17
1 UNIT 2: Networks OTHM LEVEL 3 FOUNDATION DIPLOMA IN INFORMATION TECHNOLOGY Index Questions Page No. 1. Understand networking principles. 2-6 1.1 Explain a computer network. 1.2 Differentiate between ‘client computers’ and ‘peer computers’ from network services perspective. 1.3 Describe local area network (LAN) and wide area network (WAN). 1.4 Describe the benefits and constraints of different network topologies. 2 2-3 3-5 5-6 2. Understand how network hardware and software components are connected. 2.1 Explain how hardware, software and addressing combine to support network communications. 2.2 Describe potential issues with computer networks. 2.3 Explain the steps required to set up and test a simple local area network. 3. Understand the usage and security concerns related to networking. 3.1 Evaluate the features and services provided by a local and a wide area network. 3.2 Identify security issues related to networking and how those security issues can be minimized. 3.3 Explain steps to configure security on a local area network. 7-12 7-8 8-9 9-12 12-16 12-13 13-14 14-16

UNIT 2: Networks OTHM LEVEL 3 FOUNDATION DIPLOMA IN

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

1

UNIT 2: Networks

OTHM LEVEL 3 FOUNDATION DIPLOMA IN INFORMATION TECHNOLOGY

Index

Questions Page No.

1. Understand networking principles. 2-6

1.1 Explain a computer network.

1.2 Differentiate between ‘client computers’

and ‘peer computers’ from network services

perspective.

1.3 Describe local area network (LAN) and

wide area network (WAN).

1.4 Describe the benefits and constraints of

different network topologies.

2

2-3

3-5

5-6

2. Understand how network hardware and

software components are connected.

2.1 Explain how hardware, software and

addressing combine to support network

communications.

2.2 Describe potential issues with computer

networks.

2.3 Explain the steps required to set up and

test a simple local area network.

3. Understand the usage and security concerns

related to networking.

3.1 Evaluate the features and services

provided by a local and a wide area network.

3.2 Identify security issues related to

networking and how those security issues can

be minimized.

3.3 Explain steps to configure security on a

local area network.

7-12

7-8

8-9

9-12

12-16

12-13

13-14

14-16

2

1.1 Explain a computer network?

The foundation of IT connectivity is computer networks. They are widely used and may contain

several various network forms. A computer network is a group of machines linked such that

knowledge is shared. Computer networks were the first manifestations from the 1960s, but they

have been a great success since half a century.

Computer networks are utilized for the knowledge exchange to perform a wide range of

activities.

Any of the topics utilized by the networks are:

• Text, recording, instant messaging and other communications.

• Share machines like printers, scanners and copiers.

• File sharing.

• Remote systems share information and running programmes

• Allocate easy access and maintenance by network users.

1.2 Differentiate between ‘client computers’ and ‘peer computers’ from network services

perspective?

The most significant differences are:

CLIENT COMPUTERS PEER COMPUTERS

1. Differentiated clients and servers are

available in the Client-Server

Network.

Clients and servers are not distinguished in

the Peer-to-Peer network.

The network Peer-to-Peer relies on

3

2. The Network Client Servers concentrate on

the exchange of knowledge.

3. Centralized servers are used to store the

data in the Client-Server Network.

4. The Server can answer resources requested

by the Client on the Client Server Network.

5. The network of client-servers is costlier

than the network of peer-to-peer.

6. The network of the client-server is more

robust than the peer-to-peer network.

7. On both small and big networks, client-

server networks are utilized.

networking.

Each pair has its own data when in the Peer-

to-Peer Network.

Each node will both request and answer the

service when in the Peer-to-Peer network.

The Peer-to-Peer Network is less expensive

than the Client-Server Network.

Whether peer-to-peer network increases, the

number of peers is less constant.

Since the Peer-to-Peer Network is usually

suitable for smaller networks of less than 10

devices.

4

1.3 Describe local area network and wide area network?

Local Area Networks (LAN)

The LAN is a computing network confined to one office, a single house, several buildings within

a campus, and so on. It is typically a single organization's privately managed and operated

network.

The picture below displays a tiny Local Area Network (LAN) network connecting to the

network.

One or more subnets may also be used in the Local Area Network.

5

Wide Area Networks (WAN)

A WAN is made of several LANs and covers many regional areas. It is not possible for small

and medium-sized enterprisesto pull network cables from two offices situated 1000 kilometers

apart from each location in 2 separate nations. The networking options for wide area networks

are available by network service providers also known as Internet Service Providers.

The picture below displays the 2 LANs at two geographical locations linked to a large area

network through the Internet (WAN). LAN 1 in Chennai, India and LAN 2 in the Philippines is

based in Manila. Chennai-Manila is about 4,400 kilometers away. It is not possible for a SME to

draw cables between Chennai and Manila. It is almost unlikely for a SME. In order to link these

two offices, we usually use the facilities of an internet service provider.

1.4 Describe the benefits and constraints of different network topologies?

A topology of a network refers to the way nodes are linked in a network. The connectedness

determines how they interact. The advantages and drawbacks of each kind of network node

organisation. The advantages and limitations of various network topologies

Topology of buses

Advantages:

1. The handling and implementation is simple.

6

2. Small networks are better adapted.

Drawbacks:

1. The duration of the cable is small. This reduces the number of linked stations.

2. Only for a small number of nodes will this network topology function effectively.

Topology of the ring

Benefits:

1. Both intermediate nodes proceed through the data exchanged between two nodes.

2. For the management of this topology, a central server is not needed.

Drawbacks:

1. The failure of a single network node will lead to a failure of the whole network.

2. Movement or modification to network nodes has an impact on the network's efficiency.

Topology of Mesh:

Benefits:

1. Data may be transferred from one node to several other nodes simultaneously in the

organisation of network nodes.

Drawbacks:

1. Many links do not serve a significant function, since each network node is linked to every

other node of the network. This results in certain network links becoming redundant.

Topology of stars:

Benefits:

1. The topology provides simple functioning because of its unified structure.

7

2. It also ensures that all devices in the network are isolated.

Drawback:

The activity of the network relies on how the central hub works. Thus the central hub breakdown

contributes to the whole network failure.

2.1 Explain how hardware, software and addressing combine to support network

communications?

The way hardware, software and addressing combine to support network communications is

explained below:

• For the connection of computers and other peripheral devices to the network, either through

wireless or by a cable, a network adaptor known as a network interface card is needed.

• For direct connection of the computers and peripherals or through a switch or hub cable is

required in a non-wireless network.

• A hub is used for the connection of computers and peripherals to a cabled network using

topology for a star network.

• Switch used as a hub but the switch does not transmit to all linked ports. It uses the IP address

of the data packet to steer the information to the right computer.

• The Wireless Access Point means that printers, computers, etc., can be connected via radio

wave to a wired network and cannot be cabled unless they have a wireless NIC.

Software is a computer programme that allows you on your computer to do those basic tasks. It

guides the work of all computer peripherals that includes keyboard, mouse, hard disc, and

8

display. The hardware could not be controlled without software. A software consists of two

maintypes: software framework and software implementation.

System software Types:

• Operating System (OS): A system software kernel that is first mounted on your machine for

the purpose of identifying and functioning apps and computers. As the first software layer, each

time a device is started up it will be loaded into the memory.

• System drivers: they provide life to computers and peripherals. Device drivers attach external

modules and add-ons to execute their planned tasks. The OS does not delegate tasks without the

pilot. A few examples of devices which require driving to work are the mouse, keyboard,

speakers and printer.

• Firmware: it is the running software that can be identified by the operating device in a ROM,

flash or EPROM memory chip. It directly handles and monitors all the work of one hardware.

Without switching semiconductor chips, firmware can be quickly updated.

• Translators of programming languages: Intermediate programming for high level source-

language translation into machine-language code. Language translators are very common among

compilers, assemblers, and interpreters. These are used to convert software codes completely or

to translate them one by one.

• Utilities: It is designed for machine diagnosis and repair. They may vary from the key data

protection to defragmentation of the disc drive.

9

2.2Describe potential issues with computer networks?

Performance of network is the response time that is

how easily you can send a message or how soon you can get a document.

Different factors may influence the efficiency of a computer network:

Number of network units.

Number of failures in transmission.

Network transport category.

Network latency.

Transmission media bandwidth.

One or a combination of these factors may impact any network.

Bandwidth:Bandwidth is a quantity of data which can be transferred over a specified period by t

he medium. There is a separate bandwidth for each transmitting medium.

Different forms of bandwidth characteristics of network traffic typically vary.

Latency:

Latency in the network is a metric of how long a message is needed to move through a network f

rom one system to another. A low latency network has few communication delays, while a high l

atency network has more delays. The time it takes to relay data over a network, the more delays a

re.The number of network devices and the form of communication system are influenced by the l

atency.

A hub-based network normally has more latency than a switch-

based network, so all messages are sent from hubs to all networks. Switch-

based networks send messages to the desired beneficiary only.The more computers attached to a

network, the more relevant the option of the media. Wi-

Fi is inherently less trafficable than the fiber-optical network, which carries less traffic.

Transmission errors:

There would inevitably be moments where machines are simultaneously trying to connect. Their

signals clash and the transmission is not effective. It's as how two persons talk together at the sa

me time — no one will understand what the other person said clearly.

10

A conflict happens when two systems in a network want to connect on the same channel concurr

ently.The more computers in the network the more likely a crash is, the greater the time it takes f

or a message to be sent.

