SlideShare uma empresa Scribd logo
1 de 11
NETWORKING SYSTEMS
1
NETWORKING SYSTEMS
5
Networking System
Sarju Thapa
Dr. Stephen Gardner
East Central University
Abstract
In this report, the planning to design the network will be
discussed and demonstrated in detail. The planning to design
the network layout will be made according to the scenario given
in the requirements. The plan will be implemented by the
evaluation of the aspects that are important to design the
network and other necessary things to design and implement the
network. After implementing the network, the network will be
tested by secure communication, WAN communication Channel,
Wireless network, and PAN network. The troubleshooting of the
network will also be discussed and elaborated in detail. The
protocols used in this network will also be taken into
consideration.
Introduction
Designing a network is not a simple task for someone.
There are different phases to design the network. Each phase
has a very important role to design the network. The first phase
is to collect all the requirements to design the network. The
second phase is to evaluate the requirements to make sure that
either requirement is enough to design the network or not. After
evaluating the requirements, the third phase is to implement all
the aspects that are gathered in requirements. The fourth and
last phase after implementing the network design is to optimize
the network by performance.
Network Layout
The physical arrangement of the network is called network
layout. The network layout of the given is scenario is shown
below:
Diagram created using CISCO PACKET TRACER 7.3.0
Demonstration
This network consists of two different places one place is
headquarter which is the main point of this network and another
place is Therall which is the working point of this network.
Headquarter
In headquarter, the Executive office, R&D, Reception, Guest
office, and accounting office’s host are connected with one
switch. Twisted pair cable is used in this part of the network.
Each device directly connected with the headquarter switch.
8P8C (Actually, RJ-45 is the more common term) jack is used in
this part of the network and it is located in the reception area.
Bus topology is used in this part of the network. (I think that
what you have in your diagram is a bus-star hybrid. The switch
is the bus, the individual cables to the hosts are the star)
Thrall
In Thrall Remote, the Engineering area, production area, and
reception area’s host are connected with the switch. Twisted
pair cable is used in this part of the network. Each device
directly connected with the headquarter switch. 8P8C jack is
used in this part of the network and it is located in the reception
area. Bus topology is used in this part of the network.
For both 1 and 2: type of cable, where do you map the runs and
place the jacks (I gave you a building layout), and what is in the
telecom room, e.g., server, patch panel, demarc, router, etc?
7 points each.
Secure Communication
Communication through this network is secure because it is a
private network and has less vulnerability. An unauthorized
person cannot reach this network. The transmission control
protocol is used in this network
Sarju, this is not secure from building to building (server to
server, or really, network to network) or from an employee
home to the server (host to network). A man in the middle
attack with a packet sniffer would eat your lunch. You are still
thinking like a computer person and not like a network person.
While what you say is true, it really doesn’t secure a network.
The only way to really do what I asked is with a VPN using PPP
and either PPtP or L2TP as the security wrapper. 5 points.
T3 WAN channel helps to transmit data over the network is a
secure and reliable way. The transmission of data in this
channel is fast and accurate. The bandwidth of this network is
1000 Mbps. For long-distance, TCP/IP protocol is used.
What is a T3 WAN provide for bandwidth and speed? How is it
formed and terminated. In other words, what is a T3 and how
does it work. And, it is not secure.
Wireless network
The wireless network is set up by radio signal frequency. It
used this frequency to connect two different devices. It is very
easy to set up and configure in the network. It is fast and easy
to understand and establish. Sarju, this was supposed to be
about the wireless networks? Devices, placement, bandwidth,
discussion of 802.11, etc. I think you missed something here.
PAN
PAN stands for Personal area network. PAN is used in personal
