0% found this document useful (0 votes)
63 views

Computer Networksoewaiyantun

The document discusses various types of computer networks including LAN, MAN, WAN, WLAN and PAN. It describes what each network type is used for and provides examples. It also covers common network protocols and standards like Ethernet, IEEE 802.11, HTTPS, FTP, SMTP and IP that define how devices communicate over these different network types.

Uploaded by

Ryuu
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views

Computer Networksoewaiyantun

The document discusses various types of computer networks including LAN, MAN, WAN, WLAN and PAN. It describes what each network type is used for and provides examples. It also covers common network protocols and standards like Ethernet, IEEE 802.11, HTTPS, FTP, SMTP and IP that define how devices communicate over these different network types.

Uploaded by

Ryuu
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

qwertyuiopasdfghjklzxcvbnmq

wertyuiopasdfghjklzxcvbnmqw
ertyuiopasdfghjklzxcvbnmqwer
tyuiopasdfghjklzxcvbnmqwerty
Computer Network

uiopasdfghjklzxcvbnmqwertyui
Reported by
Soe Wai yan tun

opasdfghjklzxcvbnmqwertyuiop
asdfghjklzxcvbnmqwertyuiopas
dfghjklzxcvbnmqwertyuiopasdf
ghjklzxcvbnmqwertyuiopasdfgh
jklzxcvbnmqwertyuiopasdfghjkl
zxcvbnmqwertyuiopasdfghjklzx
cvbnmqwertyuiopasdfghjklzxcv
bnmqwertyuiopasdfghjklzxcvbn
mqwertyuiopasdfghjklzxcvbnm
qwertyuiopasdfghjklzxcvbnmq
wertyuiopasdfghjklzxcvbnmqw
HND L3 B4 Soe Wai Yan Tun
P1

Network type

LAN,MAN,WAN,WLAN,PAN

LAN

Local-area network is a minute area computer network. LAN is only can connect to one room
and circumscribed to a building or group of buildings. But LAN can be connected to a LAN at any
distance through telephone lines and radio waves. The distinction between LAN and WAN is that
geographical networks are sizably voluminous. Typically, the WAN is connected to two or more
local-network networks (through public networks).

Types of Local-Area Networks (LANs)

There are many different LANs. Ethernets are most commonly utilized for PCs. Most Apple
Macintosh networks are predicated on Apple's AppleTalk network, built on Macintosh computers.
The following features are different from one LAN and another:

Topology: The geometric arrangement of the contrivances in the network. For example, the
contrivance can be arranged in a ring or in a straight line.

Protocols: Rules and encoding requisites for sending data. The protocols additionally determine
whether the network uses peer-to-peer or client / server architectures.

Media: Implements are fraudulent - wire, wire, You can connect with coaxial cables or fiber
optic cables. Some networks communicate through the radio without any communication at all.

MAN

Metropolitan area network is the computer network that many connect using the city to areas of
a metropolitan area. The term "MAN" connects the interconnected LANs within a city to a more
astronomically immense network. Then it can provide an efficacious connection to the wide
network. The term is utilized to describe the interconnectedness of many local networks.

1
HND L3 B4 Soe Wai Yan Tun
WAN

A bigger one than a LAN is call WAN. LAN has connected a room and room but WAN has
connected a city and city. It can be used (WAN) in business or the company and branch offices;
colocation buildings; May include connections to cloud accommodations and other facilities.
Mundanely need LAN and WAN connected router and switch. Enterprise WANs provide users
with security and saves time. You need to set up necessary equipment. In many places, you do
not require to install the same application server, firewall, or other resources.

WLAN

A wireless LAN (WLAN) is a wireless network. school, Computer Lab A wireless computer
network that connects two or more contrivances utilizing a wireless connection to establish a
local network (LAN) in a restricted area, such as a school or office building. It sanctions users to
navigate within and within a network. The WLAN can connect to the wider Internet through the
gateway. Most modern WLANs are predicated on the IEEE 802.11 standard and are sold under
the Wi-Fi brand. Wireless LANs are popular at home because they are facile to install and use at
home. They are popular in commercial products that provide wireless communications to their
employees and customers.

