Computer Network Assignment

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16

Module Title : COMPUTER NETWORKS

Assignment Title : Worldwide Reading Solutions

Examination Cycle : March 2016

Candidate Name : HTET HTET NAING

Candidate No :

Centre Name : KMD COMPUTER CENTRE (YANGON)

Submission Date :

Important Notes:

 Please refer to the Assignment Presentation Requirements for advice on how to set out your assignment.
These can be found on the NCC Education Campus. Scroll down the left hand side of the screen until you
reach Personal Support. Click on this, and then on Policies and Advice. You will find the Assignment
Presentation Requirements under the Advice section.

 You must familiarize yourself with the NCC Education Academic Dishonesty and Plagiarism Policy and
ensure that you acknowledge all the sources which you use in your work. The policy is available on Campus.
Follow the instructions above, but click on Policies rather than Advice.

 You must complete the ‘Statement and Confirmation of Own Work’. The form is available on the Policies
section of Campus. Scroll down the left hand side until you reach Personal Support. Click on this and then
click on Policies and Advice.

 Please make a note of the recommended word count. You could lose marks if you write 10%more or less
than this.

 You must submit a paper copy and digital copy (on disk or similarly acceptable medium).Media containing
viruses, or media which cannot be run directly, will result in a fail grade being awarded for this module.

 All electronic media will be checked for plagiarism.

Designing and developing a website


Page 1
Statement and Confirmation of Own Work

Programme/Qualification name: L4DC


All NCC Education assessed assignments submitted by students must have this statement as the
cover page or it will not be accepted for marking. Please ensure that this statement is either firmly
attached to the cover of the assignment or electronically inserted into the front of the assignment.

Student declaration
I have read and understood NCC Education’s Policy on Academic Dishonesty and Plagiarism.

I can confirm the following details.

Student ID/Registration number :

Name : HTET HTET NAING

Centre Name : KMD COMPUTER CENTRE (YANGON)

Module Name : COMPUTER NETWORKS

Module Leader :

Number of words :( ) words

I confirm that this is my own work and that I have not plagiarised any part of it. I have also noted the
assessment criteria and pass mark for assignments.

Due Date :

Student Signature:

Submission Date :

Designing and developing a website


Page 2
Table of Contents

1) Task 1

a. HTML

2) Task 2

a. CSS File

Designing and developing a website


Page 3
3) Task 3

a. Testing the website and a Test Report

4) Task 4

a. Critical Evaluation

Designing and developing a website


Page 4
Task 1

Introduction

Worldwide Reading Solutions (WLS) is a non-profit organization that supports schools by increasing the
literacy skills of pupils. WLS draws upon recent research and proven practice which shows that the use of
synthetic phonics naturally improves the reading and writing ability of primary aged children. Synthetic
phonic is a method of teaching, reading, in which pupils are taught to read letters by saying the sound they
present. The small head office is located in Manchester, England. And there are 30 trainers who work
across the world. But there are 12 employees in Manchester. Although the company grew, there was no
strategic view of IT. Employees connect their multiple devices to the office router via Wi-Fi or directly by
UTP cable. In addition, users have many kinds of versions of Anti-virus software. But users rarely change
their passwords. Besides, there is no member of staff with IT support responsibility.

Task 1

a) Network topology
There are three common network topologies in current use:
Bus topology: a series of PCs linked alongside a single cable segment.
Star topology: a group of computers joined over a central point.
Ring topology: has computers related to form a loop.
There are also variations too. They are extended star, mesh and star combined with bus etc.

Designing and developing a website


Page 5
Extended star topology is selected to use in this system. In this way, several stars are connected in a
star from a switch.

In addition, there are many categories for cable types such as Cat 1, 2, 3, 4, 5, 5e and 6. Among them, Cat
5e is chosen to use for this system. Definitely, Cat 5e is cheaper than other high standard categories. It
constitutes of copper wires aligned in four pair sand holds the capability to support fast internet speed. The
Category 5e cables can accomplish ten times more speed than 100 Mbps and supports in reducing
electromagnetic interference. Cat 5e is often used in cross-over cable jobs because of its affordability. Cat
5e cable offers high-transfer speeds and is also capable of shifting up to four signals at once.

b) Definition of “layered architecture”

An architecture in which data transfers from one distinct level of processing to another.
Communications protocols are a primary example.

Advantages of having layered protocols in a network system

1) Layered architecture allows teams to work on unlike parts of the application parallel with minimal
dependencies on other teams.

