You are on page 1of 42

Computer Networks

Worldwide Reading Solutions

Presented by
AUNG PYAE
(MCC Training Institute, Mandalay Campus)
March 2016
Presented by Aung Pyae Computer Networks

NCC Education

Level (4) Diploma in Computing

Module title Computer Networks


Assignment title Worldwide Reading Solutions
Candidate came AUNG PYAE
Candidate no 00148187
Exam cycle March 2016
Word count

Marker’s comments:

Moderator’s comments:

Marks:

Moderated Marks:

Final marks:

March 2016 Page - 1


Presented by Aung Pyae Computer Networks

STATEMENT AND CONFIRMATION OF OWN WORK

Programmed qualification name: Level (4) Diploma in Computing

Module name: Computer Networks

Each NCC Education assessed assignment submitted by you must have this statement
attached to the assignment as the cover page or it will not be accepted for making. Please
ensure that this statement is either firmly attached to the cover of the assignment or
electronically inserted NUMBER the front of the assignment.

All submitted work must have this form as the cover / first page. Please include this form as
part of a standard format when submitting an assignment.

STUDENT DECALARATION

I have read and understood NCC Education’s policy and Academic Dishonesty and
Plagiarism. I can confirm the following details;

Student ID 00148187
Name AUNG PYAE
Centre name MCC Training Institute, Mandalay Campus,
Myanmar
Module name Computer Networks
Title of work Worldwide Reading Solutions
Module leader DAW THE SEINT AYE
Number of words
I can confirm that is my own work that I have not plagiarized any part of it. I have also noted
the grading criteria and pass mark for assignment.

Due date March 2016


Student signature aungyae
Submitted date 2016

March 2016 Page - 2


Presented by Aung Pyae Computer Networks

TABLE OF CONTENTS

TABLE OF CONTENTS ...................................................................................................................... 3


Introduction ........................................................................................................................................... 5
Acknowledgement ................................................................................................................................. 6
TASK 1: Networking Infrastructure and Protocols........................................................................... 7
(a): The network components should be connected. .................................................................. 7
(b): Layered architecture ............................................................................................................... 11
(c): Networking components ......................................................................................................... 12
(d): Seven protocols ....................................................................................................................... 14
(e): Wi-Fi standard recommendation........................................................................................... 16
(f): Recommended Wi-Fi standard .............................................................................................. 17
TASK 2: Addressing............................................................................................................................ 18
(a): Mac address and IP address ................................................................................................. 18
(b): How computer gets its MAC and IP addresses .................................................................. 19
(c): Address Resolution Protocol (ARP)...................................................................................... 20
(d): Default Gateway and Subnet Mask ...................................................................................... 22
(e): Sub-netting ............................................................................................................................... 23
(f): IP Routing table ........................................................................................................................ 24
TASK 3: Security ................................................................................................................................ 25
(a): Weakness in access control .................................................................................................. 25
(b): Network secure........................................................................................................................ 26
(c): Threat of system ...................................................................................................................... 28
TASK 4: Diagram and Explanation .................................................................................................. 29
(a): Logical network diagram (topology) ..................................................................................... 29
(b): IP addresses ............................................................................................................................ 29
(c): Hardware components ........................................................................................................... 31
(d): Prices and specifications ....................................................................................................... 32
TASK 5: Remote Access ..................................................................................................................... 37
(a): Remote access ........................................................................................................................ 37
(b): Remote access on mobile devices ....................................................................................... 39
Conclusion ........................................................................................................................................... 40
References ............................................................................................................................................ 41

March 2016 Page - 3


Presented by Aung Pyae Computer Networks

March 2016 Page - 4


Presented by Aung Pyae Computer Networks

Introduction

Hello!

My name is Aung Pyae and I study business information technology from NCC Education
Level 4 Diploma in computing course at MCC Training Institute, Mandalay Campus in
Myanmar. I am attending this computer course because information technology (IT) is
essential important today and most of business process use computerized systems. As I am
interest in IT and I want to improve my knowledge and creation skills, I attended to MCC
Training Institute (Mandalay Campus) since 2013. MCC Training Institute (Myanmar) is
recognized by NCC Education and University of Greenwich in UK. So I am attending this
course which is offered by NCC Education Center.