PAN

Personal area network (PAN) is the interconnection of information technology within a person's
distance. Conventionally within 10 meters. For example, a laptop and a peregrinator; A personal
digital assistant (PDA) with a portable printer can utilize some wireless technology to connect
without any connection. Typically, such a personal network can be interconnected without wires
to the Internet or other networks.

IEEE 802.3

This article is about the standard working group. Visually perceive the Ethernet frame for the
Ethernet frame data format. IEEE 802.3 is a working group and an amassment of standards for
electrical and electronic engineering (IEEE) standards developed by the Working Group on the
physical communication and data link layer (wired) of the wired Ethernet. This is generally a
local LAN (LAN) technology. Physical connections are composed of nodes and/or infrastructure
contrivances (nodes, buttons, routers) composed of copper or fiberglass. 802.3 is a technology
that fortifies IEEE 802.1 network architecture. 802.3 uses CSMA / CD to determine the LAN
access method.

2
HND L3 B4 Soe Wai Yan Tun
802.11

"IEEE 802.11 is part of the IEEE 802 suite of LAN protocols and provides media control (MAC)
protocols to implement multiple LAN (WLAN) protocols." Wi-Fi computer connections. However,
the 2.4 GHz, 5 GHz and 60 GHz frequency ranges are not restricted. These are the most widely
used wireless computer network standards in the world. Laptop printers and smartphones are
most commonly utilized in home and office networks and can connect to the Internet without
wires. They are engendered and maintained by the IEEE LAN / MAN Standards Committee (IEEE
802). As a result, each revision in the market becomes its own standard. The protocols are
customarily utilized in conjunction with IEEE 802.2, designed to work seamlessly with Ethernet,
and are often used to carry Internet protocol traffic. The IEEE 802.11 designation lists the
channels available but is significantly different from the regulatory spectrum.

802.13

It is standard Ethernet bus topology, Provides 100 Mbps data rate utilizing data and CSMA / CD
media communication protocol. 100Base-X Version 100Xase XX uses Feline 5 UTP, which is
different from the physical layer. 100BaseFX uses fiber optic cables;

100Base-T Ethernet is compatible with 10Base-T Ethernet.

Protocols

purport of protocols; routing protocols such as IPv4, IPv6, IPv6 address Ecumenical Unicast,
Multicast, Link-local, Unique local, EUI 64, Auto configuration, FTP, HTTP, SMTP, POP3, SSL;
Management of protocols for addressing.

HTTPS

It is utilized by a computer network for secure communication. It is widely utilized on the


Internet. In HTTPS, the communication protocol is encrypted utilizing Convey Layer Security
(TLS) or its antecedent Secure Sockets Layer (SSL). Ergo, the protocol is often referred to as
TLS over HTTP or SSL over HTTP.

FTP

File Transfer Protocol is a network protocol using to transfer computer files between client and
server on a computer network. FTP uses separate control and data connection between client
and server to build on the client-server model. FTP users can customarily authenticate
themselves with a simple text-signed protocol with a username and password. However, if the
server is configured to sanction this, you can connect anonymously. Username and password

3
HND L3 B4 Soe Wai Yan Tun
are bulwarked, For secure infections that encrypt data, FTP is often secured with SSL / TLS
(FTPS) or superseded by SSH File Transfer Protocol (SFTP).

SMTP

Simple Mail Transfer Protocol is communications protocol for the Cyber World-standard was first
set to SMTP by 1982 with RFC 821 and upgraded from RFC 5321 to Elongated SMTP in 2008. It
is the most widely used type of protocol today. Mail server and other message transfer agents
use SMTP for sending and receiving messages. Commercial systems such as Microsoft Exchange
and IBM Notes, and webmail systems such as Perspective.com, Gmail and Yahoo! Mail may use
unwonted protocol. However, all utilize SMTP when sending or receiving email outside their own
system. SMTP servers utilize the Transmission Control Protocol at port 25.

IMAP

Internet Message Access Protocol is an Internet protocol using to mail users to received mail
messages from mail servers from the TCP and IP connections from IP connections. IMAP is set
by RFC 3501. IMAP was designed with the aim of sanctioning a gamut of email clients and
leaving emails on the server until the utilizer effaced it. The IMAP server mundanely heedfully
auricularly discerns port 143.