2) It enables to develop loosely coupled systems. Besides, different components of the application
can be self-sufficiently organized, maintained, and updated, on different time.

Disadvantages of having layered protocols in a network system

1) There might be a negative influence on the performance as the network has the extra overhead
of passing through layers instead of using a component directly. Development of user-intensive
requests can sometimes take longer if the layering inhibits the use of user interface components
that directly cooperate with the database.

2) The use of layers supports to control and summarize the difficulty of huge applications, but
enhances complexity to simple applications.

c) Components
Router

A device that forwards data packets along networks. A router is connected to at least two networks,
commonly two LANs or WANs or a LAN and its ISP.s network. Routers are located at gateways, the
places where two or more networks connect. Routers use headers and forwarding tables to
determine the best path for forwarding the packets, and they use protocols such as ICMP to
communicate with each other and configure the best route between any two hosts.
http://windows.microsoft.com/en-us/windows/hubs-switches-routers-access-points-differ

Designing and developing a website


Page 6
Switch
In networks, a device that filters and forwards packets between LAN segments. Switches operate at
the data link layer (layer 2) and sometimes the network layer (layer 3) of the OSI Reference Model
and therefore support any packet protocol. LANs that use switches to join segments are called
switched LANs or, in the case of Ethernet networks, switched Ethernet LANs.
http://windows.microsoft.com/en-us/windows/hubs-switches-routers-access-points-differ

Hub

A common connection point for devices in a network. Hubs are commonly used to connect
segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to
the other ports so that all segments of the LAN can see all packets.
http://windows.microsoft.com/en-us/windows/hubs-switches-routers-access-points-differ

d) Seven Layers Protocols

Fast Ethernet , RS232, and ATM are protocols with physical layer components.

PPP (Point to Point Protocol) and HDLC (High-Level Data Link Control) are included in data link layer.

IP (Internet Protocol), OSPF (Open Shorted Path First), NetBEUI (Net Bio Extended User Interface) are
worked in network layer.

TCP (Transmission Control Protocol), UDP (User Datagram Protocol), SPX (Sequenced Packet Exchange
Protocol) are worked in transport layer.

ASP (AppleTalk Session Protocol) and NetBIOS (Network Basic Input Output System) are worked in
session layer.

AFP (AppleTalk Filing Protocol), SMB (Server Message Block), NCP (Network Core Protocol), SSL
(Secure Sockets Layer) and MIME (Multi-Purpose Internet Mail Extension) are worked in presentation
layer.

OSI Seven Layers

Physical (Layer 1)

OSI Model, Layer 1 offers the hardware means of sending and receiving data on a carrier, including
defining cables, cards and physical aspects.

Data Link (Layer 2)

Designing and developing a website


Page 7
At OSI Model, Layer 2, data packets are encoded and decoded into bits. The data link layer is divided into
two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC
sub layer controls how a computer on the network gains access to the data and permission to transmit it.
The LLC layer controls frame synchronization, flow control and error checking.

Network (Layer 3)

Layer 3 delivers switching and routing technologies, creating logical routes, known as virtual circuits, for
communicating data from node to node. Routing and forwarding are functions of this layer, as well as
addressing, internetworking, error handling, congestion control and packet sequencing.

Transport (Layer 4)

OSI Model, Layer 4, provides clear transfer of data between end systems, or hosts, and is responsible for
end-to-end error recapture and flow control. It confirms complete data transfer.

Session (Layer 5)

This layer creates, manages and terminates connections between applications. The session layer sets up,
coordinates, and terminates conversations, exchanges, and dialogues between the applications at each
end. It deals with session and connection coordination.

Presentation (Layer 6)

This layer provides independence from differences in data representation (e.g., encryption) by translating
from application to network format, and vice versa. The presentation layer works to alter data into the form
that the application layer can receive.

Application (Layer 7)

OSI Model, Layer 7, supports application and end-user processes. Everything at this layer is application-
specific. This layer provides application services for file transfers, e-mail, and other network software
services. Telnet and FTP are applications that exist totally in the application level. Tiered application
architectures are part of this layer.

e)

Standards of Wi-Fi Frequency used Maximum data rate Maximum range


indoor
M Ft.
802.11g 2.4 54 38 125
802.11n 5 40 70 230
802.11ac 5 160 35 115

f) I would like to recommend the 802.11n standard. 802.11n should be used because it manufactures
wireless chip sets, and free reviews specify that the privileges of greater speed and range for
802.11n. Specifically, 802.11n usually offer practical speeds of 22Mbit/sec. to 24Mbit/sec. for
802.11n equipment. These results are based on Draft 2 of 802.11n standard. The 802.11n
standard expresses manufacturers how to design their products so that they’ll work accurately with
other manufacturers’ products. 802.11n standard devices can operate on two frequency bands,

Designing and developing a website


Page 8
2.4GHz and 5GHz. When the data quality declines, 802.11n standard devices can lower their data
rate to increase the quality of the connection. It can accommodate a wide range of network sizes,
from a small home WLAN right up to large Enterprise networks using an 802.11n access point to
cover each large area, for example public areas in airports.

