Comprehensive Data Communication Network Analysis for StarTech
VerifiedAdded on 2022/12/30
|19
|5012
|52
Report
AI Summary
This report provides a comprehensive analysis of data communication for StarTech, a skill-based training institute. It begins by identifying issues such as data breaches, inconsistent data, and unauthorized software downloads, and proposes networking solutions to address these challenges. The report outlines a network design, including a logical network diagram detailing the number of systems, administrative staff, and IT department resources. It specifies cabling requirements, primarily using coaxial cables, and explains the functionality of network infrastructure devices such as switches, routers, and LAN cards. The report also covers IPv4 addressing, methods for address acquisition, and identifies essential network services. Furthermore, it suggests network monitoring tools and addresses potential security issues, including distinct levels of protection. The conclusion summarizes the benefits of the proposed networking solutions for StarTech.

Data Communications
Table of Contents
Table of Contents
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Introduction......................................................................................................................................1
Task 1...............................................................................................................................................1
a. Will networking resolve the issues faced via StarTech......................................................1
b. Provide the network solution that will lead them to resolve the problems of StarTech.....2
Task 2...............................................................................................................................................3
a. Logical network diagram....................................................................................................3
b. Illustrate the cabling requirements of the diagram.............................................................4
c. Explicate different infrastructure devices along with their functioning and its need for
StarTech..................................................................................................................................5
d. Identify two peculiar products............................................................................................8
Task 3...............................................................................................................................................9
a. Illustrate the Ipv4 addressing used within logical groupings.............................................9
b. Specify the methods that will be utilised by devices for acquisition of addresses.............9
Task 4.............................................................................................................................................10
Identification of 5 services for StarTech to run on network and specify why this is relevant10
Task 5.............................................................................................................................................10
Specify network monitoring tool and explicate what it do...................................................10
Task 6.............................................................................................................................................12
Identify three probable security issues that will be faced via StarTech and specify distinct
levels of protection...............................................................................................................12
Conclusion.....................................................................................................................................14
References......................................................................................................................................15
Task 1...............................................................................................................................................1
a. Will networking resolve the issues faced via StarTech......................................................1
b. Provide the network solution that will lead them to resolve the problems of StarTech.....2
Task 2...............................................................................................................................................3
a. Logical network diagram....................................................................................................3
b. Illustrate the cabling requirements of the diagram.............................................................4
c. Explicate different infrastructure devices along with their functioning and its need for
StarTech..................................................................................................................................5
d. Identify two peculiar products............................................................................................8
Task 3...............................................................................................................................................9
a. Illustrate the Ipv4 addressing used within logical groupings.............................................9
b. Specify the methods that will be utilised by devices for acquisition of addresses.............9
Task 4.............................................................................................................................................10
Identification of 5 services for StarTech to run on network and specify why this is relevant10
Task 5.............................................................................................................................................10
Specify network monitoring tool and explicate what it do...................................................10
Task 6.............................................................................................................................................12
Identify three probable security issues that will be faced via StarTech and specify distinct
levels of protection...............................................................................................................12
Conclusion.....................................................................................................................................14
References......................................................................................................................................15

Introduction
Data communication is defined as exchange of information among source as well as
receiver through the usage of transmission media like wire cable. Here, the device that is liable
for transmitting data is referred to as source as well as device that will attain the transmitted data
is defined as receiver. The rationale of data communication is to transmit data as well as
maintain data but information will not be generated at neither of the entities (Alshamsi and
Diabat, 2015). Basically, this involves the process of utilisation of computing along with distinct
computing technologies for transmission of data from one to another place among distinct
participating parties. To acknowledge the concept of data communication, StarTech is
considered that is skill based training institute and provides different computing training
programmes for the students. The report will provide an insight into distinct networking concepts
with reference to the organisation so that problems that are faced by them can be resolved.
Furthermore, the logical diagram will be presented, their cabling needs, infrastructure devices
and two specific products that will be used by them. In addition to this, the Ipv4 addressing will
be specified, network services, its monitoring and their security aspects will also be identified.