IP

IP using drives communication. Its routing function enhances internetworking and rudimentary
builds the cyber world. IP packets are responsible for sending packets from a single source host
to the destination host predicated on IP addresses from the packet header. For this purport, the
packet structure that encapsulates the information that the IP will send. Additionally, designate
the address methods used to label it with the datagram source and destination information. IP
sample – 192.168.100.1

4
HND L3 B4 Soe Wai Yan Tun
P2

Network Protocols and standards

1.UDP

2.TCP

UDP

 Playing an online video game


 Streaming movies online
 Video conferencing
 Ue for RTOS(real Time operating systems)

TCP

 Sending and receiving E-mails


 Internet banking
 Remote access to your network devices
 Music streaming
 Sending SMS

Describe why different network standards and protocols are necessary

HTTP is the primary protocol used on the Internet. HTTP defines the format and method of
producing the message and what the web server and browser should run in response to various
commands. For example, when I enter the URL in the browser, I really need to get the HTTP
command to receive and send the requested website sent to the web server.

Another basic standard that controls the behavior of the World Wide Web is HTML. This explains
how to format and display web pages.

FTP (file transfer protocol)

File Transfer Protocol (FTP) is a standard Internet protocol for transferring files between
computers on the Internet. FTP is an application protocol that uses the Internet Protocol TCP /
IP, as well as Hypertext Transfer Protocol (HTTP) for sending public websites and related files,
or Simple Mail Transfer Protocol (SMTP) for sending email. FTP is widely used by computer
manufacturers to transfer website files to servers for everything on the Internet. It is often used
to download programs and other files from other servers to your computer.

Users can use FTP in a simple command line interface (for example, in the Windows MS-DOS
command prompt window) or in a commercial program that provides a graphical user interface.
A web browser can download a program that has selected an FTP request from a website. FTP
allows you to update (delete, rename, move, copy) files on the server. You need to connect to
the FTP server. However, published files can be easily accessed via anonymous FTP.

5
HND L3 B4 Soe Wai Yan Tun
Basic FTP support is usually provided as part of the TCP / IP family of programs. However,
typically FTP client programs with a graphical user interface should be downloaded by the
company that produces them.

What is an IP address? Why use this?

An IP address is an amazing product of the latest computer technology that allows one
computer (or another digital device) to exchange data with other computers over the Internet.
IP addresses are used to search for billions of digital devices that other devices connected to the
Internet can identify and distinguish. Just as someone needs your email address to write you an
email, the remote computer needs your IP address to communicate with your computer.

P3

1.NIC (Network Interface Card)

Network Interface Controller is a component of a computer that connects to a computer


network. Early network controllers were conventionally implemented on expansion cards
connected to computer buses. Cost-efficacious and widespread Ethernet standards spread to
incipient computers with a network interface installed on the motherboard. Modern network
interface controllers provide advanced processors such as interrupt and DMA interfaces. Support
for a wide range of acceptances and relinquishes; It provides for segmentation on logical
surfaces, and on-controller network traffic such as TCP offload engine.

DNS Server

Domain Name System is the Internet telephone book. When users enter domain names such as
'google.com' or 'channelmyanmar.com', they are responsible for finding the correct IP address
for those sites. The browser utilizes these addresses to connect to their primary address or CDN
server. DNS servers are automatically engendered by DNS servers.

6
HND L3 B4 Soe Wai Yan Tun
DHCP Server

DHCP server is network server. DHCP server giving the IP address. regular windows and other
network are automatically supported. Dynamic Host Configuration Protocol (DHCP) is the
network protocol using Internet protocol networks. Only then will the DHCP server communicate
the IP address and other network configuration requirements to each IP address in the network.
A DHCP server automatically sends the network parameters required for the client to
communicate congruously on the network. If it's inconvenient, The network administrator needs
to prepare. DHCP servers typically assign each client a unique dynamic IP address. This will
change when the lease for IP address expires.

Web Server

Web server is the computer that runs websites. The main purpose of Webserver is to save Web
pages to users. This communication uses the Hypertext Transfer Protocol (HTTP) to edit and
send. These web pages generally contain HTML documents, It contains syntax and text. Pictures
and exams. Enhances SMTP (Simple Mail Transfer Protocol) and FTP (File Transfer Protocol)
protocols for email and other non-HTTP files. And storage.

