Assignment Document

Network Infrastructure and Protocols

Pages:

Preview:


  • " ComputerNetworking Table of ContentsTask 1 – Network Infrastructure and Protocols ...................................................................................... 1a) Difference between Ethernet and wireless connections. .......................

Preview Container:


  • " ComputerNetworking Table of ContentsTask 1 – Network Infrastructure and Protocols ...................................................................................... 1a) Difference between Ethernet and wireless connections. .................................................................. 1b) Networking Components .................................................................................................................... 2c) Purpose of OSI Layer ......................................................................................................................... 3d) Seven Protocol ..................................................................................................................................... 5Task 2 – Addressing .................................................................................................................................... 6a) Explain why network components need addresses. ......................................................................... 6b) Difference between public IP Address and Private IP Address...................................................... 7c) Explain what is meant by DHCP. ...................................................................................................... 8d) ARP ...................................................................................................................................................... 8e) Default Gateway and Subnet Mask ................................................................................................... 9f) IP Routing Table ................................................................................................................................. 9Task 3 - Security........................................................................................................................................ 11a) Security Measures for the Network ................................................................................................. 11b) Threat for the System ....................................................................................................................... 12Task 4 – Diagram and Explanation ......................................................................................................... 13a) Logical Network Diagram ................................................................................................................ 13b) IP Address and Subnet Mask ........................................................................................................... 14c) Hardware Components..................................................................................................................... 17Task 5 – Remote Access ............................................................................................................................ 20a) Secure Remote Access ....................................................................................................................... 20b) Remote Access Requirement ............................................................................................................ 20References .................................................................................................................................................. 21 Task 1 – Network Infrastructure and Protocolsa) Difference between Ethernet and wireless connections.WI-FI It connects the tablets,PCs, mobile phones and laptops to the internet without anyphysical wired connection. The Wi-Fi uses the radio signals to transmit the information betweenthe Wi-Fi enabled devices. Wi-Fi also uses the radio technology. It is more convenient because,it does not have any cable or wired connection but, speed is slow when compared withtheEthernet. It is useful for the smart phones and portable devices. It has more security because,the data is encrypted (MakeUseOf, 2017). Ethernet It is used to connect the computer in a LAN (local area network). It is most commonlyused method for connecting the computers in a local area network. Ethernet uses cabling. But, ithas very faster speed, lower latency and no interference problems. It is useful for the laptops,desktops and PCs. It involves physical connection and it provides faster transfer speed. It hasmore security than Wi-Fi because, the data will be accessed by physically attached devicesfromthe network (quora, 2017).1The business requirement of the network uses Ethernet. Because, it uses cabling so thedata is more secure. It has high data rate and faster speed than the wireless connection.b) Networking ComponentsHub, access point, router and switches are used in the network to connect the computerwith the network. But, these components have different capabilities.Hub Computers can be connected to the network by using the hubs. Hub is connected with thecomputer through cables. Hub is used to transfer the information from one computer to anothercomputer. But, it cannot identify the source