer Network

The cost of setting up and sustaining a peer-to-peer network is quite


inexpensive. Since there is no central configuration, the setup cost has been
considerably decreased.
A peer-to-peer network does not rely on a central system. That is, the
connected computers can operate independently of one another. Even if one
part of the network fails, the rest remains operational.
A peer-to-peer network is relatively simple to set up and requires no
advanced knowledge. The connection just requires the use of a hub or switch.
Since all users are given the right to operate their own systems, there is no
need for a specialized network administrator. They can choose which types of
files they want to share.
The resources are shared evenly among all users in Peer - to - peer network.
At the same time, networked devices can both provide and consume
resources. Peer to peer networking can also be used to quickly locate and
download internet files.

Disadvantages of Peer-to-Peer Network

Peer to peer networking has a lower level of security for individual files. Other
than assigning permissions, there is no security. Even if permissions are set,
anyone with access to the system will be able to log in.

11 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

There may be unprotected forms of codes present on a terminal in various


instances. If this is the case, there's a chance that files on a network could be
accessed without sufficient permissions by distant users. This can result in a
network being hacked.
As data is not centralized in P2P networks, backup is extremely challenging.
It is saved on a number of different platforms. As a result, each computer's
backup must be done separately.
Since each connected device is independent of the others, peer to peer
networks are more exposed to malware and virus attacks. If one of the
computers becomes infected with a virus, it can readily spread to the others,
even if they are protected by antivirus or firewall software.
Peer to peer networks are frequently used to share copyrighted information
such as movies and music via torrents. There is a risk of being banned from
the internet, receiving a warning from content creators, or even being
arrested as a result of this.

What is Client/Server Networks

In a client-server network, all requests for data or services are forwarded


through a central server, which then provides services to the network's client
Computers. Clients can use the server's services to perform tasks (such as word
processing), but there must be at least one server and one client. In comparison
to peer-to-peer networks, the client server network is best suited for larger
networks with a lot of traffic. This ability to handle a lot of traffic is the ideal use
of central administration for security, data sharing, resources, applications, and
backups, but it would require a lot of resources.

Advantages of Client/Server Networks

The main benefit of a client-server network is the centralized control it


provides. All of the necessary information is gathered in one spot. This is
particularly advantageous for network administrators, who have complete

12 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

control over management and administration. Any problem that arises


throughout the entire network can be resolved in one place.
For its centralized architecture, the data in a client-server network is
effectively protected. It can be enforced with access controls, allowing only
authorized people access. Imposing credentials such as login and password is
one such method.
Client-server networks have a lot of scalabilities. The user can expand the
number of resources such as clients and servers as needed. As a result, the
server's capacity can be increased without causing significant disruption.
It is relatively simple to manage files because they are all kept on a central
server. The best management for tracking and finding records of required
files is in a client-server network.
Every client, regardless of location or platform, is given the option to log into
the system.

Disadvantages of Client/Server Network

The most significant disadvantage of a client-server network is traffic


congestion. Too many clients making requests from the same server will
cause the connection to fail or slow down.
Client-server networks, as we all know, are centralized. In the event that the
primary server fails or is interfered with, the entire network will be affected.
As a result, client-server networks are lacking in terms of robustness.
The cost of setting up and maintaining a server in a client-server network is
typically higher than the cost of network operations.
It will work nonstop once the servers have been installed. That is to say, it
requires special care. If any issues arise, they must be handled as soon as
possible. As a result, the server should be maintained by a dedicated network
manager.
Not all of the server's resources are available to access. It is not possible, for
example, to print a document straight from the web or to edit any
information on the client hard disk drive.

13 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

P4 - The Function of Interconnection Devices

Any device that allows computers to exchange data through a network is


known as an interconnection device. The following sections explain the purpose of
interconnection devices and provide examples of interconnection devices in
networks.

Network Interface Card (NIC)

A network adapter is another name for a network interface card. A NIC is


required for any device that want to communicate and send/receive data. They're
normally inserted in the expansion slot of a computer, similar to how a graphics
card or sound card would be. A transceiver, which combines a transmitter and a
receiver, is included in the NIC. This makes data transmission easier, allowing the
gadget to send and receive information. The NIC also contains a MAC address
(also known as a hardware address) which is a unique, 48-bit identifier used by
many networking protocols including ethernet and 802.11 wireless. The following
is an example of a MAC address: 65:85:45: F2:C3:8N.
When multiple computers are linked together using NICs or other devices,
the resulting group is called a "network." When you connect your computer to the
Internet, you are actually connecting it to the largest network on the world.