devices and is normally connected with the higher-level network
it is normally used to provide communication between devices
like computers, mobile, and laptop. The range of the PAN
network is very small. The range is10 meters. Its frequency for
Bluetooth is between 2.4 GHz to 2.48 GHz.
You didn’t really explain your network…just told me what a
PAN is. I would have liked you to discuss ICS with DCS and
maybe PLCs. A quick bite of SCADA would be good, too.
Troubleshooting
It is a very complex task to troubleshoot the network because
sometimes the fault is a miner and does not found easily. In the
given scenario, the network will be troubleshot by check the
wired connection and by checking the router configuration.
Where would you start? Probably at the demarcs and work in. If
that was okay, you should call the ISP. Need more detail. 4
points.
OSI model
OSI stands for open system interconnection. There are seven
layers in the OSI model. Each layer is used for a specific task.
The 7 layers of OSI are described below:
· Application layer
· Presentation layer
· Session layer
· Transport layer
· Network layer
· Datalink layer
· Physical layer
What about the TCP/IP Model and encapsulation /De-
encapsulation? What is that all about? And what about using the
example of a web page to explain the process? 2 points.
Overall, a lot more detail is needed…31/100
Conclusion
In this report, the planning to design the network layout
according to the given scenario is discussed and demonstrated
in detail. Different phases to design the network are also
discussed in detail. Some optimization of the network by testing
the network are also discussed. We also implement the project
plan to design this network. We also studied and implement the
different cases on this network.
Sources:
J. K. a. K. Ross. “Computer Networking: A Top-Down
Approach Using the Internet” Addison-Wesley, 2013.
L.L. Peterson and B.S. Davie. “ Computer Networks a system
approach, Morgan Kaufmann, 2012.
B.A. Forouzan, Data Communications and Networking”, 4rd
Edition, McGraw Hill, 2007.
A.S. Tanenbaum. “Computer Networks” 4th Edition, Prentice
Hall: 2003.
2
Dr. Steve Gardner, SP2020, April 22, 2020
BONUS QUESTION SP20 MIS3613 DATA
COMMUNICATION AND COMPUTER NETWORKS
You are an electrical engineer and the IT Director of Therall
Industries, a small company that makes a very intricate high
technology device, the metapolar refractive pilfrometer for
Rockwell Industries Turboencabulator. If you wish to know
more about the device, you may watch the video at
https://www.youtube.com/watch?v=2fjcJp_Nwvk .
Your company works out of two small locations in two different
cities. The two offices, almost identical on the outside to be
easily recognizable as a Therall facility (an icon featuring the
buildings is on the company logo), are approximately 600 feet
long and 400 feet wide. The first location, Headquarters, houses
Executive Management and Research and Development
Engineering. The second, Remote, is where other engineering
and production takes place.
Therall Industries
Your boss, Tom Frantype, has asked you to, 1) develop an
internal network leading to a secure wired communication
system between the two offices, and, 2) install a wireless
network in each facility.
The facility layouts are available on the accompanying
Powerpoint Presentation and reproduced above.
Here are the exact tasks.
1. Discuss your intrabuilding networks. At Headquarters, you
will need:
a. Two hosts in the Executive offices
b. Four hosts in R&D
c. One host in Reception
d. Four hosts in Guest Offices
e. Two hosts in Accounting
f. VoIP service to each area
Layout your hosts on the diagram, being sure to discuss what
type and grade of structured cabling you will use, where the
runs will map, what jacks you will use and where they will be
located, and the physical and logical topology to be used. Also
discuss your building connection to the ISP through your
telecom room, including type of patch panels and what your
demarc looks like and where it is connected. (10 Points)
2. At Therall Remote, you will need:
a. Sixteen hosts in Engineering
b. Four hosts in each production area
c. One host in Reception
d. POTS service throughout
Layout your hosts on the diagram, being sure to discuss what
type and grade of structured cabling you will use, where the
runs will map, what jacks you will use and where they will be
located, and the physical and logical topology to be used. Also
discuss your building connection to the ISP through your
telecom room, including type of patch panels and what your