Task 1
a. Will networking resolve the issues faced via StarTech
The issues that are being encountered via StarTech comprises that details of different
entities of the organisation are present within the PCs. It is identified that distinct instances
associated with data breach have occurred in past which further leads to data inconsistencies. In
addition to this, they are even not able to monitor printing quota for their resources. Different
unlicensed software are downloaded on the system as well as malicious websites are also
accessed. These are the issues faced by StarTech, it is important that these aspects are resolved
through which problems can be handled affirmatively and accordingly they can deliver their
liabilities. The firm is looking forward to opt for networking solutions (Botton and et. al., 2013).
The exchange of ideas along with information in between people that have identical profession
along with special interest. This will lead to enhance awareness associated with trends in the
same field. Basically, different devices can be connected with multiple devices for sharing the
information
Data communication is defined as exchange of information among source as well as
receiver through the usage of transmission media like wire cable. Here, the device that is liable
for transmitting data is referred to as source as well as device that will attain the transmitted data
is defined as receiver. The rationale of data communication is to transmit data as well as
maintain data but information will not be generated at neither of the entities (Alshamsi and
Diabat, 2015). Basically, this involves the process of utilisation of computing along with distinct
computing technologies for transmission of data from one to another place among distinct
participating parties. To acknowledge the concept of data communication, StarTech is
considered that is skill based training institute and provides different computing training
programmes for the students. The report will provide an insight into distinct networking concepts
with reference to the organisation so that problems that are faced by them can be resolved.
Furthermore, the logical diagram will be presented, their cabling needs, infrastructure devices
and two specific products that will be used by them. In addition to this, the Ipv4 addressing will
be specified, network services, its monitoring and their security aspects will also be identified.
Task 1
a. Will networking resolve the issues faced via StarTech
The issues that are being encountered via StarTech comprises that details of different
entities of the organisation are present within the PCs. It is identified that distinct instances
associated with data breach have occurred in past which further leads to data inconsistencies. In
addition to this, they are even not able to monitor printing quota for their resources. Different
unlicensed software are downloaded on the system as well as malicious websites are also
accessed. These are the issues faced by StarTech, it is important that these aspects are resolved
through which problems can be handled affirmatively and accordingly they can deliver their
liabilities. The firm is looking forward to opt for networking solutions (Botton and et. al., 2013).
The exchange of ideas along with information in between people that have identical profession
along with special interest. This will lead to enhance awareness associated with trends in the
same field. Basically, different devices can be connected with multiple devices for sharing the
information
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

The networking solution will aid them within addressing requirements of the organisation
in an adequate way. StarTech can attain significant benefits through the utilisation of networking
solution. They are specified beneath: Security breach: The security benefits can be attained from hackers and threats that have
the ability to access confidential information Installation of software: The systems can be monitored as well as certain restrictions can
be added by making use of software such as firewall so that unauthenticated or any
software is not downloaded without the prior permissions from the admin (De Rosa and
et. al, 2013). Malicious website: By making use of firewall certain websites can be blocked which
implies that threat of virus can be avoided and they will be blocked. In case if any
unauthenticated or unauthorised activity is carried out on the system then pop up will
arise.
b. Provide the network solution that will lead them to resolve the problems of StarTech
It is identified that organisation has stored information on their personal system. This
involves data related with trainer, students and staff along with sensitive data of the StarTech.
The major problem that was faced via organisation was that they were not able to track overall
printing quota, downloading unlicensed software and access to malicious website. This means
that they need to have LAN network through which they can maintain the record of all the
transactions that are being carried out. In addition to this, for maintaining the security, firewall
can be utilised so that unnecessary request for accessing the information can be blocked. In
context of access to the malicious website the firm can block those websites as this will allow
them to prevent malicious attack on their network (Demuth and et. al, 2014). Moreover, to
prevent different security concerns, depending upon the levels of the employees they can make
use of different access controls so that only restricted number of people can have access to the
confidential information. Furthermore, the network must be monitored even DMZ security can
be utilised along with ISO standards for protecting systems of the StarTech. The rationale behind
doing so is that even in case one system is compromised then intruder do not get access to the
entire network. In this manner, firm will be able to resolve the different problems with the usage
of network solutions.