2.3 Explain the steps required to set up and test a simple local area network?

A LAN, or a regional network, is only a little, far smaller than the internet. In other words, it

comprises of just a few devices linked. You may like a LAN, so that you can exchange data,

transfer images and music to other machines, link easily to a printer and play games with some

customers with a good old-fashioned LAN band.

1. Gather the equipment

First, to set up your LAN, you need the right tools. Including

Path router.

For each system to be linked, Ethernet cables are required.

Devices

Computer.

Broadband, router and modem connectivity.

Start by connecting to and enabling the network router. Whether it is completely fresh, obey

the instructions in the package and it's ready to be plugged in.

First connect the Computer

You would have the machine to link to the router if the router is new. This can be done with the

help of the Ethernet cable. You should be prompted immediately by a Windows Personal

Computer with a first link installation wizard, but it can be found in the Network and Sharing

Center in the control panel's settings section. On a Mac, the preferences of the system may

include this configuration.

11

Wireless Internet access Set Up

The automated settings wizard can carry you through the procedure step by step so that you can

get the internet up and running. After you have the Wi-Fi feature, you should still be able to link

your computers to Ethernet cables on the internet.

Web Connection

The notion of a LAN is to link various devices together - but it is now when you need to set up,

whether you want to provide internet connectivity, too. You should be able to link and go if you

already have a functioning router and high band connectivity.

In the other side, if you setup a new router and / or web link, your broadband company or router

vendor would have to obey the directions provided to you. In this case, the router and modem

must be plugged into the main telephone line of your home utilizing the WAN-port router.

Attach your other equipment

If it is Wi-Fi or an Ethernet cable that you attach your devices to the LAN, it is now time to hook

up everything. It involves other computers, notebooks, smartphones, tablets, TV screen, game

machines, sticks, all of which will require online access.

Get sharing

12

One of the beauty of a LAN is that services, such as laptops, files and media can be shared

through it. With Windows PCs, setup of a 'Home group' is super simple.

Go to the check box, then click on network and the Internet, then click on Home group,

then choose 'Build a home group.' Windows will lead through the home group

configuration wizard and a password is sent for connecting to it that other devices require.

You may also set up different user profiles on your current LAN.

3.1 Evaluate the features and services provided by a local and a wide area network?

The main features of LAN are:

Network size is restricted to just a few kilometers in a particular metropolitan region at

the moment. It can be between 100 Mbps and 1000 Mbps.

In general, only uses one kind of medium is used by LAN, typically coaxial cables of

Category 5.

The Local Area Network is characterized by its topologies by other networks. Thevarious

topologies are Bus, loop, star and mesh.

The Local Area Network is normally limited in number of computers. LANs are

constrained in other words, scalable.

The most frequent LAN is IEEE 802.3 or Ethernet. In conjunction with a click, you use a

wired medium. Coaxial cables were first used to communicate.

The characteristics of WAN are WAN

• WANs have a high capability, are intrinsically flexible and link several computers over a wide

region.

• Allow regional capital to be shared.

• Uplinks to the Internet for LANs and MAN connections are given.

• National carriers such as cellular networks, network operators, television services, satellites,

etc. have communication connections.

• In general, the transmission rate and the latency of dissemination are poor, meaning the pace of

contact is low.

• In addition, the bit error rate is higher.

13

Examples of WAN are:

• World Internet

• 4G Broadband Services Active

• A currency transport network.

3.2Identify security issues related to networking and how those security issues can be

minimized?

The below are the five most important security concerns relating to networking and how to

mitigate security problems.

1. Code Injection.

Often hackers may use bugs for embedding malicious code in applications. Many times a user's

text input area, as with a username where SQL is entered in what's called a SQL injection attack,

is a weakness. The vulnerability can be contained in a text input field. This method of attack may

be responsible for compromised keys, destruction of files, or lack of server power.

There are two methods to stop injecting code: to avoid insecure code and to process content.

2. Data Breech.

Software infringement costs are well known. Sometimes due to vulnerability credentials, neverth

eless, device misconfiguration, missing hardware or malware are commonly caused.

Prevention of data breaches calls for a variety of common measures. Transactions and site

transport should be Secure Socket Layer encrypted, permissions for each user community be

carefully fixed and servers are screened. Employees ought to be qualified to prevent phishing

threats and ensure proper security for passwords.

3. Infection of Malware

Many companies know that e-mail spam is still the key vector of malware attacks at any stage,

however, many people do not realize that it poses a risk to defense.

Since malware comes from a number of sites, a number of tools to avoid infection are required.

A robust email infrastructure and malware and vulnerability scans are required for filtering. As

infringements sometimes caused by malware, staff education is essential to safeguard companies

against malware.

14

A malware-infected computer or machine must be completely scrubbed, so that secret parts of

the code are identified and all the contaminated data are deleted until they reproduce. This is

virtually not possible, so an efficient automated tool is needed.

