You are on page 1of 10

A signed copy of this form must be submitted with every assignment.

If the statement is missing your work may not be marked.

Candidate Name: FARHAN ZAMAN

Candidate ID Number: 1001123

Qualification: O Level/A Level

Unit: Computer Networks

Centre: DIA

I have read and understood both NCC Education’s Academic Misconduct Policy and the Referencing
and Bibliographies document. To the best of my knowledge my work has been accurately referenced
and all sources cited correctly.

I confirm that this is my own work and that I have not colluded or plagiarized any part
of it.

Candidate Signature: FARHAN

Date: 10/19/2021
Task 1 a
Introduction
Nowadays most corporations and business rely on networks to sustain their daily operations. Residential
and business focuses on underlying technologies. A computer network refers to the set of computers
sharing information located or distributed by network data structure. In order to communication with
each other, it uses communication protocols over digital interconnections. Interconnectivities are
created from telecommunication network topologies that is established on objective wire, optical and
wireless radio-frequency process that might have resolved in a collection of network topologies. The
data structure of a computer are identified by network addresses and includes hostnames. It also
includes computers, servers, network hardware or functional hosts. Moreover, by transferring protocols,
the network addresses provide for establishing and understanding the data structure which is called
Internet Protocol. Computer networks can be identified by a lot of value which includes transmission
medium that carry signals, bandwidth, connectivity protocols to compose network traffic, topology,
traffic control structure and the size of the network. Computer networks relies on theoretical and
practical application and it is well-chosen to be a division of computer science, engineering and
telecommunications. Furthermore, it supports applications like accessing to the Web, shared use of
application, storage servers, fax machines, use of email and messaging. It is determined by a large
pattern of technology information. In addition the computer network gives the permission for sharing of
files, data. It gives users access to resources regulated by the device on the network and also access to
all the details that is stored on different computers on the network. For example, form, document
printing or use of a storage device that is shared among others .However, business networks incorporate
additional features, security parameters, and usage requirements. (Computer Networks)

An American multinational organization which is called the Juniper Network. The Juniper Networks goal
is to establishing and buying or selling networking devices for example, routers, switches, network
authority software, security devices and software related networking technology

In terms of Competition, Juniper Networks biggest competition is Cisco. During 2001, for high end core
routers, it controlled the market. However, Cisco routers relied on software, which resulted in slower
speeds. In order to compete with its biggest rival Cisco, it imported a collection of routers for the
network frame. During the year 2004 and 2007, it controlled the market by 38% and had 5%, 18% and
30% share of the market engagement, market frame and core routers

The purpose of Juniper’s network requirements is to prevent allowing network-based attacks on the
network. The newer technology of intrusion detection and prevention provide the capability to stop
malicious traffic altogether. In addition network should be encrypted because this ensures that parties
which are not authorized to the data, do not get access to it.

In terms of use of communication, Juniper uses integrated services digital network that is an essential
arrangement of switches which authorize connections between individual telephones. In addition it
serves as a telecommunications facility where lines from telephones can be connected together to
permit communication

During 2011, in order for moving data over a network on a single layer network, the Juniper network
announced QFabric, which is a recovery protocol approach.

4 protocols within the OSI model

1. Http – is an application later protocol used for distributed, collaborative information system. It
works on a client-server model, where the web browser acts as the client. The purpose of using
Http is because errors can be reported without closing connections. Memory usage and CPU
usage are low because of lesser concurrent connections

2. FTP- File Transfer Protocol enables file sharing between hosts, both local and remote and runs
on of TCP. For file transfer, FTP creates two TCP connections: control and data connection. The
purpose of using FTP is because it enables sharing large files and multiple directories at the
same time. It can also recover lost data and schedule a file transfer

3. TCP – is a transport protocol that provides a reliable stream delivery and virtual connection
service to application through the use of progressed acknowledgement. The purpose of using
TCP because it ensures data reaches the destination, reaches on time and also reaches it
without duplication. Moreover, TCP automatically breaks data into packets before transmission

