Anda di halaman 1dari 13

LEVEL 3 FOUNDATION PROGRAMMES

demo
MODULE: Computer Networks
demo
ASSIGNMENT TITLE: SDS
demo demo
Important Notes:
demo demo demo demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo

% You must familiarize yourself with the NCC Education Academic Dishonesty and
Plagiarism Policy and ensure that you acknowledge all the sources which you use in your
work. The Policy is available on the Campus. Follow the instructions above, but click on
Policies rather than Advice.

demo demo demo demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo

% You must submit a paper copy and digital copy (on disk or similarly acceptable
medium). Media containing viruses, or media which cannot be run directly, will result in a fail
grade being awarded for this module.

demo demo demo demo demo demo demo demo

% This assessment is worth 50% of the students overall grade.

demo demo demo demo demo demo


Name: Abdullah Mansuri Number: 00159865 ZCAS
demo

demo demo
demo

demo

demo demo

demo

AbdullahMansuri_00159865_04/04/2016
demo

demo

demo demo demo

demo demo

demo
demo

demo demo demo


Introduction 3
Task 1 3
demo demo demo demo demo demo demo demo demo demo demo
Ethernet 3
Token Ring 3
demo demo demo demo demo demo demo demo demo demo demo
Recommendation 3
b) 4
demo demo demo demo demo demo demo demo demo demo demo
d) 5
Task 2 6
demo demo demo demo demo demo demo demo demo demo demo
b) 6
c) 6
demo demo demo demo demo demo demo demo demo demo demo
e) 7
f) 7
demo demo demo demo demo demo demo demo demo demo demo
Task 3 9
a) 9
b) 9
demo demo demo demo demo demo demo demo demo demo demo
d) 9

AbdullahMansuri_00159865_04/04/2016
demo demo demo demo demo demo demo demo demo demo demo
Task 4 11
demo demo demo demo demo demo demo demo demo demo demo demo demo
c) 11
demo demo demo demo demo demo demo demo demo demo demo
Task 5 13
demo demo demo demo demo demo demo demo demo demo demo
b) 13
demo demo demo demo demo demo demo demo demo demo demo
References 14
demo

demo

demo
Specialist Dental Services is a large company with major branches spanning across the UK.
They provide dental care of many kinds. The assignment will be the design of a Network
that can be implemented in the new Clinic.

demo demo
demo
demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo
demo demo demo demo demo
demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo
demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo
demo

AbdullahMansuri_00159865_04/04/2016
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo
demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo
demo

demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo
4. The Transport Layer - Offers end-to-end communication between end devices through a
network and depending on the application, gives a reliable connection-oriented or
connectionless best-effort communication. Also responsible for Application and client-side
entity identification and checks for confirmation that the entire message arrived intact.
Responsible for segmentation of data and control of data flow to prevent memory overruns.
Establishes and maintains both ends of virtual circuits, detects Transmission-error and
Realigns segmented data in the correct order on the receiving side. Also, multiplexing or
sharing of multiple sessions over a single physical link.
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo
6. The Presentation Layer - Responsible for how an application formats the data to be sent

AbdullahMansuri_00159865_04/04/2016
out. Basically allows an application to read (or understand) the message by defining a syntax
with the syntax and semantics of the information transmitted. For computers with different
internal data representations to communicate, the data structures to be exchanged can be
defined in an abstract way, along with a standard encoding to be used ‘‘on the wire.’’ It
manages these abstract data structures and allows higher-level data structures (e.g.,
banking records) to be defined and exchanged. (Tanenbaum, 2010, p.69)
7. The Application Layer - Provides an interface for the end user. This layer is what the user
sees, in terms of loading an application and is the data the user sees. Functionality includes
support for file transfers, ability to print on a network, Electronic mail, messaging and
browsing the World Wide Web. (Simoneau, 2009, p.8)