Mail Server

The mail server can be compared to the computer of a neighboring sender. Every email sent
through the mail server goes through the route to its intended recipient. It seems to send the
message straight away - moving from one PC in one eye - in fact, to a complicated series of
transfers. Without these email servers, you can only send emails to people who match your own
email address. This means that you can only send messages from one waiyan.com account to
another tuntun.com account.

7
HND L3 B4 Soe Wai Yan Tun
Unshielded Twisted Pair (UTP)

UTP cables are widely utilized in computer and communications industries, such as Ethernet
cables and telephone wires. In a UTP cable, the conductors of a single circuit lie around one
another in order to eliminate electromagnetic interference (EMI) from external sources.
Unprotected does not utilize extra shields, such as supplemental panels or aluminum foil. UTP
cables are conventionally a group of fraudsters, together with colored electrodes. UTP using for
connection.

RJ 45

RJ45 is a mundane type of connector utilized for Ethernet networking. It is akin to a telephone
slot but is remotely wider. At each end, there is an RJ45 connector on each end, so Ethernet
cables are sometimes called RJ45 cables. RJ 45 using for Ethernet cables.

8
HND L3 B4 Soe Wai Yan Tun
Windows 10

Microsoft has been in control of its own operating system for decenniums, and its latest version
of Windows 10 is liable to dominate the market. Windows 10 is perfect operating system.
Windows 10 safer than other windows. Windows 10 controls the whole computer.

Windows server 2012 R2

Windows Server 2012 R2 is the successor to Microsoft's Windows Server 2012 operating
system. Windows Server 2012 R2, relinquished under the Windows Server Blue codename,
officially launched at the terminus of 2013. Among the ameliorations Windows Server 2012 R2
includes is the Hyper-V hypervisor (Hyper-V 2012 R2). Virtual machines (VMs) during direct
migration; Hyper-V hosts for VM live cloning and shared VHDX files during live migration.
remote recollection access (RDMA) support. Windows Server 2012 R2 additionally offers
enhanced integration and interoperability with Microsoft's Windows Azure cloud platform and
Microsoft's Office 365 version. Windows Server 2012 R2 will be relinquished in 2013 It was
promulgated on June 3. Later that month, the preview version was available for download on
June 24th. After official release, Windows Server 2012 R2 was available in Standard, Datacenter
and Essentials editions.

9
HND L3 B4 Soe Wai Yan Tun
Firewall

A firewall is a network security contrivance that decides whether or not to sanction categorical
traffic, predicated on designated security rules, checking inbound and outbound traffic. Over 25
years, firewalls are the first line of bulwark for network security. They can be a barrier between
outside networks such as the Internet and insecurity between unreliable and secure internal
networks. And then Firewall are divided into hardware and software.

P4

Switch Function

A switch is a contrivance utilized in Access or OSI Layer 2. A switch can utilize multiple hosts
(PCs) to connect to the network. If a key is different, a button sends a message to a particular
host. When any host on the network sends a message to a host on the same network or to
another host on the same network, the switch accepts frames to read the physical MAC address
of the message.

A network switch has become an integral part of subsisting area networks. Astronomically
immense to medium size LANs build and use multiple network switches. The SOHO (Diminutive
Office / Home office) networks generally consist of a single or sometimes multi-purport
contrivance, such as a digital (DSL) and cable broadband/home broadband accommodations,
such as a single or sometimes residential door.

Today, we utilize components such as routers that connect physical broadband technology. We
can visually perceive some people utilizing telephone technology over the Internet utilizing
Voice over IP (VoIP).

10
HND L3 B4 Soe Wai Yan Tun
Function of Router

Routers are machines that send data packets to the congruous computer network. They have a
table that contains a list of all their networks built inside. It contains information about how
diligent each channel in the network is. When the data packet reaches the router, It reads the
destination of the packet outside of local networks. It will send the router to another router. It
will send another router to the destination until it arrives.