There are four main subjects in our Level 4 first semester course:

 Computer Networks
 Designing and Developing Object-Oriented Computer Programs
 Designing and developing a website
 Office Solutions Development

This assignment is aimed for the global assignment subject, Computer Networks.

Computer Networks subject provide me to the networking and communication systems


commonly employed in a business environment, along with the understanding of the
underlying theoretical frameworks and of associated issues such as testing and security of
these systems.

In this assignment, we have to present the networking infrastructure and protocols, network
addressing, network security, related diagram and explanation, and remote access of school
organization, Worldwide Reading Solutions.

This introduction is aimed for this Computer Networks assignment and this subject was
taught by our teacher, Daw The Seint Aye. I had done this assignment with my teacher.

AUNG PYAE

MCC Training Institute, Mandalay Campus

March 2016

March 2016 Page - 5


Presented by Aung Pyae Computer Networks

Acknowledgement

Knowledge is most valuable prize of the world and the teacher who gives this knowledge are
also valuable and grand persons. When I arrived in MCC (Myanmar Computer Company
Limited) Training Institute, everything was difficult for me and I learned many subjects about
computer and information technology. Some are easy but some are difficult. There are many
teachers and officers in our school. The teacher who teaches our subjects teaches me kindly.
I thank to my teachers with best wishes.

This global subject is important for me because we cannot achieve the Level 4 honor degree
without passing this subjects. So I need to study hard and make practice for my tasks and
topics. This assignment is completely done under the guidance of my Computer Networks
teacher, Daw The Seint Aye. I great thank to my teacher and all other teachers in our Level
4 subjects and they give me some great advices and logical thinking. I also thank to our
class tutor, Daw Zin Thandar as she gives me strength for my mind and teach us to become
well professional technicians.

Next, I thank to my friends who help me in solving the difficulties of this assignment and help
to become a complete assignment. They also help to complete and add some knowledge for
this assignment and give more useful advices. I also thank my MCC Training Institute, NCC
Education and University of Greenwich. I can study Business IT course because of them. I
also thank all my teachers and friends who help me to finish and to become a complete
assignment.

And finally, I great thank to MCC and NCC since it services me to get more ways for my
living and guide me to become a professional IT technician.

AUNG PYAE

MCC Training Institute, Mandalay Campus

March 2016

March 2016 Page - 6


Presented by Aung Pyae Computer Networks

TASK 1: Networking Infrastructure and Protocols

(a): The network components should be connected.

Star topology

Alternatively referred as a star network, star topology is one of the most common network
setups. In this configuration, every nodes connect to a central network device, like a hub,
switch, or computer. The central network devices acts as a server and the peripheral devices
act as clients.

Star topology is often called star network. It has only one center node: hub or switch, and the
center is connected to the many devices on the network. It can be implemented with the
wireless routers, cable structures and many devices.

The picture below shows the star topology setup, it is shaped like a star as its name.

Figure: Star topology

Advantages of star topology

 Centralized management of the network, through the use of the central computer,
hub or switch.
 Easy to add another computer to the network.
 If one computer on the network fails, the rest of the network continues to function
normally.

Disadvantages of star topology

March 2016 Page - 7


Presented by Aung Pyae Computer Networks

 Can have a higher cost to implement, especially when using a switch or router as the
central network device.
 The central network device determines the performance and number of node that the
network can handle.
 If the central computer, hub, or switch falls, the entire network goes down and all
computers are disconnected from the network.

March 2016 Page - 8


Presented by Aung Pyae Computer Networks

Fiber optic cable

A fiber optics cable is made up of optical fibers that are used in carrying light. Fiber optic
cabling is based on optical fibers, which are long, flexible, hair-width stands of ultra-pure
glass. Fiber optics cables are manufactured specially by glasses that are heated between
3000 and 4000 degrees and then drawn out at a rate of up to 66 feet per second.

Brief description of fiber optic cable:

 Maximum length: 100 km and further (single mode)


 Speed: 100 MBs to 100 GBs
 Cost: expensive

Advantages of fiber optic cable

 Can be used for long distances.


 Higher data speed.
 Difficult to terminate.