and destination of the information. It will sendinformation to all the computers connected in the hub. It cannot send and receive the informationat the same time. In OSI layer, the hub is used in the physical layer.Switch The functions of switch is similar to hub. But, switches can identify the source ofinformation. Hence, it will send information onlyto the intended computer.It can send andreceive information at the same time. Switches are faster than hubs and are suitable for officeand home network, where more computers are used to access the information through thenetwork. In OSI layer switch is used in the Data link layer (orbit-computer-solutions.com, 2017).Router Routers are also called as intermediate devices. It enables the communication betweenthe computer and the other components of the network to exchange the information between thenetworks. The shocking information about the router is, that it has the capability to direct thetraffic in the network. It can be used with wires or wirelessly. It provides in-built security for thenetwork through firewall. In OSI layer router is used in the Network layer.Access Point Access points are used for the wireless access of the network. If the access point isplugged into the hub and switch, it will send wireless signals. This signal is used by the devicesand computers to connect with the wired network.It enables to move from one place to anotherplace with continuous access of the network. In OSI layers access point is used in theApplication layer.2 c) Purpose of OSI Layer OSI model is used to presents the structured seven layers thatare interconnecting as thestack. Every layers maintain the ability of linking the network segments, computers and devices. 3 The OSI layer purposes are discussed below:• OSI layer creates a common platform for the hardware manufactures and softwaredevelopers. It encourages the network product creation that can communicate with eachother.• The OSI layer is used to help the network administrators by separating the process oflarge data exchange in the network segments. The networks segments are easier totroubleshoot, manage and to understand the network(Guide, 2017).• OSI layer prevents the single layer changes that affects the other layers.• It determines each layer functions of the model that encourages the industry organization.• It divides the process of the network communication in the smaller components and itcreates the software trouble shooting, development and designs easily. • The network component standardization is used to allow the development of the multiplevendors.• OSI layers allows the communication between the different types of software andhardware.• It divides the layers in the network and it makes life easier to the network administratorand it also creates learning easier.• The purpose of the OSI layer provides various services such as data encryption, datasegmentation, data compression, error correction and detection, packet acknowledgementand flow controls.• It reduces the complexity of the network.• It simplifies the learning and teaching.• It ensures the interoperable technology. The interoperability between the vendors.• It facilitates the modular engineering and standardizes the interfaces. 4 d) Seven Protocol? IEEE 802.11 is an Ethernet protocol. It is used in the Physical layer of the OSI model.This layer deals with the hardware of the network. The modulation of this protocol isPhase shift keying. ? HDLC protocol is used for the general purpose. In OSI layers it is used in the data linklayer.This protocol uses the physical layer services to provide communication pathbetween the receiver and transmitter.? IPV4 is the internet protocol. It is used in the Network layer of the OSI model. It is fiveclasses for the communication.? TCP (Transmission Control Protocol). It is the main protocol in the internet. Thisprotocol is used in the Transport Layer of the OSI model. It works in two modes,connection oriented and connection less.? PPTP (Point to Point Tunneling Protocol) is used in the virtual private networks. In OSImodel this protocol is used in the Session Layer. This protocol uses TCP for theencapsulation of packets.? SSL (Secure Socket Layer) is the most widely used protocol. It is used in the Presentationlayer of the OSI model. It provides a secure channel between the two operating systems.? Hyper Text Transfer Protocol is one of the application protocol which is used in theapplication layer of OSI model. This protocol is the foundation for the communication. Ituses logical links between the text nodes.5 Task 2– Addressinga) Explain why network components need addresses. Each network component requiresthe address, because it is easy to identify every singledevice on the network. So, the user assigns an address to each device (quora, 2017).Difference between MAC Address and IP Address The IP addresses and MAC address are represented in the unique nodes in the network.Every IP network contains the IP address and MAC address and it stores in our IP stack(theydiffer, 2017). MAC Address IP AddressIt uses Ethernet. There is physical connection It uses TCP/IP. There islogical connectionbetween the routers and devices. between the internet and devices. Device manufactures assign the MAC address. ISP or DHCP assign the IP address. Chargeable Unchangeable Unique Unique