in an adequate way. StarTech can attain significant benefits through the utilisation of networking
solution. They are specified beneath: Security breach: The security benefits can be attained from hackers and threats that have
the ability to access confidential information Installation of software: The systems can be monitored as well as certain restrictions can
be added by making use of software such as firewall so that unauthenticated or any
software is not downloaded without the prior permissions from the admin (De Rosa and
et. al, 2013). Malicious website: By making use of firewall certain websites can be blocked which
implies that threat of virus can be avoided and they will be blocked. In case if any
unauthenticated or unauthorised activity is carried out on the system then pop up will
arise.
b. Provide the network solution that will lead them to resolve the problems of StarTech
It is identified that organisation has stored information on their personal system. This
involves data related with trainer, students and staff along with sensitive data of the StarTech.
The major problem that was faced via organisation was that they were not able to track overall
printing quota, downloading unlicensed software and access to malicious website. This means
that they need to have LAN network through which they can maintain the record of all the
transactions that are being carried out. In addition to this, for maintaining the security, firewall
can be utilised so that unnecessary request for accessing the information can be blocked. In
context of access to the malicious website the firm can block those websites as this will allow
them to prevent malicious attack on their network (Demuth and et. al, 2014). Moreover, to
prevent different security concerns, depending upon the levels of the employees they can make
use of different access controls so that only restricted number of people can have access to the
confidential information. Furthermore, the network must be monitored even DMZ security can
be utilised along with ISO standards for protecting systems of the StarTech. The rationale behind
doing so is that even in case one system is compromised then intruder do not get access to the
entire network. In this manner, firm will be able to resolve the different problems with the usage
of network solutions.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Task 2
a. Logical network diagram
The virtual illustration of network which appears to their users as a separate as well as
self-contained network that might be either a larger portion or may be a local area network is
defined as logical network.
The network diagram with respect to StarTech is illustrated above. The diagram clearly
specifies the distinct components or entities who will be in the network with the rationale to
eliminate issues that are being faced by the organisation on the whole. The aspects associated
with logical diagram are specified beneath:
a. Logical network diagram
The virtual illustration of network which appears to their users as a separate as well as
self-contained network that might be either a larger portion or may be a local area network is
defined as logical network.
The network diagram with respect to StarTech is illustrated above. The diagram clearly
specifies the distinct components or entities who will be in the network with the rationale to
eliminate issues that are being faced by the organisation on the whole. The aspects associated
with logical diagram are specified beneath:

It is identified that StarTech have near around 200 students and have opted for different
courses. The firm have 4 labs with capacity of 30 systems, this implies total 120 systems
in labs. They have been clearly specified within the network design.
10 admin employees are there and each have their own system for carrying out their
operations in an appropriate way.
2 systems are utilised within the IT department in order to ensure that department is able
to address as well as monitor the activities that are carried out within the network.
Furthermore, there is a system with director along with attached printer.
The different systems as per the specifications are clearly illustrated and they are
connected with one other through the usage of different cables. In this case, it is copper wire that
are connected with the Fasteth (fastethernet) so that communication can take place among
different entities accordingly. In addition to this, the devices are connected with the switches and
router so that they ca routed with reference to packet and IP address that is being mentioned
within the respective package.
b. Illustrate the cabling requirements of the diagram
The networking hardware that are being utilised for connecting one network device with
the other devices or connect with different systems, scanners, printers, etc. is defined as network
cable. These cables are utilised for connecting and transferring information along with data
among routers, SAN (storage area network), computers an switches. They acts as a media or
carrier via which information flows. There are different types of communication or network
cables that are being utilised within the network designing. The three main types of networking
cables are specified beneath: Fiber optic cable: These comprises of bundle of glass threads each of them is liable for
transmission of messages that are modulated on the light waves. This involves complex
design along with structure and this have outer optical casing that comprises of traps at
central core. They have proved useful with respect to the WAN (wide area network)
installation when outdoor or underground cable are required within the office builds
when higher volume of communication is required (Farahani and et. al, 2013). Twisted pair cable: It is ordinary wiring that is liable for connecting home as well as
different business computers with telephone organisation. In this case two different
courses. The firm have 4 labs with capacity of 30 systems, this implies total 120 systems
in labs. They have been clearly specified within the network design.