WAP Function

Mobile Phones It provides access to the internet through wireless devices such as PDAs and
PDAs Regulations for sending / receiving data over wireless devices (for- example mobile
phones)

Bridge Function

The network bridge, additionally kenned as the Ethernet bridge, links two components of the
network. Sections are not independent entities but are discrete entities. Owned and managed
by the same organization. The purport of the bridge is to break down the network management
components.

11
HND L3 B4 Soe Wai Yan Tun
P5

Directorty Services

Directory accommodations store and store directory information to integrate network resources.
Directory accommodations mapping the network names of network resources for network
addresses and assigning network denominations.

Directory accommodations sanction users to access resources without kenning the physical
location of the objects, such as protocols and network topology. This is a consequential part of
the operating system and centralized storage for the accommodation platform.

Account

Active Directory Type: Integrating Accounts to Your Domain (Active Directory) It may be
effaced or transmuted. It has users, Not only group or computer accounts, Performs such tasks
as moving (or moving OU) to groups and resetting a password or a locked account. Normally it
is not cognate to contrivances such as Active Directory Users and Computers. You can withal
run other implements (DSAdd, DSModify) or PowerShell scripts and other programs.

Authentication Management

Authentication management in one network will refer to a computer system that utilizes a
method to verify the identity of another network. The utilizer will ascertain that the utilizer is
not a valid hacker. It will do this by utilizing the username or password afore the utilizer can
access the network resources.

DNS

Domain name systems delegate the domain name by assigning domain names and assigning
domain names that are sanctioned for each domain and mapping these designations to Internet
resources.

Network administrators can delegate ascendancy over the subdomains of their allocated
namespace to other designated servers. This mechanism provides distributed and error-free
accommodations and is designed to eschew a single central database.

12
HND L3 B4 Soe Wai Yan Tun
Telecommunication Services

Telecommunications services are a set of user-defined data transfer services that are provided
to a group of telecommunications services or a group of users on a telecommunications system.

The communications service user is responsible for the content of the message. The
telecommunications service receives the message and receives it. Responsible for broadcasting
and distribution.

Email communication

Email communication, Email or e-mail is information stored on a computer between two users.
To put it more simply, email is text, and text. Files, An image or message that contains a
message or message sent to a categorical person or group to a particular group or group.

Social Networking

Gregarious networking: Families, Colleagues Utilizing Internet-predicated gregarious media


sites to keep in touch with customers or customers. Gregarious networking is a gregarious
purport; One or both of the business objectives can be obtained through sites such as
Facebook, Twitter, LinkedIn and Instagram.Social networks have become a consequential base
for marketers endeavoring to reach customers.

Despite the competition, Facebook is the most astronomically immense and most popular
convivial network utilizing over three billion platforms. It was propagated by Instagram,
Facebook Herald, Twitter and Pinterest.

File Services

File Sharing Accommodation designates that you can transfer and transfer files. It is distributed
and monitored online accommodation. It provides an entire platform for sharing files between
users on one or more third-party accommodations and with different networks.

File transfer

File transfer is the process of replicating or transferring files from a computer to a network or an
Internet connection. It can apportion files, files, or computers with users or computers on a
local or remote substructure; Transfer or broadcast can be made.

13
HND L3 B4 Soe Wai Yan Tun
File Sharing

File sharing is a great way to keep track of your files. Multimedia (audio/video); Graphic
Computer programs; It is a private or public distribution of information or resources in a
network with different level sharing privileges. File-sharing can use several methods.

Application Services

Adjusting accommodations; Application Security and DDoS Minimization Application


accommodations, such as optimizing traffic and access control, ascertain applications are
securely accessible on any cloud or platform. The bottom line, app accommodations ascertain
your applications do precisely what you optate them to do. Rudimentally, it distributes
"invisible", an essential part of the modern application stack.

Database

A database is a systematic amassment of information. The database is conventionally controlled


by the database management system. Similarly, data and DBMS, as well as the applications
associated with them, are often referred to as database systems, often abbreviated to the
equity database.Databases and columns are organized in rows and columns to optimize the
conversion and search of data in the most prevalent types of databases today. Facilely access
and manage data Repair Repair Update Most databases utilize a systematic query language
(SQL) for data inditing and querying.

