Data Communications - Sample Assignment

Added on - 21 Feb 2021

  • 17

    Pages

  • 4086

    Words

  • 17

    Views

  • 0

    Downloads

Trusted by +2 million users,
assist thousands of students everyday
Showing pages 1 to 4 of 17 pages
Data Communications
TABLE OF CONTENTSTASK 1............................................................................................................................................1a) Are Startech correct in this belief that networking will address their issues...........................1b) What network solution would address each of their problems...............................................1TASK 2............................................................................................................................................2a) Logical network diagram.........................................................................................................2b) Identify types of cables used and provide its rough cost.........................................................2c) Explain each infrastructure device and its function.................................................................3d) Identify two products that could have been used for each infrastructure device....................4TASK 3............................................................................................................................................4a) Actual address and range used in IPv4....................................................................................4b) Methods used by devices to acquire their address..................................................................5TASK 4............................................................................................................................................5Identify at least 5 appropriate services for organisation to run on their network........................5TASK 5............................................................................................................................................7Identify one networking monitoring tool that Startech can use to ensure that network continueto perform effectively..................................................................................................................7TASK 6..........................................................................................................................................11Identify three possible issues that Startech will face and how they can provide appropriateprotection...................................................................................................................................11REFERENCES..............................................................................................................................14
TASK 1a) Are Startech correct in this belief that networking will address their issuesNow days the Computer Network is the fastest and reliable way of sharing information,educational data study material within the institute. The benefits of computer network:-The computer network is help to share the notes and information on network and thestudent and staff can easily access the content from the network. The computer networksimprove the communication between the staff and students. It provides multiple access tomultiple user so that they can use data at same using a single network.It also provides centralized storage data system through this system all user like admin,staff and students use centralised server (Bi and et.al.,2015).In computer network we use the firewall to prevent unauthorized access andBlockDownloading Unlicensed Softwarethe unlicensed software increase the malware and data lossrisk on network,Block Malicious websitesit install malware in you device in other it gather youconfidential information and gain total access to your machine and many tool able to preventfrom the this type issue they are anti-malware, anti-spyware, firewall and IDS and regular updatethe security patch to preventing for all issue.The network technology provide the wireless technology the wireless technology allowthe access and communicate while in the move, you don’t need extra cables or adaptors to accessthe network this technology is cost saving and easy to install.In this technology unauthorizedWi-Fi accessAre most common issue to prevent this issuewe provide the user name and password to all users for access the Wi-Fi with the data limit andaccess permission that mean the student access only educational sites or block any type ofdownloading, staff allow to access all sites and downloading.b) What network solution would address each of their problemsData breach problem could be solved by using a good password policy such as by keepingan unpredictable and complex passwords (Shariatmadariand et.al.,2015). Updating theoperating systems and application software also prevents data breach threats. Using firewallcould be the first step for defence in network security. Malicious attacks can be prevented bykeeping local firewall on all the time. Use of antivirus, anti-malware or anti spyware couldcontinuously monitor or protect server and prevent stealing and destroying data assets frommalicious programs. Continuously auditing and analysing suspicious activities could prevent1
future serious data breach problems.Networking prevents unauthorized software downloading through rule based softwarerestrictions. This rule has two main components one is identification of the software andsoftware authorization status. There are basically four rules to restrict and permit an applicationare hash rule, certificate rule, path rule and internet zone rule.Hash ruleThis policy of software restriction calculates a files hash either by MD5 hash algorithm or securehash algorithm and thus assign software restriction policyCertificate ruleThis rule can only be applied to windows installer packages and scripts and not beapplicable in DLL or EXE file extensions.Path rulePath rule either grant access or deny access to a program.Internet zone ruleThis rule either allows or disallows user to run the software.2
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document