demarc looks like and where it is connected. (10 Points)
3. The secure communications channel should allow the
employees of both offices to communicate securely with each
other and the servers located at Headquarters. It should also
allow employees to work remotely using the network at either
Headquarters or Remote. What is this secure network, how it is
formed, what protocol(s)does it use, etc? Convince Tom
Frantype that you can secure it by explaining how it works. (10
points).
4. The WAN communication channel from both ISPs to the
facilities is a T3. Explain how a T3 WAN channel works, what
the available bandwidth is, what sort of communication protocol
it uses, how it might communicate over long distances
(Headquarters is in Houston, Remote is in Ada), and how it is
terminated at the demarc. (10 points).
5. Now it is time to setup the wireless network in each facility.
Explain how you will set it up, what type of communication
device you will use, what band it operates in, where the
device(s) will be positioned, and how fast the connection will
probably be and why. Don’t forget your most important wireless
connection will be at Headquarters between the receptionist and
the CEO in the Executive Suite. To make the CEO happy, that
connection needs to be fast and certain to make. (10 points).
6. At Remote, there are 6 dapoplar presserstops in Production 1,
and 7 in Production 2. These machines are controlled from a
central control booth in each room. The machines are monitored
via a PAN in each room. Explain how this PAN works,
including the communication method, the frequency, the range
of the devices, and anything else Tom Frantype may ask about
these smaller networks. Try to anticipate his questions. (10
points).
7. Oh no! Interbuilding comms are down and R&D in
Headquarters cannot talk to Engineering at Remote. Explain the
steps you would go through to troubleshoot this problem. (10
points).
8. While one of your engineers was on a chat line discussing
one of the dapoplar presserstops that was acting up with a
representative from Shadrach (the company that makes the
machine), his monitor went blank. After a few moments, a
message popped up that said, “If you want your data back, you
must send a certified check for £500,000 to Cayman National
Bank, Peter A. Tomkins Building, 200 Elgin Ave, George Town
KY1-1102, Cayman Islands”. No matter how he tried, the
engineer was unable to access the secure data folder on the
server where the Therall company proprietary manufacturing
data is kept. What has happened? Is there a way to fix this? (10
Points).
9. Wow, you have done a great job on your system! In fact, Tom
(was MISTER Frantype, but now you are on a first name basis)
was so impressed he gave you a raise and a part of the profit-
sharing bonus pool. This almost doubled your salary. Last
Friday night when you were at a barbeque at Tom and Marie’s
house in the Woodlands outside of Dallas, Tom told you, “You
know, I have heard a lot about this networking thing but I really
don’t understand how a computer forms a message, asks for a
webpage and gets the correct one, or really anything about it. It
all seems like magic to me. I said something to Fred over in
R&D and he said, ‘It’s simple, it’s all about the OSI model and
encapsulation and de-encapsulation. That explains everything.’
I must admit I felt a bit foolish asking anymore because Fred
said it was so simple. Can you explain to me what he was
talking about? What does he mean, ‘Seven layers?’, and
‘Headers and Footers’? And then he said something about
another model, the TCP/IP? Can you help me here?”
It appears staying in Frantype’s good graces is going to require
you to explain what the two models are, what they do, and how
they work. You should do that by, 1) explaining the OSI model,
and, 2) explaining the TCP/IP model by helping him understand
how a web page is requested and received, including protocols,
etc. Your new salary, in fact, your entire job, may depend on
this. Good luck. (10 points).
10. Please ensure your submission is neat and easily readable.
Do your best work. (10 points)
Thank you.
If you want a full explanation of the Turboencabulator,
including history, uses, and companies that employ it, visit
https://www.youtube.com/watch?v=kkH20fNavoI or reference
the Wikipedia article on this amazing invention.
Therall Industries
Therall Industries Headquarters
Executive Suite
Accounting
Reception
R & D Engineering
Guest Offices
Storage
Telecom Room
Brick Firewall
Therall Industries Remote
Production 2
Reception
Engineering
Production 1
Telecom Room
Therall

