Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Unit:
Computer Network
ASSIGNMENT TITLE:
Cupcake Cyber Café
September 2017
Statement and Confirmation of Own Work
Program/Qualification name: Level 4 Diploma in Computing (L4DC)
I confirm that this is my own work and that I have not plagiarized any part
of it. I have also noted the assessment criteria and pass mark for
assignments.
Due Date: 28/07/2017
Task 1
Ethernet is the most widely installed local area network (LAN) technology. Ethernet is a link
layer protocol in the TCP/IP stack, describing how networked devices can format data for
transmission to other network devices on the same network segment, and how to put that data
out on the network connection. Ethernet cables connect devices together within a local area
network, like PCs, routers, and switches. Ethernet cables normally support one or more industry
standards including Category5 (CAT5), CAT5e, CAT6, CAT6e, CAT6a and CAT7 but Category
5 and Category 6 are the most common. (techtarget.com, 2017)
Wi-Fi
Wi-Fi is a technology that uses radio waves to provide network connectivity. Wi-Fi connection is
established to using a wireless adapter to create hotspots - areas in the vicinity of a wireless
router that are connected to the network and allow users to access internet services.
(ccm.net, 2016)
Security risk Viruses attract is a big problem Wi-Fi can be hacked from outside
of Ethernet networking. of office.
(lantronix.com, 2017)
(B)
Network Components
Different type of Topology
A network topology is the arrangement of a network, including its nodes and connecting lines.
There are two ways of defining network geometry: the physical
topology and the logical topology. The physical topology of a
network is the actual geometric layout of workstations. There
are several common physical topologies like:
a. Bus
b. Star
c. Ring
d. Tree
e. Mesh
I chose star topology as suitable network topology for Cupcake Cyber Café. In the star topology,
there is a central server to which all the unit are connected. Every unit is indirectly connected to
every other through the switch. In a star network, a cable failure will isolate the workstation that
it links to the switch, but only that workstation will be isolated. . All the other workstation will
continue to function normally.
CAT 6 Category 6 is a major improvement over Cat 5e. It’s really just the bee’s
knees. It’s suitable for up to 10 gigabit Ethernet at 250 MHz. To even
better tackle the issue of that pesky crosstalkin; Cat 6 cables has an
internal separator that isolates pairs from one another. For those who
want to “future-proof” their residential or commercial network as much
as possible without a significant cost increase, Cat 6 is a great choice.
(cableorganizer.com, 2002)
(techtarget.com, 2017)
(C)
Data link The data link layer is divided into two sub-layers-MAC and
LLC. The MAC sub layer controls haw a computer on the
network gains access to the data and permission to transmit
it. The LLC layer controls frame synchronization, flow control
and error checking.
(D)
Networking components
A hub, in the context of networking, is a hardware device that
relays communication data. A hub sends
Hub Layer-1 data packets (frames) to all devices on a
network, regardless of any MAC addresses
contained in the data packet. NIC capacity
(10/100/1000 MBPS).
A network switch is use to connect devices together on network
by performing a form of packet
Switch Layer-1 switching. A switch will only send a
message to the device that needs or
requests it. The transmission speed in switches is double than in
Ethernet hub, a switch transferring 200Mbps connection to
become 300Mbps.
Task 3
(A)
(lifewire.com, 2017)
Difference between MAC and IP Address
MAC
A MAC (or Machine Access Control) addresses is provided in every networking component when
manufacturing. MAC addresses are typically used only to direct packets from one device to the next as
data travels on a network.
IP
(askleo.com, 2017)
IPv6 is the successor to Internet Protocol Version 4 (IPv4). It was designed as an evolutionary upgrade to
the Internet Protocol and will, in fact, coexist with the older IPv4 for some time. IPv4 address is a
combination of hexadecimal number (i.e. fe90:180e:90c7:d3b4:ec8d%8).
(webopedia.com, 2017)
(B)
Differences
Public IPv4 This standard used in ISP, public IPv4 is used globally for accessing the internet
immediately. The most internet service provider provides dynamic (unstable) IP
address which is unique and allows to wireless or routing system to access the
public IP address under DHCP control.
Private IPv4 It allows internet access to the networking devices of Cupcake Cyber Café which is
assigning private IP addresses, organized by local area network. Communicating
the outsider address using IP address, there is a configuration of Network Address
Translation protocol which can translate the private IP address to communicate
with public IP address.
Ranges of privet IP Ranges of Private IP start from-
Class A- 10.0.0.0 to 10.255.255.255,
Class B- 172.16.0.0 to 172.31.255.255
Class C- 192.168.0.0 to 192.168.255.255
(lifewire.com, 2017)
(C)
Uses of DHCP
For Cafe staffs and customers a wireless access point can be configured by DHCP protocol as
it can act as routable protocol. (techtarget.com, 2017)
(D)
IP Routing Table
A routing table is present on all IP nodes. The routing Table stores information about IP
networks and haw they can be reached (either directly or indirectly). Because all IP nodes
perform some form of IP routing, routing tables are not exclusive to IP routers. Any node loading
the TCP/IP protocol has a routing table. There are a series of default entries according to the
configuration of the node and additional entries can be entered either manually through TCP/IP
utilities or dynamically through interaction with routers.
