Advanced Computer Networks Assignment

Assignment Help Computer Networking
Reference no: EM133106272 , Length: word count:3000 + labs

Advanced Computer Networks - OTHM Level 6 Diploma in Information Technology

Reference Number - R/617/3034

Unit Level - 6

Aim: This unit supports learners to develop a critical understanding of relevant and modern concepts in networking technologies within the IT industry. This unit also introduces learners to the detection of threats and vulnerabilities in physical and IT security, and how to manage risks relating to organisational security.

Learning Outcome 1: Understand the concepts of servers, clients, and processes.

Learning Outcome 2: Be able to create a client/server model in a Linux system with User Datagram Protocol (UDP), Transmission Control Protocol (TCP) and Application Layer protocols.

Learning Outcome 3: Be able to design and configure a secure network for a corporate environment.

Case Scenario

Global ISP is a leading high-end systems integrator with a proven background in complex, advanced integrated security systems. Global ISP excels in delivering innovative solutions to complex and technically challenging problems to clients in both the government and commercial sectors. By December 2018, it had over 290,000 customers across the UK. Global ISP is now expanding further and recently they have secured a contract of creating a new technology hub in Huddersfield, UK. You are in charge of a pool of network analysts who will be designing a range of network systems in the project.

Your line manager Alex Wood has asked you to provide upskilling training to this group of analysts. You have the following tasks for your new assignment with the company.

Task 1: You need to create a report that will cover the following:

a. First part of the report covers the concepts of servers, clients, and processes. You will start by, explaining the client and server environment and the communication between clients and servers. Then you will define the terms: Process ID (PID), Parent Process ID (PPID) and ‘init'. The first part will be concluded with a comparison of the operation of parent processes and child processes.

b. Second part of the report covers Linux server basics. Start this section by explaining the features of Linux server configurations. To finish this section you need to explain the concepts of UDP and TCP systems.

c. To conclude the report, critically evaluate Network Security protocols that are relevant to Global ISP. Conclude the report with a critical analyse of the purpose and requirements of a secure network for Global ISP where they face imminent threats from hackers who want to use DDoS attack to bring its services down. Also, as you are aware that Global ISP systems are prone to phishing attacks, you should include concerning issue in your analysis.

Task 2
All analysts have completed the mandatory academic part of the training and now they are ready to start practical part of their work. You have planned to demonstrate them how to plan, design, setup and configure a secure Linux based network system.

Instructions

a. Build and implement DNS server in Linux using UDP and TCP.

b. Design a secure network for a corporate environment that will protect Global ISP from imminent hacker attacks.

c. Configure Network Security for a secure network in a corporate environment. (Your lab instructor may give you additional security concerning scenarios.)

Attachment:- OTHM Level 6 Diploma in Information Technology.rar

Reference no: EM133106272

Questions Cloud

Explain the purpose of the team project : You have been assigned as the team leader for a group project to update the current HR vacation and sick leave policies. Your five-member team has 6 months to c
Discuss the roles of the directorate of dispute prevention : Industrial Relations is one of the key factors that contribute to the growth/decline of the economy globally, Lesotho is not an exception in this case. To this
What specific campus resources would the ra recommend : As an RA and one of the residents send a person a private group message letting them know that they are really struggling finding friends to hang out with and f
Childhood obesity problems : Do you think that childhood obesity problems begins as early as when the child enters Elementary School?
Advanced Computer Networks Assignment : Advanced Computer Networks Assignment Help and Solution, OTHM Level 6 Diploma in Information Technology - Assessment Writing Service
Limitations of weighted average cost of capital : What are some limitations of weighted average cost of capital? Please explain.
Advantages and disadvantages of using wikis : 1. Do you think all companies should establish their own blogs? Why or why not?
Legal constraints hr professionals : A number of businesses are now relying solely on data to make hiring decisions. What are some of the legal constraints HR professionals may be faced with by doi
What are some strengths and weaknesses of data : What are some strengths and weaknesses of data, findings, and current research on leadership, diversity and equity?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd