Sei sulla pagina 1di 21

LEVEL 4 DIPLOMA IN COMPUTING

Unit:
Computer Network
ASSIGNMENT TITLE:
Cupcake Cyber Café
September 2017
Statement and Confirmation of Own Work
Program/Qualification name: Level 4 Diploma in Computing (L4DC)

Each NCC Education assessed assignment submitted by you must have


this statement attached to the assignment as the cover page or it will not
be accepted for marking. Please ensure that this statement is either firmly
attached to the cover of the assignment or electronically inserted into the
front of the assignment.
Student declaration

I have read and understood NCC Education’s Policy on Academic


Dishonesty.
I can confirm the following details:
Student ID/Registration number: 00166534
Name: Atiqul Islam
Centre Name: Daffodil International Academy
Module Name: Computer Network
Module Leader: Md. Sarwar Hossain Mollah

No unread replies. No replies.

I confirm that this is my own work and that I have not plagiarized any part
of it. I have also noted the assessment criteria and pass mark for
assignments.
Due Date: 28/07/2017

Student Signature: Atiqul Islam

Submitted Date: 28/07/2017


Contents
Introduction .................................................................................................................................................. 4
Task 1 ............................................................................................................................................................ 4
Networking Infrastructure and Protocols ..................................................................................................... 4
Ethernet and Wi-Fi ........................................................................................................................................ 4
Network Components ................................................................................................................................... 5
Purpose of OSI 7-layer model ....................................................................................................................... 6
Networking components .............................................................................................................................. 7
Task 3 ............................................................................................................................................................ 8
Network Components Address ..................................................................................................................... 8
Difference between MAC and IP Address ..................................................................................................... 9
Difference between IPv4 and IPv6 ................................................................................................................ 9
Differences .................................................................................................................................................. 10
Dynamic Host Configuration Protocol ........................................................................................................ 10
IP Routing Table .......................................................................................................................................... 11
Subnet Mask ............................................................................................................................................... 12
Task 3 .......................................................................................................................................................... 12
Security ....................................................................................................................................................... 12
(A) Haw the company may be at risk- ......................................................................................................... 12
(B)Recommendation for keep the network secure- ................................................................................... 13
(C) Biggest threat for this system- .............................................................................................................. 14
Task 4 .......................................................................................................................................................... 15
(A) Logical Network Diagram- ..................................................................................................................... 15
(B) Setting up IPv4 address for Network Diagram- ..................................................................................... 15
(C) Reason of choosing the particular hardware components – ................................................................ 16
(D) Providing local price and specifications – ............................................................................................. 17
Task 5 .......................................................................................................................................................... 18
(A) Haw VOIP works – ................................................................................................................................. 18
(B) Incorporating for VoIP in the Cyber Café – ........................................................................................... 18
Conclusion ................................................................................................................................................... 19
Introduction
Cupcake Cyber Café is a micro enterprise, as defined by the EC. It was opened to provide
Cupcake, but they are going to extend its services to adding Cyber Café with five computer and
Wi-Fi access for all customers. The manager wants to improve the accounting system by
replacing the TCR with tablets. The introduction of this topology will also enable sales staff to
take order on the shop floor, rather than just at the counter.

Task 1

Networking Infrastructure and Protocols


(A)

Ethernet and Wi-Fi


Ethernet

Ethernet is the most widely installed local area network (LAN) technology. Ethernet is a link
layer protocol in the TCP/IP stack, describing how networked devices can format data for
transmission to other network devices on the same network segment, and how to put that data
out on the network connection. Ethernet cables connect devices together within a local area
network, like PCs, routers, and switches. Ethernet cables normally support one or more industry
standards including Category5 (CAT5), CAT5e, CAT6, CAT6e, CAT6a and CAT7 but Category
5 and Category 6 are the most common. (techtarget.com, 2017)

Wi-Fi

Wi-Fi is a technology that uses radio waves to provide network connectivity. Wi-Fi connection is
established to using a wireless adapter to create hotspots - areas in the vicinity of a wireless
router that are connected to the network and allow users to access internet services.