Mais conteúdo relacionado

Semelhante a NETWORKING SYSTEMS .docx

ComputerNetworksAssignment
ComputerNetworksAssignmentComputerNetworksAssignment
ComputerNetworksAssignment
Rebecca Patient
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
honey725342
 
Week 4_Project Part 2_DNesbit
Week 4_Project Part 2_DNesbitWeek 4_Project Part 2_DNesbit
Week 4_Project Part 2_DNesbit
David Nesbit II
 
ProjectPurposeThe purpose of this project is to provide an o.docx
ProjectPurposeThe purpose of this project is to provide an o.docxProjectPurposeThe purpose of this project is to provide an o.docx
ProjectPurposeThe purpose of this project is to provide an o.docx
woodruffeloisa
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
Erin Rivera
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]
Avijit Nath
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)
ateeq85905
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
IJARIIT
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
Vamsi Krishna Kalavala
 

Semelhante a NETWORKING SYSTEMS .docx (20)

Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
 
ComputerNetworksAssignment
ComputerNetworksAssignmentComputerNetworksAssignment
ComputerNetworksAssignment
 
Experiment no. 1,2 and assignment no.1 cn
Experiment no. 1,2 and assignment no.1 cnExperiment no. 1,2 and assignment no.1 cn
Experiment no. 1,2 and assignment no.1 cn
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
 
Week 4_Project Part 2_DNesbit
Week 4_Project Part 2_DNesbitWeek 4_Project Part 2_DNesbit
Week 4_Project Part 2_DNesbit
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
Cisco Activity
Cisco ActivityCisco Activity
Cisco Activity
 
ProjectPurposeThe purpose of this project is to provide an o.docx
ProjectPurposeThe purpose of this project is to provide an o.docxProjectPurposeThe purpose of this project is to provide an o.docx
ProjectPurposeThe purpose of this project is to provide an o.docx
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)
 
ccna presentation
ccna presentationccna presentation
ccna presentation
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
 
NTC/362 ENTIRE CLASS UOP TUTORIALS
NTC/362 ENTIRE CLASS UOP TUTORIALSNTC/362 ENTIRE CLASS UOP TUTORIALS
NTC/362 ENTIRE CLASS UOP TUTORIALS
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignment
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Netw 208 Success Begins / snaptutorial.com
Netw 208  Success Begins / snaptutorial.comNetw 208  Success Begins / snaptutorial.com
Netw 208 Success Begins / snaptutorial.com
 
Opnet tutorial
Opnet tutorialOpnet tutorial
Opnet tutorial
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
 

Mais de dohertyjoetta

NEURAL NETWORKS 3Neural NetworksName Group .docx
NEURAL NETWORKS 3Neural NetworksName Group .docxNEURAL NETWORKS 3Neural NetworksName Group .docx
NEURAL NETWORKS 3Neural NetworksName Group .docx
dohertyjoetta
 
Neo-psychoanalytic approaches to personality include theorists such .docx
Neo-psychoanalytic approaches to personality include theorists such .docxNeo-psychoanalytic approaches to personality include theorists such .docx
Neo-psychoanalytic approaches to personality include theorists such .docx
dohertyjoetta
 
Negligent Tort LiabilityPrior to beginning work on this assi.docx
Negligent Tort LiabilityPrior to beginning work on this assi.docxNegligent Tort LiabilityPrior to beginning work on this assi.docx
Negligent Tort LiabilityPrior to beginning work on this assi.docx
dohertyjoetta
 
Need to write a Research proposal for 5 to 6 pages for above top.docx
Need to write a Research proposal for 5 to 6 pages for above top.docxNeed to write a Research proposal for 5 to 6 pages for above top.docx
Need to write a Research proposal for 5 to 6 pages for above top.docx
dohertyjoetta
 
New England Journal of Public Policy Reconnecting the Brok.docx
New England Journal of Public Policy Reconnecting the Brok.docxNew England Journal of Public Policy Reconnecting the Brok.docx
New England Journal of Public Policy Reconnecting the Brok.docx
dohertyjoetta
 
Neuroscience meets cryptography ( This is the topic for research p.docx
Neuroscience meets cryptography ( This is the topic for research p.docxNeuroscience meets cryptography ( This is the topic for research p.docx
Neuroscience meets cryptography ( This is the topic for research p.docx
dohertyjoetta
 
Network Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxNetwork Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docx
dohertyjoetta
 
NETW204 Class Project This project includes three phases. .docx
NETW204 Class Project This project includes three phases. .docxNETW204 Class Project This project includes three phases. .docx
NETW204 Class Project This project includes three phases. .docx
dohertyjoetta
 
Network Design Proposal TemplateNetwork Design Proposal.docx
Network Design Proposal TemplateNetwork Design Proposal.docxNetwork Design Proposal TemplateNetwork Design Proposal.docx
Network Design Proposal TemplateNetwork Design Proposal.docx
dohertyjoetta
 
Network DesignScenarioThe Corporation Techs’ current network.docx
Network DesignScenarioThe Corporation Techs’ current network.docxNetwork DesignScenarioThe Corporation Techs’ current network.docx
Network DesignScenarioThe Corporation Techs’ current network.docx
dohertyjoetta
 
Netflix is glowing. We had a beautiful Q4,” the company preen.docx
Netflix is glowing. We had a beautiful Q4,” the company preen.docxNetflix is glowing. We had a beautiful Q4,” the company preen.docx
Netflix is glowing. We had a beautiful Q4,” the company preen.docx
dohertyjoetta
 