Functions of NIC

It functions as a translator, assisting in the conversion of data into digital


signals.
It supports both wired and wireless connection methods.
It serves as a bridge between the computer and the data network.
It employs both the physical and data link layers of the OSI paradigm.

Router

A router acts as a bridge connecting two networks. A router serves two


main purposes. For instance, a router makes ensuring that data is sent to the
proper location, such as the right Internet provider and email recipient. The router

14 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

also prevents data from travelling to unauthorized destinations, such as


preventing a big file from being transmitted to all computers on a network, which
lowers network speed.
The router operates at the OSI model’s layer 3 at the network. A router's
primary function is to connect networks and to keep certain forms of broadcast
traffic under control so that traffic does not become jumbled. A router is capable
of routing a routed protocol. From one router to the next, an IP protocol can be
routed. A router protocol shares data first with close neighbors, then with the rest
of the network, allowing the router to learn about the network's structure.

Functions of Router

Interior router directs data between nodes on autonomous LANs


Exterior router directs data between nodes external to give autonomous LAN
Border routers connect a self-contained LAN to a wide-area network (WAN).
Network administrators design routers to use specified paths between nodes
in static routing.
Dynamic routing determines the optimum path between two nodes
automatically.
Information is accumulated in the routing table.

Switch

A switch is a network device that connects network segments and devices.


The switch has mostly replaced hubs and bridges in Local Area Networks because
it is considered a more intelligent device that improves network performance and
reduces the risk of connection issues. A switch keeps track of all the MAC
addresses that are attached to it so that it can figure out which device is connected
to which port. When a frame is received, it examines the target MAC address to
determine which port the data should be sent to. Unlike a hub, it does not just
send data out on all ports.
Switches also give all ports the same amount of bandwidth, so if a switch
is 10/100Mbps, all ports get the same amount of bandwidth. This is not the case
with a hub, because bandwidth is shared among all ports. Switches can be used

15 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

to connect a group of end-user devices (for example, workstations) or several


network segments.

Functions of Switch

Intelligently directs data to the correct network.


Connects multiple computers and devices to one network.

Wireless Access Point (WAP)

A wireless access point is a gadget that uses Wi-Fi or another comparable


technology to link wireless devices to a wired network. If a building has networked
devices, those gadgets can connect wirelessly to the internet without using cables.
The wireless access point broadcasts the signal that enables the client to connect
to the access point and direct traffic between the wireless and wired interfaces.
Stand-alone access points are small physical devices that closely resemble
home broadband routers. WAP are incorporated into the hardware of wireless
routers used for home networking, and they operate with stand-alone AP units. If
your current router doesn't support wireless devices, which is rare, you can
expand your network by adding a WAP device rather than a second router.

Functions of WAP

Connects to the internet without any need of wires.


All access points provide a similar set of features to network users because
the standard feature protocol is 802.11.

P6 - Making a networked system secure &


M3 – Risks of Insecure Network and How they can be
minimized

16 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

One of the most important aspects of business operations is network


security. Every organization must understand how to set up and maintain a secure
networked system.

Risks of Insecure Network

Even the smallest enterprises may now put up a network thanks to the
affordable prices and simple setup of wireless equipment. Wireless routers and
network cards are affordable, and a small amount of time is all it takes for the
average computer user to network a few devices. However, running a wireless
network that is unsecure or insufficiently secured exposes your business to a
number of risks.

Data Breaches

A breach of internal wireless networks opens the door to the invading


hacker. Once they have gained access to your network, they can view both your
data and that of your clients, which poses a serious risk to both your privacy and
the smooth running of your organization. Hackers may even lock you out of your
system, preventing you from accessing any of the data you require to run your
business. An attack using ransomware is what this is. With programs freely
available from the Internet, anyone can sit in a car outside your place of business
and enjoy access to your customer files, accounting data, usernames and
passwords, or any other information on the network. A competitor who has such
in-depth knowledge of your business poses a dangerous or even fatal threat to it.

Loss of Personal Data

Not just competitor businesses could be reading your mail. Small


businesses are targeted by criminals as a source of easily stolen personal
information while larger businesses grow more security conscious. As dangerous
as leaving your house unlocked or your keys in the car is believing that your
company is "too little to be a target." Unsecured networks and email can expose
your personnel and clients to a number of data-gathering assaults. Knowing that
nearby computers would attempt to connect with the strongest signal available,

17 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

some criminals even set up their own wireless nodes while disguising them as
components of your network.