(ccm.net, 2016)

Ethernet cabling Wi-Fi

Data rates IEEE 802.3 – 10 Mbps 802.11- 1 or 2 mbps in 2.4 GHz

IEEE 802.3u - 100 Mbps 802.11a- 54 mbps in 5GHz band

IEEE 802.3z - 1000 Mbps 802.11b- 11 mbps in 2.4 GHz

IEEE 802.3ae – 10 Gbps 802.11g- 54 mbps in 2.4 GHz


Advantage Packet dropping is very less in The major advantage of Wi-Fi is that it
Ethernet. It gives you fist, secured, is compatible with almost every
reliable transmission across them. operating system.

Disadvantage Ethernet cable runs, hubs, Complex propagation effects that


routers and switches connect the are beyond the control of the
networked computers adding to network administrator.
installation costs.

Security risk Viruses attract is a big problem Wi-Fi can be hacked from outside
of Ethernet networking. of office.

(lantronix.com, 2017)

(B)

Network Components
Different type of Topology

A network topology is the arrangement of a network, including its nodes and connecting lines.
There are two ways of defining network geometry: the physical
topology and the logical topology. The physical topology of a
network is the actual geometric layout of workstations. There
are several common physical topologies like:

a. Bus
b. Star
c. Ring
d. Tree
e. Mesh

Suitable network topology for Cupcake Cyber Cafe

I chose star topology as suitable network topology for Cupcake Cyber Café. In the star topology,
there is a central server to which all the unit are connected. Every unit is indirectly connected to
every other through the switch. In a star network, a cable failure will isolate the workstation that
it links to the switch, but only that workstation will be isolated. . All the other workstation will
continue to function normally.

Suitable Cable for This network

Cable Type Data Rate

CAT 6 Category 6 is a major improvement over Cat 5e. It’s really just the bee’s
knees. It’s suitable for up to 10 gigabit Ethernet at 250 MHz. To even
better tackle the issue of that pesky crosstalkin; Cat 6 cables has an
internal separator that isolates pairs from one another. For those who
want to “future-proof” their residential or commercial network as much
as possible without a significant cost increase, Cat 6 is a great choice.
(cableorganizer.com, 2002)

(techtarget.com, 2017)

(C)

Purpose of OSI 7-layer model


Layers Purpose

Physical Responsible for electrical signals, light signal, radio signals


etc. Hardware layer of the OSI layer devices like repeater,
hub, cables, Ethernet work on this layer. Protocols like
RS232, ATM, FDDI, Ethernet work on this layer.

Data link The data link layer is divided into two sub-layers-MAC and
LLC. The MAC sub layer controls haw a computer on the
network gains access to the data and permission to transmit
it. The LLC layer controls frame synchronization, flow control
and error checking.

Network Internetworking, error handling, congestion control and


packet sequencing work at this layer. Different network
protocols like TCP, IP, IPX and AppleTalk work at this layer.

Transport Responsible for end-to-end error recovery and flow control.


Responsible for complete data transfer. Protocols like SPX,
TCP, UDP work here.

Session The session layer sets up, coordinates and terminates


conversations, exchanges and dialogues between the
applications at each end. It deals with session and
connection coordination. Protocols like NFS, RPC, SQL,
work at this layer.

Presentation Encryption and decryption of the data, data semantics and


syntax. Presentation examples include encryption, ASCII,
EBCDIC, TIFF, GIF, PICT, JPEG, MPEG, MIDI.

Application Application layer supports application, apps and end-user


processes. This layer is responsible for application services
for file transfers, e-mail and other network software services.
Protocols like Telnet, FTP, HTTP work on this layer.
(fossbytes.com, 2017)

Figure 1 : OSI 7 Layer model

(D)

Networking components
A hub, in the context of networking, is a hardware device that
relays communication data. A hub sends
Hub Layer-1 data packets (frames) to all devices on a
network, regardless of any MAC addresses
contained in the data packet. NIC capacity
(10/100/1000 MBPS).
A network switch is use to connect devices together on network
by performing a form of packet
Switch Layer-1 switching. A switch will only send a
message to the device that needs or
requests it. The transmission speed in switches is double than in
Ethernet hub, a switch transferring 200Mbps connection to
become 300Mbps.

Wireless access point is a device that


creates a wireless local area network, or
WAP Layer-2 WLAN, usually in an office or large
building. An access point connects to a
wired router, switch, or hub via an
Ethernet cable, and projects a Wi-Fi signal
to a designated area.