Figure: Fiber optic cable

March 2016 Page - 9


Presented by Aung Pyae Computer Networks

Data transfer rate

Data transfer rate is the amount of digital data that have been moved from another location
within a pre-determined period of time. Data transfer rate can be views as a certain amount
of the moving speed of data from one place to another.

Data transfer rate of some cables:

 Fiber optic cable: 100 MBs to 100 GBs


 Twisted pair cable: 10 MBs to 10 GBs
 Coaxial cable: 10 MBs to 100 GBs

March 2016 Page - 10


Presented by Aung Pyae Computer Networks

(b): Layered architecture

According to the ISO standards, networks are divided into seven layers depending on the
complexity and functionality provide of each layer. A layered architecture is using different
layers for allocating the responsibilities of an application.

Advantages of layered architecture

 Easy to design once layers and their interaction are defined clearly.
 Easy to modify and develop networks by separate layers modifications.

Disadvantages of layered architecture

 Layered architecture is difficult to assign the functionalities to the correct and


appropriate layer exactly. The performance of the system is degraded as it has too
many layers.
 Changes to lower level interfaces tend to percolate to higher levels, especially if the
relaxed layer approach is used.

March 2016 Page - 11


Presented by Aung Pyae Computer Networks

(c): Networking components

Hub

Hub is the basic networking component used in Ethernet networks to connect network
computers to form a local area network. Active hubs are the most common type of hub. Hub
operates at the physical layer (Layer 1) of the OSI model for data transmission.

Switch

Switch is a network device to connect computers, servers, printers and other electronic
devices within a compound, campus, or business. Switch serves as controller, enabling the
networked devices to connect each other. Switch operates at the data link layer (Layer 2) of
the OSI model to process and forward data.

Figure: D-Link switch

Wireless access point

Wireless Access Point (WAP) allows wireless devices to connect to wire connected networks
using Wi-Fi. Wireless access point operates at the data link layer (Layer 2) of the OSI model
for reliable transmission of data between two nodes connected by the physical layer.

Figure: Symbol of wireless access point or Wi-Fi

March 2016 Page - 12


Presented by Aung Pyae Computer Networks

Router

Router is a networking device that is used to extend or segment networks by forwarding


packets from one logical network to another. Router makes the wireless devices to access
the internet with LAN and WLAN networks. Router operates at the application layer (Layer 7)
of the OSI model for network management.

Figure: D-Link router

March 2016 Page - 13


Presented by Aung Pyae Computer Networks

(d): Seven protocols

Protocol

In terms of network communications, a protocol is an agreement between communicating


parties on how a communication will take place. It is simply the rules of the conversation.
Different conversations can use different protocols.

There are seven layers in OSI model. The OSI model is the conceptual model: it does not
tell us how the communication is carried out. Each layer has its own protocol. Network
communication use many protocols in one communication.

The seven protocols identify for the application of school organization are:

1. Integrated Services for Digital Network (Physical layer)


Integrated Services for Digital Network (ISDN) provides to allow digital transmission
such as video, data, and services over the telephone network. ISDN operates at the
Physical Layer of the OSI model for network access.

2. Point-to-Point Protocol PP (Data link layer)


Point-to-Point Protocol is used to establish a direct connection, authentication,
transmission and compression. Point-to-Point Protocol is used on many types of
networks. PPP operates at the Data Link Layer of OSI model to pass the data to the
next layer.

3. IPv6 (Network layer)


Internet Protocol version 6 (IPv6) is to assign IP address for network identification
and location the definition. IPv6 operates at the Network Layer of the OSI model for
communication.

4. Transmission Control Protocol (Transport layer)


Transmission Control Protocol (TCP) enables two hosts to establish a connection
and streams of data. TCP operates at the Transport Layer of the OSI model for data
segments between points on network.

5. Transport Layer Security (Session layer)

March 2016 Page - 14


Presented by Aung Pyae Computer Networks

Transport Layer Security (TLS) protocol is used to protect privacy and data integrity
of network communication. TLS protocol operates at the Session Layer of OSI model
for managing sessions.