demo
c)
Web, Email Internet Access and Security Software Protocols;
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo
SMTP – Simple mail transfer protocol is the standard protocol for sending emails using
TCP/IP. It doesn’t provide an interface but is simply an Application Layer protocol that allows
transmission/delivery of email over the internet.
ICMP - Internet control message protocol. Sends messages between devices to indicate the
availability or error conditions. Basically, they are used as a feedback mechanism for
network communications, they are used in network diagnostic tools, such as ping and trace
route. Found in the Network Layer.
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo
HTTP – Hypertext Transfer Protocol, defined in the Application Layer, forms the basis for
communication on the web. Sends requests to web servers, however cannot function without
the lower layer protocols assistance
DNS – Domain Name System. Application Layer protocol. Provides a human friendly
naming mechanism for internet resources. Ties domain names to IP addresses and allows
access to sites by name.
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo
(Ellingwood, 2014)

demo
Hub – Works on the physical layer, as all they do is read and then echo all data from each
port to all the other ports without reading for a destination.
Switches – On the data link layer, as they actually check the data and look for the
destination mac address to forward it to.

AbdullahMansuri_00159865_04/04/2016
Router – Work on the network layer, so that they can filter data based on IP addresses.
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo

demo demo
a)
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo
IP-Address: 192.168.123.132
demo demo demo
Host: .132
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo
(Support.microsoft.com, 2011)
demo

demo
A public IP address is assigned to a computing device to allow direct access over the
Internet. A web server, email server and any server device directly accessible from the
Internet require a public IP address. A public IP address is globally unique, and can only be
assigned to a single device.
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
A private IP address is allocated by InterNIC so organizations can create their own private
network. Tablets, smartphones and Computers within a network are usually assigned a
private IP address. Local devices see this computer via its private IP address. However, the
devices residing outside of your local network cannot directly communicate via the private IP
address, but uses the router's public IP address to communicate.
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo
(Iplocation.net, 2013)

demo
demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo

AbdullahMansuri_00159865_04/04/2016
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo
demo

demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo
demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo
demo demo demo

demo
demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo
demo demo demo

demo
demo demo
demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo

AbdullahMansuri_00159865_04/04/2016
demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo
demo
demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo
The routing table checks if it has the Mac Address of the IP address, and if it does, forwards
the IP packet. If it doesn’t, it sends a broadcast request asking for the Mac Address related
to that IP address.
(Technet.microsoft.com, 2014)
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo
A route that matches the destination IP address (host route)
A route that matches the network ID of the destination IP address (network route)
demo demo demo
The packet is then sent to the next hop. When the packet is received at a router, the packet
is passed to IP to verify the checksum and destination. Then this IP finds the best route
forward and forwards the packet to that next IP.
When the packet reaches the destination, the IP verifies the checksum and destination and
then passes the IP datagram to the upper level protocol.
demo demo

demo demo

a)
demo demo demo demo
Privacy is ensuring that only authorized users can access network services and suitable

AbdullahMansuri_00159865_04/04/2016
consequences for a potential breach are in place.
Integrity is ensuring that transmitted data is not partially or fully lost, modified by a third party
or corrupted. Basically is ensuring data is transmitted properly and securely.
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo
The SDS clinics data integrity wasn’t ensured, as the data was corrupted or deleted and
cannot be accessed. (NCC, CN Topic 8, p.3-8)

b)
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
(SearchEnterpriseWAN, 2016)
demo

c)
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo
(NCC, CN TOPIC 8, p.25-29)

demo
d)
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo
Firewalls, a perimeter device that permits/denies access based on a set of rules configured
by the administrator. It protects the network from anything coming from the internet.
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo
File Auditing. The process of comparing the current system against a record of the files and
file characteristics of your system when it is a known-good state. This is used to detect
changes to the system that may have been authorized.
demo demo demo demo demo

demo
The biggest threat would be loss of data integrity. Patient information contains precise

AbdullahMansuri_00159865_04/04/2016
sensitive information with regards to their status, and wrong display of such information can
cause wrong diagnostics.

demo demo

demo demo demo demo demo demo


demo

demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo

demo
demo demo demo
demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo
demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo

AbdullahMansuri_00159865_04/04/2016
demo demo

Task 5

demo
The use of IP networks, namely the LAN (internal network) and WAN (the Internet) to carry
voice communications. Internet that was originally designed to carry computer data is also
used to carry voice, a packet switched network.
VoIP, or Voice over Internet Protocol, is the process of taking analog audio signals, turning
them into digital data and transmitting over the Internet. This means using a standard
Internet connection to place free phone calls thus bypassing the phone company (and its
charges) entirely.
demo demo demo demo demo

b)
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo
(NCC, CN Topic 11, p.24-29)
Implement end-to-end QoS (quality of service) first, which means that voice traffic must be
given higher priority than data traffic. Use IEEE 802.1p/q enabled switches. Implementing
QoS traffic prioritization ensures timely VoIP packet delivery and provides the best call
quality. As part of this QoS plan, you should break voice traffic off into its own VLANs to get it
away from the data traffic. These VLANs will put the phones on their own broadcast domains
and IP subnets.
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo
VOIP is a mission-critical network application, its traffic needs a solid infrastructure and it
cannot be competing with other traffic on the network. Therefore QoS should be a priority.
(Davis, 2007)

demo
c)
The VOIP network will slow down the network as it requires a lot of bandwidth as for it to
perfectly run in real-time, it can’t be forgiving in terms of packet loss and slow/out of sync
delivery of packets. To function effectively, it will need the highest bandwidth priority.
demo

AbdullahMansuri_00159865_04/04/2016
References

Axis.com. (2012). Network technologies - Local area network and Ethernet | Axis
Communications. [online] Available at: http://www.axis.com/global/en/learning/web-
articles/technical-guide-to-network-video/lan-and-ethernet [Accessed 21 Mar. 2016].
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo
Tanenbaum, A. (2010). Computer networks. 5th ed. Upper Saddle River, N.J.: Prentice Hall
PTR, p.94, p.69.
demo demo demo demo demo demo demo demo demo demo
Simoneau, P. (1997). The OSI Model: Understanding the Seven Layers of Computer
Networks. Global Knowledge TM. Pages 3-9
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
dslreports.com. (2014). What is the difference between a Hub, Switch, and Router. [online]
Available at: http://www.dslreports.com/faq/5456 [Accessed 29 Mar. 2016].
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo
Iplocation.net. (2013). What is the difference between public and private IP address?.
[online] Available at: https://www.iplocation.net/public-vs-private-ip-address [Accessed 31
Mar. 2016].
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo
Linksys. (2014). Linksys Official Support - Differences between IPv4 and IPv6. [online]
Available at: http://www.linksys.com/us/support-article/?articleNum=139604 [Accessed 2 Apr.
2016].
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo
Mitchell, B. (2015). An Beginner's Guide to IPs: Subnet Masks and Subnetting. [online]
About.com Tech. Available at:
http://compnetworking.about.com/od/workingwithipaddresses/a/subnetmask.htm [Accessed
2 Apr. 2016].
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo
Technet.microsoft.com. (2009). IP routing: TCP/IP. [online] Available at:
https://technet.microsoft.com/en-us/library/cc785246%28v=ws.10%29.aspx [Accessed 2 Apr.
2016].
demo demo demo demo demo demo demo demo demo demo demo
SearchEnterpriseWAN. (2016). What is virtual private network (VPN)? - Definition from
WhatIs.com. [online] Available at:
http://searchenterprisewan.techtarget.com/definition/virtual-private-network [Accessed 2 Apr.
2016].

AbdullahMansuri_00159865_04/04/2016
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo
Valdes, R. and Roos, D. (2011). How VoIP Works. [online] HowStuffWorks. Available at:
http://computer.howstuffworks.com/ip-telephony.htm [Accessed 3 Apr. 2016].
demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo demo demo
demo demo demo demo demo demo demo demo demo demo demo
demo
demo
demo

AbdullahMansuri_00159865_04/04/2016

Anda mungkin juga menyukai