Nelson v. James H. Knight DDS, P.C., 834 N.W.2d 64 (Iowa 2013).docx
Nelson v. James H. Knight DDS, P.C., 834 N.W.2d 64 (Iowa 2013).docxNelson v. James H. Knight DDS, P.C., 834 N.W.2d 64 (Iowa 2013).docx
Nelson v. James H. Knight DDS, P.C., 834 N.W.2d 64 (Iowa 2013).docx
dohertyjoetta
 
Negrin 1Negrin 5Claudia NegrinProfessor Oscar GonzalezENC1.docx
Negrin 1Negrin 5Claudia NegrinProfessor Oscar GonzalezENC1.docxNegrin 1Negrin 5Claudia NegrinProfessor Oscar GonzalezENC1.docx
Negrin 1Negrin 5Claudia NegrinProfessor Oscar GonzalezENC1.docx
dohertyjoetta
 

Mais de dohertyjoetta (20)

NEURAL NETWORKS 3Neural NetworksName Group .docx
NEURAL NETWORKS 3Neural NetworksName Group .docxNEURAL NETWORKS 3Neural NetworksName Group .docx
NEURAL NETWORKS 3Neural NetworksName Group .docx
 
Neo-psychoanalytic approaches to personality include theorists such .docx
Neo-psychoanalytic approaches to personality include theorists such .docxNeo-psychoanalytic approaches to personality include theorists such .docx
Neo-psychoanalytic approaches to personality include theorists such .docx
 
Neoliberalism In what ways does the world of Oryx and Crake reflect.docx
Neoliberalism In what ways does the world of Oryx and Crake reflect.docxNeoliberalism In what ways does the world of Oryx and Crake reflect.docx
Neoliberalism In what ways does the world of Oryx and Crake reflect.docx
 
Negligent Tort LiabilityPrior to beginning work on this assi.docx
Negligent Tort LiabilityPrior to beginning work on this assi.docxNegligent Tort LiabilityPrior to beginning work on this assi.docx
Negligent Tort LiabilityPrior to beginning work on this assi.docx
 
Needs to be at least 250 words with at least 1 scholarly article wit.docx
Needs to be at least 250 words with at least 1 scholarly article wit.docxNeeds to be at least 250 words with at least 1 scholarly article wit.docx
Needs to be at least 250 words with at least 1 scholarly article wit.docx
 
Need to write a Research proposal for 5 to 6 pages for above top.docx
Need to write a Research proposal for 5 to 6 pages for above top.docxNeed to write a Research proposal for 5 to 6 pages for above top.docx
Need to write a Research proposal for 5 to 6 pages for above top.docx
 
New England Journal of Public Policy Reconnecting the Brok.docx
New England Journal of Public Policy Reconnecting the Brok.docxNew England Journal of Public Policy Reconnecting the Brok.docx
New England Journal of Public Policy Reconnecting the Brok.docx
 
Neuroscience meets cryptography ( This is the topic for research p.docx
Neuroscience meets cryptography ( This is the topic for research p.docxNeuroscience meets cryptography ( This is the topic for research p.docx
Neuroscience meets cryptography ( This is the topic for research p.docx
 
Network Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxNetwork Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docx
 
NETW204 Class Project This project includes three phases. .docx
NETW204 Class Project This project includes three phases. .docxNETW204 Class Project This project includes three phases. .docx
NETW204 Class Project This project includes three phases. .docx
 
Network forensics is considered a very hard problem for a number of .docx
Network forensics is considered a very hard problem for a number of .docxNetwork forensics is considered a very hard problem for a number of .docx
Network forensics is considered a very hard problem for a number of .docx
 
Network Design Proposal TemplateNetwork Design Proposal.docx
Network Design Proposal TemplateNetwork Design Proposal.docxNetwork Design Proposal TemplateNetwork Design Proposal.docx
Network Design Proposal TemplateNetwork Design Proposal.docx
 
Netflix’s strategy of moving to a streaming service has been widely .docx
Netflix’s strategy of moving to a streaming service has been widely .docxNetflix’s strategy of moving to a streaming service has been widely .docx
Netflix’s strategy of moving to a streaming service has been widely .docx
 