4. IP: Internet Protocol (IPv4) – it is a network layer protocol contains addressing and control
information, which helps packets to be routed in a network. The purpose of using IPv4 is
because it encrypts data to ensure privacy and security. In addition, data becomes more scalable
and economical. (Network Protocols)

Task 1b
Nowadays technologies like a wireless communication system enhances our way of life. Many small
and big business trends focuses on having the elements of wireless communication. Wireless
communication are used to make calls, connecting devices, accessing the internet and enhance security

In this case, I recommend the Cellular Network because it offers voice and video streaming that is a
decent and responsible as a broadband communication. In addition, it has the capability to use better
bandwidth cellular connectivity such as traffic routing and progressive driver assistance systems.
In terms of security, wireless communication such as Cellular Network enhances Security. For example,
walkie-talkies that transmit and receive radio signals. In addition, it does not have connection problems
like cellphones. As a result the network company can provide walkie-talkie to their security guards. In
addition, employees can also use them to communicate within the building. Bluetooth also plays
important role in accessing locked doors.

LPWANs a network that provides long-range communication. However, I would not recommend this
because LPWANs can only send small blocks of data at a low rate, and therefore are better suited for use
cases that don’t require high bandwidth and are not time-sensitive. (Wireless Communication use).
(Uses for Wireless Communication System)

Voice over Internet Protocol (VOIP) is a method and group of technologies for the delivery of voice
communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet .In
addition, it also refers to the transmission of voice traffic over an internet connection. Traditional
telephony, known as the public switched telephone network works through physical phone lines, cable
systems and networks and allow users to make landline and cellular telephone calls. IP telephony,
however is much more versatile and enables voice, data and video to be transmitted to a variety of
devices including smartphones, laptops, tablets and IP phones at a much lower cost. In order to
incorporate VOIP into system, the company need to get involve with signaling, channel setup,
digitization of the analog voice signals and encoding.

A VoIP system works by taking the analog voice signals, converting them into digital signal, then sending
them as data over the broadband line. Furthermore, VoIP technology enables traditional services to
operate over computer networks using packet-switched protocols. Packet-switched VoIP puts voice
signals into packets, similar to an electric envelope. VoIP packets can be transmitted over any VoIP-
compatible network, such as a local area network (LAN)

There are many strategies implemented within an organization to protect Voice over Internet Protocol
(VoIP) communication services from potential network threats. Without proper security measures,
issues can arise. The organization needs to make sure the service is convenient and makes efficient use
of under-utilized network resources. VoIP network security works to preserve optimal communicate
performance within a business’s network by preventing possible threats such as viruses, Denial of
service attacks and Distributed denial of service attacks. When a VoIP network encounters harmful
traffic, it requires to provide efficient communications. This can result in transmission that degrade voice
quality, thus making it unintelligible. Fixing these problems can cost organizations both time and money.
(How VoIP works). (VoIP impact on network security)

Task 2 Network Layout


Star topology would the best suitable topology because it is flexible and low chances of failure. It is one
of the most and common topology in the local area network. Star networks are one of the most
common computer network topologies that are used in homes and offices. In a star network topology it
is possible to have all the essential data backups in a private folder and if the computer fails, it can still
use the data using the next computer in the network and accessing the backup files.

In terms of isolation of devices, each device is isolated by the link that connects it to the hub. It makes
the isolation of the individual devices simple. This isolation nature also prevents any non- centralized
failure affecting the network. In a star network, a cable failure will isolate the workstation that it links to
the central computer, but only that workstation will be isolated. All the other workstations will continue
to function normally except that they will not able to communicate with the isolated workstation.

When it comes to simplicity, the star topology is easy to understand, establish and navigate. The star
topology obviates the need for complex routing or message passing protocols. In addition, due to its
centralized nature, the topology offers simplicity of operation

Another big advantage of would be Better performance. Star network prevents unnecessary passing of
the data packet through nodes. At most 3 devices and 2 links are involved in any communication
between two devices which are part of this topology. This topology encourage a huge overhead on the
central hub, however if the central hub has plenty of capacity, then very high network used by one
device in the network does not affect other devices in the network. Data packets are sent quickly as they
do not have to travel through any unnecessary. In addition when it comes to lengthening a cable from
the hub, new devices or nodes can be added very easily to the star network since it is easy to add or
remove computers. This topology network is also fast because each computer terminal is attached
directly to the central computer. Moreover, easy installation which means installation is simple,
inexpensive and fast because of flexible cable and the modular connector. (Advantages of topology)

Task 3 Security Threats


Network security threats can cause data and information lost to any organization. Multiple attacks on
the network can damage the organization and its structure.