No, I do not want to recommend for the entire LAN be connected wirelessly. If hybrid network
would be used, it will be suitable for this system. Hybrid network topology is a combination of two or
more different basic network topologies. For example, it can be star-ring, star-bus topologies, etc. It
must be certainly different topologies, because for example two star topologies form the star
topology. The resulting hybrid topology has the features and limitations of its components. Hybrid
network topology has many advantages. Hybrid topologies are flexible, reliable and have better fault
tolerance. The new nodes can be easily added to the hybrid network, the network faults can be
easily identified and corrected without disturbing the work of the rest of network. But at the same
time hybrid topologies are expensive and difficult for managing.

TASK 2

a) The definition of MAC Address

In a local area network (LAN) or other network, the MAC (Media Access Control) address is the
computer's unique hardware number. (On an Ethernet LAN, it's the same as your Ethernet
address.) When you're connected to the Internet from your computer (or host as the Internet
protocol thinks of it), a correspondence table relates your IP address to your computer's physical
(MAC) address on the LAN.

The MAC address is used by the Media Access Control sublayer of the Data-Link Layer (DLC) of
telecommunication protocols. There is a different MAC sublayer for each physical device type. The
other sublayer level in the DLC layer is the Logical Link Control sublayer.

The definition of IP Address

IP specifies the format of packets, also called datagrams, and the addressing scheme. An IP address
is an identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route
messages based on the IP address of the destination. The format of an IP address is a 32-bit numeric
address written as four numbers separated by periods. Each number can be zero to 255. 

The difference between them

MAC (Media Access Control) addresses uniquely identify Ethernet network cards (or PCs with built in
Ethernet). Although it's true that every computer that uses Ethernet has a unique MAC address, not all
Internet connections are made over Ethernet. Also, MAC addresses in a particular local network are not
similar in any way, so one can't use them to decide that a particular machine is "nearby."

IP addresses uniquely identify computers on the Internet, or on a local intranet. Computers on the same
local "subnet," such as those on a particular local network, will share part of their IP address. For instance,
computers in my office intranet are part of the 192.168.2.x subnet, with IP addresses like 192.168.2.100
and 192.168.2.101. The router that connects our office to the Internet has the IP address 192.168.2.1. That
router also has a true Internet IP address, and performs NAT (Network Address Translation) to allow
connections from computers inside my intranet to reach the outside world... but blocks incoming
connections for security. http://accc.uic.edu/answer/what-my-ip-address-mac-address

Designing and developing a website


Page 9
How MAC Address and IP Address differ from IPv4 and IPv6

MAC address is the short term for Media Access Control Address. It is a unique address and also
organizes the protocols access to physical network segments. That is often used as address in some IEEE
802 network technologies like Ethernet and Wi-Fi. IP Address is termed Internet Protocol Address. It also
executes the host and identifies the networking interface and also addresses the location.

IPv4 is the internet protocol for fourth version. IPv6 is internet protocol for sixth version. Ipv4 is carried out
the communication with devices by using 32 bits addressing system for identification. So, Ipv4 is absolute
in nowadays because it needs address for internet connection.Ipv6 is used 128 bits IP address and most
commonly used. It can be evolutionary upgraded and designed for more used of internet. IPv4 is written by
decimal and parted by periods for human readable. Ipv6 is written by hexadecimal and parted by colons.
https://www.quora.com/What-is-difference-between-IPv4-IPv6-and-MAC-address-of-a-device

b) PC gets both. But does it need both????

The computers need both because MAC addresses and IP addresses work on different layers of the
internet protocol suite. MAC addresses are used to recognize machines within the same broadcast network
on layer 2, while IP addresses are used on layer 3 to identify machines throughout different networks.

