Computer Network Assignment
Computer Network Assignment
Computer Network Assignment
Candidate No :
Submission Date :
Important Notes:
Please refer to the Assignment Presentation Requirements for advice on how to set out your assignment.
These can be found on the NCC Education Campus. Scroll down the left hand side of the screen until you
reach Personal Support. Click on this, and then on Policies and Advice. You will find the Assignment
Presentation Requirements under the Advice section.
You must familiarize yourself with the NCC Education Academic Dishonesty and Plagiarism Policy and
ensure that you acknowledge all the sources which you use in your work. The policy is available on Campus.
Follow the instructions above, but click on Policies rather than Advice.
You must complete the ‘Statement and Confirmation of Own Work’. The form is available on the Policies
section of Campus. Scroll down the left hand side until you reach Personal Support. Click on this and then
click on Policies and Advice.
Please make a note of the recommended word count. You could lose marks if you write 10%more or less
than this.
You must submit a paper copy and digital copy (on disk or similarly acceptable medium).Media containing
viruses, or media which cannot be run directly, will result in a fail grade being awarded for this module.
Student declaration
I have read and understood NCC Education’s Policy on Academic Dishonesty and Plagiarism.
Module Leader :
I confirm that this is my own work and that I have not plagiarised any part of it. I have also noted the
assessment criteria and pass mark for assignments.
Due Date :
Student Signature:
Submission Date :
1) Task 1
a. HTML
2) Task 2
a. CSS File
4) Task 4
a. Critical Evaluation
Introduction
Worldwide Reading Solutions (WLS) is a non-profit organization that supports schools by increasing the
literacy skills of pupils. WLS draws upon recent research and proven practice which shows that the use of
synthetic phonics naturally improves the reading and writing ability of primary aged children. Synthetic
phonic is a method of teaching, reading, in which pupils are taught to read letters by saying the sound they
present. The small head office is located in Manchester, England. And there are 30 trainers who work
across the world. But there are 12 employees in Manchester. Although the company grew, there was no
strategic view of IT. Employees connect their multiple devices to the office router via Wi-Fi or directly by
UTP cable. In addition, users have many kinds of versions of Anti-virus software. But users rarely change
their passwords. Besides, there is no member of staff with IT support responsibility.
Task 1
a) Network topology
There are three common network topologies in current use:
Bus topology: a series of PCs linked alongside a single cable segment.
Star topology: a group of computers joined over a central point.
Ring topology: has computers related to form a loop.
There are also variations too. They are extended star, mesh and star combined with bus etc.
In addition, there are many categories for cable types such as Cat 1, 2, 3, 4, 5, 5e and 6. Among them, Cat
5e is chosen to use for this system. Definitely, Cat 5e is cheaper than other high standard categories. It
constitutes of copper wires aligned in four pair sand holds the capability to support fast internet speed. The
Category 5e cables can accomplish ten times more speed than 100 Mbps and supports in reducing
electromagnetic interference. Cat 5e is often used in cross-over cable jobs because of its affordability. Cat
5e cable offers high-transfer speeds and is also capable of shifting up to four signals at once.
An architecture in which data transfers from one distinct level of processing to another.
Communications protocols are a primary example.
1) Layered architecture allows teams to work on unlike parts of the application parallel with minimal
dependencies on other teams.
2) It enables to develop loosely coupled systems. Besides, different components of the application
can be self-sufficiently organized, maintained, and updated, on different time.
1) There might be a negative influence on the performance as the network has the extra overhead
of passing through layers instead of using a component directly. Development of user-intensive
requests can sometimes take longer if the layering inhibits the use of user interface components
that directly cooperate with the database.
2) The use of layers supports to control and summarize the difficulty of huge applications, but
enhances complexity to simple applications.
c) Components
Router
A device that forwards data packets along networks. A router is connected to at least two networks,
commonly two LANs or WANs or a LAN and its ISP.s network. Routers are located at gateways, the
places where two or more networks connect. Routers use headers and forwarding tables to
determine the best path for forwarding the packets, and they use protocols such as ICMP to
communicate with each other and configure the best route between any two hosts.
http://windows.microsoft.com/en-us/windows/hubs-switches-routers-access-points-differ
Hub
A common connection point for devices in a network. Hubs are commonly used to connect
segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to
the other ports so that all segments of the LAN can see all packets.
http://windows.microsoft.com/en-us/windows/hubs-switches-routers-access-points-differ
Fast Ethernet , RS232, and ATM are protocols with physical layer components.
PPP (Point to Point Protocol) and HDLC (High-Level Data Link Control) are included in data link layer.