1) Malware – it is one of the most common security threats that may occur in an organization.
These dangerous threats is harmful to the database system that leads to encoding data,
cancellation or manipulating of files. With not being proactive and without recovering planning,
and if data backups is off, the network will face data loss, disruption of business, and
unnecessary costs. In order to fix the problem, the organization should restore the system. If the
system slows down, then the system needs to shut down and it should be disconnected from
the internet. After that the organization should reboot the system, install a security product and
run a scan

2) Viruses and Worms – Research shows more than 30% of personal computers are damaged by
malware attacks. In the system the viruses are absorbed that can lay dormant. Worms on the
other hand, infect documents, spreadsheets and other files. Once the worms enters the system,
it will infect as many network systems. Damaging the software liability is caused by spreading of
viruses. The solution would be to install an anti-malware solution that is connected to all
networked devices and systems. This can significantly reduce the possibility of contraction
viruses and keeping them from spreading amongst the network

3) Phishing Attacks – These are designed to steal sensitive data such as passwords, usernames
credit card numbers. These attacks impersonate reputable websites, banking institutions, and
personal contacts that come in the form of instant messages or phishing emails designed to
appear legitimate. The solution here is best to use care when clicking on the links in email
messages. The best option would be to move the email into the spam folder, if the message is
not known from where it came from. In addition, the organization should focus on buying a web
content and an anti-phishing filter that will help to avoid harmful sites from accessing it

4) Disapproval of Service – is known as cyber-attack that causes overwhelming hosted servers and
thus becomes completely inoperable. According to statistics, about 33% of organizations fall
because of DDoS attack. Moreover, the cost revenue causes huge amount of dollars. However,
the organization should provide solution for these attacks in order to build a cooperative
relationship with its ISP. In addition the organization must boost their network protection which
resembles their cloud service if it wants to start hosted in the cloud. They should also reduce the
cause of attacks.

5) Trojan horse – which is infected with mass number of viruses. If a Trojan has the network access,
it can steal highly sensitive personal information. It attacks usually spread via email. If the Trojan
access the computer, it can hijack the webcam and tap into the most sensitive data information
as a means to exploit. In order to tackle these problems, the organization need to be aware of
these attacks and focus more on researching on how to discourage their aggression. In addition,
by regularly scanning the network, it will help to spot Trojan virus with adequate cyber security
software. Moreover, the organization has to make sure to have security patches, software that
is up-to date and a secure internet connection

6) Rootkits – refers to when an attacker destroys the system security sensitivity. In order to defend
these threats, the organization should keep patched against known system. (Network Security
Threats)

Task 4a
This is the Logical Network Diagram of Juniper Network. The following diagram contains of all the
network components. First we Internet Access, then we use the FDDI to connect the routers. Then we
use router for our connection with other components.

Task 4b
I chose the hardware component server, router and switch because it connects to the host. The purpose
here is to communicate with another host on the same subnet and a host communicates with a host on
a different subnet. The process is very similar but involves routing. In addition the switch here simply
forwards the frames on the correct device. Before an IP packet is transmitted over a network via the
network interface card of a host, the host needs to make a very important decision. Looking at host, we
can see that the IP address is 172.30.248.34 and the subnet mask is 255.255.255.0, this tells that the
host with the following IP address are in the same subnet. (Logical Network Diagram)

Task 5
A network operating system (NOS) is a specialized operating system for a network device such as router,
switch or firewall. Operating systems with networking capabilities were described as network operating
system because they allowed PCs to participate in computer networks and shared file and printer access
within a local area network (LAN). In the past, a network operating system was considered an operating
system that provided network potentialities. Furthermore, for sharing information computer networks
gave access to personal computers to engage in a client-server structuring. For example, printers