Difference between IPv4 and Ipv6IPv4 IPv66It manages the multicast group membership: It managesthe multicast group membership:IGMP. multicast listener discovery. Minimum packet size : 576 bytes Minimum packet size : 1280 bytes DNS host records: A records DNS host records: AAAA records It uses the ICMP router discovery. It uses the ICMPv6 router discovery The IPv4 fragmentation is performed by the The fragmentation is performed by sending arouters and sends it to the host. host. It has the address resolution in the broadcast It has the address resolution in the multicastARP request frames. neighbor solicitation messages.b) Difference between public IP Address and Private IP Address.Public IP Address When the computer is connected to the internet, ISP will provide unique IP address forthe computer. This IP address can be dynamic or static. Static IP address cannot change and thedynamic IP address will be changed each time when the computer connects to the internet(HACKS et al., 2017).Private IP AddressIf the IP address falls within some ranges for the private network (LAN), then it will becalled as private IP address. Private IP address is assigned by the Internet Assigned NumberAuthority. The ranges of the IP address are given below:10.0.0.0- 10.255.255.255 7 172.16.0.0 - 172.31.255.255192.168.0.0 - 192.168.255.255c) Explain what is meant by DHCP.DHCP stands for dynamic host configuration protocol. It is the client server protocol andit automatically provides the IP host with its address and other configuration information such asdefault gateway and subnet mask. It uses BOOTP and it shares various DHCP implementationdetails.DHCP server services are used to provide two benefits such as reduced networkadministration and reliable IP address configuration. The reliable IP address configuration isused to minimize the manual IP address configuration errors. These are the address conflicterrors and typographical errors. The reduced network administration includes the automated andcentralized TCP/IP configuration. It is used to define the TCP/IP configuration from the centrallocation of the network.Here, IT Centre usesthe remote access using the DHCP protocol. Because, each device isbased on the TCP/IP network and it has unique IP address to access the resources and internet ornetwork. Once theuser uses it without DHCP, the address should be configured manually for thePC and that PC is moved to the other subnet and is removed from the network. The DHCP serveris used to enable the overall process either manuallyor automatically. It maintains the pool oflease address and IP addresses to DHCP client.DHCP server contains the static and dynamic IPaddresses. The static IP address is the Permanent IP address. The DHCP server stores the TCP/IPconfiguration parameters and maintains the valid IP address and lease duration of the usernetwork(Technet.microsoft.com, 2017).d) ARPAddress resolution protocol (ARP) is one of the protocol which is used by the internetprotocol. It is used to map the hardware addresses with the IP address. In OSI layer, it is usedbelow the network layer. It is used as the interface between the Network layer and Data Linklayer. This protocol is used when the IPV4 is used with Ethernet. ARP converts the IP addressinto the Ethernet addresses. 8 Need for ARPThe underlying hardware of the Ethernet communicates by using the Ethernet addressand not with the IP addresses. It performs the required function by routingthe IP addresses. Itfinds the hardware addresses or MAC address of the host from the IP address and maintainscache, in which the IP address is mapped with the MAC address (Distributednetworks.com,2017).e) Default Gateway and Subnet MaskDefault GatewayDefault gateway is used to know, how the packets are forwarded to one network to othernetworks. In TCP/IP network, the nodes are work stations, servers and devices and each nodesare defined with the default routing. It is the address of the user router. The default gateway IPaddress is assigned by the internet service provider.It allows communication between thecomputers on other network.Subnet Mask? The subnet mask is used to display the IP space for the given default gateway. ? Dividing a network into more than one network is called as sub netting. ? The subnet is logical and it is visible in the IP network subdivision.? IP address contains the two main components such as host address and networkaddress. The subnet mask divide the IP address into the host address and networkaddresses.? Subnet mask set the 1's as the network bits and 0's as the host bits.For ExampleDefault gateway of the User Router is 192.168.0.1 then, the subnet mask automaticallygenerates the subnet address 255.255.255.0.f) IP Routing Table All the IP nodes have routing table. Routing table contain the information about the IPnetworks. It is the set of rules in the form of table. It determines the travelling of data packets in9 the IP network. All the IP devices use this routing protocol.It contains the information about thepacket with its path and destination (SearchNetworking, 2017). Each packet will have the information about its source and destination. If the packet isreceived, it will be examined by the network devices and it will match the details with therouting table to get the details about the destination. The routing will provide the