Professional Documents
Culture Documents
Presented by
AUNG PYAE
(MCC Training Institute, Mandalay Campus)
March 2016
Presented by Aung Pyae Computer Networks
NCC Education
Marker’s comments:
Moderator’s comments:
Marks:
Moderated Marks:
Final marks:
Each NCC Education assessed assignment submitted by you must have this statement
attached to the assignment as the cover page or it will not be accepted for making. Please
ensure that this statement is either firmly attached to the cover of the assignment or
electronically inserted NUMBER the front of the assignment.
All submitted work must have this form as the cover / first page. Please include this form as
part of a standard format when submitting an assignment.
STUDENT DECALARATION
I have read and understood NCC Education’s policy and Academic Dishonesty and
Plagiarism. I can confirm the following details;
Student ID 00148187
Name AUNG PYAE
Centre name MCC Training Institute, Mandalay Campus,
Myanmar
Module name Computer Networks
Title of work Worldwide Reading Solutions
Module leader DAW THE SEINT AYE
Number of words
I can confirm that is my own work that I have not plagiarized any part of it. I have also noted
the grading criteria and pass mark for assignment.
TABLE OF CONTENTS
Introduction
Hello!
My name is Aung Pyae and I study business information technology from NCC Education
Level 4 Diploma in computing course at MCC Training Institute, Mandalay Campus in
Myanmar. I am attending this computer course because information technology (IT) is
essential important today and most of business process use computerized systems. As I am
interest in IT and I want to improve my knowledge and creation skills, I attended to MCC
Training Institute (Mandalay Campus) since 2013. MCC Training Institute (Myanmar) is
recognized by NCC Education and University of Greenwich in UK. So I am attending this
course which is offered by NCC Education Center.
There are four main subjects in our Level 4 first semester course:
Computer Networks
Designing and Developing Object-Oriented Computer Programs
Designing and developing a website
Office Solutions Development
This assignment is aimed for the global assignment subject, Computer Networks.
In this assignment, we have to present the networking infrastructure and protocols, network
addressing, network security, related diagram and explanation, and remote access of school
organization, Worldwide Reading Solutions.
This introduction is aimed for this Computer Networks assignment and this subject was
taught by our teacher, Daw The Seint Aye. I had done this assignment with my teacher.
AUNG PYAE
March 2016
Acknowledgement
Knowledge is most valuable prize of the world and the teacher who gives this knowledge are
also valuable and grand persons. When I arrived in MCC (Myanmar Computer Company
Limited) Training Institute, everything was difficult for me and I learned many subjects about
computer and information technology. Some are easy but some are difficult. There are many
teachers and officers in our school. The teacher who teaches our subjects teaches me kindly.
I thank to my teachers with best wishes.
This global subject is important for me because we cannot achieve the Level 4 honor degree
without passing this subjects. So I need to study hard and make practice for my tasks and
topics. This assignment is completely done under the guidance of my Computer Networks
teacher, Daw The Seint Aye. I great thank to my teacher and all other teachers in our Level
4 subjects and they give me some great advices and logical thinking. I also thank to our
class tutor, Daw Zin Thandar as she gives me strength for my mind and teach us to become
well professional technicians.
Next, I thank to my friends who help me in solving the difficulties of this assignment and help
to become a complete assignment. They also help to complete and add some knowledge for
this assignment and give more useful advices. I also thank my MCC Training Institute, NCC
Education and University of Greenwich. I can study Business IT course because of them. I
also thank all my teachers and friends who help me to finish and to become a complete
assignment.
And finally, I great thank to MCC and NCC since it services me to get more ways for my
living and guide me to become a professional IT technician.
AUNG PYAE
March 2016
Star topology
Alternatively referred as a star network, star topology is one of the most common network
setups. In this configuration, every nodes connect to a central network device, like a hub,
switch, or computer. The central network devices acts as a server and the peripheral devices
act as clients.
Star topology is often called star network. It has only one center node: hub or switch, and the
center is connected to the many devices on the network. It can be implemented with the
wireless routers, cable structures and many devices.
The picture below shows the star topology setup, it is shaped like a star as its name.
Centralized management of the network, through the use of the central computer,
hub or switch.
Easy to add another computer to the network.
If one computer on the network fails, the rest of the network continues to function
normally.
Can have a higher cost to implement, especially when using a switch or router as the
central network device.