Although the computer has an IP address, it still needs a MAC address to discover other machines on the
same network (especially the router/gateway to the rest of the network/internet).
http://networkengineering.stackexchange.com/questions/3329/reason-for-both-a-mac-and-an-ip-address

c) Definition of ARP

Short for Address Resolution Protocol, a network layer protocol used to convert an IP address into a
physical address (called a DLC address), such as an Ethernet address. A host wishing to obtain a physical
address broadcasts an ARP request onto the TCP/IP network. The host on the network that has the IP
address in the request then replies with its physical hardware address.
http://www.webopedia.com/TERM/A/ARP.html

Why is it needed?

ARP is used to mediate between Ethernet (and other broadcast link-level protocols) and the network layer,
or IP protocols. Put more simply, ARP converts IP addresses to Ethernet addresses. ARP is necessary
because the underlying Ethernet hardware communicates using Ethernet addresses, not IP addresses.
http://searchnetworking.techtarget.com/answer/Why-is-ARP-necessary

Designing and developing a website


Page 10
d) Default Gateway

In a network using subnets, the router that forwards traffic to a destination outside of the subnet of
the transmitting device. http://www.techsupportforum.com/forums/f58/explanation-of-subnet-mask-default-
gateway-preferred-and-alternate-dns-server-57325.html

Subnet Mask

Subnet Mask is used to decide what subnet an IP address fits. An IP address has two components,
the network address and the host address. For example, consider the IP address 150.215.017.009.
Assuming this is part of a Class B network, the first two numbers (150.215) represent the Class B network
address, and the second two numbers (017.009) identify a particular host on this network.
http://www.techsupportforum.com/forums/f58/explanation-of-subnet-mask-default-gateway-preferred-and-
alternate-dns-server-57325.html

e) IP Routing table

Each router maintains a set of information that provides a mapping between different network
IDs and the other routers to which it is connected. This information is contained in a data
structure normally called a routing table.

Routers are responsible for progressing traffic on an IP internetwork. Each router accepts
datagrams from a variety of sources, examines the IP address of the destination and decides what
the next hop is that the datagram needs to take to get it that much closer to its final destination.
http://www.tcpipguide.com/free/t_IPRoutesandRoutingTables.htm

Task-3

a) TWO 2 examples with justifications of how the company has weaknesses in access control
measures.

Although the company has developed, there was no strategic plan for IT departments. Many staff
and employees have connected to the office router via Wi-Fi or other devices, so the internet
access cannot be a good communication. Besides, users are rarely change their passwords. So
there is no secure condition for their personal or official cases.

b) Five 5 measures

Password security policy

Designing and developing a website


Page 11
Users tend to pick weak passwords if it is allowed and it is not secure. So, it is also easy to crack via
dictionary attack. Thus, users should change their passwords to be secure using complex words
and symbols. And the users should not use the same password for different applications.

Antivirus software

Antivirus software are also essential for an organization process or a company. Viruses are very
sophisticated and they can corrupt company information and personal documentations. They can be
protected by automatic scan the viruses and update capabilities.

Encryption

Encrypting the transmission is useful when the organization or company wants to protect emails
regularly sent from another office in other countries. To encrypt the communications through their
emails, the company should create a virtual private network (VPN).

Internet access VPN use

The company should use the VPN network which is a remote network communication via the
internet. It is useable because of its secure, private communication tunnel between two or more
devices across a public network. VPN is protected the connection between the client and the ISP.

Staff Morale

Staffs use the internet with their multiple devices to the office router. So they can know the personal
information of the company. If the staffs are honest with this, there will not be a problem. But if the
staffs are corrupting and sending this information to any rival companies. This is related with the
morale and ethics of the staffs. So, it is needed to manage and monitor the staffs carefully.

c) The biggest threat

The biggest threat for this system is the password security policy. The attackers can get information
by eavesdropping or other various ways. Each employee should have a secure and strong
password and it is important to change the passwords in every 6 months or in a default time. If the
users cannot know the way how to give strong passwords, the password generators can help to get
new ones.

Task-4

a) A logical network diagram (topology) that shows the main components of the network

Designing and developing a website


Page 12
access points
router router
firewall

firewall

switch

Internet
switch cloud

Server

Server Mail server File


server

Designing and developing a website


Page 13
b) Office

192.168.1.1 192.168.1.2
192.168.1.3
255.255.255.0 255.255.255.0
255.255.255.0
Office
192.168.1.4
switch
255.255.255.0
Spain
224.168.10.11
mail server server file server
172.16.1.1 172.16.1.2 255.255.255.255
172.16.1.3
255.255.0.0 255.255.0.0
255.255.0.0 192.168.2.1
255.255.255.0
switch
192.168.4.1
access 192.168.2.3
255.255.255.0
points 255.255.255.0
firewall
router server
192.168.2.2
192.168.3.1 VPN 255.255.255.0
224.168.10.1
255.255.255.0
255.255.255.255
router
access
192.168.6.1 points 192.168.5.1
firewall 255.255.255.0
255.255.255.0