IP (Internet Protocol), OSPF (Open Shorted Path First), NetBEUI (Net Bio Extended User Interface) are
worked in network layer.
TCP (Transmission Control Protocol), UDP (User Datagram Protocol), SPX (Sequenced Packet Exchange
Protocol) are worked in transport layer.
ASP (AppleTalk Session Protocol) and NetBIOS (Network Basic Input Output System) are worked in
session layer.
AFP (AppleTalk Filing Protocol), SMB (Server Message Block), NCP (Network Core Protocol), SSL
(Secure Sockets Layer) and MIME (Multi-Purpose Internet Mail Extension) are worked in presentation
layer.
Physical (Layer 1)
OSI Model, Layer 1 offers the hardware means of sending and receiving data on a carrier, including
defining cables, cards and physical aspects.
Network (Layer 3)
Layer 3 delivers switching and routing technologies, creating logical routes, known as virtual circuits, for
communicating data from node to node. Routing and forwarding are functions of this layer, as well as
addressing, internetworking, error handling, congestion control and packet sequencing.
Transport (Layer 4)
OSI Model, Layer 4, provides clear transfer of data between end systems, or hosts, and is responsible for
end-to-end error recapture and flow control. It confirms complete data transfer.
Session (Layer 5)
This layer creates, manages and terminates connections between applications. The session layer sets up,
coordinates, and terminates conversations, exchanges, and dialogues between the applications at each
end. It deals with session and connection coordination.
Presentation (Layer 6)
This layer provides independence from differences in data representation (e.g., encryption) by translating
from application to network format, and vice versa. The presentation layer works to alter data into the form
that the application layer can receive.
Application (Layer 7)
OSI Model, Layer 7, supports application and end-user processes. Everything at this layer is application-
specific. This layer provides application services for file transfers, e-mail, and other network software
services. Telnet and FTP are applications that exist totally in the application level. Tiered application
architectures are part of this layer.
e)
f) I would like to recommend the 802.11n standard. 802.11n should be used because it manufactures
wireless chip sets, and free reviews specify that the privileges of greater speed and range for
802.11n. Specifically, 802.11n usually offer practical speeds of 22Mbit/sec. to 24Mbit/sec. for
802.11n equipment. These results are based on Draft 2 of 802.11n standard. The 802.11n
standard expresses manufacturers how to design their products so that they’ll work accurately with
other manufacturers’ products. 802.11n standard devices can operate on two frequency bands,
No, I do not want to recommend for the entire LAN be connected wirelessly. If hybrid network
would be used, it will be suitable for this system. Hybrid network topology is a combination of two or
more different basic network topologies. For example, it can be star-ring, star-bus topologies, etc. It
must be certainly different topologies, because for example two star topologies form the star
topology. The resulting hybrid topology has the features and limitations of its components. Hybrid
network topology has many advantages. Hybrid topologies are flexible, reliable and have better fault
tolerance. The new nodes can be easily added to the hybrid network, the network faults can be
easily identified and corrected without disturbing the work of the rest of network. But at the same
time hybrid topologies are expensive and difficult for managing.
TASK 2
In a local area network (LAN) or other network, the MAC (Media Access Control) address is the
computer's unique hardware number. (On an Ethernet LAN, it's the same as your Ethernet
address.) When you're connected to the Internet from your computer (or host as the Internet
protocol thinks of it), a correspondence table relates your IP address to your computer's physical
(MAC) address on the LAN.
The MAC address is used by the Media Access Control sublayer of the Data-Link Layer (DLC) of
telecommunication protocols. There is a different MAC sublayer for each physical device type. The
other sublayer level in the DLC layer is the Logical Link Control sublayer.
IP specifies the format of packets, also called datagrams, and the addressing scheme. An IP address
is an identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route
messages based on the IP address of the destination. The format of an IP address is a 32-bit numeric
address written as four numbers separated by periods. Each number can be zero to 255.
MAC (Media Access Control) addresses uniquely identify Ethernet network cards (or PCs with built in
Ethernet). Although it's true that every computer that uses Ethernet has a unique MAC address, not all
Internet connections are made over Ethernet. Also, MAC addresses in a particular local network are not
similar in any way, so one can't use them to decide that a particular machine is "nearby."