The central network device determines the performance and number of node that the
network can handle.
If the central computer, hub, or switch falls, the entire network goes down and all
computers are disconnected from the network.
A fiber optics cable is made up of optical fibers that are used in carrying light. Fiber optic
cabling is based on optical fibers, which are long, flexible, hair-width stands of ultra-pure
glass. Fiber optics cables are manufactured specially by glasses that are heated between
3000 and 4000 degrees and then drawn out at a rate of up to 66 feet per second.
Data transfer rate is the amount of digital data that have been moved from another location
within a pre-determined period of time. Data transfer rate can be views as a certain amount
of the moving speed of data from one place to another.
According to the ISO standards, networks are divided into seven layers depending on the
complexity and functionality provide of each layer. A layered architecture is using different
layers for allocating the responsibilities of an application.
Easy to design once layers and their interaction are defined clearly.
Easy to modify and develop networks by separate layers modifications.
Hub
Hub is the basic networking component used in Ethernet networks to connect network
computers to form a local area network. Active hubs are the most common type of hub. Hub
operates at the physical layer (Layer 1) of the OSI model for data transmission.
Switch
Switch is a network device to connect computers, servers, printers and other electronic
devices within a compound, campus, or business. Switch serves as controller, enabling the
networked devices to connect each other. Switch operates at the data link layer (Layer 2) of
the OSI model to process and forward data.
Wireless Access Point (WAP) allows wireless devices to connect to wire connected networks
using Wi-Fi. Wireless access point operates at the data link layer (Layer 2) of the OSI model
for reliable transmission of data between two nodes connected by the physical layer.
Router
Protocol
There are seven layers in OSI model. The OSI model is the conceptual model: it does not
tell us how the communication is carried out. Each layer has its own protocol. Network
communication use many protocols in one communication.
The seven protocols identify for the application of school organization are:
Transport Layer Security (TLS) protocol is used to protect privacy and data integrity
of network communication. TLS protocol operates at the Session Layer of OSI model
for managing sessions.
Wireless gives the advantages on the business or process such as increased mobility,
flexibility, convenience, and opportunities to provide new services. There are numerous
standards of Wi-Fi. The following table shows the Wi-Fi standards showing their frequency
used, maximum data rate and maximum indoor range.
Table explained:
In this assignment of education service system, the recommended Wi-Fi standard should be
the 802.11ac standard for the following reasons.
Standard 802.11ac was introduced in 2012 and it has 20, 40, 80 and 160 MHz
bandwidth.
Maximum data transfer speed is 78 MB/S to 3.2 GB/S enough for school education
service organization.
802.11ac standard has advanced antenna technologies: MIMO, MU-MIMO, up to
eight spatial streams.
801.11ac standard uses OFDM modulation scheme.
802.11ac standard has the larger bandwidth of 40, 80, 160 and powerful for staff and
users of literacy support organization.
TASK 2: Addressing
MAC address: A physical address commonly called media access control address (MAC
address) to assign network communication on the physical network segment.
IP address: Internet Protocol address (IP address) specifies the format of packets and the
network addressing scheme.
MAC address identifies the Ethernet network devices and IP address identifies the devices
on the internet, or local intranet.
MAC address and IP address are operate the Data Link Layer (Layer 2) of the OSI
model for data transmission.
IPv4 and IPv6 protocols are operate at the Network Layer (Layer 3) of the OSI model
for structuring and managing the network. They are used for routing, addressing, and
data traffic control.
Computer gets its MAC address by connected network adapter such as router. Each
network adapter devices has a different MAC addresses listed as a physical address.
In computer network, both of MAC address and IP address are required for the network
connection and internet service. Without IP address, the control server cannot detect the
connected network device. MAC address and IP address identify the type or model of
connected network device for server control of other network communications.
Address Resolution Protocol (ARP): A protocol for resolution of network layer address into
link layer address. With the LAN hardware, ARP requires TCP standard for media control.
ARP resolves media access control address for local traffic: ARP resolves IP address
to hardware address for hosts on the same network.
ARP resolves media access control address for remote traffic: ARP forward the IP
datagrams to local routers for their destination. ARP resolves the media control
access of router interface. The below illustration shows how the ARP resolves for two
hosts on different physical network with IP address to hardware address connected
by a router.
Default gateway: A networking node used to the forward packets on the network. In TCP/IP
networks, nodes of servers and network devices to define the IP addresses of data packets.