224.168.1.1
255.255.255.255

c) Chosen components
In this topology, the main office in England is connected over VPN network with the office in Spain.
There are firewalls, routers, switches, servers, PCs and access points. They are connected in that
way described in figure because VPNs are great for accessing blocked websites or for bypassing
Internet filters. This is why there is an enlarged number of VPN services used in countries where
Internet censorship is realistic. If the company wants an IP address from another office in other
country, then a VPN can provide this. Besides, its bandwidth and efficiency of the network can be
normally improved once a VPN solution is applied. In case of a company, the great advantage of
having a VPN is that the information can be accessed remotely even from office in other countries.
That’s why a VPN can increase productivity within a company.
https://blogs.vmware.com/euc/2015/09/vmware-horizon-access-point-secure-remote-access-end-
user-computing.html

Designing and developing a website


Page 14
d) Local prices

No. Device’s Name Brand Quantity Price Total price


1 Desktop Lenovo 8 $169.78 $1358.24
2 Laptop Lenovo 7 $236.36 $1654.52
3 Network printer HP 1320n 1 $699.99 $699.99
Monochrome
4 Switch 8port Gigabit 2 $25.36 $50.72
ethernet switch
5 Router AVStream Dual 2 $43.78 $87.56
Band Router
6 Firewall Cisco RV110W 2 $95.18 $190.36
7 Access points TP-LINK TL- 2 $58.31 $116.62
WA901ND
Advanced
8 Servers HP Proliant Server 6 $491.51 $2949.06
Gen8
9 Microsoft Nokia Nokia Lumia 640 8 $57.21 $457.68
Smartphones
10 Anti-virus software Nortan 1

Task-5

In this system, the company use VPN network to get the good communication between the
companies. A more secure way to deliver remote access to company systems is with a virtual private
network (VPN). A VPN creates a secure link between the office network and the employee’s computer
across the internet.
http://www.webopedia.com/DidYouKnow/Internet/virtual_private_network_VPN.asp

All the information sent between the two is knotted, so nobody can interrupt it. So it is secure to use
it. Setting up a secure VPN can be a complicated task that requires extra hardware and software.
Because a VPN allows wide access to your company systems, you need to take adequate security
precautions too. http://www.itdonut.co.uk/it/communications/networking/remote-access-to-your-
network

Dropbox is a good solution because it is easy to share files between the main office and the sub-offices .
As long as they have accounts adding and sharing content will be a breeze. Besides, it offers a nice
storage backup when the company needs to store a large files with ablsolute ease. http://small-
bizsense.com/top-5-benefits-of-using-dropbox-for-a-small-business/

a) VPN Security weakness

Designing and developing a website


Page 15
The main problem found when the company is using VPN network is that the employees try to use
with their devices connected to the office router via Wi-Fi. So, the devices are barriers to get a good
connection between the companies. Besides, there may become a IP spoofing attacks, that is,
someone is using the same IP address between staffs.

Reference Lists
http://www.itdonut.co.uk/it/communications/networking/remote-access-to-your-network
http://windows.microsoft.com/en-us/windows/hubs-switches-routers-access-points-differ
http://www.lenovo.com/uk/en/
https://www.monoprice.com/Category?c_id=105&cp_id=10521
http://www.tcpipguide.com/free/t_IPRoutesandRoutingTables.htm
http://networkengineering.stackexchange.com/questions/3329/reason-for-both-a-mac-and-an-ip-
address
https://blogs.vmware.com/euc/2015/09/vmware-horizon-access-point-secure-remote-access-end-
user-computing.html
http://www.webopedia.com/DidYouKnow/Internet/virtual_private_network_VPN.asp
https://technet.microsoft.com/en-us/library/cc786563(v=ws.10).aspx

http://searchnetworking.techtarget.com/answer/Why-is-ARP-necessary

http://www.techsupportforum.com/forums/f58/explanation-of-subnet-mask-default-gateway-
preferred-and-alternate-dns-server-57325.html

http://www.webopedia.com/TERM/A/ARP.html

https://www.quora.com/What-is-difference-between-IPv4-IPv6-and-MAC-address-of-a-device

http://accc.uic.edu/answer/what-my-ip-address-mac-address

http://small-bizsense.com/top-5-benefits-of-using-dropbox-for-a-small-business/

Designing and developing a website


Page 16