4. Distributed Denial of Service Attack

An assault by Distributed Denial of service usually entails the use of a hacker to overwhelm the

traffictarget on a group of computers.

A research by NETSCAPE Arbor indicated that in 2017 7.5 million DDoS attacks have occurred,

and so many IT services providers are far more common than many people know. One of the

worse consequences of a corporate DDoS assault is that the corporation is hit only by the same

service provider, server, or even network infrastructure without being attacked.

If the company is involved in a DDoS assault, implement a disaster response strategy and explain

the damage to staff and consumers. A detection technique such as a WAF is used to shut the

saturated protocol, which is probably reused when attackers adapt their tactics.

5. Insiders without Malice

It is not comfortable, but normal to take careful account of this last challenge, as the 2017 CERT

study from the U.S. State of Cybercrime indicates that insiders conduct one of five assaults.

The prevention of insider assaults involves mostly restricting access by a hostile insider. This

ensures that the logical access control policies are set to follow the least privilege standard and

the network is monitored by audit and transaction records. A solution like the custom malicious

activity detector from Liquid Web prevents threats both internally and externally.

If a disruptive insider assault is found, access rights for the insider should be removed

automatically. In order to avoid the conduct of further activity that could damage the company,

such as the sale of stolen records, the police should be called.

3.3Explain steps to configure security on a local area network?

Any of the information collected in the University electronically is economical, personal and

medical sensitive information, as well as private information. Unauthorized distribution or data

access is immoral and potentially unconstitutional in connection with the University network. If

it is deliberately or unintentionally violated, personal responsibility can occur.

15

Protection on a local zone network is configured through several steps:

Step 1: Simplify and never share a strong password

Your password is the secret to network entry. You can pick a good one to minimize the

likelihood that a programme or other deviates your password.

Step 2: Nobody is allowed to use your user account.

The account used by you represents all the computer tools to be used by you directly. By

allowing someone use services with which they might not be able to utilize their user account,

you help them to access theresources. Ultimately, everything they can do is the duty.

Step 3: Use Important Files network drives

The files containing or vital to the job sensitive details should be saved on a network disc, but

only as long as they are necessary. These drives are normally higher in the above "F:\" alphabet.

The drives of the network are used because of following:

Security: Someone with physical access to a device will access the data saved on their local

computer drives — A:\ via E:\ in one way or another.

• Protection of files: If a device fails, all data on local discs will be destroyed. The overnight

backup of files saved on the network drives. In the case that data is destroyed owing to disasters,

the chances of data being recovered in a comparatively new state are much higher.

Step 4: Locate your computer on the day you leave your desk

If you abandon your desktop for many minutes, leave your screen on and activated, the world's

stronger password would not apply. You can plan your work area when you are at your desk, so

that casual guests cannot see desktop. This will mitigate a great deal of inadvertent access to

sensitive or private data.

Step 5: Shut your computer off on the day

Switch off the machine at night before you reach the workplace. A machine not affected by

threats by other machines will not be affected or hacked.

Step 6: Use Sensitive Data Exchange and View Encryption

16

To see websites with personal data you can still use cryptography. If the domain address starts

with "https," you will determine if the website uses encryption.

Step 7: Do not install unauthorized softwares

For installation on university computers only programmes in Start, then USM Apps and Install

have been accepted. Do not install Internet free applications.

Step 8: Thinkwisely Before Opening Email Attachments

Be wary of emails that you didn't intend to get, even though it seems like anyone you trust. If

somebody you meet happens to have it, email him before opening it to ensure that he intends to

give you the attachment.

Step 9: Plan your computer's antivirus scan

Your machine normally sits idle in your office at this stage. Now is a great moment to run the

machine for an anti-virus check. This will operate during the locking of your screen. Please

report them to the Helpdesk if any viruses are found.

17

References

https://www.fieldengineer.com/blogs/what-is-a-computer-network

https://www.jigsawacademy.com/blogs/cyber-security/difference-between-peer-to-peer-and-

client-server/

https://www.omnisecu.com/basic-networking/lan-and-wan-local-area-network-and-wide-area-

network.php

http://nafi.yolasite.com/resources/Advantages%20and%20Disadvantages%20of%20Different%2

0Network%20Topologies.pdf

https://teachcomputerscience.com/computer-networks/

https://fcit.usf.edu/network/chap4/chap4.htm

https://www.bbc.co.uk/bitesize/guides/zvspfcw/revision/8

https://www.fingent.com/blog/a-detailed-guide-to-types-of-software-applications/

https://www.fieldengineer.com/blogs/5-steps-to-a-successful-lan-implementation

https://www.tutorialspoint.com/Wide-Area-Network-WAN

https://www.liquidweb.com/blog/five-common-web-security-problems/

https://usm.maine.edu/computing/10-steps-data-and-network-security