information tothe network device to send the packet to the next hop in the network.Routing Table will have the following information:? Destination - It contains the Destination IP address.? Next Hop - It contains the information of the Packet Forwarded IP address.? Interface - When forwarding the packet to the next level, the device will use thisinterface.? Metric - It is used to assign the cost for each path. Hence, it helps to choose the costeffective path.? Routes– It contains the information from both the directly and indirectly attachedsubnets. Also, it contains the default routes for certain traffic.10 Task 3 - Securitya) Security Measures for the Network The recommended security measures for the network are given below:Server RoomIt is important to ensure the security of the server. Server room is the main part of thephysical network. Hence, it is important to ensure that they have good locks. The policies of theserver lock should be strong enough.Surveillance It is good to lock the server room. Because, anyone can break or misuse the access of theauthority. It is important to know who is going inside and get out of the server room. Anauthentication system will be better for locking this devices. Surveillance through the videocamera will help to monitor the individuals who are entering and leaving. Ensure that the Vulnerable Devices are in the Locked Room It is not only the server that is important in the organizations network. Hackers cancapture the data of particular network by simply plugging in the laptop to the hub. Make sure thatthe network devices are in a locked room.Using Mount Servers Mount server doesn’t allocate more space and also it is easy to secure.It is smaller andlighter than the tower systems. It is easy to lock them in a closed rack(Shinder, 2017).Backup Backing up the important information is essential in the recovery of the network. It is alsoimportant to secure the backup devices, tapes and discs. Because it can be stolen by anyone. So,it is recommended to keep the backup devices in the server room.11 WorkstationHackers may connect the unsecured computers to the network for accessing and deletingthe important information of the business. Workstations located in the unoccupied desks andempty locations can be accessible to the outsiders.Hence, it is important to disconnect the unusedcomputers from the network.Security of the CaseIt is important to protect the Workstation and server from the thieves.Because, it is easyto get off the hard disks in the packet which carries all the information about the premises.b) Threat for the System The Head office of Ultra Taxi shares the location with other offices.The security in themain gate contain the authority to allow or prevent the visitors from outside. Hence, it can bemisused by the unauthorized people to enter into the office and access the information of thebusiness.Therefore, it will be a big threat for this system.12 Task 4– Diagram and Explanationa) Logical Network DiagramVisio file is attachedbelow.524334-PhysicalDiagram.vsdx The above diagram displays the ultra taxi organization logical network diagram. Here,themainly used components are listed below:? Router? Switch? Core Switch? Firewall13 ? Web server? Email Server? Database serverThe Ultra taxi organization contains a head office and many branch offices. The headoffice containsone main office, reception area, storage unit, CEO and operation Manager Office.The Storage unit contains the documents and files. In the logical network diagram, the ISP(Internet Service Provider) is connected with router. The router is connected with the firewalland core switch. Router is used to connect multiple devices. The core switch is used to connectmultiple switches. The switches are used to connect the multiple devices. The web server, fileserver, data base server and email servers are connected with switches. b) IP Address and Subnet MaskVisio file is attached below.14 524334-LogicalDiagram.vsdx 15 16 c) Hardware ComponentsThe hardware components are listed below:? Cisco Routers ? Cisco Smart Switch? Cisco Firewall? Cisco Cable? Cisco ConnectorsCisco RoutersHere, the Cisco Routers 1900 Seriesis used because this router is designed to meet all theapplication demands. It provides high secure concurrent services and performances. It alsoprovides mobility and it determines accounting, authentication, authorization and public key17 infrastructure. It manages and evolves the network management requirements and applications. Itis mainly used for reducing the total cost and it provides efficiencyto the user network.Cisco SwitchHere, the Cisco SF200-48P Smart Switch is used because it provides high secure businessoperations, operational excellence and sustainability. It enables the network reliability andresolves the trouble shooting problems. It provides the cost effective remote sites and retaillocations. This switch enables the deployment application such as management systems, remotesite, IP telephony and wireless access. It is mainly used to simplify the multi scale tasks andreduces the power nodes.Cisco FirewallHere, the Cisco ASA 5500 Series Firewalls are used because it integrates the smallbusiness and mid-size networks with the service providers.It delivers high functionality,performance and reliability of the user network. It performs the multi scale