Malware Distribution

The risk of malware distribution increases when using an unsecured Wi-Fi


network. The limited security settings that can be activated on mid- or low-end
technology are easily bypassed by hackers. Once inside, hackers can use your
network to spread dangerous software to unsuspecting users. What's worse in
these circumstances is that business users are often unaware of what is happening
if a hacker gains access to your network and sends malicious software. Long
stretches of time may pass before anything is discovered. Damage is frequently
already done by this point.

Loss of Customers

The clients and their willingness to do business with you in the future are
the lifeblood of any business. The consequences can be severe if a cyber attack
exposes the personal or financial information of your clients, or if private
information is made public. Fixing the issue will be expensive, time-consuming,
and, at the very least, cause your clients great discomfort. At worst, it can cost
them a substantial sum. If you gain a reputation as a company that doesn't
adequately protect customer data, you've given your clients a strong reason to go
elsewhere. Additionally, you can expose yourself to legal action.

Legal and Financial Risks

A data breach may have serious legal and financial consequences. Banks
are typically the first point of call for customers who lose money as a result of
identity theft, but as a business, you might not. More importantly, your customers,
suppliers, or other parties can try to sue your business to recover their losses.
Even if your case is won in the end, lawsuit takes time and money. A judgment
holding your business responsible could have a negative impact, especially if it
exceeds the limits of your liability insurance. At the very least, such suits are
damaging to your reputation.

18 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

Making the Network Secure

There are some essential network security procedures you should take to
cover the basics and make sure you have a first line of defense against potential
attacks, whether you work for yourself, own a small business, or are in charge of
the security of a large enterprise network.
Naturally, network security requirements will depend on how many devices
connect to the network. If your business has a large network with thousands of
linked devices, there will be a lot more actions you need to take to safeguard and
secure your network.

Install a Firewall

The first and most important step in creating a secure network is selecting
a firewall that fits the size and scope of your business. A network firewall aids in
securing the "ports" that cybercriminals use to breach your company's security
and steal your data. You can prevent opportunistic hackers from finding a weak
target by installing a powerful firewall.

Set up a VPN

A critical follow-up to setting up a firewall is configuring a VPN. Through the


use of a VPN, you may connect to your network and access the internet while
keeping your online behavior and data hidden from any unauthorized parties. This
is especially useful if you allow your employees to work remotely since there are
many remote access risks that a VPN helps to mitigate.

Install Antivirus Software

In the modern technological environment, antivirus software is crucial. It


aids in the removal of viruses, spyware, and adware—all of which are used by wily
hackers to enter your network and inflict additional harm. Additionally, antivirus
software can identify and stop any harmful programs from being installed on your
devices because most employees don't always follow safe computing practices,
increasing the risk of infection on your system.

19 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

Update your Firmware

At the moment, firmware security is fragile and dangerous. Even while


progress has been made, there is still a long way to go before firmware is as
secure as other computer components. If you don’t want your firmware failing
your small business network security, then your best is to employ a policy of
looking for updates and updating your firmware to the latest version as quickly as
possible to close security holes and ensure proper functioning of your hardware.

Train the Employees

To review IT security best practices, hold regular training sessions.


Additionally, you ought to work to create a culture of cybersecurity awareness.
Your company will be safer the more educated your staff are about their part in
small business network security.

Backup the Data

The unthinkable does occasionally occur, when you are attacked and your
data is taken. The only thing that could save you in that situation would be your
data backups. For maximum security, you should back up your data every single
day, or at least once a week, and keep it offsite in a secure, flood- and fireproof
location.

Develop a Data Recovery Plan

Data backup should now be a part of a bigger disaster recovery plan (DRP).
One surefire strategy to stop serious harm in the event of a network breach is to
create a DRP. A mid-level manager or IT manager should be in charge of its
creation, storage, and retrieval during emergencies. It should have processes for
all types of attacks and disasters. Of course, you should give each employee a set
of tasks to complete, and you should regularly evaluate your strategies to make
sure they work.