Subnet mask: A subnet mask is a screen of numbers used for routing traffic within a subnet.
Once a packet has arrived at the gateway of school service organization with its unique
network number, it can be routed to its destination within the internal gateways using
the subnet number.
The reasons:
Default gateway is the IP address of the network devices that allow network
communication with the subnet. The school support organization need default
gateway.
lP address on default gateway gives the information that the subnet mask has and
more other information.
Subnet mask is used to identify the network address of IP address on default
gateway by performing operation.
(e): Sub-netting
Sub-netting is the strategy used to partition a single physical network into more than one
smaller logical sub-networks (subnets).
Sub-netting is the process of borrowing bits from the host, to divide the larger
network into small subnets.
Sub-netting does not give more hosts but costs the hosts.
If the server lose two IP addresses for each subnet, and perhaps one for the subnet
IP addresses and one for the subnet broadcast IP address.
If the server lose the last subnet and all of its host IP addresses as the broadcast for
that subnet is the same as the broadcast for the network.
The gateway address on the router allow communication with the subnet mask. The gateway
on router identifies the network and IP routing table determine the IP address. Ethernet
address are assigned to the MAC address.
TASK 3: Security
Without data protection and vulnerability tools such as firewall and vulnerability scanner, the
organization can be attacked by hackers as the lack of security. Firewall and gateways
provide security of data and the network system of organization. This can reduce the risk of
prevalent cyber-attacks on the organization.
The school support organization need to control with system with access measurements, for
example, set username and password to enter the database of student support data. Lack of
account management system can have some risks and problems on data protection and
unauthorized users can have access on some part of network system such as entering the
file database without administrator permission. The organization need to have administrative
access control.
The following hardware, software, policies and other systems are used to keep the network
security of organization more secure.
Firewall: Firewall is essential need for computer networks and software firewall helps to
prevent the outside computer to control the user's devices. In broadband routers, hardware
firewall can be found as stand-alone products and used in packet filtering to check
destination and source. The networks of school support organization need to be prevented
with firewall for security and other protection.
Internet
Switch
ADSL Modem Firewall Server
Switch
Laptop
PC Wi-Fi
Smart phone
Virtual Private Network (VPN): Virtual Private Network (VPN) is a private network that uses
a public telecommunication instead of leased lines to communicate. The school support
organization should use the VPN to comprise the networks and control the network access.
By using VPN, networks can prevent from unauthorized users, ensure that the data is being
transported.
Anti-virus software: Virus can enter the network and other devices of organization with
various methods, and from internet, emails. So antivirus software are needed to protect from
virus. Antivirus software prevents virus from attacking system. Antivirus software need to
update their virus database when a new code or virus appears in the network.
Fingerprint: Fingerprint have ridges and valleys that are unique to that fingertip. Fingerprint
is the most common biometric method and can be used with computers and other electronic
devices. School support organization need to keep the fingerprint system for staff. By using
fingerprint, managers can easily know who is absent.
Port scanner: Port scanner is software application designed to probes for open ports and
used by network administrators to test. There are 65536 different ports numbers available.
Network administrators of the organization need to scan the ports and fix if for security
problem.
By the assignment scenario, the school support organization uses the Dropbox to store
normal business documentation, teaching materials and training videos. The Dropbox file
sharing system have some weakness and they can be related or have effect on the
organization.
Dropbox is secure for a normal user, but for the organization, it can have some problems in
data security. File download link and download pages of Dropbox are public and every user
can access or download the file without permission. With the Dropbox download link, every
internet user can view the download page of shared file and other related information. So the
security of data protection is the biggest threat for the system.
Internet
Server control PC
(127.16.122.32) Server
Smartphone 4 Laptop 2
Network printer (255.128.17.128)
(128.64.32.66)
(255.9.24.32)
Hub
PC 4 Laptop 3 PC 1
(127.16.122.64) Wi-Fi (255.128.17.125) (127.16.122.204)
(64.16.8.128)
Switch 1
Smartphone 1
Switch 2 (128.64.32.16)
PC 5 PC 2
(127.16.122.8) (127.16.122.128)
PC 3
Smartphone 2
PC 6 Wi-Fi (127.16.122.32)
(128.64.32.128)
(127.16.122.16) (64.16.8.255)
Laptop 1 Smartphone 3
PC 7 (255.128.17.25) (128.64.32.8)
(127.16.122.1)
Switch 3 Switch 4
Smartphone 5
(128.64.32.4)
PC 8
(127.16.122.4)
Laptop 4
Wi-Fi (255.128.17.64)
(64.16.8.2)
Wi-Fi
(64.16.8.204)
Smartphone 6
Laptop 7 Laptop 6 Laptop 5 (128.64.32.1)
(255.128.17.64) (255.128.17.16) (255.128.17.32)
Figure: Logical network diagram (topology) with main components of the network
By the logical network diagram, the system use star topology to connect the network devices.