IP addresses uniquely identify computers on the Internet, or on a local intranet. Computers on the same
local "subnet," such as those on a particular local network, will share part of their IP address. For instance,
computers in my office intranet are part of the 192.168.2.x subnet, with IP addresses like 192.168.2.100
and 192.168.2.101. The router that connects our office to the Internet has the IP address 192.168.2.1. That
router also has a true Internet IP address, and performs NAT (Network Address Translation) to allow
connections from computers inside my intranet to reach the outside world... but blocks incoming
connections for security. http://accc.uic.edu/answer/what-my-ip-address-mac-address
MAC address is the short term for Media Access Control Address. It is a unique address and also
organizes the protocols access to physical network segments. That is often used as address in some IEEE
802 network technologies like Ethernet and Wi-Fi. IP Address is termed Internet Protocol Address. It also
executes the host and identifies the networking interface and also addresses the location.
IPv4 is the internet protocol for fourth version. IPv6 is internet protocol for sixth version. Ipv4 is carried out
the communication with devices by using 32 bits addressing system for identification. So, Ipv4 is absolute
in nowadays because it needs address for internet connection.Ipv6 is used 128 bits IP address and most
commonly used. It can be evolutionary upgraded and designed for more used of internet. IPv4 is written by
decimal and parted by periods for human readable. Ipv6 is written by hexadecimal and parted by colons.
https://www.quora.com/What-is-difference-between-IPv4-IPv6-and-MAC-address-of-a-device
The computers need both because MAC addresses and IP addresses work on different layers of the
internet protocol suite. MAC addresses are used to recognize machines within the same broadcast network
on layer 2, while IP addresses are used on layer 3 to identify machines throughout different networks.
Although the computer has an IP address, it still needs a MAC address to discover other machines on the
same network (especially the router/gateway to the rest of the network/internet).
http://networkengineering.stackexchange.com/questions/3329/reason-for-both-a-mac-and-an-ip-address
c) Definition of ARP
Short for Address Resolution Protocol, a network layer protocol used to convert an IP address into a
physical address (called a DLC address), such as an Ethernet address. A host wishing to obtain a physical
address broadcasts an ARP request onto the TCP/IP network. The host on the network that has the IP
address in the request then replies with its physical hardware address.
http://www.webopedia.com/TERM/A/ARP.html
Why is it needed?
ARP is used to mediate between Ethernet (and other broadcast link-level protocols) and the network layer,
or IP protocols. Put more simply, ARP converts IP addresses to Ethernet addresses. ARP is necessary
because the underlying Ethernet hardware communicates using Ethernet addresses, not IP addresses.
http://searchnetworking.techtarget.com/answer/Why-is-ARP-necessary
In a network using subnets, the router that forwards traffic to a destination outside of the subnet of
the transmitting device. http://www.techsupportforum.com/forums/f58/explanation-of-subnet-mask-default-
gateway-preferred-and-alternate-dns-server-57325.html
Subnet Mask
Subnet Mask is used to decide what subnet an IP address fits. An IP address has two components,
the network address and the host address. For example, consider the IP address 150.215.017.009.
Assuming this is part of a Class B network, the first two numbers (150.215) represent the Class B network
address, and the second two numbers (017.009) identify a particular host on this network.
http://www.techsupportforum.com/forums/f58/explanation-of-subnet-mask-default-gateway-preferred-and-
alternate-dns-server-57325.html
e) IP Routing table
Each router maintains a set of information that provides a mapping between different network
IDs and the other routers to which it is connected. This information is contained in a data
structure normally called a routing table.
Routers are responsible for progressing traffic on an IP internetwork. Each router accepts
datagrams from a variety of sources, examines the IP address of the destination and decides what
the next hop is that the datagram needs to take to get it that much closer to its final destination.
http://www.tcpipguide.com/free/t_IPRoutesandRoutingTables.htm
Task-3
a) TWO 2 examples with justifications of how the company has weaknesses in access control
measures.
Although the company has developed, there was no strategic plan for IT departments. Many staff
and employees have connected to the office router via Wi-Fi or other devices, so the internet
access cannot be a good communication. Besides, users are rarely change their passwords. So
there is no secure condition for their personal or official cases.
b) Five 5 measures
Antivirus software
Antivirus software are also essential for an organization process or a company. Viruses are very
sophisticated and they can corrupt company information and personal documentations. They can be
protected by automatic scan the viruses and update capabilities.
Encryption
Encrypting the transmission is useful when the organization or company wants to protect emails
regularly sent from another office in other countries. To encrypt the communications through their
emails, the company should create a virtual private network (VPN).
The company should use the VPN network which is a remote network communication via the
internet. It is useable because of its secure, private communication tunnel between two or more
devices across a public network. VPN is protected the connection between the client and the ISP.
Staff Morale
Staffs use the internet with their multiple devices to the office router. So they can know the personal
information of the company. If the staffs are honest with this, there will not be a problem. But if the
staffs are corrupting and sending this information to any rival companies. This is related with the
morale and ethics of the staffs. So, it is needed to manage and monitor the staffs carefully.
The biggest threat for this system is the password security policy. The attackers can get information
by eavesdropping or other various ways. Each employee should have a secure and strong
password and it is important to change the passwords in every 6 months or in a default time. If the
users cannot know the way how to give strong passwords, the password generators can help to get
new ones.
Task-4
a) A logical network diagram (topology) that shows the main components of the network
firewall
switch
Internet
switch cloud
Server
192.168.1.1 192.168.1.2
192.168.1.3
255.255.255.0 255.255.255.0
255.255.255.0
Office
192.168.1.4
switch
255.255.255.0
Spain
224.168.10.11
mail server server file server
172.16.1.1 172.16.1.2 255.255.255.255
172.16.1.3
255.255.0.0 255.255.0.0
255.255.0.0 192.168.2.1
255.255.255.0
switch
192.168.4.1
access 192.168.2.3
255.255.255.0
points 255.255.255.0
firewall
router server
192.168.2.2
192.168.3.1 VPN 255.255.255.0
224.168.10.1
255.255.255.0
255.255.255.255
router
access
192.168.6.1 points 192.168.5.1
firewall 255.255.255.0
255.255.255.0
224.168.1.1
255.255.255.255
c) Chosen components
In this topology, the main office in England is connected over VPN network with the office in Spain.
There are firewalls, routers, switches, servers, PCs and access points. They are connected in that
way described in figure because VPNs are great for accessing blocked websites or for bypassing
Internet filters. This is why there is an enlarged number of VPN services used in countries where
Internet censorship is realistic. If the company wants an IP address from another office in other
country, then a VPN can provide this. Besides, its bandwidth and efficiency of the network can be
normally improved once a VPN solution is applied. In case of a company, the great advantage of
having a VPN is that the information can be accessed remotely even from office in other countries.
That’s why a VPN can increase productivity within a company.
https://blogs.vmware.com/euc/2015/09/vmware-horizon-access-point-secure-remote-access-end-
user-computing.html
Task-5
In this system, the company use VPN network to get the good communication between the
companies. A more secure way to deliver remote access to company systems is with a virtual private
network (VPN). A VPN creates a secure link between the office network and the employee’s computer
across the internet.
http://www.webopedia.com/DidYouKnow/Internet/virtual_private_network_VPN.asp
All the information sent between the two is knotted, so nobody can interrupt it. So it is secure to use
it. Setting up a secure VPN can be a complicated task that requires extra hardware and software.
Because a VPN allows wide access to your company systems, you need to take adequate security
precautions too. http://www.itdonut.co.uk/it/communications/networking/remote-access-to-your-
network
Dropbox is a good solution because it is easy to share files between the main office and the sub-offices .
As long as they have accounts adding and sharing content will be a breeze. Besides, it offers a nice
storage backup when the company needs to store a large files with ablsolute ease. http://small-
bizsense.com/top-5-benefits-of-using-dropbox-for-a-small-business/
Reference Lists
http://www.itdonut.co.uk/it/communications/networking/remote-access-to-your-network
http://windows.microsoft.com/en-us/windows/hubs-switches-routers-access-points-differ
http://www.lenovo.com/uk/en/
https://www.monoprice.com/Category?c_id=105&cp_id=10521
http://www.tcpipguide.com/free/t_IPRoutesandRoutingTables.htm
http://networkengineering.stackexchange.com/questions/3329/reason-for-both-a-mac-and-an-ip-
address
https://blogs.vmware.com/euc/2015/09/vmware-horizon-access-point-secure-remote-access-end-
user-computing.html
http://www.webopedia.com/DidYouKnow/Internet/virtual_private_network_VPN.asp
https://technet.microsoft.com/en-us/library/cc786563(v=ws.10).aspx
http://searchnetworking.techtarget.com/answer/Why-is-ARP-necessary
http://www.techsupportforum.com/forums/f58/explanation-of-subnet-mask-default-gateway-
preferred-and-alternate-dns-server-57325.html
http://www.webopedia.com/TERM/A/ARP.html
https://www.quora.com/What-is-difference-between-IPv4-IPv6-and-MAC-address-of-a-device
http://accc.uic.edu/answer/what-my-ip-address-mac-address
http://small-bizsense.com/top-5-benefits-of-using-dropbox-for-a-small-business/