Sultanate pair. Each of them has different features. UTP

Sultanate of Oman

Gulf College

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

 

 

 

 

 

Assignment about:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Done by: Muhanna Saleh Albusaidi

ID:

 

 

Table of contents

Introduction………………………………………………………………………3

 

Task1:

The type cable used………………………………………………………….4The connectors used…………………………………………………………4-5The cost of cabling and
installation…………………………………………6The data transfer rates that will
be required………………………………….7 Type topology…………………………………………………………………7

 

Task2:

Devices and media used for
networks……………………………………….8-9Advantages and disadvantages of
devices……………………………………9Types and data protocols…………………………………………………10-11The best devices to buy and cost…………………………………………….11

 

Task3:

The security issues that are
specific to an environment with public access to the internet including access
by children…………………………………………………………………9Protection from viruses, Trojan
horses, etc……………………………………12Separating public and private
wireless networks……………………………..13 

Task4:

Test plan………………………………………………………………………..12Instructions How to test all
aspects of the network……………………………13 

Task5:

Conclusion……………………………………………………………………14Reference……………………………………………………………………..14

 

 

 

 

 

Introduction:

 

Network is a collection of computers and other
devices connected to each other to share resources. Network protocol is the set
of rules of communication that means of exchanging information in the network,
which are the regulatory rules needed by the network in order to help its
various elements to communicate and understand each other.

 

 

The process of transferring files
and information between different types of computers is one of the basic needs
of organizations, banks, companies and others. The development of ICTs, which
are considered the most important components of computer networks, is aimed at
satisfying the needs and requirements of all business organizations for a fast
and cost-effective security environment. The occasion

The computer network helps employees through the speed and ease of
communication between them through the use of programs such as e-mail and also
helps the network administrator to control computers and devices using the
server and the benefits of the network It helps to share applications instead
of downloading them in each device, The main server.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Task1:

a) The media used:

 

Wired:

       Twisted-pair
cable, coaxial cable, fiber-optic cable are the common types of wired network
media.

Twisted pair cable is can use for
telephone communication and for Ethernet networks.

UTP and STP are types of twisted pair. Each of them has
different features.

UTP cable is used for different
networks. This cable has eight copper wires covered by an insulating material.
UTP cable can cancel the effective of electromagnetic interference and radio
frequency interference. UTP cable is installed using the RJ 45 connector. The
RJ-45 has eight wire connector. UTP is used in telephone wiring and local area
networks.

 

Fiber-optic cable normally
is installed for long backbone runs or runs between buildings.

It
consists of a center glass core surrounded by various layers of protective
materials. It sends light rather than electronic signals that eliminate the
problem of electrical interference. Fiber optic cable has the power to sends
signals over much longer distances than coaxial and twisted pair and to carry
data at vastly greater speeds. This capacity can expands communication
possibilities to include services such as video conferencing and interactive
services.

 

 

Coaxial cable:      This
cable is made of copper wire surrounding by flexible insulation and it is
coated by metallic foil that called second layer. Second layer is reduced the
amount of outside interference.

 

 

A wireless local-area
network is used radio waves to join devices like laptops to the Internet and to
your business network and its applications. When you join a laptop to a WiFi
hotspot at a cafe, hotel or other public place, you’re connecting to that
business’s wireless network. Wireless Wifi:     . Wi-Fi
technology gives us with a wireless connection through Access Points. These
devices provide laptops, smart phones and tablets devices with the Internet
connection signals..

 

b)The connectors
used:

 

      There are many
categories of UTP cables that identified by CAT that supporting a different
amount of bandwidth.

 

CAT5: Used in Ethernet-based LANs, it includes two twisted
pairs and supports 100 Mbps for up to 100 meters.

CAT5e: Used in Ethernet-based LANs, it has four twisted pairs
and supports 1 Gbps for 100 meters.