First, main server is require to connect internet and store other information such as database,
and access control. Hub is require for local are network and start topology is connected by
switches. From sub-divided switches, all PC, laptops, smart phones, and printers get
network access to control or share files via network communication.
Wireless router
Name: D-Link
Model: DIR-655
Price: 68.50 $
Specification: Signal does not weaken when passing through walls or other objects.
Maximum speed is 1 GB/s.
Switch
Name: D-Link
Model: DGS-10240
Price: 57.98 $
Specification: Increase available network bandwidth on individual.
Access point
Name: Cisco
Model: Cisco WAP4410N
Price: 85 $
Specification: Use for wireless communication.
Server
Figure: Server
Name: Sentinel
Model: DX4000
Price: 900.98 $
Specification: The server to store database and other network communications.
Name: Acer
Model: Aspire ATC-605-UR14
Price: 749.99 $
Specification: To maintain applications, files, mail and serve the client computer.
Monitor
Name: Acer
Model: G23HL
Price: 109.99 $
Specification: To connect the system unit and show display.
Laptop
Network printer
By the assignments scenario, all PC and laptop use Microsoft Windows operating system,
the Remote Desktop Connection (RDC) is the best solution for control the system with
remote access. For the remote access to control the system from another country, the
system need to create a remote desktop connection to access the system from another
place.
To connect to the remote desktop connection, all control computers and laptops must be
powered on, remote desktop must be enabled, have permission to connect and have a
network connection.
All devices in remote access need to verify the administrative privileges and allow
access for Windows firewall.
After the computer is ready for remote access, enter the computer’s name and
connect to remote desktop connection.
Enter the credentials to connect remote access network.
After logged in successfully, the system have full access to control and share files.
From there on, the company director could remote access to files and programs.
Dropbox is not a good solution for as the file share system of Dropbox is not secure and all
users can be view. A data protection system is need for Dropbox to share files and access
control between send files and share files.
For the remote access on mobile devices, the secure Virtual Private Network (VPN) is need
to connect remote access and VPN controls the network access. By using VPN, networks
can prevent from unauthorized users, ensure that the data is being transported.
All mobile devices need to connect to the remote server. VNC client is need on mobile
device and this is user’s display frame buffer. Computer is connected to VNC server.
When the remote access mobile device send frame buffer update request to remote access
computer, the computer send frame buffer update response to mobile device.
Conclusion
The Computer Networks module includes 12 main topics and consists of networking and
communication systems commonly employed in a business environment, along with the
understanding of the underlying theoretical frameworks and of associated issues such as
testing and security of these systems, and also include security techniques for network
secure.
From this subject, I learn all network components and their connections, protocols and OSI
model, network addressing techniques and structures and related techniques such ad
gateway and IP address, sub-netting.
Network security and plans are also learned from this subject and access control techniques
are learned. I’m very enjoying in doing of this network pans for this assignment and enjoy of
finding the references on internet.
I have learned practical and knowledge from this CN module in the NCC Education’s
Diploma in Computing. When I do the assignment of CN module, I have done all tasks well
my assignment by applying these practical and knowledge.
Before this time, I understand about all techniques of computer system and network in IT
technology. Network infrastructure and remote access are important for business system in
practical. I knew about the network plans and other network technologies from this
assignment and I got the knowledge how to apply this system with computer in finding
suitable element.
From this assignment, I understand the techniques and network systems. With practical
skills, I tested the networks and send data safely over secure network communication. I
learned many protocols, addressing, remote access, and security from this assignment and
get more knowledge and practice skills. I learned about IP addressing methods and
techniques for protection, creating a secure network by using techniques, access control,
and most commonly used techniques to ensure privacy, security, and other network
knowledge.
References
END OF ASSIGNMENT