6. Apple Filing Protocol (Presentation layer)


Apple Filing Protocol (AFP) is a proprietary network that offers Mac OS for file
services. In Mac OS, Network File System (NFS), and File Transfer Protocol (FTP),
AFP is one of the file services. Apple Filing Protocol operates at the Presentation
Layer of OSI model.

7. File Transfer Protocol (Application layer)


File Transfer Protocol (FTP) is used to transfer files on the network. FTP operates in
Application Layer of OSI model and works on clients and servers where a client
requests a file and server sends requested resource back to the client.

March 2016 Page - 15


Presented by Aung Pyae Computer Networks

(e): Wi-Fi standard recommendation

Wireless gives the advantages on the business or process such as increased mobility,
flexibility, convenience, and opportunities to provide new services. There are numerous
standards of Wi-Fi. The following table shows the Wi-Fi standards showing their frequency
used, maximum data rate and maximum indoor range.

Wi-Fi standard Frequency used Maximum data rate Maximum indoor


range
802.11g 2.4 GHz 54 MB/s 38 m (125 ft)
802.11n 2.4/5 GHz 600 MB/s 70 m (230 ft)
802.11ac 5 GHz 6.93 GB/s 35 m (115 ft)

Table explained:

 GHz = Giga Hertz


 MB/s = Megabyte per second
 GB/s = Gigabyte per second
 m = Meter
 ft = Feet

March 2016 Page - 16


Presented by Aung Pyae Computer Networks

(f): Recommended Wi-Fi standard

In this assignment of education service system, the recommended Wi-Fi standard should be
the 802.11ac standard for the following reasons.

 Standard 802.11ac was introduced in 2012 and it has 20, 40, 80 and 160 MHz
bandwidth.
 Maximum data transfer speed is 78 MB/S to 3.2 GB/S enough for school education
service organization.
 802.11ac standard has advanced antenna technologies: MIMO, MU-MIMO, up to
eight spatial streams.
 801.11ac standard uses OFDM modulation scheme.
 802.11ac standard has the larger bandwidth of 40, 80, 160 and powerful for staff and
users of literacy support organization.

March 2016 Page - 17


Presented by Aung Pyae Computer Networks

TASK 2: Addressing

(a): Mac address and IP address

MAC address: A physical address commonly called media access control address (MAC
address) to assign network communication on the physical network segment.

IP address: Internet Protocol address (IP address) specifies the format of packets and the
network addressing scheme.

Differences between MAC address and IP address:

MAC address identifies the Ethernet network devices and IP address identifies the devices
on the internet, or local intranet.

MAC address and IP address differences with IPv4 and IPv6:

 MAC address and IP address are operate the Data Link Layer (Layer 2) of the OSI
model for data transmission.
 IPv4 and IPv6 protocols are operate at the Network Layer (Layer 3) of the OSI model
for structuring and managing the network. They are used for routing, addressing, and
data traffic control.

March 2016 Page - 18


Presented by Aung Pyae Computer Networks

(b): How computer gets its MAC and IP addresses

Computer gets its MAC address by connected network adapter such as router. Each
network adapter devices has a different MAC addresses listed as a physical address.

In static, IP address of computer is assigned by network administrator or ISP. In dynamic, IP


address is temporary and assigned from pool of addresses.

In computer network, both of MAC address and IP address are required for the network
connection and internet service. Without IP address, the control server cannot detect the
connected network device. MAC address and IP address identify the type or model of
connected network device for server control of other network communications.

Figure: IP address example

March 2016 Page - 19


Presented by Aung Pyae Computer Networks

(c): Address Resolution Protocol (ARP)

Address Resolution Protocol (ARP): A protocol for resolution of network layer address into
link layer address. With the LAN hardware, ARP requires TCP standard for media control.

Address Resolution Protocol (ARP) is needed for following reasons:

 ARP resolves media access control address for local traffic: ARP resolves IP address
to hardware address for hosts on the same network.

Figure: ARP control address for local traffic

 ARP resolves media access control address for remote traffic: ARP forward the IP
datagrams to local routers for their destination. ARP resolves the media control
access of router interface. The below illustration shows how the ARP resolves for two
hosts on different physical network with IP address to hardware address connected
by a router.

