You are on page 1of 19

Department of CIS

Name: Robiul Islam


ID: 181-16-254
Course: Computer Network
Final Assignment
Submitted to: Sarwar Hossain Mollah
TASK-1
a)
Difference between old and newer version of Ethernet and Wi-Fi

Cat 5 Cat 6 Wi-Fi


It support data transfers up to It can go up to 10 Gbps in data Wi-Fi support data transfer
100 Mbps in an Ethernet transfer speeds in an Ethernet up to 3.4 Gbps.
network. network
Cat 5e is the enhanced Cat 6a is the augmented 802.11ac is the latest Wi-Fi
version of the Cat 5 which model of the Cat 6 which standard, offering speeds
adheres to the 1000 adheres to the much faster 10 up to 3,200 Mbps.
BASE-T/TX standard GBASE-T standard
Speed is not optional for Speed are maintained at Speed of the Wi-Fi is much
longer runs longer distance better than Ethernet.
It’s limited to 100MHz speed It supports up to 250MHz It support the 2.4 GHz and
and allows length up to 100 frequencies with 10x the 5 GHz frequency for 802.
meters speed of Cat 5 11n and 802. 11ac.

Recommendation:
It has been recommend that remote protocol rendition 802. 11ac to make more grounded their
security framework and accelerate data transfer capacity. By remote control rendition 802.
11ac can access without any traffic.
And also Cat6 is the best option for networking. By using Cat6 they will get the fast and faster
data transmission.

b)
Identify the five (5) protocol and their layer used which are operate
1. Internet Protocol (IP):
It is an addressing protocol. IP address packets route them and show different nodes
and network unless it reaches it’s right destination.
It works Data Link Layer.
2. Hyper Text Transfer Protocol (HTTP):
HTTP is based on client and server model. HTTP is used for making a connection
between the Web client and Web server. HTTP shows information in Web pages.
It works in Transport Layer.

3. Dynamic Host Configuration Protocol (DHCP) :


DHCP is a correspondences protocol that network directors use to midway oversee and
robotize the network design of gadgets appending to an internet protocol network.
It works in Application Layer.

4. File Transfer Protocol (FTP):


FTP is basically use for transferring files to different networks. There may be a mass of
files, such as- text files, multimedia files, etc. This way of file transfer is quicker than
other methods.
It generally works for Application Layer.

5. Media Access Control (MAC):


An indicated by the qualities, in view of S-MAC protocol, this paper proposed a L-MAC
protocol of low power misfortune.
It works in Data Link Layer.

TASK-2

a)
The reason of network components need addresses
Network address is known as the numerical network part of an IP address. This is used to
distinguish a network that has it’s own hosts and addresses.
In computer networking, each device/Host is assigned 2 different unique address. One physical
address, MAC and one logic address. IPv4/IPv6, to make communication possible between any
two hosts in the network.
Difference between MAC address and IP address:

MAC address IP address


It identifies the physical address of a It Identifies connection of a computer on
computer on internet. the internet.
MAC address is assigned by the IP address is assigned by the network
manufacturer of NIC card. administrator or Internet Service Provider.
Numeric portrayal of a device that uses. Numeric portrayal of a device that
utilization TCP/IP.
It’s changeable. It’s unchangeable (Static IP address) and
changeable (Dynamic IP address).
It is 48 bits (6 bytes) hexadecimal address. IPv4 is a 32-bit (4 bytes) address, and IPv6
is a 128- bits (16 bytes) address.

b)
Use of Public IP and Private IP

Public IP address:
A Public IP address is assigned to a computing device to allow direct access over the internet.
We use Public IP address into the Switch, Web Server, Document Server, E-mail Server and so
on to direct access over the internet

Private IP address:
A private IP address is the address space allocated by Inter NIC to allow organizations to create
a own private network. We use private IP address into inner computers, tables, switches,
printer’s of BRAC’s to guarantee that they can impart inside.
Private IP address ranges:
Class Name IP address ranges
Class A 10.0.0.0 – 10.255.255.255

Class B 172.16.0.0 – 172.31.255.255

Class C 192.168.0.0 – 192.168.255.255

c)
Dynamic Host Configuration protocol (DHCP)
It is network management protocol used to dynamically assigned an IP addresses to any new
node entering the network. DHCP permits a node to be configured automatically, thereby
avoiding the necessity of involvement by a network administrator. DHCP is also used to
configure the proper subnet mask, default gateway, and DNS server information on the device.
All regular network gadgets including telephones, PC’s and other buyer contraptions bolster
DHCP, which is incorporated with the product of all normal network working frameworks.

Figure: DHCP (Dynamic Host Configuration Protocol)


Why would use it
ISPs providers regularly use DHCP to distribute open IP locations to their clients. Since
conventional locations are a panic asset on the internet. Every supplier claims just have a
predetermined number and should share them among every dynamic endorser. DHCP permits
providers to reuse a formerly designated address when that endorser has remained
disconnected for a set time frame. For this reason, I want to use it on Internet of BRAC’s.