Network DesignScenarioThe Corporation Techs’ current network.docx
Network DesignScenarioThe Corporation Techs’ current network.docxNetwork DesignScenarioThe Corporation Techs’ current network.docx
Network DesignScenarioThe Corporation Techs’ current network.docx
 
Netflix is glowing. We had a beautiful Q4,” the company preen.docx
Netflix is glowing. We had a beautiful Q4,” the company preen.docxNetflix is glowing. We had a beautiful Q4,” the company preen.docx
Netflix is glowing. We had a beautiful Q4,” the company preen.docx
 
Netflix is an American media service provider founded by Reed Hastin.docx
Netflix is an American media service provider founded by Reed Hastin.docxNetflix is an American media service provider founded by Reed Hastin.docx
Netflix is an American media service provider founded by Reed Hastin.docx
 
Nelson v. James H. Knight DDS, P.C., 834 N.W.2d 64 (Iowa 2013).docx
Nelson v. James H. Knight DDS, P.C., 834 N.W.2d 64 (Iowa 2013).docxNelson v. James H. Knight DDS, P.C., 834 N.W.2d 64 (Iowa 2013).docx
Nelson v. James H. Knight DDS, P.C., 834 N.W.2d 64 (Iowa 2013).docx
 
Negrin 1Negrin 5Claudia NegrinProfessor Oscar GonzalezENC1.docx
Negrin 1Negrin 5Claudia NegrinProfessor Oscar GonzalezENC1.docxNegrin 1Negrin 5Claudia NegrinProfessor Oscar GonzalezENC1.docx
Negrin 1Negrin 5Claudia NegrinProfessor Oscar GonzalezENC1.docx
 
Needs to be 2 pages. APA format. Tie the three interpersonal concept.docx
Needs to be 2 pages. APA format. Tie the three interpersonal concept.docxNeeds to be 2 pages. APA format. Tie the three interpersonal concept.docx
Needs to be 2 pages. APA format. Tie the three interpersonal concept.docx
 
need two pages in the uploaded documents they ask about the team.docx
need two pages in the uploaded documents they ask about the team.docxneed two pages in the uploaded documents they ask about the team.docx
need two pages in the uploaded documents they ask about the team.docx
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 