20 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

M2 - Designing a networked solution to meet a particular


situation with specific requirements &
D1 - Justifying the design and choice of components used in a
particular networked solution

First of all, to start building a network, the first thing we need is a router.
Without router, there won’t be any internet. So, I take a home router and connect
it with the internet. Then we need to give IP address which is essential. I go to
router GUI tab and give it a IP address as 192.168.0.1 as you can see in the
screenshot. I enable DHCP server which is to give IP address automatically to the
devices that connect to the router. I set the start-point of the IP address as
192.168.0.2 and maximum number of users as 50. That means if a device is the
first one to connect to this router, it IP address will be 192.168.0.2 and it will go
on until it reaches the maximum number of users and the IP address for the last
device will be 192.168.0.52. I set the maximum users as 50 because we are
building a network for a small office and the average users a day might be around
30. If we set a high number of users and there is only a few users in reality, it is
a waste of money and resources.

As it is said in the scenario, we need to connect two types of connection;


wire and wireless. We need to use wire connection for the employees of the office.

21 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

So I take 15 PC for 15 employees. I can just connect them to the router. But
router does have enough ports for 15 PC. We need to use switch. I take a switch
and connect the 15 PC to that switch and the switch to the router with the cables
as in the screenshot. If you check the IP configuration of the PCs, you can see
they has the order of IP address because of the DHCP server we set up in router.

After that we need to configure for the visitors. For the visitors, we need to
use wireless connection. Visitors might be using any devices such as laptop,
smartphone, or tablet. So I take two devices for each type to represent them. But
in reality, the number can be more or less. In this case, we can do the same as
the PCs for employees by connecting wirelessly to the router. It would be cheap
but it has disadvantages like junks or slow internet connections. There might be
because a lot of devices are connected to the same router, at the same time. I
use Access Point (AP) to avoid this. What AP do is that it gets the internet from
the router directly and gives it to those devices which connect it wirelessly without
losing any bandwidth. It might be a little expensive, but it worth the price. I
connect the AP to router with cable and visitors’ device to the AP with wireless

22 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

connection. If we check the IP configuration of the visitors’ devices, we can see


the IP address in order due to the DHCP server. Now, the network for a small
office has completed.

P5 - Typical Services provided by Networks

There are four main services provided by Networks. These include –

1. Directory Services
2. File Services
3. Telecommunication Services
4. Application Services

Directory Services

In order for a user to access the information, the protocols and network
topology are transparent in the Directory Services software system, which stores,

23 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

arranges, and provides access to the data from an operating system. This service
is a network service; therefore it will identify all resources, including email
addresses. The user can access these resources thanks to peripheral devices and
computers connected to the network. There are three categories related to the
directory service. They are Account Management, Authentication Management and
DNS.

Account Management

Users may control their accounts, network connectivity, and other things
using a service called account management. The network can be updated, added
to, or even changed by the user. Users of this service have complete control over
how they manage their accounts. The domain of network management is where
connections throughout the whole network are monitored. Users may manage
their accounts to access all resources and manage all device processes. Other
users who have been added have installed all of the network accounts, data, and
documents there. Without this service, a user couldn't edit anything in their
account if they needed to.

Authentication Management

The process used to identify a user who attempts to access a network


system is called authentication management. When a user enters their username
and password, the system checks to see if they are already in the database, and
if they are, it grants them access to the system with the necessary level of
privileges. Accounts are necessary because it is crucial that sensitive material
cannot be viewed by the general public while it is being kept or sent. Additional
security measures can include security questions or puzzles for login as well as
two-factor authentication, which involves identifying a person based on something
they know and it's something they psychically own.

DNS

A technology called a domain name server, or DNS, enables the conversion


of a website's domain name into an IP address. The IP address is expressed with
decimal separators between the numbers and the domain name is put in capital

24 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

letters. They may store the domain names in a large database and use the DNS
to convert them to IP addresses. If the IP address could not be found, the domain
name server would have to request that the correct IP address be found. One of
the key benefits of a DNS is the ability to access any website. The Internet
wouldn't exist if there weren't domain name servers.

File Services

The management of files on a network device is aided by file services. In


order for users to exchange data inside an organization, structure, etc., file
services are necessary. You may use it to transfer data over a network. A user
can utilize file services to transfer data without needing an external hard disk or
other device. In order for users to backup data as needed, file services also store
files. File Transfer and File Sharing are a few of instances of file services.

File Transfer

The user may transmit and receive files and documents from other network
users via file transfer. In order to connect to the internet and transmit a few or a
single number of files to another device, the user would need the File Transfer
Protocol. A user must first lower the file's size if they must transmit a larger one
in order to send it. For instance, they have to deliver the file across the network
using a zip or compressed file. There are several services that let users to transfer
files from one computer to another, but the file transfer protocol is most typically
used by the user when downloading or uploading a file to a server. The user can
modify the file format while sending their data. Without the need for authentication
such as a username and password, several file transfer protocols allow users to
access files and data via the internet.

