Site Loader
Rock Street, San Francisco

Sultanate of OmanGulf College     Assignment about:                      Done by: Muhanna Saleh AlbusaidiID:  Table of contentsIntroduction………………………………………………………………………3 Task1:The type cable used………………………………………………………….4The connectors used…………………………………………………………4-5The cost of cabling andinstallation…………………………………………6The data transfer rates that willbe required………………………………….

7 Type topology…………………………………………………………………7 Task2:Devices and media used fornetworks……………………………………….8-9Advantages and disadvantages ofdevices……………………………………9Types and data protocols…………………………………………………10-11The best devices to buy and cost…………………………………………….11 Task3:The security issues that arespecific to an environment with public access to the internet including accessby children…………………………………………………………………9Protection from viruses, Trojanhorses, etc………………………………….

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

..12Separating public and privatewireless networks……………………………..13 Task4:Test plan………………………………………………………………………..12Instructions How to test allaspects of the network……………………………13 Task5:Conclusion……………………………………………………………………14Reference…………………………………………………………………….

.14     Introduction: Network is a collection of computers and otherdevices connected to each other to share resources. Network protocol is the setof rules of communication that means of exchanging information in the network,which are the regulatory rules needed by the network in order to help itsvarious elements to communicate and understand each other.  The process of transferring filesand information between different types of computers is one of the basic needsof organizations, banks, companies and others. The development of ICTs, whichare considered the most important components of computer networks, is aimed atsatisfying the needs and requirements of all business organizations for a fastand cost-effective security environment. The occasionThe computer network helps employees through the speed and ease ofcommunication between them through the use of programs such as e-mail and alsohelps the network administrator to control computers and devices using theserver and the benefits of the network It helps to share applications insteadof downloading them in each device, The main server.

                           Task1:a) The media used: Wired:       Twisted-paircable, coaxial cable, fiber-optic cable are the common types of wired networkmedia. Twisted pair cable is can use fortelephone communication and for Ethernet networks.UTP and STP are types of twisted pair. Each of them hasdifferent features.UTP cable is used for differentnetworks. This cable has eight copper wires covered by an insulating material.UTP cable can cancel the effective of electromagnetic interference and radiofrequency interference.

UTP cable is installed using the RJ 45 connector. TheRJ-45 has eight wire connector. UTP is used in telephone wiring and local areanetworks.

 Fiber-optic cable normallyis installed for long backbone runs or runs between buildings.Itconsists of a center glass core surrounded by various layers of protectivematerials. It sends light rather than electronic signals that eliminate theproblem of electrical interference. Fiber optic cable has the power to sendssignals over much longer distances than coaxial and twisted pair and to carrydata at vastly greater speeds. This capacity can expands communicationpossibilities to include services such as video conferencing and interactiveservices.   Coaxial cable:      Thiscable is made of copper wire surrounding by flexible insulation and it iscoated by metallic foil that called second layer. Second layer is reduced theamount of outside interference.  A wireless local-areanetwork is used radio waves to join devices like laptops to the Internet and toyour business network and its applications.

When you join a laptop to a WiFihotspot at a cafe, hotel or other public place, you’re connecting to thatbusiness’s wireless network. Wireless Wifi:     . Wi-Fitechnology gives us with a wireless connection through Access Points. Thesedevices provide laptops, smart phones and tablets devices with the Internetconnection signals.. b)The connectorsused:       There are manycategories of UTP cables that identified by CAT that supporting a differentamount of bandwidth. CAT5: Used in Ethernet-based LANs, it includes two twistedpairs and supports 100 Mbps for up to 100 meters.CAT5e: Used in Ethernet-based LANs, it has four twisted pairsand supports 1 Gbps for 100 meters.

CAT6: Used in Ethernet-based LANs and data center networks,it has four tightly wound twisted pairs. It supports 1 Gbps for up to 100meters and 10 Gbps for up to 50 meters.       c)The cost of cabling and installation.

Type of cable Costs Pictures 25mm copper cable electric control 50RO 96 core fiber optic cable 70 RO  2m Cable USB to RJ-45 160 RO RJ-45 to DB9 Console Management Router Cable 3.400 RO Cable 4 mm 730 RO   D)The datatransfer rate that will be require. Fiber optic cable canrun 100km without magnifying the light signal.CAT5: Data transfer up to 100 Mbps.CAT6: Data transfer up to 55 Mbps.

 E) Networktopology        There are manytypes of topology:Bus Topology: it used a single main cable which has terminators on both ends and easyto implement and extend.Ring Topology which every node is connected to onlytwo neighbors forming a ring shape. The messages move in only one and the samedirection in this arrangement. In case any cable or device breaks away from theloop, then the entire network fails.

Tree Topology (hierarchical topology): Theconfiguration and cabling is difficult in comparison to other topologies.However, its point to point wiring for individual sections is a desirablefeature of this topology.Star topology: each devices and computers on anetwork connected to a central device.This central device can be either a hub, router or a switch. Star topology would be ideal for my network.  Recommendationfor cabling and connector to purchase. I recommend to use UTP cable because it is the most commontype of LAN cable.