The interface identifies the physical or logical interface such as a network adapter that is used
to forward the packet to either its destination or the next router.
(microsoft.com, 2017)
(E)
Subnet Mask
Subnet mask is a mask used to determine what subnet an IP address belongs to. An IP address
has two components, the network address and the host address. For example, consider the IP
address 150.215.017.009. Assuming this is part of a class B network, the first two number
(150.215) represent the class B network address, and the second two numbers (017.009)
identify a particular host on this network. Subnet mask uses “0” address for associating with
network address and “255” use for broadcasting the address to the local network. As a small
network, I think the Cupcake Café don’t need to subnet. (webopedia.com, 2017)
Task 3
Security
Company faces many external and internal digital threats that can corrupt hardware and
compromise data. I’m giving some example of haw the company may be at risk by new Cyber
café and customer Wi-Fi -
Computer Virus
Perhaps the most well-known computer security threat, a computer virus is a program written to
alter the way a computer operates, without the permission or knowledge of the user. A virus
replicates and executes itself, usually doing damage to your computer in the process.
Phishing
Masquerading as a trustworthy person or business, phishers attempt to steal sensitive financial
or personal information through fraudulent email or instant messages.
Spyware
A serious computer security threat, spyware is any program that monitors your online activities
or installs programs without your consent for profit or to capture personal information.
People, not computers, create computer security threats and malware. Hackers and predators
are programmers who victimize others for their own gain by breaking into computer systems to
steal, change or destroy information as a form of cyber-terrorism.
It is highly recommended for the company to pay careful attention to security of their computers
and networks. Following recommendation should be taken to keep the network secure-
Firewall configurations
It’s important for firewall configurations to be regularly reviewed and independently audited to
ensure that only the absolutely necessary configuration is active.
Security Policies
Company needs to ensure that, there wireless passkey isn’t public information. Any device that
connects to your wireless network should be granted access to it by an staff member only.
Anti-malware
Anti-malware is always there for identifying the computer that has infected by malware. It has
also the efficiency to remove the malware from the infected computer. It’s also provide internet
security, browsing protection and get the email protect by being infected.
Restoring Point
Restoring Point by means of back up file system process is needed for keeping the company’s
data information if it loses at any condition. For instance-if any data will lose then the data can
be restored from the backup server.
(C) Biggest threat for this system-
Malicious threat, include Computer viruses, Trojan, worm and spyware. It is code or software
that is particularly intended to damage, steal, disrupt, or as a rule inflict some other “terrible” or
illegitimate activity on information, hosts, or network.
Security measure:
• Install antivirus software into the system and download updates to ensure that software has
the latest fixes for new viruses, Trojans, worms and bots.
• Ensure that antivirus software can scan email and the all the files downloaded from the
internet.
For better implementation, all the staff of the company should be well trained about the security
system of the company’s IT infrastructure.
Task 4
For setting up the networking components, I have chosen some particular network components
like PC, firewall, VPN, servers, switches, cable and further more. As describing the connections,
I am providing an explanation of how the components are connected in the company diagram.
ISP means of internet service provider which provides every user to get accessed the internet.
By using firewall which is now a default application in the windows operating system. It helps to
protect the network against malware attack. I have used two servers in the company which is
connected via switches. The main server is for the instant controller of the internal workstations
and he backup server is there for supporting the main server if there is any critical damage in
main server. I have used the WAP to creating a wireless access point network. By using WAP
network, staffs and customer can connect to the internet using their mobiles and staff can
surface POS tablets. In the cyber cafe there are total 5 PC which are connected by 1 switch. I
have used one switch for each 5 PC workstations for reducing the complexities and used
another switch for setting up the POS unit.
VoIP and analog voice calls are converted into packets of data. The packets travel like any
other type of data, such as e-mail, over the public Internet and/or any private Internet Protocol
(IP) network. Using a VoIP service, you can call landline or cell phones. You can also call
computer-to-computer, with both parties speaking into a computer microphone and listening
through computer speakers or headsets. (cisco.com, 2017)
1. Plan ahead: Before you can start researching IP-based phone systems, you need to have a
clear understanding of the features and capabilities your business and employees need.
2. Back-up land line and Internet connection. You should have a regular phone line and a
backup broadband connection.
3. Session Initiation Protocol support. Session Initiation Protocol (SIP) is a signaling protocol
used for controlling communication sessions over IP.
4. Flexibility. Small businesses are dynamic—constantly on the move. You need a phone
system that allows your employees to be productive no matter where work takes them.
5. Sound quality. We’ve all been on a call with bad sound quality. It’s frustrating at best and
unproductive at worst. Good call quality is essential to your business.
6. Scalability. As your business grows, you want a phone system that can grow with you as you
bring new employees on board or add a credit card terminal. (cisco.com, 2017)
Conclusion
Based on their requirements, I have try to make a well network diagram including hardware and
software components and recommended to use Cat 6 Ethernet cabling and 802.11n standard
WAP for maximum speed internet with a better security. Ultimately i full-fill all the requirements
and now it’s a complete network to use.
Bibliography
amazon.com (1996-2017), [Online], Available: https://www.amazon.com/dp/B01KLECNDG?psc=1 [24
julay 2017].