Moreover, Network operating systems are used to manage multiple computers on a single system.
Every computer has an operating system for the individual device, but a network system is used as
central system for an entire grouping of computers. The types of network systems very according to the
specific demands of the system

Client Server Systems are the most common types of network operating systems and they are frequently
used in business, government, schools and organizations that require a central server. The server
connects all the files for the network, and each computer is tied into the server. In addition, the
centralization of the server creates a single, secure point of entry for the network. Security is important
and organization can build a very large network by using this model. For example, Microsoft is one of the
most common server system. The UNIX/Linus system is another common server used in the client server
model. Some centralized networks frequently working off these models include Cumulus, stratum, Open
Network Linux, White Box Switch and even Dell systems. Numerous companies are operating in this field

Task 6
For the organization, Juniper Networks were chosen. A company that establish and buy or sell products
such as routers, switches, network security products and software related networking technology. This
network is the most suitable because it can prevent network-based attacks on the network. It has the
capability malicious traffic with the help of newer technology of intrusion detection and prevention.

When it comes to hardware requirements, any x86 processor (Intel or AMD) with VT-d capability should
be used for lab stimulation and low performance. For all other use cases, Intel Ivy Bridge processors or
later are required. For example, Ivy Bridge Processors: Intel Xeon E5-2667V2 @ 3.30GHz 25 MB Cache.
For single root I/O virtualization (SR-IOV) NIC type, use Intel Ivy Bridge CPU (or higher) and Intel x520
NICs using ixgbe driver or X710 NICs with 10G ports and using i40e driver. Any other NIC models are not
supported.

For Junos OS Release 19.1R1 and Junos OS Release 19.2R1 onwards, for single root I/O virtualization (SR-
IOV) NIC type, use Intel Ivy Bridge CPU (or higher) and Intel x520 NICs using ixgbe driver, or X710 and
Xl710 NICs with 10G ports using i40e driver or XL710Q-DA2 NIC with 40G ports using i40e driver. Any
other NIC models are not supported. In terms of memory and storage, for lite mode should use
minimum 3 GB and for performance mode minimum 5 GB, 1 GB for VCP and 4GB for VFP. Storage
should be Local or NAS. Each VMX instance requires 44 GB of disk storage. Minimum storage
requirements: 40 GB for VCP and 4 GB for VFP. On the other hand, the Juniper Network organization
may face networks such as Malware, Computer viruses and worms, phishing attacks, Distributed denial
of services, Trojan horse and Rootkits. In order to tackle these network attacks, the organization can
deliver proper recovery strategy and keeping data backup offs. Restore the system after that reboot the
system, install a security product and run a scan. In addition, the organization can buy a web based
content and an anti-phishing filter that will help to avoid phishing attacks. The organization can install a
software that can give signals if a viruses is detected. It can also keep security patches, software up-to
date and a secure internet connection. (Hardware requirements and cost)

Conclusion
Therefore by implementing all these factors, the Juniper Network can successfully show their purpose of
network requirements and prevent security threats

References
https://en.wikipedia.org/wiki/Computer_network

https://en.wikipedia.org/wiki/Juniper_Networks

https://www.thefreedictionary.com/Private+Integrated+Services+Network

https://www.sciencedirect.com/topics/computer-science/juniper-network

https://www.manageengine.com/network-monitoring/network-protocols.html

https://www.thinksecurenet.com/blog/5-uses-wireless-communication-system/

https://industrytoday.com/best-uses-of-wireless-iot-communication-technology/

https://ok.com.au/what-is-voip-and-how-does-it-work/

https://www.radware.com/glossary/voip-network-security/

https://www.ukessays.com/essays/technology/star-network-topology.php

https://blog.rsisecurity.com/top-10-network-security-threats/

https://ccnaexamsim.wordpress.com/2012/10/30/the-life-of-an-ip-packet/

https://www.juniper.net/documentation/us/en/software/vmx/vmx-getting-started/topics/concept/
vmx-hw-sw-minimums.html

You might also like