March 2016 Page - 20


Presented by Aung Pyae Computer Networks

Figure: ARP control address for remote traffic

March 2016 Page - 21


Presented by Aung Pyae Computer Networks

(d): Default Gateway and Subnet Mask

Default gateway: A networking node used to the forward packets on the network. In TCP/IP
networks, nodes of servers and network devices to define the IP addresses of data packets.

Subnet mask: A subnet mask is a screen of numbers used for routing traffic within a subnet.
Once a packet has arrived at the gateway of school service organization with its unique
network number, it can be routed to its destination within the internal gateways using
the subnet number.

The reasons:

 Default gateway is the IP address of the network devices that allow network
communication with the subnet. The school support organization need default
gateway.
 lP address on default gateway gives the information that the subnet mask has and
more other information.
 Subnet mask is used to identify the network address of IP address on default
gateway by performing operation.

March 2016 Page - 22


Presented by Aung Pyae Computer Networks

(e): Sub-netting

Sub-netting is the strategy used to partition a single physical network into more than one
smaller logical sub-networks (subnets).

Uses of sub-netting in school support organization:

 Sub-netting is the process of borrowing bits from the host, to divide the larger
network into small subnets.
 Sub-netting does not give more hosts but costs the hosts.
 If the server lose two IP addresses for each subnet, and perhaps one for the subnet
IP addresses and one for the subnet broadcast IP address.
 If the server lose the last subnet and all of its host IP addresses as the broadcast for
that subnet is the same as the broadcast for the network.

Figure: IPv6 sub-netting example illustration

March 2016 Page - 23


Presented by Aung Pyae Computer Networks

(f): IP Routing table

IP routing table stores information of IP address networks. IP routing table is used to


determine the forwarding IP addresses and the interface to be used for forwarding.

Figure: Example of IP routing table

The gateway address on the router allow communication with the subnet mask. The gateway
on router identifies the network and IP routing table determine the IP address. Ethernet
address are assigned to the MAC address.

March 2016 Page - 24


Presented by Aung Pyae Computer Networks

TASK 3: Security

(a): Weakness in access control

Boundary firewall and internet gateways:

Without data protection and vulnerability tools such as firewall and vulnerability scanner, the
organization can be attacked by hackers as the lack of security. Firewall and gateways
provide security of data and the network system of organization. This can reduce the risk of
prevalent cyber-attacks on the organization.

Access control and administrative privilege management:

The school support organization need to control with system with access measurements, for
example, set username and password to enter the database of student support data. Lack of
account management system can have some risks and problems on data protection and
unauthorized users can have access on some part of network system such as entering the
file database without administrator permission. The organization need to have administrative
access control.

March 2016 Page - 25


Presented by Aung Pyae Computer Networks

(b): Network secure

The following hardware, software, policies and other systems are used to keep the network
security of organization more secure.

Firewall: Firewall is essential need for computer networks and software firewall helps to
prevent the outside computer to control the user's devices. In broadband routers, hardware
firewall can be found as stand-alone products and used in packet filtering to check
destination and source. The networks of school support organization need to be prevented
with firewall for security and other protection.

Internet

Switch
ADSL Modem Firewall Server

Switch

Laptop

PC Wi-Fi

Smart phone

Figure: Firewall structure diagram

Virtual Private Network (VPN): Virtual Private Network (VPN) is a private network that uses
a public telecommunication instead of leased lines to communicate. The school support
organization should use the VPN to comprise the networks and control the network access.
By using VPN, networks can prevent from unauthorized users, ensure that the data is being
transported.

Remote user VPN device VPN device


Internet (VPN tunnel)
Business

Figure: VPN structure diagram

March 2016 Page - 26


Presented by Aung Pyae Computer Networks

Anti-virus software: Virus can enter the network and other devices of organization with
various methods, and from internet, emails. So antivirus software are needed to protect from
virus. Antivirus software prevents virus from attacking system. Antivirus software need to
update their virus database when a new code or virus appears in the network.

Fingerprint: Fingerprint have ridges and valleys that are unique to that fingertip. Fingerprint
is the most common biometric method and can be used with computers and other electronic
devices. School support organization need to keep the fingerprint system for staff. By using
fingerprint, managers can easily know who is absent.