Office network or Home network gear like broadband router offers DHCP bolster for included
accommodation in joining home pc’s to Local Area Network. Using DHCP implies home network
overseers don’t have to arrange these parameters independently on every customer. For this
reason, I want to use it office network of john’s Removals.

TASK-3
a)
Five (5) measure of network security
1. Firewall:
A firewall can be either software based, such is what is provided with windows, or hardware
based, such as a router. The basic idea behind a firewall is to allow authorized access to a
computer while blocking unauthorized access. This is accomplished by configuring access
condition based on user defined rules, IP address, and port accessibility.
2. Virtual Private Network (VPN):
The benefit to this is two-fold. First, its expensive. Instead of installing additional equipment
and service to create a secure connection between one place one place and another. The
second benefit to this is the fact that a secure data connection is established. VPN is the
software based security.
3. Network Monitoring:
Network monitoring is likewise a piece of network administration framework. It is used as a
framework that always monitors a pc network for slow or falling segments and informs the
network administrator.

4. Security Policy:
All the time need to keep an eye on security attacks, since there are different types of attack
that can happen on the computer network. Hackers and cyber criminals know exactly how to
attack particular types of network, which is why always should know about the type of security
attacks that exist.
5. Training:
One of the biggest cyber security threats is human error. Make sure that the security policies in
place and employees understand these policies. This policies should cover rules regarding
device and network access, password strength and frequency of change, best practice of file
sharing, security application policies, reporting procedures on lost or stolen devices and many
of more.
b)
Biggest threat for the system:
I think Malware is the most dangerous threat for the system. Because it can disrupt small
business in many ways-from freezing day-to-day operations to stealing private data. Here are a
few examples of what malware can do for this system-

 Take control of the computer and all the software running on it.
 Alter and delete the files.
 Steal the sensitive information.
 Send malicious emails on the behalf.
 Can steal the password.
 Pop-up windows.
 Reformat the computer’s hard drive causing the complete loss of the information.
TASK-4

a)
The Diagram of computer network

Figure: Diagram of BRAC network

b)
Discuss about particular hardware components
There are used some hardware in this diagram the reason of uses such kind of hardware are
given bellow-
DMZ: A network containing publicly accessible servers that is isolated from the “internal”
network proper but not necessarily from the outside world.
Access point: An access point connects users to other users within the network and also can
serve as the point of interconnection between the WLAN and a fixed wire network.
ISP: An Internet Service Provider that provides Internet access to companies.
Switch 3: This is used both for routing and connecting all the layer 2 switches.
Router: This is a hardware which is used for sharing internet access through sharing networks
within a local area.
Server: server is use to manage, store, send and process data. it has to be more reliable than a
desktop computer.
Printer: It works by converting digital images and text into physical copies.

TASK-5
a)
Network Topology:
Network topology is the arrangement of the different networking elements like network links
computer, switches, nodes, Wi-Fi. Access points laptops and other network devices in a
computer network. There are two type of network topology-

 Physical
 Logical
Physical topology defines how all the network devices are connected physically in a computer
network.
A Logical topology defines the logical connectivity of network devices on a computer network.
Figure: Network Topology

Topology affect the performance of a network


Sometimes topology affect the performance of a network. Such as-

 More software is required to run the network efficiently.


 Difficult to administer.
 Limited cable length and number of stations.
b)
Different types of topology of a network:
Network topology is the schematic description of a network arrangement, connecting various
nodes (sender and receiver) through lines of connection.
Types of Topology-

 BUS Topology: Bus topology is a network type in which every computer and network
device is connected to single cable.
 RING Topology: It forms a ring as each computer is connected to another computer,
with the last one connected to the first, that’s why it’s called ring topology.

 STAR Topology: In this type of topology all the computers are connected to a single hub
through a cable. This hub is the central node and all other nodes are connected to the
central node.
 MESH Topology: It is a point-to-point connection to other nodes for devices. All the
network nodes are connected to each other.
 TREE Topology: It has a root node and all other nodes are connected to it forming a
hierarchy. It is also called hierarchical topology.
 HYBRID Topology: It is two different types of topologies which is a mixture of two or
more topologies.

c)
Suitable topology for the particular scenario
It has been recommend that Hybrid topology will best for the scenario. The reason of
recommend this topology are given below here-

 Reliable: Unlike other network, fault detection and troubleshooting is easy in this
topology.

 Scalable: It is easy to increase the size of network by adding new components without
disturbing exiting architecture.
 Flexible and effective: This network can be designed according to requirements of the
organization and it is so effective.

So far the above I recommend Hybrid topology for this. So that they can get a much usable and
effective network connection.

You might also like