Proxy

If you optate to browse the site anonymously, proxies can provide you with a way to obnubilate
your abode IP address ecumenical. By connecting to the Internet through proxies, your
contrivance's home IP address will not be revealed, but the proxy server's IP will be shown.

If you're connected to the Internet, it can make you feel more secure. There are many proxies
that can accommodate you for clearance.(e.g we found a plethora of searches. Some are free
and some charge a diminutive fee. The cull is only for you. However, the accommodations
offered are more reliable, We have found that it is more expeditious and more secure).

VoIP

VOIP is ( Voice Over Internet Protocol)

If you have a good quality internet connection, you can send your telephone accommodation
through your cyberspace connection, not your local telephone company.

There is a way to convert analog signals that can be sent over the cyber world to digital signals.

14
HND L3 B4 Soe Wai Yan Tun
You can install this feature on your phone (visually perceive VOIP Phones) or in a separate box
like ATA.

Mobile Working

Mobile work is simply mobile contrivances such as tablets and tablets. Tablets Work activities
that use smartphones and laptops (unless you utilize a laptop at your customary desk - if you
have one). It additionally includes how we convey our mobile contrivances when peregrinating.

P6

users name and password are crucial for network system

The username and password of your users, including the website, The most prevalent way to
utilize your electronic mail accounts and your computer itself (through utilizer accounts) is to
identify them. Consequently, it is very consequential to utilize vigorous passwords to bulwark
your security and identity. ... utilize your vigorous passwords. Do not reveal them to anyone.

Authorisation permissions and access control

Authentication verifies your identity and authentication gives you sanction. The policy that
sanctions your sanction sanctions you to identify yourself. For example, the identity of a bank's
customer (for example, username) can be accessed through that bank's online accommodation.
However, the bank's sanction policy must sanction each of your accounts to be accessed online
only after your own account has been approved. And then access control is the sanction policy
designates what can be accessed by individuals or groups, but Controls - additionally kenned as
sanctions or privileges - are the methods we utilize to enforce these policies.

Software Protection

Antivirus

Anti-virus software forfends your computer from malware and cybercriminals. Anti-virus
software probes for information: web pages, files, search for kenned threats, monitor the
deportment of all programs, and exhibits suspicious comportment. It is to block or abstract
malware as anon as possible. Antivirus aegis is essential because of constant cyber threats. If
you do not have security software installed, you may be infected with a virus or maybe targeted
by malevolent software that has not been detected by your computer or mobile contrivance.

15
HND L3 B4 Soe Wai Yan Tun
Intrusion detection system

An Intrusion Detection System (IDS) is a network security technology pristinely


designed to detect susceptibilities on a target program or computer. Intrusion Obviation
Systems (IPS) has expanded the IDS solutions and integrated them to their capabilities as well
as integrating their faculty to avert threats.

IDS is a heedfully auricularly discerning contrivance. IDS monitors traffic and reports its results
to the administrator. However, it is not automatically possible to avert the revelation of the
exploitation system. Assailants can exploit impotence as anon as they enter the network and
debilitate the susceptibility of IDS blockers.

M1

Benefits of Peer-to-Peer Network

 Simple and very easy to install


 You only need a hub or switch that connects all your computers together
 It can be used only if the files are organized in public folders
 Even if one computer stops working, all other connected computers continue to work

Disadvantages of Peer-to-peer network

This is a network plan that connects two PCs, so one PC (client) sends a service request to
another PC called a server.

This is a computer network in which you can share specific files or folders with selected users or
with all users.

It is also common in small offices where dedicated file servers are unavailable.

 You cannot back up files and folders


 You can set a password on a file to prevent users from accessing it, as it may be slightly
less secure
 If the computer is not connected properly, the problem may be caused by the file you
are trying to access
 Each PC can be used by other users, so individual users may experience poor
performance

16
HND L3 B4 Soe Wai Yan Tun
Benefits Client Server Network

 All files are stored in a central location.


 Network security and backups are controlled externally.
 Users can access shared data.
 Security is better than other networks because you can set your own password in your
profile. Therefore, note that you can use.

Disadvantages of client-server network

 Server cost must be prepaid.


 You cannot access and use the connected computer. This is because the server is weak.