Router is a network gateway device; it


connects two or more networks by
Router Layer-3 getting and sending data packets via IP
address at a same time. Router operates
at the network layer of the OSI model.

Task 3
(A)

Network Components Address


A network address serves as unique identification for a computer or
other device on a network. When setting up correctly, computers can
determine the addresses of other computers and devices on the
network and use these addresses to communication with one another.

(lifewire.com, 2017)
Difference between MAC and IP Address
MAC

A MAC (or Machine Access Control) addresses is provided in every networking component when
manufacturing. MAC addresses are typically used only to direct packets from one device to the next as
data travels on a network.

IP

An IP (Internet Protocol) address is assigned


to every device on a network, so that device
can be located on that network. TCP/IP
address always has a return IP address. Static IP is mostly used in business communicating purposes as it
is stable where Dynamic IP is unstable.

(askleo.com, 2017)

Difference between IPv4 and IPv6


IPv6 (Internet Protocol Version 6) is also called IPng (Internet Protocol next generation) and it is the
newest version of the Internet Protocol (IP) reviewed in the IETF standards committees to replace the
current version of IPv4 (Internet Protocol).

Internet Protocol Internet Protocol


Version 4 (IPv4) Version 6 (IPv6)
Deployed 1981 1999
Address Size 32-bit number 128-bit number

Address Format Dotted Decimal Notation: Hexadecimal Notation:


192.149.252.76 3FFE:F200:0234:AB00
0123:4567:8901:ABCD
Prefix Notation 192.149.0.0/24 3FFE:F200:0234::/48

Number of Addresses 2^32 = ~4,294,967,296 2^128 = ~340,282,366,


920,938,463,463,374,607,
431,768,211,456

IPv6 is the successor to Internet Protocol Version 4 (IPv4). It was designed as an evolutionary upgrade to
the Internet Protocol and will, in fact, coexist with the older IPv4 for some time. IPv4 address is a
combination of hexadecimal number (i.e. fe90:180e:90c7:d3b4:ec8d%8).

(webopedia.com, 2017)

(B)
Differences

Public IPv4 This standard used in ISP, public IPv4 is used globally for accessing the internet
immediately. The most internet service provider provides dynamic (unstable) IP
address which is unique and allows to wireless or routing system to access the
public IP address under DHCP control.
Private IPv4 It allows internet access to the networking devices of Cupcake Cyber Café which is
assigning private IP addresses, organized by local area network. Communicating
the outsider address using IP address, there is a configuration of Network Address
Translation protocol which can translate the private IP address to communicate
with public IP address.
Ranges of privet IP Ranges of Private IP start from-
Class A- 10.0.0.0 to 10.255.255.255,
Class B- 172.16.0.0 to 172.31.255.255
Class C- 192.168.0.0 to 192.168.255.255
(lifewire.com, 2017)

(C)

Dynamic Host Configuration Protocol


DHCP (Dynamic Host Configuration Protocol) is a communications protocol that network
administrators use to centrally manage and automate the network configuration of devices
attaching to an Internet Protocol (IP) network. DHCP allows devices needing an IP address to
request one when they are starting up, For
example, rather than an address reassigned
and manually configured on each device.

Uses of DHCP

Creating a DHCP host server protocol network


can be established where all the POS unit of
Cyber Café will continue sharing packet as a Figure 2 : How DHCP work
network provider.

For Cafe staffs and customers a wireless access point can be configured by DHCP protocol as
it can act as routable protocol. (techtarget.com, 2017)

(D)
IP Routing Table

A routing table is present on all IP nodes. The routing Table stores information about IP
networks and haw they can be reached (either directly or indirectly). Because all IP nodes
perform some form of IP routing, routing tables are not exclusive to IP routers. Any node loading
the TCP/IP protocol has a routing table. There are a series of default entries according to the
configuration of the node and additional entries can be entered either manually through TCP/IP
utilities or dynamically through interaction with routers.

Figure 3 : IP Routing Table

When IP packet is to be forwarded, the routing table is used to determine:

Figure 4 : How IP packet is to be forwarded

1. The forwarding or next-hop IP address:


For a direct delivery, the forwarding IP address is the destination IP address in the IP packet.
For an Indirect, the forwarding IP address is the IP address of a router.

2. The interface to be used for the forwarding:

The interface identifies the physical or logical interface such as a network adapter that is used
to forward the packet to either its destination or the next router.

(microsoft.com, 2017)

(E)

Subnet Mask
Subnet mask is a mask used to determine what subnet an IP address belongs to. An IP address
has two components, the network address and the host address. For example, consider the IP
address 150.215.017.009. Assuming this is part of a class B network, the first two number
(150.215) represent the class B network address, and the second two numbers (017.009)
identify a particular host on this network. Subnet mask uses “0” address for associating with
network address and “255” use for broadcasting the address to the local network. As a small
network, I think the Cupcake Café don’t need to subnet. (webopedia.com, 2017)

Task 3

Security

(A) Haw the company may be at risk-

Company faces many external and internal digital threats that can corrupt hardware and
compromise data. I’m giving some example of haw the company may be at risk by new Cyber
café and customer Wi-Fi -

Computer Virus

Perhaps the most well-known computer security threat, a computer virus is a program written to
alter the way a computer operates, without the permission or knowledge of the user. A virus
replicates and executes itself, usually doing damage to your computer in the process.

Phishing
Masquerading as a trustworthy person or business, phishers attempt to steal sensitive financial
or personal information through fraudulent email or instant messages.

Spyware

A serious computer security threat, spyware is any program that monitors your online activities
or installs programs without your consent for profit or to capture personal information.

Hackers & Predators

People, not computers, create computer security threats and malware. Hackers and predators
are programmers who victimize others for their own gain by breaking into computer systems to
steal, change or destroy information as a form of cyber-terrorism.

(B)Recommendation for keep the network secure-

It is highly recommended for the company to pay careful attention to security of their computers
and networks. Following recommendation should be taken to keep the network secure-

Firewall configurations

It’s important for firewall configurations to be regularly reviewed and independently audited to
ensure that only the absolutely necessary configuration is active.

Security Policies

Company needs to ensure that, there wireless passkey isn’t public information. Any device that
connects to your wireless network should be granted access to it by an staff member only.

Anti-malware

Anti-malware is always there for identifying the computer that has infected by malware. It has
also the efficiency to remove the malware from the infected computer. It’s also provide internet
security, browsing protection and get the email protect by being infected.

Restoring Point

Restoring Point by means of back up file system process is needed for keeping the company’s
data information if it loses at any condition. For instance-if any data will lose then the data can
be restored from the backup server.
(C) Biggest threat for this system-

Malicious threat, include Computer viruses, Trojan, worm and spyware. It is code or software
that is particularly intended to damage, steal, disrupt, or as a rule inflict some other “terrible” or
illegitimate activity on information, hosts, or network.

Security measure:

• Install antivirus software into the system and download updates to ensure that software has
the latest fixes for new viruses, Trojans, worms and bots.

• Ensure that antivirus software can scan email and the all the files downloaded from the
internet.

For better implementation, all the staff of the company should be well trained about the security
system of the company’s IT infrastructure.
Task 4

(A) Logical Network Diagram-

Figure 5 : Logical Network Diagram for Cupcake cafe

(B) Setting up IPv4 address for Network Diagram-


In the following diagram I have shown all the possible network setup among all unit. I have used
two servers one is main server and another is backup server. I have allocated all the IP ranges
192.168.1.1-192.168.2.4, for all the connection of this company i was fixed it in the same way
with also allocating subnet mask and default gateway.
Figure 6 : Setting up IPv4 address for Cupcake cafe Network Diagram

(C) Reason of choosing the particular hardware components –

For setting up the networking components, I have chosen some particular network components
like PC, firewall, VPN, servers, switches, cable and further more. As describing the connections,
I am providing an explanation of how the components are connected in the company diagram.

ISP means of internet service provider which provides every user to get accessed the internet.
By using firewall which is now a default application in the windows operating system. It helps to
protect the network against malware attack. I have used two servers in the company which is
connected via switches. The main server is for the instant controller of the internal workstations
and he backup server is there for supporting the main server if there is any critical damage in
main server. I have used the WAP to creating a wireless access point network. By using WAP
network, staffs and customer can connect to the internet using their mobiles and staff can
surface POS tablets. In the cyber cafe there are total 5 PC which are connected by 1 switch. I
have used one switch for each 5 PC workstations for reducing the complexities and used
another switch for setting up the POS unit.