Figure: Fingerprint identification

Port scanner: Port scanner is software application designed to probes for open ports and
used by network administrators to test. There are 65536 different ports numbers available.
Network administrators of the organization need to scan the ports and fix if for security
problem.

Figure: Scan open ports in Windows

March 2016 Page - 27


Presented by Aung Pyae Computer Networks

(c): Threat of system

By the assignment scenario, the school support organization uses the Dropbox to store
normal business documentation, teaching materials and training videos. The Dropbox file
sharing system have some weakness and they can be related or have effect on the
organization.

Dropbox is secure for a normal user, but for the organization, it can have some problems in
data security. File download link and download pages of Dropbox are public and every user
can access or download the file without permission. With the Dropbox download link, every
internet user can view the download page of shared file and other related information. So the
security of data protection is the biggest threat for the system.

Figure: Dropbox logo

March 2016 Page - 28


Presented by Aung Pyae Computer Networks

TASK 4: Diagram and Explanation

(a): Logical network diagram (topology)


(b): IP addresses

March 2016 Page - 29


Presented by Aung Pyae Computer Networks

Internet

ADSL modem Firewall Switch

Server control PC
(127.16.122.32) Server

Smartphone 4 Laptop 2
Network printer (255.128.17.128)
(128.64.32.66)
(255.9.24.32)

Hub

PC 4 Laptop 3 PC 1
(127.16.122.64) Wi-Fi (255.128.17.125) (127.16.122.204)
(64.16.8.128)

Switch 1

Smartphone 1
Switch 2 (128.64.32.16)
PC 5 PC 2
(127.16.122.8) (127.16.122.128)

PC 3
Smartphone 2
PC 6 Wi-Fi (127.16.122.32)
(128.64.32.128)
(127.16.122.16) (64.16.8.255)

Laptop 1 Smartphone 3
PC 7 (255.128.17.25) (128.64.32.8)
(127.16.122.1)

Switch 3 Switch 4

Smartphone 5
(128.64.32.4)
PC 8
(127.16.122.4)
Laptop 4
Wi-Fi (255.128.17.64)
(64.16.8.2)
Wi-Fi
(64.16.8.204)
Smartphone 6
Laptop 7 Laptop 6 Laptop 5 (128.64.32.1)
(255.128.17.64) (255.128.17.16) (255.128.17.32)

Figure: Logical network diagram (topology) with main components of the network

March 2016 Page - 30


Presented by Aung Pyae Computer Networks

(c): Hardware components

By the logical network diagram, the system use star topology to connect the network devices.
First, main server is require to connect internet and store other information such as database,
and access control. Hub is require for local are network and start topology is connected by
switches. From sub-divided switches, all PC, laptops, smart phones, and printers get
network access to control or share files via network communication.

March 2016 Page - 31


Presented by Aung Pyae Computer Networks

(d): Prices and specifications

Wireless router

Figure: D-Link router

 Name: D-Link
 Model: DIR-655
 Price: 68.50 $
 Specification: Signal does not weaken when passing through walls or other objects.
Maximum speed is 1 GB/s.

Switch

Figure: D-Link switch

 Name: D-Link
 Model: DGS-10240
 Price: 57.98 $
 Specification: Increase available network bandwidth on individual.

March 2016 Page - 32


Presented by Aung Pyae Computer Networks

Access point

Figure: Cisco access point

 Name: Cisco
 Model: Cisco WAP4410N
 Price: 85 $
 Specification: Use for wireless communication.

Server

Figure: Server

 Name: Sentinel
 Model: DX4000
 Price: 900.98 $
 Specification: The server to store database and other network communications.

March 2016 Page - 33


Presented by Aung Pyae Computer Networks

Desktop computer casing

Figure: Acer desktop casing

 Name: Acer
 Model: Aspire ATC-605-UR14
 Price: 749.99 $
 Specification: To maintain applications, files, mail and serve the client computer.

Monitor

Figure: Acer monitor

 Name: Acer
 Model: G23HL
 Price: 109.99 $
 Specification: To connect the system unit and show display.