performances such as18 lower deployment, operational costs, scalability, high effective threat, flexibility and featureextensibility. It provides, layered threat protection.Cost EstimationDevice Number Cost in USD Total CostCisco Routers 1 750 750Cisco Switches 5 700 3500Cisco Firewall 1 500 500Cisco Wires 8 80 640Cisco Connectors 10 500 50019 Task 5– Remote Accessa) Secure Remote Access For the secure remote access between the head office and the mobile drivers, theworkplace join can be used. It allows the users to register their devices securely with thecompany directory. This registration provides a certification for the device. It can be used for theauthentication of the user when a connection is required with the head office(Mallett, 2013).b) Remote Access RequirementRemote access requirement for the mobile devices include internet connection andantivirus software. Mobile devices are required to support the various security objectives such asavailability, integrity and confidentiality. User achieves these security objectives then, the mobiledevices are secured against the combination of threats.Mobile device security threats containsome assets such as unauthorized access, mobile malware, Eavesdropping, loss and theft andunlicensed and unmanaged application. The mobile devices possessphysical attacks andsignificant risks which are highly vulnerable.Encryption and authentication is used to help andprevent the loss of data in the mobile devices.Security is one of the leading problems for small organization. To secure the datacenterin the clouds, the public and hybrid presents aset of complex problems. To use the SDNtechnologies, it will change the securing datacenter network and it improves theopportunities.Business impact of the mobile devices are enter prize integration, applicationsecurity, mobile device risks, third party management solutions, vulnerability identification,vulnerability exploitation and threat modeling.The mobile devices contain threat mounting,which the organization carefully evaluateswith the potential risks. The corporate environmentallows the expansion of the corporate office.20 ReferencesDistributednetworks.com. (2017). Purpose of Address Resolution Protocol | TCP-IPConfiguration and Linux Network Administration. [online] Available at:http://www.distributednetworks.com/linux-network-administration/module3/address-resolution- protocol.php [Accessed 6 Feb. 2017].Guide, C. (2017). OSI Model Advantages and Basic Purpose Explained. [online]Computernetworkingnotes.com. Available at: http://www.computernetworkingnotes.com/ccna- study-guide/osi-model-advantages-and-basic-purpose-explained.html [Accessed 6 Feb. 2017].HACKS, C., GUIDES, H., SECURITY, I., Ramesh, S., jain, s., Star, R., Jovine, F., Daniel, w.,address, h., Agarwal, S., DESAi, n., saleem, s., aftab, g., Driller, D., patro, s., regar, m., Ramesh,S., bird, j. and Verma, A. (2017). Private and Public IP Addresses: What's the Difference? |GoHacking. [online] Gohacking.com. Available at: https://www.gohacking.com/private-and- public-ip-addresses/ [Accessed 6 Feb. 2017].MakeUseOf. (2017). Wi-Fi vs Ethernet: Which Should You Use and Why?. [online] Availableat: http://www.makeuseof.com/tag/wi-fi-vs-ethernet-which-should-you-use-and-why/ [Accessed6 Feb. 2017].Mallett, A. (2013). Citrix Access Gateway VPX 5.04 Essentials. 1st ed. Birmingham: Packt Pub.orbit-computer-solutions.com. (2017). Difference between Hubs, Switches, Routers, and AccessPoints - orbit-computer-solutions.com. [online] Available at: http://www.orbit-computer- solutions.com/difference-between-hubs-switches-routers-and-access-points/ [Accessed 6 Feb.2017].quora. (2017). What's the difference between WiFi and Ethernet?. [online] Available at:https://www.quora.com/Whats-the-difference-between-WiFi-and-Ethernet [Accessed 6 Feb.2017].21 quora. (2017). Why do devices on a network need addresses?. [online] Available at:https://www.quora.com/Why-do-devices-on-a-network-need-addresses [Accessed 6 Feb. 2017].SearchNetworking. (2017). What is routing table? - Definition from WhatIs.com. [online]Available at: http://searchnetworking.techtarget.com/definition/routing-table [Accessed 6 Feb.2017].Shinder, D. (2017). 10 physical security measures every organization should take -TechRepublic. [online] TechRepublic. Available at: http://www.techrepublic.com/blog/10- things/10-physical-security-measures-every-organization-should-take/ [Accessed 6 Feb. 2017].Technet.microsoft.com. (2017). What Is DHCP?: Dynamic Host Configuration Protocol(DHCP). [online] Available at: https://technet.microsoft.com/en- us/library/cc781008(v=ws.10).aspx [Accessed 6 Feb. 2017].theydiffer. (2017). Difference between a MAC address and an IP address. [online] Available at:http://theydiffer.com/difference-between-a-mac-address-and-an-ip-address/ [Accessed 6 Feb.2017].22 23 24 "

Why US?

Because we aim to spread high-quality education or digital products, thus our services are used worldwide.
Few Reasons to Build Trust with Students.

128+

Countries

24x7

Hours of Working

89.2 %

Customer Retention

9521+

Experts Team

7+

Years of Business

9,67,789 +

Solved Problems

Search Solved Classroom Assignments & Textbook Solutions

A huge collection of quality study resources. More than 18,98,789 solved problems, classroom assignments, textbooks solutions.

Scroll to Top