10 admin employees are there and each have their own system for carrying out their
operations in an appropriate way.
2 systems are utilised within the IT department in order to ensure that department is able
to address as well as monitor the activities that are carried out within the network.
Furthermore, there is a system with director along with attached printer.
The different systems as per the specifications are clearly illustrated and they are
connected with one other through the usage of different cables. In this case, it is copper wire that
are connected with the Fasteth (fastethernet) so that communication can take place among
different entities accordingly. In addition to this, the devices are connected with the switches and
router so that they ca routed with reference to packet and IP address that is being mentioned
within the respective package.
b. Illustrate the cabling requirements of the diagram
The networking hardware that are being utilised for connecting one network device with
the other devices or connect with different systems, scanners, printers, etc. is defined as network
cable. These cables are utilised for connecting and transferring information along with data
among routers, SAN (storage area network), computers an switches. They acts as a media or
carrier via which information flows. There are different types of communication or network
cables that are being utilised within the network designing. The three main types of networking
cables are specified beneath: Fiber optic cable: These comprises of bundle of glass threads each of them is liable for
transmission of messages that are modulated on the light waves. This involves complex
design along with structure and this have outer optical casing that comprises of traps at
central core. They have proved useful with respect to the WAN (wide area network)
installation when outdoor or underground cable are required within the office builds
when higher volume of communication is required (Farahani and et. al, 2013). Twisted pair cable: It is ordinary wiring that is liable for connecting home as well as
different business computers with telephone organisation. In this case two different
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

insulated wires will be utilised that are within the twisted pattern as well as runs in
parallel with one other with rationale to decline electromagnetic or crosstalk induction
among pairs of wires. Generally, there are two types of twisted pair cables they are
shielded and unshielded that are accountable for different functioning. In case of shielded
that is STP, it is used within token ring network and on the other hand UTP (unshielded
twisted pair) can be utilised with reference to ethernet networks. The generally used
cables are cat7, cat5e, cat6a cables and many more.
Coaxial cable:This is also known as coax cable and is kind of copper cable that
comprises of inner conductor which is further surrounded with certain foam insulation
that is wrapped symmetrically via woven braided metal shield and further covered with
plastic jacket. These cables acts like a high-frequency transmission cable that comprises
of single solid copper core in comparison to the twisted pair cable. This is usually 80
times faster or have high capability and is generally utilised within connecting radio
transmitters as well as receivers with network connections, television signals and
antennas.
With reference to StarTech, coaxial cable will be used that is kind of copper wire. The
benefits that can be used by respective organisation through the usage of such kind of cabling as
it will provide them with higher levels of bandwidth, easy installation, easy to locate, power
(they provides power as they are metallic), rugged and resistant. The StarTech will have cabling
facilities from FirstMile supplier who delivers their services in UK and the approximate cost will
be $150.
c. Explicate different infrastructure devices along with their functioning and its need for
StarTech
Network infrastructure devices refers to the components of network that are liable for
transporting interaction that required for applications, services, data along with multi-media.
Basically, they are software and hardware resources within the network that provides network
connectivity, interaction, functionalities along with management of network of the organisation
(Kim, 2014). With reference to StarTech the network infrastructure entities are specified
beneath:
Networking hardware
parallel with one other with rationale to decline electromagnetic or crosstalk induction
among pairs of wires. Generally, there are two types of twisted pair cables they are
shielded and unshielded that are accountable for different functioning. In case of shielded
that is STP, it is used within token ring network and on the other hand UTP (unshielded
twisted pair) can be utilised with reference to ethernet networks. The generally used
cables are cat7, cat5e, cat6a cables and many more.
Coaxial cable:This is also known as coax cable and is kind of copper cable that
comprises of inner conductor which is further surrounded with certain foam insulation
that is wrapped symmetrically via woven braided metal shield and further covered with
plastic jacket. These cables acts like a high-frequency transmission cable that comprises
of single solid copper core in comparison to the twisted pair cable. This is usually 80
times faster or have high capability and is generally utilised within connecting radio
transmitters as well as receivers with network connections, television signals and
antennas.