This cable is easy to install, is fairly inexpensive, andhas a high bandwidth capability. The distance limitation is approximately 328feet (100 meters).Also, Fiber optic cable can carry more data in longerdistance with light signal than electrinic signal carry coaxial cable. Thiscable is more expensive the other cable.I used CAT5e connector because it supports data rate of 1 Gbps for 100 metersand CAT6 connectors because it supports data rate 100 Gbps for 50 meters I choose to make a Star Topology .The best advantages is ifone cable fault, only one computer fails not entire network.

Also ,if there isany problems can be easily founded and easy to troubleshoot.               Task2: Network devices: Switch:                  It isa hardware that connect group of client together within LAN.                  It usedswitching table to sends packet directly to destination. It reduces collisionsand isolate traffic.  Router:     It is used tosend data between several networks and it depends on a destination IP addressto transfer packets by using routing table. It can be configured statically ordynamically.

 Web server:      It is a softwarethat serve files from web pages by using HTTP protocol in response to client’srequest.      E-mail server:     It is a serverthat sends and receives e-mail over a network. E-mail server can carriese-mails from clients and send them to other e-mail server or other clients. Database server:       It is a serverthat used to host databases and to provide database services to other clients suchas data analysis, storage, data manipulation, archiving. 2)Provide a recommendation of the hardware that should be purchased. I recommend to userouter and switch. Routers will be used as the primary devices that used tointerconnect networks.

Each port on a router connects to a different networkand routes packets between the networks We have to consider speed and types of ports/interfaces,Manageability and cost when selecting a switch for the network. The best switchcan be monitored for performance and security and provides more enhancements. In addition to switches and routers, other connectivityoptions are available for LANs: Wireless access points:enable computers and other devices, such as handheld Internet Protocol (IP)phones, to connect to the network wirelessly or share broadband connectivity.Firewalls: protect networkfrom threats and offer application security, network control and containment,and secure connectivity technologies. Also, we have to combine the functionality of switches,routers, access points, and firewalls in the same networking device.

Finally, make sure your network is designed with reliabilityand redundancy in mind. This provides the business continuity you’ll need tobounce back quickly from unforeseen circumstances.  3)Protocol types.

* FTP (File Transfer Protocol): it allows users tosends files from one computer to another.* The Hypertext Transfer Protocol (HTTP) is agroup of rules for sending files like text, images, sounds and etc on the World Wide Web.* Simple Mail Transfer Protocol (SMTP) is an Internet standard for sendingand receiving email.* The Address Resolution Protocol (ARP) is a communicationprotocol used for discovering and mapping physical addressassociated with a given IPv4 address.  4)The Hardware to buy and cost  Device cost Integrated wireless router range 29  RO Cisco RV325 Gigabit Dual WAN VPN Router 45 RO Gigabit PoE Web Managed (Plus) Switch 25 RO Webroot Secure Internet Security (software): 19 RO    Task3: a)the security issues that arespecific for particular environment with public access to the internetincluding access by children? There are many steps to increase awareness between thepublic and the children of the moral importance of dealing with the Internetand provide them with the information and skills necessary to raise theirpersonal safety while dealing with secret codes, there are several steps forthe safe use of the Internet:Use  a strong password when you using social mediasites to protect each person from any risk.

Work continuously todevelop awareness when dealing with ICT.Understand all rules, responsibilitiesand penalties for dealing with technologyAvoid posting informationlike bank account info, your address and birth date and your daily schedule to keepyourself and your information safe. There are many security issues like :-Viruses, Worms, Bombs, and Trojan HorsesA virus is a program that enters the device withoutpermission and puts copies of itself into programs, and the virus is amalicious or intrusive program. It could come through unprotected ports,compromise whole network.-Trap Doors: is amechanism built in to a system by its designer or administrator to give thatperson subsequent unauthorized access to the system.

This threat can beaddressed by specifying the server’s interfaces and testing that they alloperate properly.-Denial of Service Attacks: Thisthreat comes in many forms, ranging from physical destruction of a networkresource to flooding the resource with so many requests that it is unable toservice legitimate users. -Snooping: is a passiveattack that involves tapping into the network wire and listening for data thatmight be valuable.

-Spoofing: involvesdeceiving someone or deceiving the system itself. This is usually done bytapping into the wire and injecting information in an attempt to interceptvaluable data destined for a valid user or workstation.   b)Protection from  viruses, Trojan horses and etc.Implementing Firewall for Internal and External Security.A firewall is either a program or a device used to save the network and serverfrom hackers. A firewall used to monitor and block or allow network traffic,both incoming and outgoing, on a secret network.

 Virtual Private Network (VPN). VPN extends a private network across a public network, suchas the Internet. It enables a computer or network to transfer and receive dataacross public networks as if it were directly connected to the private network,while benefiting from the functionality, security and management policies ofthe public network.  Network Packet Sniffers. An effective way to monitor traffic over a network using anetwork data monitoring program. It gathers incoming and outgoing data, whichcan be useful in detecting network intrusion attempts.