NETWORKING SYSTEMS .docx

  • 1. NETWORKING SYSTEMS 1 NETWORKING SYSTEMS 5 Networking System Sarju Thapa Dr. Stephen Gardner East Central University Abstract In this report, the planning to design the network will be discussed and demonstrated in detail. The planning to design the network layout will be made according to the scenario given in the requirements. The plan will be implemented by the
  • 2. evaluation of the aspects that are important to design the network and other necessary things to design and implement the network. After implementing the network, the network will be tested by secure communication, WAN communication Channel, Wireless network, and PAN network. The troubleshooting of the network will also be discussed and elaborated in detail. The protocols used in this network will also be taken into consideration. Introduction Designing a network is not a simple task for someone. There are different phases to design the network. Each phase has a very important role to design the network. The first phase is to collect all the requirements to design the network. The second phase is to evaluate the requirements to make sure that either requirement is enough to design the network or not. After evaluating the requirements, the third phase is to implement all the aspects that are gathered in requirements. The fourth and last phase after implementing the network design is to optimize the network by performance. Network Layout The physical arrangement of the network is called network layout. The network layout of the given is scenario is shown below: Diagram created using CISCO PACKET TRACER 7.3.0 Demonstration This network consists of two different places one place is headquarter which is the main point of this network and another place is Therall which is the working point of this network. Headquarter In headquarter, the Executive office, R&D, Reception, Guest office, and accounting office’s host are connected with one
  • 3. switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C (Actually, RJ-45 is the more common term) jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network. (I think that what you have in your diagram is a bus-star hybrid. The switch is the bus, the individual cables to the hosts are the star) Thrall In Thrall Remote, the Engineering area, production area, and reception area’s host are connected with the switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network. For both 1 and 2: type of cable, where do you map the runs and place the jacks (I gave you a building layout), and what is in the telecom room, e.g., server, patch panel, demarc, router, etc? 7 points each. Secure Communication Communication through this network is secure because it is a private network and has less vulnerability. An unauthorized person cannot reach this network. The transmission control protocol is used in this network Sarju, this is not secure from building to building (server to server, or really, network to network) or from an employee home to the server (host to network). A man in the middle attack with a packet sniffer would eat your lunch. You are still thinking like a computer person and not like a network person. While what you say is true, it really doesn’t secure a network. The only way to really do what I asked is with a VPN using PPP and either PPtP or L2TP as the security wrapper. 5 points. T3 WAN channel helps to transmit data over the network is a secure and reliable way. The transmission of data in this channel is fast and accurate. The bandwidth of this network is
  • 4. 1000 Mbps. For long-distance, TCP/IP protocol is used. What is a T3 WAN provide for bandwidth and speed? How is it formed and terminated. In other words, what is a T3 and how does it work. And, it is not secure. Wireless network The wireless network is set up by radio signal frequency. It used this frequency to connect two different devices. It is very easy to set up and configure in the network. It is fast and easy to understand and establish. Sarju, this was supposed to be about the wireless networks? Devices, placement, bandwidth, discussion of 802.11, etc. I think you missed something here. PAN PAN stands for Personal area network. PAN is used in personal devices and is normally connected with the higher-level network it is normally used to provide communication between devices like computers, mobile, and laptop. The range of the PAN network is very small. The range is10 meters. Its frequency for Bluetooth is between 2.4 GHz to 2.48 GHz. You didn’t really explain your network…just told me what a PAN is. I would have liked you to discuss ICS with DCS and maybe PLCs. A quick bite of SCADA would be good, too. Troubleshooting It is a very complex task to troubleshoot the network because sometimes the fault is a miner and does not found easily. In the given scenario, the network will be troubleshot by check the wired connection and by checking the router configuration. Where would you start? Probably at the demarcs and work in. If that was okay, you should call the ISP. Need more detail. 4 points. OSI model OSI stands for open system interconnection. There are seven layers in the OSI model. Each layer is used for a specific task. The 7 layers of OSI are described below:
  • 5. · Application layer · Presentation layer · Session layer · Transport layer · Network layer · Datalink layer · Physical layer What about the TCP/IP Model and encapsulation /De- encapsulation? What is that all about? And what about using the example of a web page to explain the process? 2 points. Overall, a lot more detail is needed…31/100 Conclusion In this report, the planning to design the network layout according to the given scenario is discussed and demonstrated in detail. Different phases to design the network are also discussed in detail. Some optimization of the network by testing the network are also discussed. We also implement the project plan to design this network. We also studied and implement the different cases on this network. Sources: J. K. a. K. Ross. “Computer Networking: A Top-Down Approach Using the Internet” Addison-Wesley, 2013. L.L. Peterson and B.S. Davie. “ Computer Networks a system approach, Morgan Kaufmann, 2012. B.A. Forouzan, Data Communications and Networking”, 4rd Edition, McGraw Hill, 2007. A.S. Tanenbaum. “Computer Networks” 4th Edition, Prentice Hall: 2003.