File Sharing

Users may share data with one another in the form of programs, images,
videos, documents, and more. You may decide whether to share your data openly
with lots of people or privately with only one or two people. A team of people may
finish a task by everyone reading, viewing, and modifying the same file at the
same time. This could involve the usage of online sharing services like Google

25 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

Drive and others. When a file is created, the user chooses and specifies the
individuals who have access to it. This allows for quicker and safer information
sharing and file access inside the firm. File sharing is mostly used in business and
in education.

Telecommunication Services

Long-distance communication and data transmission is usually


accomplished using telecommunication systems. VOIP-based internal digital
telecommunications systems are common in today's enterprises. It may be
controlled by a network, allowing one device to connect to another within a
network without needing to connect to an outside line or go through a traditional
telecommunications company. This helps the company save time and money. In-
house management of additional telecommunications networks by businesses is
common. Other communication systems, such as Email, IRC (internet relay chat),
Social Networking, and Remove Access are frequently used by businesses
internally.

Email

Email is now used for a sizable amount of business communication, both between
organizations and with clients. Communication is sped up when communications
are sent and received electronically. Email servers send, receive, store, and filter
data. Simple Mail Transfer Protocol (SMTP) servers, MX (mail exchange) servers,
and DNS servers all work together to decide how and where emails are sent based
on the email address entered in the "to" field.

IRC (Internet Relay Chat)

Similar to texting, users could quickly and easily connect with other users
inside different divisions of a business or outside of a business using the instant
chat feature found on many social networking platforms today.

26 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

Social Networking

This is an internet platform that enables people to communicate online


using devices including computers, tablets, and mobile phones. The most popular
social networking sites nowadays include Facebook, Twitter, Instagram, Flickr,
WhatsApp, etc. Users build profiles on these sites by updating information about
their interests, hobbies, etc. and uploading images. People may socialize using
these social networking sites while relaxing at home or dozing off in bed. They can
converse without ever meeting in person.

Remote Access

Remote access is necessary for working from home or providing technical


help. If a user needs help, remote access enables technical support to remotely
log in to their device and address issues. Employees who want to work from home
but need access to their office computer might do so using remote access from
their home computer.

Application Services

Application services manage software-based services and provide users


over a network solution. These services offer communication for server networks
or peer-to-peer networks. You may access networked files and other software
programs through these services as well. They may include Database, Proxy and
Voice Over IP (VoIP).

Database
Application software helps the user do a variety of tasks. This might be done
for a variety of reasons, including academic, professional, and general ones. A
database is a sort of application software that lets you keep a lot of crucial data
organized or in a certain format on a device. Data is safely stored in databases.
Databases are mostly used by businesses to track their sales and consumer data.
Schools use databases to keep track of information such as student attendance.
When a database has a large amount of data, it is easy to find any given piece of
information. Additionally, you may create forms, queries, reports, etc. using
databases. This keeps your database structured and organized.

27 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

Proxy

A proxy server is a safe service that secures your network by filtering out
hazardous websites, just like a VPN does. Computer networks can link silently to
other network services like internet sources, photos, files, etc. using a specialized
device called a proxy server. A client and an internet source are not directly
connected. He or she is connected to a proxy server, which helps the client access
the internet and, among other things, request files that are kept on other servers.
When a person sees a website online, a proxy server keeps a record of it. This
makes it possible for the proxy server to more rapidly retrieve that webpage from
cached memory. Therefore, if many websites are opened or used regularly, they
can be saved in the proxy cache. The main functions of a proxy server are to speed
up internet resource access and scan for viruses and malware. Internet speed is
aided by proxy servers. It is used in schools to prevent unsuitable or harmful
websites.

Voice Over IP (VoIP)

Analog impulses are transformed into digital data through the voice over
internet protocol, or voice over ip. Online audio or video communication is made
possible by an application service called voice over. These days, this service
enables voice messaging and video chats between mobile devices (Smartphones)
via Wi-Fi or 4G. Additionally, a user can use an IP phone or another program that
consumes data packets to make a phone call via the internet. However, if two
customers communicate using the same service provider, VoIP may be free.
People increasingly utilize online voice through services like Skype to communicate
with friends and family who are located abroad. These voice-over systems are
more user-friendly and less costly.