With reference to StarTech, coaxial cable will be used that is kind of copper wire. The
benefits that can be used by respective organisation through the usage of such kind of cabling as
it will provide them with higher levels of bandwidth, easy installation, easy to locate, power
(they provides power as they are metallic), rugged and resistant. The StarTech will have cabling
facilities from FirstMile supplier who delivers their services in UK and the approximate cost will
be $150.
c. Explicate different infrastructure devices along with their functioning and its need for
StarTech
Network infrastructure devices refers to the components of network that are liable for
transporting interaction that required for applications, services, data along with multi-media.
Basically, they are software and hardware resources within the network that provides network
connectivity, interaction, functionalities along with management of network of the organisation
(Kim, 2014). With reference to StarTech the network infrastructure entities are specified
beneath:
Networking hardware
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Switches
Routers
Cables
LAN cards Servers
Basis Functionalities Reasons for choosing
Switches Store and forward
Cut through (verifies the packet
header before forwarding it)
Fragment free (preserves both the
functions above)
Adaptive switching (depending on
traffic conditions)
Each packet will be verified
before it is routed to the
system.
Collisions will be identified
in initial 64 bytes of packet
while addressing details will
be stored
Routers High speed internet connectivity
Users can configure port
Route traffic
Redundancy is provided within the
master & slave mode
Furnish distinct paths for forwarding
data
Renders fast rate for data
transmission as this makes
use of higher STM links to
have connectivity
Access restrictions are
provided which means that
all the users can not have
access to the information
Cables Transfer and connect information
among different devices
Different cables are available that
can be used as per topology as well
as structure of entire system
architecture
Provides fast internet and also
reliable connectivity
Network can be developed
Messages can be transmitted
Communication can occur
among different entities of
the StarTech
Routers
Cables
LAN cards Servers
Basis Functionalities Reasons for choosing
Switches Store and forward
Cut through (verifies the packet
header before forwarding it)
Fragment free (preserves both the
functions above)
Adaptive switching (depending on
traffic conditions)
Each packet will be verified
before it is routed to the
system.
Collisions will be identified
in initial 64 bytes of packet
while addressing details will
be stored
Routers High speed internet connectivity
Users can configure port
Route traffic
Redundancy is provided within the
master & slave mode
Furnish distinct paths for forwarding
data
Renders fast rate for data
transmission as this makes
use of higher STM links to
have connectivity
Access restrictions are
provided which means that
all the users can not have
access to the information
Cables Transfer and connect information
among different devices
Different cables are available that
can be used as per topology as well
as structure of entire system
architecture
Provides fast internet and also
reliable connectivity
Network can be developed
Messages can be transmitted
Communication can occur
among different entities of
the StarTech

Devices can be connected within the
network
LAN cards Acts like a interface among
computer as well as network
Accountable for converting address
within electrical signal which in turn
is sent to web server via cables.
Signals received from LAN card
will be displayed as data in the PC.
When user needs a web page
then LAN card will have data
from device of user and then
this will be sent on the server
on internet.
Networking Software
Operating system Firewall
Basis Functionalities Reasons for choosing
Operating system Security
Control on the system
performance
Job accounting
Error detection aids
Coordination among users and
software
Memory and processor
management
Without operating
system users cannot
interact with the device
Firewall Prevent useful information from
getting leaked
Control data traffic
Record activities of the user
Protect from alterations from any
other party information
StarTech will have the
option of packet
filtering
Stateful inspection
Acts as an application
proxy also referred to
network
LAN cards Acts like a interface among
computer as well as network
Accountable for converting address
within electrical signal which in turn
is sent to web server via cables.
Signals received from LAN card
will be displayed as data in the PC.
When user needs a web page
then LAN card will have data
from device of user and then
this will be sent on the server
on internet.
Networking Software
Operating system Firewall
Basis Functionalities Reasons for choosing
Operating system Security
Control on the system
performance
Job accounting
Error detection aids
Coordination among users and
software
Memory and processor
management
Without operating
system users cannot
interact with the device
Firewall Prevent useful information from
getting leaked
Control data traffic
Record activities of the user
Protect from alterations from any
other party information
StarTech will have the
option of packet
filtering
Stateful inspection
Acts as an application
proxy also referred to
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Transport layer filtering (circuit
level)
as application level
gateway
Networking services
IP addressing Wireless protocols
Basis Functionalities Reasons for choosing
IP addressing Provide legitimate addresses
for network
Routing and encapsulation of
data packets around distinct IP-
based networks
Identify computer hosts
Network or host interface
identification
Location addressing
Wireless protocols Access information on mobile
wireless networking
WAP gateway is accountable
for translating request within
conventional HTTP URL and
this will be sent over internet
Renders fast connection,
suspension along with
reconnection
Provides data privacy,
authentication and
integrity
d. Identify two peculiar products
Switch
Product Prices Supplier
Cisco Catalyst 9200L $1311 Netgear
Cisco Catalyst 9500 $12082.79 Netgear
Router
Product Prices Supplier
level)
as application level
gateway
Networking services
IP addressing Wireless protocols
Basis Functionalities Reasons for choosing
IP addressing Provide legitimate addresses
for network
Routing and encapsulation of
data packets around distinct IP-
based networks
Identify computer hosts
Network or host interface
identification
Location addressing
Wireless protocols Access information on mobile
wireless networking
WAP gateway is accountable
for translating request within
conventional HTTP URL and
this will be sent over internet
Renders fast connection,
suspension along with
reconnection
Provides data privacy,
authentication and
integrity
d. Identify two peculiar products
Switch
Product Prices Supplier
Cisco Catalyst 9200L $1311 Netgear
Cisco Catalyst 9500 $12082.79 Netgear
Router
Product Prices Supplier
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

X10AD7200 Smart
WiFi Router
$90 Netgear
D-Link AC 2600 Wi-Fi
Router
$60 D-Link
Task 3
a. Illustrate the Ipv4 addressing used within logical groupings
The numerical illustration which uniquely identifies peculiar interface within the network
is referred to as internet protocol (IP) address. This illustrates set of requirements as well as
standards for creation and transmission of datagrams or data within the entire network. With
reference to StarTech, IPv4 addressing is being utilised which is a 32 bit format and here each
digit section comprises of three digit number means there 2^32 systems that can be connected
within the network. In addition to this the class C IP addressing scheme will be utilised and here
the IP address is 192.168.1.1. At present scenario the organisation have 143 systems that are
available with them thus the range of the IP addresses will be 192.168.1.255 (2^n >= number of
systems that will be in the network, 2^>= 143). This also implies that there is a probability to add
new systems in the network which means that they can expand their functionalities.
b. Specify the methods that will be utilised by devices for acquisition of addresses
StarTech have the option to make use of static as well as dynamic allocation of the IP
addresses. With reference to this, these methods are illustrated below:
Static: The IP addresses are assigned in statistical manner to the system. The network
administrator is accountable for configuring IP addresses through default gateway as
well as name servers in manual manner by entering them within the files that are present
on the system via graphical interface. But this leads to creation of heavy burden on the
administrator when network gets large.
Dynamic: Here, IP addresses are assigned in the dynamic manner to end systems and
this leads to relieve administrator within manual assignment of the addresses to each
network (Larsen and Urry, 2016). Rather than this administrator have to assign addresses
WiFi Router
$90 Netgear
D-Link AC 2600 Wi-Fi
Router
$60 D-Link
Task 3
a. Illustrate the Ipv4 addressing used within logical groupings
The numerical illustration which uniquely identifies peculiar interface within the network
is referred to as internet protocol (IP) address. This illustrates set of requirements as well as
standards for creation and transmission of datagrams or data within the entire network. With
reference to StarTech, IPv4 addressing is being utilised which is a 32 bit format and here each
digit section comprises of three digit number means there 2^32 systems that can be connected
within the network. In addition to this the class C IP addressing scheme will be utilised and here
the IP address is 192.168.1.1. At present scenario the organisation have 143 systems that are
available with them thus the range of the IP addresses will be 192.168.1.255 (2^n >= number of
systems that will be in the network, 2^>= 143). This also implies that there is a probability to add
new systems in the network which means that they can expand their functionalities.
b. Specify the methods that will be utilised by devices for acquisition of addresses
StarTech have the option to make use of static as well as dynamic allocation of the IP
addresses. With reference to this, these methods are illustrated below:
Static: The IP addresses are assigned in statistical manner to the system. The network
administrator is accountable for configuring IP addresses through default gateway as
well as name servers in manual manner by entering them within the files that are present
on the system via graphical interface. But this leads to creation of heavy burden on the
administrator when network gets large.
Dynamic: Here, IP addresses are assigned in the dynamic manner to end systems and
this leads to relieve administrator within manual assignment of the addresses to each
network (Larsen and Urry, 2016). Rather than this administrator have to assign addresses

and with reference to server, the administrator illustrate address pools along with
additional parameters that must be set to host that involves name server, default gateway
and many other information through which it will become easy to render necessary
information. With reference to this, the different address assignment protocols that can
be utilised by IT department of StarTech are Boot Protocol, resolution protocol and
dynamic host configuration protocol (DHCP). They all are accountable for assigning
automatic addresses to the devices that are present within the network.
Task 4
Identification of 5 services for StarTech to run on network and specify why this is relevant
There are different services that are being carried out within the network that enables
organisation to deliver their functionalities in a relevant manner. They are specified beneath:
Background services: These services are accountable for performing operations which
are directly not specified or noticed via a user. For an instance if any application is utilises any
service for compacting their storage space then this is referred to as background service. In
context of StarTech, the five different background services are: allocation of IP addresses,
processing of payments, user authentication, DHCP, DNS and security concepts. These services
are implemented within the background through which relevant functionalities are being
conducted in the network (Mulde and Dekker, 2014). This will aid within delivering precise
information.
Foreground services: They are accountable for performing certain operations that will be
noticed via user. In this case, notifications can be displayed with reference to this they (users) are
aware about what services are executing within the system. The services that are carried out
within the network of StarTech are: email, login details, pop up message for approval,
verification of the details and chatbox. These are the services that are being delivered to the users
and these can be seen by them as well as accordingly they can revert back.
Task 5
Specify network monitoring tool and explicate what it do
The usage of system that is accountable for continuously monitoring computer network
for failing or slow components as well as is liable for notifying network administrator in case of
any kind of outages or certain troubles is referred to as network monitoring. This is the section of
additional parameters that must be set to host that involves name server, default gateway
and many other information through which it will become easy to render necessary
information. With reference to this, the different address assignment protocols that can
be utilised by IT department of StarTech are Boot Protocol, resolution protocol and
dynamic host configuration protocol (DHCP). They all are accountable for assigning
automatic addresses to the devices that are present within the network.
Task 4
Identification of 5 services for StarTech to run on network and specify why this is relevant
There are different services that are being carried out within the network that enables
organisation to deliver their functionalities in a relevant manner. They are specified beneath:
Background services: These services are accountable for performing operations which
are directly not specified or noticed via a user. For an instance if any application is utilises any
service for compacting their storage space then this is referred to as background service. In
context of StarTech, the five different background services are: allocation of IP addresses,
processing of payments, user authentication, DHCP, DNS and security concepts. These services
are implemented within the background through which relevant functionalities are being
conducted in the network (Mulde and Dekker, 2014). This will aid within delivering precise
information.
Foreground services: They are accountable for performing certain operations that will be
noticed via user. In this case, notifications can be displayed with reference to this they (users) are
aware about what services are executing within the system. The services that are carried out
within the network of StarTech are: email, login details, pop up message for approval,
verification of the details and chatbox. These are the services that are being delivered to the users
and these can be seen by them as well as accordingly they can revert back.
Task 5
Specify network monitoring tool and explicate what it do
The usage of system that is accountable for continuously monitoring computer network
for failing or slow components as well as is liable for notifying network administrator in case of
any kind of outages or certain troubles is referred to as network monitoring. This is the section of
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 19
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