  • 6. 2 Dr. Steve Gardner, SP2020, April 22, 2020 BONUS QUESTION SP20 MIS3613 DATA COMMUNICATION AND COMPUTER NETWORKS You are an electrical engineer and the IT Director of Therall Industries, a small company that makes a very intricate high technology device, the metapolar refractive pilfrometer for Rockwell Industries Turboencabulator. If you wish to know more about the device, you may watch the video at https://www.youtube.com/watch?v=2fjcJp_Nwvk . Your company works out of two small locations in two different cities. The two offices, almost identical on the outside to be easily recognizable as a Therall facility (an icon featuring the buildings is on the company logo), are approximately 600 feet long and 400 feet wide. The first location, Headquarters, houses Executive Management and Research and Development Engineering. The second, Remote, is where other engineering and production takes place. Therall Industries Your boss, Tom Frantype, has asked you to, 1) develop an internal network leading to a secure wired communication system between the two offices, and, 2) install a wireless network in each facility.
  • 7. The facility layouts are available on the accompanying Powerpoint Presentation and reproduced above. Here are the exact tasks. 1. Discuss your intrabuilding networks. At Headquarters, you will need: a. Two hosts in the Executive offices b. Four hosts in R&D c. One host in Reception d. Four hosts in Guest Offices e. Two hosts in Accounting f. VoIP service to each area Layout your hosts on the diagram, being sure to discuss what type and grade of structured cabling you will use, where the runs will map, what jacks you will use and where they will be located, and the physical and logical topology to be used. Also discuss your building connection to the ISP through your telecom room, including type of patch panels and what your demarc looks like and where it is connected. (10 Points) 2. At Therall Remote, you will need: a. Sixteen hosts in Engineering b. Four hosts in each production area c. One host in Reception d. POTS service throughout Layout your hosts on the diagram, being sure to discuss what type and grade of structured cabling you will use, where the runs will map, what jacks you will use and where they will be located, and the physical and logical topology to be used. Also discuss your building connection to the ISP through your telecom room, including type of patch panels and what your demarc looks like and where it is connected. (10 Points) 3. The secure communications channel should allow the employees of both offices to communicate securely with each other and the servers located at Headquarters. It should also
  • 8. allow employees to work remotely using the network at either Headquarters or Remote. What is this secure network, how it is formed, what protocol(s)does it use, etc? Convince Tom Frantype that you can secure it by explaining how it works. (10 points). 4. The WAN communication channel from both ISPs to the facilities is a T3. Explain how a T3 WAN channel works, what the available bandwidth is, what sort of communication protocol it uses, how it might communicate over long distances (Headquarters is in Houston, Remote is in Ada), and how it is terminated at the demarc. (10 points). 5. Now it is time to setup the wireless network in each facility. Explain how you will set it up, what type of communication device you will use, what band it operates in, where the device(s) will be positioned, and how fast the connection will probably be and why. Don’t forget your most important wireless connection will be at Headquarters between the receptionist and the CEO in the Executive Suite. To make the CEO happy, that connection needs to be fast and certain to make. (10 points). 6. At Remote, there are 6 dapoplar presserstops in Production 1, and 7 in Production 2. These machines are controlled from a central control booth in each room. The machines are monitored via a PAN in each room. Explain how this PAN works, including the communication method, the frequency, the range of the devices, and anything else Tom Frantype may ask about these smaller networks. Try to anticipate his questions. (10 points). 7. Oh no! Interbuilding comms are down and R&D in Headquarters cannot talk to Engineering at Remote. Explain the steps you would go through to troubleshoot this problem. (10 points).
  • 9. 8. While one of your engineers was on a chat line discussing one of the dapoplar presserstops that was acting up with a representative from Shadrach (the company that makes the machine), his monitor went blank. After a few moments, a message popped up that said, “If you want your data back, you must send a certified check for £500,000 to Cayman National Bank, Peter A. Tomkins Building, 200 Elgin Ave, George Town KY1-1102, Cayman Islands”. No matter how he tried, the engineer was unable to access the secure data folder on the server where the Therall company proprietary manufacturing data is kept. What has happened? Is there a way to fix this? (10 Points). 9. Wow, you have done a great job on your system! In fact, Tom (was MISTER Frantype, but now you are on a first name basis) was so impressed he gave you a raise and a part of the profit- sharing bonus pool. This almost doubled your salary. Last Friday night when you were at a barbeque at Tom and Marie’s house in the Woodlands outside of Dallas, Tom told you, “You know, I have heard a lot about this networking thing but I really don’t understand how a computer forms a message, asks for a webpage and gets the correct one, or really anything about it. It all seems like magic to me. I said something to Fred over in R&D and he said, ‘It’s simple, it’s all about the OSI model and encapsulation and de-encapsulation. That explains everything.’ I must admit I felt a bit foolish asking anymore because Fred said it was so simple. Can you explain to me what he was talking about? What does he mean, ‘Seven layers?’, and ‘Headers and Footers’? And then he said something about another model, the TCP/IP? Can you help me here?” It appears staying in Frantype’s good graces is going to require you to explain what the two models are, what they do, and how they work. You should do that by, 1) explaining the OSI model, and, 2) explaining the TCP/IP model by helping him understand how a web page is requested and received, including protocols,
  • 10. etc. Your new salary, in fact, your entire job, may depend on this. Good luck. (10 points). 10. Please ensure your submission is neat and easily readable. Do your best work. (10 points) Thank you. If you want a full explanation of the Turboencabulator, including history, uses, and companies that employ it, visit https://www.youtube.com/watch?v=kkH20fNavoI or reference the Wikipedia article on this amazing invention. Therall Industries Therall Industries Headquarters Executive Suite Accounting Reception R & D Engineering Guest Offices Storage Telecom Room Brick Firewall Therall Industries Remote Production 2