28 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

D2 - evaluating typical services available from a network


operating system directory service

In the following, I’ll be explaining the typical services available from a


network operating system directory service. They will include Account
Management, Account Authentication and DNS. I will be going over the
advantages and disadvantages of each of these directory service.

Account Management

User accounts are crucial for networks because they let the network
administrator monitor each user's behavior. On a network, account management
is in charge of carrying out several responsibilities. The ability for users to have
accounts is the responsibility of account administration. Account management
helps to keep information private since, in contrast to this case, where only the
information's owner can access it, if a user saves information on the network,
anybody may be able to access it.

Advantages

One main benefit of account management is that it allows a network


administrator to keep an eye on and monitor every user activity on a network.
If a user were to violate a network regulation, the user could then be quickly
recognized and interrogated.
Another benefit of using directory services for account management on a
network is that the network administrator may create a set of group policies to
limit user access to particular sections of the network. This speeds up and
simplifies the process for network administrators.
Account management is useful as it enables users to access the network's
system from a variety of devices using the same username and password they
initially created on the network. This saves users from having to remember a
large number of different usernames and passwords, makes login easier, and
maintains account security for users.

29 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

Disadvantages

Users won't be able to log in to the network or access any of their personal
data kept on the network if a network active directory encounters downtime.
This is because if the active directory is down, the entire network would be
affected.
Another disadvantage of employing active directory account management on
a network is that users may not have complete authority over their devices,
making it impossible for them to install any necessary software.

Account Authentication

Authentication is the process of determining whether someone or


something is who or what it is declared to be. In short, authentication determines
whether or not a user has access to particular networked files or folders. Active
directories on a network can be used for authentication.

Advantages

A network that uses authentication has the advantage of maintaining network


security, privacy, and integrity by preventing users without the necessary
permissions from accessing files and folders they shouldn't be able to.
Another benefit of authentications is that they are extremely efficient while yet
being very user-friendly and universal.
Authentication is simple to set up and doesn't always cost much money.

Disadvantages

The fact that password-based authentication is not as secure as other


authentication methods, such as multi-factor and others, is a disadvantage of
network authentication.
Authentication is also heavily reliant upon honesty amongst user’s. For
instance, if a user shares their password with a third party, this poses a serious
risk to the network since the user may not be who they say they are if the
account is used by the outside party. This is bad for networks because it
endangers the security and privacy of data and information stored on them.

30 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

DNS (Domain Name Server)

Domain names are changed into IP addresses using a DNS (Domain Name
Server) internet-based mechanism. TCP/IP protocols, a collection of rules used in
conjunction with how devices transmit data on the Internet and many private
networks, are utilized by DNS servers. Domain names are converted into readable
IP addresses and formatted alphabetically after that. Every web address starts
with a domain name, which must be converted into an IP address in order to be
read since they are easier for consumers to remember than IP addresses.

Advantages

A benefit of a DNS [Domain Name Server] is that it is supported by a sizable


network of other DNS servers that are identical or similar to it. As a result, if
one DNS server is unable to convert a domain name into an IP address, the
current DNS server can use an additional DNS to help the first DNS with the
converting.
Another benefit of a DNS is that it makes it easier for users to remember web
addresses because they only need to remember the domain name rather than
the IP address, which speeds up and simplifies online search for users.

Disadvantages

DNS redirection may result from improper DNS configuration. This means that
an user is taken to an entirely different place when they search for a website
and type the domain name into their web browser.
Another disadvantage of DNS is that it has some security flaws which could
make networks susceptible to third party threats relating to hacking.

31 | P a g e
PAN THU (LEVEL – 3 BATCH – 11)

Reference Websites

https://www.belden.com/blogs/network-types
https://www.w3schools.in/types-of-network-protocols-and-their-uses
https://www.hitechwhizz.com/2020/11/7-advantages-and-disadvantages-drawbacks-benefits-
of-p2p-network.html
https://www.hitechwhizz.com/2020/11/5-advantages-and-disadvantages-drawbacks-benefits-
of-client-server-network.html
https://www.technologyuk.net/computing/computer-networks/network-
technologies/interconnection-devices.shtml
https://en.wikipedia.org/wiki/Network_service
https://www.nec.co.nz/market-leadership/publications-media/network-security-best-practices-
5-ways-to-make-your-company-network-secure/
https://tdwi.org/articles/2019/04/23/dwt-all-9-ways-to-make-your-company-network-
secure.aspx

32 | P a g e

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy