Professional Documents
Culture Documents
SERVICES
Computer System
Contents
1.Networking infrastructure and Protocols.................................................................3
Token Ring............................................................................................................... 3
Ethernet and Structured cabling............................................................................. 3
Wi-Fi........................................................................................................................ 4
OSI 7 Layer Model................................................................................................... 4
Purpose of Seven Protocols..................................................................................... 5
Networking Components......................................................................................... 5
2.Addressing............................................................................................................... 7
Differences between a network address and a host address..................................7
Differences between Private IPv4 and public IPv4 address.....................................7
DHCP....................................................................................................................... 7
Differences IPv4 and IPv6........................................................................................ 7
Default gateway...................................................................................................... 8
Subnet Mask............................................................................................................ 8
IP routing table........................................................................................................ 9
Security.................................................................................................................... 10
Three (3) security concepts...................................................................................10
How would you ensure that there was a secure connection between the local and
head office networks?........................................................................................... 10
How would you ensure that users of the open access PC or the Wi-Fi cannot access
the local server?.................................................................................................... 10
4 measures that can help network secure.............................................................10
Biggest Threats..................................................................................................... 11
Logical network diagrams..................................................................................... 12
Allocate suitable IP address and add them in diagram..........................................12
Particular Hardware components..........................................................................12
Prices and Specification for hardware or software.................................................13
Remote access......................................................................................................... 14
VOIP....................................................................................................................... 14
Components and Outline....................................................................................... 14
Network performances.......................................................................................... 14
References................................................................................................................ 15
Cat-5
Cat-5e
Cat-6
100
100
100
Speed
(Mb/s)
10 100
X
X
X
X
X
X
Cat-6a
55 for 10 Gb/s
100
Length (meters)
(Gb/s)
1 10
Mhz
100
100
250
500
X
X
X
X
X
1.3 Wi-Fi
Mobile user can connect to a local area network through wireless connection. There are two
station for this topology, first station defines the radio parameter and a connection names
4. Transport Layer
3. Network Layer
applications.
Responsible for establishing paths for data transfer
1. Physical Layer
network nodes.
Responsible for the electrical, mechanical and timing
across the link.
1.4
OSI
Layer Model
IP Internet protocol
Developed for internet to get data from one network device to other ensure proper
transmission.
Located on transport layer
A set of communication guidelines that allow software to transmit email over the network.
Located on Application layer.
2.Addressing
2.1 Differences between a network address and a host address.
Network address
An identifier for a node or network interface of a telecommunication network
Host address
The portion of address used to identify hosts on the network.
2.3 DHCP
Known as Dynamic Host Configuration Protocol.
Which client protocol automatically provides internet protocol host with its IP address.
Why use DHCP?
Because every device on TCP/IP- based network must have a unique IP address in order to
access the network and its resources.
Automatically tell you how many hosts is allowed foe each class of network.
Required us to specify it independently.
The address doesnt give any information on the network size.
3.Security
3.1 Three (3) security concepts.
1. Power failure
Shutting computer down suddenly without proper shutdown procedures may cause
problems with rebooting operation system.
2. Theft of computer
Losing computer may be less painful, if you use proper data backup strategy and keep
data safe storage.
3. Mechanical damage of hard drive
Hard drive of computer is the most fragile parts; they break down more often than any
other device connected to computing.
3.2 How would you ensure that there was a secure connection between
the local and head office networks?
In order to ensure a secure connection between the local and head office is to set up a VPN for
both computers. VPN is a virtual private network in which the connection can be set up between
2 computers which establishes a secure path between computer with public internet access and
a computer that is connected private network.
3.3 How would you ensure that users of the open access PC or the Wi-Fi
cannot access the local server?
To ensure the user from accessing the local server is restricting server access to members of a
group only or create a firewall rule that grant access.
Limit access
Disk encryption automatically mandates the use of password.
The biggest threats for this company are ignoring the security update, which mostly they just
ignore and leave away.4.
19INCH
NETWORK
SERVER
RACK
FILING
the files.
Price = $375
MODE
OUMAN
2U
19INCH
APPLICATION SERVER
Which
handle
between
the
user
and
storage
and
server
is
computer
SWITCH
5.Remote access
5.1 VOIP
Stand for voice over IP and video conferencing.
Use IP network, namely the LAN and WAN to carry voice communication in which voices
originally carried over the circuit switched networks and designed to carry computer data and is
a packet switched network.
Outline
Signaling
Database services
Call connect and disconnect
Codec operation
References
Quora.com. N.p., 2016. Web. 3 May 2016.
N.p., 2016. Web. 3 May 2016.
"7 Greatest Causes Of Data Loss | Data Safety Tips". Databackuponlinestorage.com.
N.p., 2016. Web. 3 May 2016.
"Cabling Considerations For 10-Gigabit Ethernet". Cablinginstall.com. N.p., 2016.
Web. 3 May 2016.
"Ethernet". Wikipedia. N.p., 2016. Web. 3 May 2016.
"Explain When You Need A Default Gateway Set And Why?". Answers.yahoo.com.
N.p., 2016. Web. 3 May 2016.
Henry, Jerome. "WLAN Fundamentals > Wireless Networks And Topologies".
Ciscopress.com. N.p., 2016. Web. 3 May 2016.
"Host Address". Wikipedia. N.p., 2016. Web. 3 May 2016.
"How Does Voip Impact Network Performance - IT Answers". IT Answers. N.p., 2016.
Web. 3 May 2016.
"How To Set Up A Vpn Between Two Computers". wikiHow. N.p., 2016. Web. 3 May
2016.
mask?, Why. "Why Do We Need Subnet Mask?". Superuser.com. N.p., 2016. Web. 3
May 2016.
"Network Address". Wikipedia. N.p., 2016. Web. 3 May 2016.
Popeskic, Valter. "Voip Network Components". How does Internet work. N.p., 2012.
Web. 3 May 2016.
"Public And Private Addresses". Technet.microsoft.com. N.p., 2016. Web. 3 May
2016.
"Restrict Server Access To Members Of A Group Only". Technet.microsoft.com. N.p.,
2016. Web. 3 May 2016.
"What Is A Private IP Address?". WhatIsMyIPAddress.com. N.p., 2016. Web. 3 May
2016.
"What Is DHCP?". Technet.microsoft.com. N.p., 2016. Web. 3 May 2016.
"What Is Structured Cabling? ...And Why You Should Care". CABLExpress. N.p., 2016.
Web. 3 May 2016.
"What Is The Difference Between Ipv6 And Ipv4? - Webopedia.Com".
Webopedia.com. N.p., 2016. Web. 3 May 2016.
www.black-box.de, Black. "Token Ring". Black-box.de. N.p., 2016. Web. 3 May 2016.
Academy, C. (2016). The Routing Table (3.5) > Cisco Networking Academy's
Introduction to Routing Dynamically. [online] Ciscopress.com. Available at:
http://www.ciscopress.com/articles/article.asp?p=2180210&seqNum=12 [Accessed
31 Jan. 2016].
Access.redhat.com, (2016). Apache ActiveMQ - Using Networks of Brokers - Network
Topologies. [online] Available at: https://access.redhat.com/documentation/enUS/Fuse_ESB_Enterprise/7.1/html/Using_Networks_of_Brokers/files/FMQNetworksTop
ologies.html [3 May 2016].
All-about-computer-parts.com, (2016). List of computer network components.
[online] Available at: http://www.all-about-computerparts.com/computer_network_components.html [3 May 2016].
Anon, (2016). [online] Available at:
https://www.cyberstreetwise.com/cyberessentials/files/requirements.pdf [3 May
2016].
Anon, (2016). [online] Available at:
http://gonda.nic.in/swangonda/pdf/0789732556.pdf [Accessed 3 May 2016].
Anon, (2016). [online] Available at: https://www.juniper.net/techpubs/en_US/learnabout/ipv4-ipv6-differences.pdf [Accessed 3 May 2016].
Anon, (2016). [online] Available at: https://www.aelius.com/njh/subnet_sheet.html
[Accessed 3 May 2016
Antoniou, S., Antoniou, S. and Antoniou, S. (2016). Basic Networking Protocols: Part
1. [online] Blog.pluralsight.com. Available at: http://blog.pluralsight.com/cisco-basicnetworking-protocol-tcp-ip [Accessed 3 May 2016].
Arkfeld, M. (2016). Network Components. [online] Elawexchange.com. Available at:
http://www.elawexchange.com/index.php?
option=com_content&view=article&id=183&Itemid=248 [Accessed 3 May 2016].
author, A. and Laurie, V. (2016). Computer Protocols- TCP,IP, UDP, POP, SMTP, HTTP,
FTP, and More. [online] Vlaurie.com. Available at:
http://vlaurie.com/computers2/Articles/protocol.htm [Accessed 3 May 2016].