(D) Providing local price and specifications –

Name Specification Price


Firewall Dual Core Celeron J1800 Bay Trail 2.4GHz, 2MB $169.00
L2 Cache. (amazon.com, 1996-
2017)
Switch 8 gigabit port switch Ethernet connection integrates $24.99
10/100/1000Mps with Auto-Negotiation. (amazon.com, 1996-
2017)
CAT 6 Cable Media bridge Ethernet Cable 50 Feet - Supports $9.49
Cat6 / Cat5e / Cat5 Standards, 550MHz, 10Gbps - (amazon.com, 1996-
RJ45 Computer Networking Cord (Part# 31-399- 2017)
50B )
Server 2017 Newest Dell PowerEdge T30 Tower Server $486.0
System| Intel Xeon E3-1225 v5 3.3GHz Quad (amazon.com, 1996-
Core, 8GB RAM, 1TB HDD, DVD RW. 2017)
Desktop PC HP Elite Windows 10 Desktop Computer C2D 3.0 $123.55
PC 4 GB 160 GB DVDRW Wi-Fi 17 inch Monitor (amazon.com, 1996-
LCD, Keyboard and Mouse. 2017)
Tablet Lenovo Tab 4, 10.1" Android Tablet, Quad-Core $179.99
Processor, 1.4GHz, 16GB Storage, Slate Black, (amazon.com, 1996-
ZA2J0007US. 2017)
Printer Canon MX492 Wireless All-IN-One Small Printer $45.79
with Mobile or Tablet Printing, Airprint and Google (amazon.com, 1996-
Cloud Print Compatible. 2017)
WAP Supports data rates up to 54 Mbps in up to 5 times $65.99
faster than 802.11b. Backwards compatible with (amazon.com, 1996-
existing IEEE 802.11b devices at 11 Mbps. 2017)
Task 5

(A) Haw VOIP works –

VoIP and analog voice calls are converted into packets of data. The packets travel like any
other type of data, such as e-mail, over the public Internet and/or any private Internet Protocol
(IP) network. Using a VoIP service, you can call landline or cell phones. You can also call
computer-to-computer, with both parties speaking into a computer microphone and listening
through computer speakers or headsets. (cisco.com, 2017)

(B) Incorporating for VoIP in the Cyber Café –


A VoIP phone system offers a lot of benefits and takes advantage of the data network. About
upgrading to an IP-based or internet phone system on Cyber cafe, here are some things to
consider:

1. Plan ahead: Before you can start researching IP-based phone systems, you need to have a
clear understanding of the features and capabilities your business and employees need.

2. Back-up land line and Internet connection. You should have a regular phone line and a
backup broadband connection.

3. Session Initiation Protocol support. Session Initiation Protocol (SIP) is a signaling protocol
used for controlling communication sessions over IP.

4. Flexibility. Small businesses are dynamic—constantly on the move. You need a phone
system that allows your employees to be productive no matter where work takes them.

5. Sound quality. We’ve all been on a call with bad sound quality. It’s frustrating at best and
unproductive at worst. Good call quality is essential to your business.

6. Scalability. As your business grows, you want a phone system that can grow with you as you
bring new employees on board or add a credit card terminal. (cisco.com, 2017)
Conclusion

Based on their requirements, I have try to make a well network diagram including hardware and
software components and recommended to use Cat 6 Ethernet cabling and 802.11n standard
WAP for maximum speed internet with a better security. Ultimately i full-fill all the requirements
and now it’s a complete network to use.