M2

Now I will explain in detail Game Shop network. I can connect Game Shop 2 room network.
Using 2nd room PC 25 and 1st room switch 1 and PC 10. I can using cashiers PC 2 and Router.
2nd room PC is many that’s why I using 2 switch. Switch1 connect PC 20 and Switch2 connect
PC 5 and then Switch2 connect to Switch1, and Switch1 connect Switch3. 1st room PC 10
connect to Switch8. This Switch8 connect to Switch 3.

M3

Business Risks

17
HND L3 B4 Soe Wai Yan Tun
A computer network is a fundamental part of any organization; this can include educational
institutes and governments. The risks associated with network arise when malicious damage
occurs; this can be from both internal and extrenal sources. Prevention methods need to be in
place to stop a network form failing and increase business continuity. The following slides will
explain the implications of implementing an insecure network in a large organization.

Loss of Business

Domestic and external hazards can cause hardware damage. For example, physical damage and
glomming of equipment. Loss of customer details requires emolument. If the product is faulty or
consummately damaged, repair the product.

Rehabilitating hardware that has been damaged due to maleficent attacks Repair or supersedes
software that was damaged in the system crash. If they include customer or employee details,
they will decline.

Loss of Confidentiality

Confidentiality is when organizations are responsible for the security of customer information.
Unless it is stored on the computer, the utilizer's details must be stored in a secure place. If
more details are stored on the computer, there must be supplemental security, such as anti-
virus software and encryption to forfend confidential information. Control access to forfend
confidential data. Controlling sensitive information is like a manager. Managers must decide
who can modify or efface sensitive information.

Security Issues

When businesses connect with their systems and computers, the quandaries of a utilizer affect
everyone in the network. Albeit there are many benefits of utilizing the network, the network
has a more preponderant potential for security issues. Security issues such as:

 Data loss
 Security breaches
 Malicious attacks such as hacking and viruses

Trojans

Trojans are software programs, initially used to combat active computer viruses via detection
and removal (search & destroy) methods. Trojan are more commonly applied online, a common
method of successfully infecting computer is by offering users a program download that
supposedly fixes virus issues but instead lnfects the computer system.

18
HND L3 B4 Soe Wai Yan Tun
Malware

The regulation is shrinking software malware. Simply put, malware is designated to ravage
contrivances. Any software is inscribed for the purport of purloining data and generally causing
discombobulation. Viruses Trojan Spyware and ransomware come in sundry types of malware.

Viruses

Viruses are different from Trojans. Because viruses are linked to something. (e.g Viruses can be
triggered by email). Viruses like worm can be done by opening an email attachment. Also,
emails can turn themselves into viruses.

Warm

The worm virus is a malevolent and self-replicating program that can spread across the network
without human assistance. Worms cause virus-like damage and viruses. Exploiting apertures in
security software and purloining sensitive information; There is a quandary with installing the
back door and other issues for file damage and remote access.

Adware

Adware is an adware that shows ads on your computer, Return your search requests to
advertising websites and give them names for programs designed to accumulate marketing
information about you.

D1

Here is a network design for a client that is very facile to follow. As you can optically discern,
between the router and the switch. I decided to utilize a high speed fiber optic cable that would
sanction high speed gear and slow haste. What I can't optically discern in my picture is the VPN.

I am already established for access to servers. Access data from other businesses without any
security issues. In additament, another paramount element for this network setup is network

19
HND L3 B4 Soe Wai Yan Tun
protocols. I establish TCP / IP that will sanction fundamental communication with all
contrivances on the Internet.It can be set up facilely because it is a TCP / IP program that can
be sent to all computers on the network. Only then will they receive each protocol. It may work
better on the main servers of a business, but workstations withal need these protocols.
Supplementally, it is a separate firewall that is hardware-predicated for deciding how to
implement it.

Albeit the computer has software firewalls, it is a safer precaution to bulwark the network. Many
businesses are threatened by hackers, so the firewall will forfend the network against hackers.
Last but not least, it is an exclusive line of business that fortifies every workstation connected to
a designated IP address for more facile monitoring of the network.

D2

Account Management

Guidance accommodations have many different areas that are responsible for controlling
different components of your network. The first thing I would verbalize is account management.
It is mainly to control utilizer accounts and determine who owns different programs.

eg, network administrators in one school have access to variants of software. Edifiers have
access to a program that includes student records. However, students will not be given the
same opportunities but will be given opportunities that will benefit their edification.

Account management is very consequential to the utilizer, This betokens that when they expire,
they can edit their account like a password.

Account Management benefits

The reason that FHS benefits from user account management is that it can be easily accessed
with computer access. This is because each user is still able to access their own account and the
files they save to their own account when they log on to a different computer. This does not
give them access to their accounts so it is easier to access their accounts.

For example, the FHS building will have seven floors and a separate computer for users to work
on. Instead, they can access any computer and make it easier for network administrators to
access users, as well as access to which files and servers can be accessed.

Account Management disadvantages

Where there are benefits, there are impuissances in the FHS industry that utilizes accounting
management. One disadvantage of utilizing account management is that clients rely entirely on
network administrators to access or access certain files and folders. Another quandary of all

20
HND L3 B4 Soe Wai Yan Tun
network administrators is that they do not sanction their users' needs, as some software may
do, which may make it arduous for the utilizer.

Authentication

Authentication is the process of determining who or what a person is or who he or she is.
Authentication determines whether a utilizer has access to categorical files or folders stored on
the network. Authentication can be carried out through the active directory of the network. An
example is when a utilizer enters a network, their details are verified through the SAM
database. The SAM database contains information about utilizer names and passwords on
accounts on the network.

Authentication Advantages and Disadvantages

One advantage of a network that utilizes authentication is that authentication obviates users
from accessing files and folders without ample sanction. It maintains the network's security and
confidentiality and integrity of the information of the network. Another advantage of
authentication is that it is especially efficacious but is very simple and ecumenical for all users.
Authentication is facile to install and facile to install.

One disadvantage of authentication on the network is that password-predicated authentication


is not as robust as multi-factor and other authentication methods. Authentication relies heavily
on customer adhesion. For example, if a utilizer gave their password to someone else, it could
have been a great threat to the network, since it could have been utilized by a third party if it
were another person. This may affect the security and confidentiality of the information stored
on or within a network.

Group Policies

Group policies are rudimentally an infrastructure. It enables network managers/administrators


to set categorical network rules for users and computers. Group Policy settings are included in
the Group Policy Objects [GPOs] associated with the following Active Directory Directory
Accommodations container. Sites: Domains or organizational units.

Group Policies Advantages and Disadvantages

The main advantage of a network that utilizes cluster policies as infrastructure is to make it
more facile to manage the network's overall management. Adscititiously, Group policies
sanction each business or network to implement policies individually. For example, a business
may set a screen to implement on all computers on the network.

21
HND L3 B4 Soe Wai Yan Tun
The disadvantage of networked group policy is that they require to be configured. This
designates that the error occurred during the establishment of the group policy. Group policies
are the main positive feature of the network. These are only minor disadvantages and can be
facilely remedied with the avail of professional management and management.

DNS

DNS [Domain Name Server] is [www.soewaiyantun.com] is domain names into IP addresses.


DNS is a protocol. As computers exchange data on the Internet and private networks, DNS
servers use TCP / IP protocols. Domain designations are encoded in alphabetical order and are
converted into an IP address that can read domain denominations. Domain designations are
more facile to recollect compared to users' IP addresses, Consequently, domain denominations
are at the front of every web address and need to be transmuted into IP addresses for reading.

DNS Advantages and Disadvantages

One advantage of DNS (Domain Name Server) is that DNS is fortified by a sizably voluminous
network of same/other DNS servers. This denotes that if a DNS server fails to transmute the
domain name to an IP address. Adscititious DNS servers can be acclimated to avail transmute
the domain name's initial DNS. Another advantage of DNS is that it avails the utilizer recollect
the web addresses. Because they require only recollect the domain designation, not the IP
address. It makes websites more expeditious and more facile for users on the Internet.

If the DNS is not opportunely configured, it can lead to DNS redirection. This betokens that
when a utilizer searches for a website and puts the domain name into their web browser, they
point to a plenarily different location. Another disadvantage of DNS is that it has security
susceptibilities that can cause networks to cause third-party threats cognate to hacking.

22

You might also like