CAT6: Used in Ethernet-based LANs and data center networks,
it has four tightly wound twisted pairs. It supports 1 Gbps for up to 100
meters and 10 Gbps for up to 50 meters.

 

 

 

 

 

 

 

c)The cost of cabling and installation.

Type of cable

Costs

Pictures

25mm copper cable electric
control

50RO

96 core fiber optic cable

70 RO

 2m Cable USB to RJ-45

160 RO

RJ-45 to DB9 Console
Management Router Cable

3.400 RO

Cable 4 mm

730 RO

 

 

D)The data
transfer rate that will be require.

 Fiber optic cable can
run 100km without magnifying the light signal.

CAT5: Data transfer up to 100 Mbps.

CAT6: Data transfer up to 55 Mbps.

 

E) Network
topology

        There are many
types of topology:

Bus Topology: 
it used a single main cable which has terminators on both ends and easy
to implement and extend.

Ring Topology which every node is connected to only
two neighbors forming a ring shape. The messages move in only one and the same
direction in this arrangement. In case any cable or device breaks away from the
loop, then the entire network fails.

Tree Topology (hierarchical topology): The
configuration and cabling is difficult in comparison to other topologies.
However, its point to point wiring for individual sections is a desirable
feature of this topology.

Star topology: each devices and computers on a
network connected to a central device.

This central device can be either a hub, router or a switch.

 

Star topology would be ideal for my network.

 

 

Recommendation
for cabling and connector to purchase.

 

I recommend to use UTP cable because it is the most common
type of LAN cable. This cable is easy to install, is fairly inexpensive, and
has a high bandwidth capability. The distance limitation is approximately 328
feet (100 meters).

Also, Fiber optic cable can carry more data in longer
distance with light signal than electrinic signal carry coaxial cable. This
cable is more expensive the other cable.

I used CAT5e connector because it supports data rate of 1 Gbps for 100 meters

and CAT6 connectors because it supports data rate 100 Gbps for 50 meters

 

I choose to make a Star Topology .The best advantages is if
one cable fault, only one computer fails not entire network. Also ,if there is
any problems can be easily founded and easy to troubleshoot.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Task
2:

 

Network devices:

Switch:

                 It is
a hardware that connect group of client together within LAN.

                 It used
switching table to sends packet directly to destination. It reduces collisions
and isolate traffic.

 

Router:

     It is used to
send data between several networks and it depends on a destination IP address
to transfer packets by using routing table. It can be configured statically or
dynamically.

 

Web server:

      It is a software
that serve files from web pages by using HTTP protocol in response to client’s
request.

    

E-mail server:

    It is a server
that sends and receives e-mail over a network. E-mail server can carries
e-mails from clients and send them to other e-mail server or other clients.

 

Database server:

       It is a server
that used to host databases and to provide database services to other clients such
as data analysis, storage, data manipulation, archiving.

 

2)Provide a recommendation of the hardware that should be purchased.

 I recommend to use
router and switch. Routers will be used as the primary devices that used to
interconnect networks. Each port on a router connects to a different network
and routes packets between the networks

 

We have to consider speed and types of ports/interfaces,
Manageability and cost when selecting a switch for the network. The best switch
can be monitored for performance and security and provides more enhancements.

 

In addition to switches and routers, other connectivity
options are available for LANs:

 

Wireless access points:
enable computers and other devices, such as handheld Internet Protocol (IP)
phones, to connect to the network wirelessly or share broadband connectivity.Firewalls: protect network
from threats and offer application security, network control and containment,
and secure connectivity technologies.

Also, we have to combine the functionality of switches,
routers, access points, and firewalls in the same networking device.

Finally, make sure your network is designed with reliability
and redundancy in mind. This provides the business continuity you’ll need to
bounce back quickly from unforeseen circumstances.

 

 

3)Protocol types.

* FTP (File Transfer Protocol): it allows users to
sends files from one computer to another.

* The Hypertext Transfer Protocol (HTTP) is a
group of rules for sending files like text, images, sounds and etc on the World Wide Web.