Bibliography
amazon.com (1996-2017), [Online], Available: https://www.amazon.com/dp/B01KLECNDG?psc=1 [24
julay 2017].

amazon.com (1996-2017), [Online], Available: https://www.amazon.com/TP-Link-Gigabit-Ethernet-


Unmanaged-TL-SG108/dp/B00A121WN6/ref=sr_1_20?s=electronics&ie=UTF8&qid=1500894837&sr=1-
20&keywords=switch [24 julay 2017].

amazon.com (1996-2017), [Online], Available: https://www.amazon.com/Mediabridge-Ethernet-Cable-


Feet-Networking/dp/B001W26TIW/ref=sr_1_9?s=electronics&ie=UTF8&qid=1500895143&sr=1-
9&keywords=cat+6+ethernet+cable [24 julay 2017].

amazon.com (1996-2017), [Online], Available: https://www.amazon.com/Newest-PowerEdge-Server-E3-


1225-Operating/dp/B0722J7NNX/ref=sr_1_3?s=pc&ie=UTF8&qid=1500895554&sr=1-
3&keywords=server [24 julay 2017].

amazon.com (1996-2017), [Online], Available: https://www.amazon.com/Cisco-Linksys-WAP54G-


Wireless-G-Access-Point/dp/B00007KDVJ/ref=sr_1_53?s=electronics&ie=UTF8&qid=1500896243&sr=1-
53&keywords=WAP [24 julay 2017].

amazon.com (1996-2017), [Online], Available: https://www.amazon.com/HP-Windows-Desktop-


Computer-Monitor/dp/B01ES0MUUA/ref=sr_1_1?ie=UTF8&qid=1500922024&sr=8-
1&keywords=desktop+computer+set [25 julay 2017].

amazon.com (1996-2017), [Online], Available: https://www.amazon.com/Lenovo-Android-Quad-Core-


Processor-ZA2J0007US/dp/B0711BT1QK/ref=sr_1_11?s=electronics&ie=UTF8&qid=1500922389&sr=1-
11&keywords=tablet [25 julay 2017].
amazon.com (1996-2017), [Online], Available: https://www.amazon.com/Canon-MX492-Wireless-
Printing-Compatible/dp/B00RN08584/ref=sr_1_2?s=electronics&ie=UTF8&qid=1500922947&sr=1-
2&keywords=wifi+Printer [25 julay 2017].

askleo.com (2017), [Online], Available:


https://askleo.com/whats_the_difference_between_a_mac_address_and_an_ip_address/ [23 Julay
2017].

cableorganizer.com (2002), [Online], Available: https://www.cableorganizer.com/telecom-


datacom/patch-cables-boots-plugs.html [23 julay 2017].

ccm.net (2016), 3 february, [Online], Available: http://ccm.net/faq/298-what-is-wifi-and-how-does-it-


work [19 julay 2017].

cisco.com (2017), [Online], Available: http://www.cisco.com/c/en/us/solutions/small-business/resource-


center/serve-customers-better/voip-how.html [25 julay 2017].

cisco.com (2017), [Online], Available: https://blogs.cisco.com/smallbusiness/top-6-considerations-when-


buying-a-phone-system [25 julay 2017].

fossbytes.com (2017), 1 January, [Online], Available: https://fossbytes.com/osi-model-7-layers-osi-


model-explained/ [11 Julay 2017].

lantronix.com (2017), 1 january, [Online], Available: https://www.lantronix.com/resources/networking-


tutorials/ethernet-tutorial-networking-basics/ [22 julay 2017].

lifewire.com (2017), [Online], Available: https://www.lifewire.com/introduction-to-network-addresses-


817378 [22 Julay 2017].

lifewire.com (2017), [Online], Available: https://www.lifewire.com/what-is-a-private-ip-address-


2625970 [23 Julay 2017].

microsoft.com (2017), [Online], Available: https://technet.microsoft.com/en-us/library/cc958823.aspx


[23 julay 2017].

techtarget.com (2017), [Online], Available:


http://searchunifiedcommunications.techtarget.com/definition/DHCP [23 julay 2017].

techtarget.com (2017), [Online], Available: http://whatis.techtarget.com/definition/network-topology


[23 julau 2017].

techtarget.com (2017), [Online], Available: http://searchnetworking.techtarget.com/definition/Ethernet


[25 julay 2017].

webopedia.com (2017), [Online], Available:


http://www.webopedia.com/DidYouKnow/Internet/ipv6_ipv4_difference.html [23 Julay 2017].
webopedia.com (2017), [Online], Available: http://www.webopedia.com/TERM/S/subnet_mask.html [23
julay 2017].

Potrebbero piacerti anche