March 2016 Page - 34


Presented by Aung Pyae Computer Networks

Laptop

Figure: Microsoft Surface

 Name: Microsoft surface


 Model: Microsoft surface RT
 Price: 219,18 $
 Specification: Use for portable application and easy networking

Network printer

Figure: Epson printer

 Name: Epson printer


 Model: WF-2540 All in One color printer
 Price: 71.50 $
 Specification: It can be print with color and also scanner and copier.

March 2016 Page - 35


Presented by Aung Pyae Computer Networks

Microsoft Nokia smartphone

Figure: Nokia Lumina smartphone

 Name: Microsoft Nokia Lumina


 Model: Nokia Lumina 730 dual sim
 Price: 239.41 $
 Specification: Use for mobile communication.

March 2016 Page - 36


Presented by Aung Pyae Computer Networks

TASK 5: Remote Access

(a): Remote access

By the assignments scenario, all PC and laptop use Microsoft Windows operating system,
the Remote Desktop Connection (RDC) is the best solution for control the system with
remote access. For the remote access to control the system from another country, the
system need to create a remote desktop connection to access the system from another
place.

Figure: Remote Desktop Connection (RDC) logo

Components to connect RDC:

To connect to the remote desktop connection, all control computers and laptops must be
powered on, remote desktop must be enabled, have permission to connect and have a
network connection.

Actions to connect RDC:

 All devices in remote access need to verify the administrative privileges and allow
access for Windows firewall.
 After the computer is ready for remote access, enter the computer’s name and
connect to remote desktop connection.
 Enter the credentials to connect remote access network.
 After logged in successfully, the system have full access to control and share files.
 From there on, the company director could remote access to files and programs.

March 2016 Page - 37


Presented by Aung Pyae Computer Networks

Comment for Dropbox:

Dropbox is not a good solution for as the file share system of Dropbox is not secure and all
users can be view. A data protection system is need for Dropbox to share files and access
control between send files and share files.

March 2016 Page - 38


Presented by Aung Pyae Computer Networks

(b): Remote access on mobile devices

For the remote access on mobile devices, the secure Virtual Private Network (VPN) is need
to connect remote access and VPN controls the network access. By using VPN, networks
can prevent from unauthorized users, ensure that the data is being transported.

All mobile devices need to connect to the remote server. VNC client is need on mobile
device and this is user’s display frame buffer. Computer is connected to VNC server.

When the remote access mobile device send frame buffer update request to remote access
computer, the computer send frame buffer update response to mobile device.

March 2016 Page - 39


Presented by Aung Pyae Computer Networks

Conclusion

The Computer Networks module includes 12 main topics and consists of networking and
communication systems commonly employed in a business environment, along with the
understanding of the underlying theoretical frameworks and of associated issues such as
testing and security of these systems, and also include security techniques for network
secure.

From this subject, I learn all network components and their connections, protocols and OSI
model, network addressing techniques and structures and related techniques such ad
gateway and IP address, sub-netting.

Network security and plans are also learned from this subject and access control techniques
are learned. I’m very enjoying in doing of this network pans for this assignment and enjoy of
finding the references on internet.

I have learned practical and knowledge from this CN module in the NCC Education’s
Diploma in Computing. When I do the assignment of CN module, I have done all tasks well
my assignment by applying these practical and knowledge.

Before this time, I understand about all techniques of computer system and network in IT
technology. Network infrastructure and remote access are important for business system in
practical. I knew about the network plans and other network technologies from this
assignment and I got the knowledge how to apply this system with computer in finding
suitable element.

From this assignment, I understand the techniques and network systems. With practical
skills, I tested the networks and send data safely over secure network communication. I
learned many protocols, addressing, remote access, and security from this assignment and
get more knowledge and practice skills. I learned about IP addressing methods and
techniques for protection, creating a secure network by using techniques, access control,
and most commonly used techniques to ensure privacy, security, and other network
knowledge.

March 2016 Page - 40


Presented by Aung Pyae Computer Networks

References

 NCC Education Level 4 – Computer Networks Student Handbook


 NCC Education Level 4 – Computer Networks Student Guide
 http://www.computerhope.com
 http://www.cableorganizer.com/
 http://www.markedbyteachers.com/
 https://technet.microsoft.com
 https://answers.yahoo.com/
 http://superuser.com/

END OF ASSIGNMENT

March 2016 Page - 41

You might also like