It used to analyzenetwork problems, filter and block suspicious content from access to thenetwork. Encryption: an encrypted message can transmitted anddecrypted on the other side by using the same key. It used to authenticate thesource of massage. D) Separation of public and privatewireless networks When you want to make your network segments, you’ve set upone wireless network for your own private use with your personal PCs, fileservers, and etc on that network and another for public use. In such a scenario, you should configure your private routerto be the farthest device from your Internet connection.

This may require youto get another router if you need wired ports as well as wireless ones. Yourshared network will be connected directly to your Internet connection and yourprivate network will connect to the shared network, ideally through a cable tothe AP at the Internet connection. Apply IP Address for your network, so You can get thissetting of the IP address range used by the private router somewhere on thatscreen where you enable DHCP and router functions, or turn them off to turnyour AP into a non-routing AP-only bridging device.For your “public” network AP, configure the AP sothat its router functionality is turned on and so that the AP’s DHCP server isactive. Look at the IP address range for this network now.

 This keeps your networks separate – because privateaddresses are not routable via the Internet.You can establish some firewall protection between the twosegments of your network to really keep the public and private networksseparate and secure from each other,. E)The security measures that shouldbe to implement to controls and reduce threats n your system. IT security policies:Review IT security policies that address accounts and userswith privileged access, such domain administrators, application administrators,and DBAs. Ensure that policies exist and clear on how access is requested,justified, approved, and ensure they’re regularly reviewed.

  Securing Servers:System administrators should ensure their file servers areprotected, both physically and in how the consoles may be accessed. Restrict physical access to the file server.  Task4: Test plan:  A test plan is a document including the objectives,resources, and processes for a specific test for a software or hardware product. The plantypically include a detailed understanding of the eventual workflow.A test plan documents the way that will be used to verifythat a product or system meets its design specifications and otherrequirements.A test plan may include a strategy for one or more of thefollowing depending on the product and the responsibility of the organization:Design Verification orCompliance test – performed during the development, typically on a small sampleof units.Manufacturing or Productiontest – performed during preparation or assembly of the product in an ongoingway for purposes of performance verification and quality control.

Acceptance or Commissioningtest – performed at the time of delivery or installation of the product.Service and Repair test – performedas required over the service life of the product.Regression test – performedon an existing operational product, to verify that functionality didn’t getbroken when other aspects of the environment are changed. Instruction of how test all aspectof network: 1. Build the topology according to the Design and TopologyDiagram.

Assign IP addresses according to the IP address plan.2. Create a basic configuration on each device. Includeapplicable passwords, device names, default routes, default gateways, andactivate interfaces.3. Console into one of the devices in the topology and pingall of the other devices in the topology.

Record any anomalies.4. Telnet to each device in the configuration and verifythat each is reachable.5. Copy the output of the show running-config ,show ip route,show processes cpu sorted ,show interfaces , and the first few lines of showmemory and paste into a document using a text editor such as Notepad. Repeatfor all devices in the topologyFinally, make sure your network is designed with reliabilityand redundancy in mind. This provides the business continuity you’ll need tobounce back quickly from unforeseen circumstances. Testing cabling: The process of testing any fiber optic cable plant:- testing cable on the reel before installation, testingeach segment as it is installed and testing complete end-to-end loss.

-Practical testing: testing only a few fibers on each cablereel for continuity before installation to make sure there hasn’t been any damageto the cable during shipment. -Then each segment is tested as it is terminated by theinstallers. -Finally the entire cable run is plugged together and testedfor end-to-end loss for final documentation.

         Conclusion : In this assignment, I research and mention the best networkhardware , the media you may select and topology require  to create the network .Also , a number of factors may need to consider like speedand types of ports or interfaces , manageability and cost. The best hardware which provides effective enhancements tothe monitoring and security features. In addition, I mention some recommendations for securitymeasure that you need to implement to avoid the security issues and how todocument the test plan and testing cabling.    Reference:http://www.bestbuy.com/site/lenovo-desktop-amd-a10-series-12gb-memory-2tb-hard-drive-black/4362103.p?skuId=4362103http://www.toptenreviews.com/business/internet/best-web-design-software/coffeecup-visual-site-designer-review/http://www.khayma.com/internetclinic/progwebdezin.htmhttp://www.bestbuy.com/site/lenovo-li2364d-23-ips-led-fhd-monitor-black/5203200.p?skuId=5203200https://support.novell.com/techcenter/articles/ana19971102.htmlhttps://fcit.usf.edu/network/chap4/chap4.htmhttp://www.who.int/goe/publications/goe_security_web.pdfhttp://sourcedaddy.com/networking/separating-your-networks.html              

Post Author: admin

x

Hi!
I'm Dora!

Would you like to get a custom essay? How about receiving a customized one?

Check it out