* Simple Mail Transfer Protocol (SMTP) is an Internet standard for sending
and receiving email.

* The Address Resolution Protocol (ARP) is a communication
protocol used for discovering and mapping physical address
associated with a given IPv4 address.

 

 

4)The Hardware to buy and cost

 

Device

cost

Integrated wireless router range

29  RO

Cisco RV325 Gigabit Dual WAN VPN Router

45 RO

Gigabit PoE Web Managed (Plus) Switch

25 RO

Webroot Secure Internet Security (software):

19 RO

 

 

 

Task3:

 

a)the security issues that are
specific for particular environment with public access to the internet
including access by children?

 

There are many steps to increase awareness between the
public and the children of the moral importance of dealing with the Internet
and provide them with the information and skills necessary to raise their
personal safety while dealing with secret codes, there are several steps for
the safe use of the Internet:

Use  a strong password when you using social media
sites to protect each person from any risk.Work continuously to
develop awareness when dealing with ICT.Understand all rules, responsibilities
and penalties for dealing with technologyAvoid posting information
like bank account info, your address and birth date and your daily schedule to keep
yourself and your information safe.

 

There are many security issues like :

-Viruses, Worms, Bombs, and Trojan Horses

A virus is a program that enters the device without
permission and puts copies of itself into programs, and the virus is a
malicious or intrusive program. It could come through unprotected ports,
compromise whole network.

-Trap Doors: is a
mechanism built in to a system by its designer or administrator to give that
person subsequent unauthorized access to the system. This threat can be
addressed by specifying the server’s interfaces and testing that they all
operate properly.

-Denial of Service Attacks: This
threat comes in many forms, ranging from physical destruction of a network
resource to flooding the resource with so many requests that it is unable to
service legitimate users.

-Snooping: is a passive
attack that involves tapping into the network wire and listening for data that
might be valuable.

-Spoofing: involves
deceiving someone or deceiving the system itself. This is usually done by
tapping into the wire and injecting information in an attempt to intercept
valuable data destined for a valid user or workstation. 

 

 

b)Protection from  viruses, Trojan horses and etc.

Implementing Firewall for Internal and External Security.

A firewall is either a program or a device used to save the network and server
from hackers. A firewall used to monitor and block or allow network traffic,
both incoming and outgoing, on a secret network.

 

Virtual Private Network (VPN).

 

VPN extends a private network across a public network, such
as the Internet. It enables a computer or network to transfer and receive data
across public networks as if it were directly connected to the private network,
while benefiting from the functionality, security and management policies of
the public network.

 

 

Network Packet Sniffers.

 

An effective way to monitor traffic over a network using a
network data monitoring program. It gathers incoming and outgoing data, which
can be useful in detecting network intrusion attempts. It used to analyze
network problems, filter and block suspicious content from access to the
network.

 

Encryption: an encrypted message can transmitted and
decrypted on the other side by using the same key. It used to authenticate the
source of massage.

 

D) Separation of public and private
wireless networks

 

When you want to make your network segments, you’ve set up
one wireless network for your own private use with your personal PCs, file
servers, and etc on that network and another for public use.

 

In such a scenario, you should configure your private router
to be the farthest device from your Internet connection. This may require you
to get another router if you need wired ports as well as wireless ones. Your
shared network will be connected directly to your Internet connection and your
private network will connect to the shared network, ideally through a cable to
the AP at the Internet connection.

 

Apply IP Address for your network, so You can get this
setting of the IP address range used by the private router somewhere on that
screen where you enable DHCP and router functions, or turn them off to turn
your AP into a non-routing AP-only bridging device.

For your “public” network AP, configure the AP so
that its router functionality is turned on and so that the AP’s DHCP server is
active. Look at the IP address range for this network now.

 

This keeps your networks separate – because private
addresses are not routable via the Internet.

You can establish some firewall protection between the two
segments of your network to really keep the public and private networks
separate and secure from each other,.

 

E)The security measures that should
be to implement to controls and reduce threats n your system.

 

IT security policies:

Review IT security policies that address accounts and users
with privileged access, such domain administrators, application administrators,
and DBAs. Ensure that policies exist and clear on how access is requested,
justified, approved, and ensure they’re regularly reviewed. 

 

Securing Servers:

System administrators should ensure their file servers are
protected, both physically and in how the consoles may be accessed.

 

Restrict physical access to the file server.

 

 

Task4: Test plan:

 

 

A test plan is a document including the objectives,
resources, and processes for a specific test for a software or hardware product. The plan
typically include a detailed understanding of the eventual workflow.

A test plan documents the way that will be used to verify
that a product or system meets its design specifications and other
requirements.

A test plan may include a strategy for one or more of the
following depending on the product and the responsibility of the organization:

Design Verification or
Compliance test – performed during the development, typically on a small sample
of units.Manufacturing or Production
test – performed during preparation or assembly of the product in an ongoing
way for purposes of performance verification and quality control.Acceptance or Commissioning
test – performed at the time of delivery or installation of the product.Service and Repair test – performed
as required over the service life of the product.Regression test – performed
on an existing operational product, to verify that functionality didn’t get
broken when other aspects of the environment are changed.

 

Instruction of how test all aspect
of network:

 

1. Build the topology according to the Design and Topology
Diagram. Assign IP addresses according to the IP address plan.

2. Create a basic configuration on each device. Include
applicable passwords, device names, default routes, default gateways, and
activate interfaces.

3. Console into one of the devices in the topology and ping
all of the other devices in the topology. Record any anomalies.

4. Telnet to each device in the configuration and verify
that each is reachable.

5. Copy the output of the show running-config ,show ip route
,show processes cpu sorted ,show interfaces , and the first few lines of show
memory and paste into a document using a text editor such as Notepad. Repeat
for all devices in the topology

Finally, make sure your network is designed with reliability
and redundancy in mind. This provides the business continuity you’ll need to
bounce back quickly from unforeseen circumstances.

 

Testing cabling:

 

The process of testing any fiber optic cable plant:

– testing cable on the reel before installation, testing
each segment as it is installed and testing complete end-to-end loss.

-Practical testing: testing only a few fibers on each cable
reel for continuity before installation to make sure there hasn’t been any damage
to the cable during shipment.

-Then each segment is tested as it is terminated by the
installers.

-Finally the entire cable run is plugged together and tested
for end-to-end loss for final documentation.

 

 

 

 

 

 

 

 

 

Conclusion :

 

In this assignment, I research and mention the best network
hardware , the media you may select and topology require  to create the network .

Also , a number of factors may need to consider like speed
and types of ports or interfaces , manageability and cost.

The best hardware which provides effective enhancements to
the monitoring and security features.

In addition, I mention some recommendations for security
measure that you need to implement to avoid the security issues and how to
document the test plan and testing cabling.

 

 

 

Reference:

http://www.bestbuy.com/site/lenovo-desktop-amd-a10-series-12gb-memory-2tb-hard-drive-black/4362103.p?skuId=4362103

http://www.toptenreviews.com/business/internet/best-web-design-software/coffeecup-visual-site-designer-review/

http://www.khayma.com/internetclinic/progwebdezin.htm

http://www.bestbuy.com/site/lenovo-li2364d-23-ips-led-fhd-monitor-black/5203200.p?skuId=5203200

https://support.novell.com/techcenter/articles/ana19971102.html

https://fcit.usf.edu/network/chap4/chap4.htm

http://www.who.int/goe/publications/goe_security_web.pdf

http://sourcedaddy.com/networking/separating-your-networks.html

 

 

 

 

 

 

 

 

 

 

 

 

 

 

x

Hi!
I'm Clifton!

Would you like to get a custom essay? How about receiving a customized one?

Check it out