CN Sample
CN Sample
Student Name :
NCC Education ID Number :
Unit : Computer Network
Qualification : Level 4 Diploma in Computing
Center : Twinkle University (Yangon, Myanmar)
Total Words Count :
Table of Contents
Task 1 – Plaining a Network 2
Physical Topology 2
Illustration & justification of recommended logical topology 2
UDP traffic of VoIP/Video conferencing and about monitoring software of
network traffic 3
Task 2 – Wireless Network 3
Mesh Network 3
Justification of WiFi6 (802.11ax) 4
Discussion of Site survey for installing of wireless access 4
Identify two Benefits of installing PoE enabled access points 5
Task 3 – Design the Network 5
Network Physical Cabling 6
Identify security consideration and assumption 6
Task 4 – Secure the Network 7
Network Threats 7
Four Advantages of implementing a VPN 7
Task 5 – Network Operating System 8
operating system for file sharing, DNS and DHCP services 8
The purpose of Cisco IOS 8
Task 6 – Network Recommendation 9
Summarizing network scalability for growth of Gotham City College 9
Identifying three key aspect of network design for common threat 9
Three recommendations for a minimum of 3 years to make ensure the
network 9
Discussing IoT Devices on the network and three risk of its 10
References 11
Page 1 of 12
Task 1 – Plaining a Network
Physical Topology
Physical topology refers the structure or layout that is interconnected to network physical media
devices (links and node) on the network. Mainly physical topologies are the following:
⮚ Bus Topology: All network devices are connected by using single transmission medium
such as series. It is also known as linear bus. There are multiple points that is connected
through the single backbone cable. Both edges of Its backbone cable are terminated for
signal bounce. If the common backbone cable fail, the whole network system will break
down.
⮚ Ring Topology: All network devices are connected through single common cable such a
circle/ring. It is also known as ring network. There is not beginning and end and does not
need terminator. If a device or common backbone cable is broken in the ring topology,
the entire network system will break down because each device connected inside the
ring topology has receiver and transmitter that can sent data packet to the next until to
reach the destination.
⮚ Star Topology: All network devices are connected to central network device. Each
network device is connected with an individual cable. If the cable or the connect device
is broken, its device only will disconnect from central network device. And then, the
entire network system will not break down. But, if the central network device is broken,
the entire network system will break down because of central network device work as a
server.
⮚ Tree Topology: All network devices are connected as the branches of a tree. It is also
known as star bus topology because it is combined star and bus topologies. In this
topology, there may be multiple central nodes connected to bus and all central nodes
are also interconnected by linear bus. If the trunk/bus cable is broken the network
devices that will be other side, cannot connect with each other
⮚ Hybrid Topology: It is a topology that combines two or more physical topologies. Two or
Page 2 of 12
points are individual connected to central network devices with separate cable. As per the
below network diagram, Switch and Wireless Access point work as central network devices
(server). So, the central network devices are only needed to care not to break down the entire
network system. If the star topology is used with network switch devices, the data can be
transmitted at the same time because the collision domain exit each point connected to central
network device. And then many networks segment can be divided by using VLAN function of
Layer 3 Switch. So, star topology is recommended to meet the needs of company.
Page 3 of 12
coverage if needed. There are mainly three components: the Root AP, the Mesh AP, and the
leaf node (wireless clients).
Root AP: In all mesh network, there are at lest one root access point /Gateway AP that
connected to a wired network because it is needed to connect the internet or outside of the
mesh network. Root AP provide a wireless signal to another mesh access points.
Mesh AP: It is called the wireless access points that communicating with one other over radio
backhaul. It transfers the data to between Access points reach the destination. Mesh AP is also
known as backbone of Mesh network. The connection is more reliable because there are many
connectivity resources that running within mesh network. Even one point fails, the data will be
transmitted from other device in the mesh network. Mesh APs also provide wireless signal to
endpoint devices.
Leaf Node: It means endpoint/physical devices that is connecting the Mesh APs via wireless
signal.
Page 4 of 12
mathematically measure interference and performance of signal strength. After getting the
result of site survey, can decide where wireless access point should be installed. So, the
important site survey must be conduced before installing any wireless access points.
Cost saving: If the PoE enabled access points are connected to PoE network switch or a PoE
injector, cost will be saved more because a connected single ethernet cable can transmit both
data and power at the same time.
Flexibility/control: It is easy to install and more flexibility for placement as it can be moved and
installed easier for the location because it doesn’t need to think for power supply.
In the above network design, Class A IP addressing with CIDR methods will be used to assign
IP address to the network nodes installed at the classrooms of Floor 2. Each network segment
has 30 usable IP address (example: Network A- 10.147.148.0/27, Network B-
Page 5 of 12
10.147.148.32/27) and the network segments of each classroom are isolated by using VLAN ID.
The primary switch of server room of floor 2 will be connected to primary core switch 1 of the
main server room with two ethernet cables by using ether channel protocol to have the benefits
of link aggregation and redundancy. Ip allocation of each network segment will be assigned
automatically by primary core switch 1. All the switch ports connected to PCs installed at the
classroom will be assigned specific VLAN ID. Each other of the classrooms can not access but
every device of the classrooms can access the servers of main server room and printers
installed at each floor.
Page 6 of 12
Task 4 – Secure the Network
Network Threats
Network threats mean an attempt to access the unauthorized resources of the network of
organization to steal the important data and information. The following are three main network
threats.
Distributed Denial-Of-Services (DDOS): it makes the network resources and services to be slow
or to be crush/down. It can cause also by continuous sending many large ICMP packets to
target systems. IT Administrator need to monitor and filter the malicious traffic to prevent DDoS
Attacking.
Phishing: It is tricking people to steal their sensitive information via online by sending email or
message and will contain some information and a website or URL link to be interested. The link
will go the fake website created like the real and then will ask to enter the information such as
personal information and bank credit card information. To prevent this phishing attack, the users
will be needed to educate and share the knowledge of cyber security awareness and there
should be email filtering system to monitor/filter incoming and outgoing of email traffic.
Safely Remote Access to organization`s resources Anytime: the resources of organization can
be accessed from anytime and anywhere if user have internet connection.
Data integrity: when users access the organization network resources from outside, the traffic
/date will be safe and reliable as the data travel through the encrypted VPN tunnel between two
sides.
Better work Life Balance: As users can work at any time and from anywhere if internet is
available, user can manage more flexible working hours.
Hide Private Information: As using encrypted Virtual Private Network, attacker cannot find and
steal the information easily.
Page 7 of 12
Task 5 – Network Operating System
operating system for file sharing, DNS and DHCP services
There are many different types of network operating systems. Basically, it can sort two types,
proprietary (closed source) and opened-source network operating systems (NOS). The
proprietary NOS means, it is owned by a particular company. Its development and design can
be modified by only a proprietary company. The opened-source mean, it is against with
proprietary NOS and can be modified by anyone.
One of the proprietary NOS, Microsoft Widow Server Operating System will be used to be able
to setup the File Sharing, DNS and DHCP services. Every operating system has pros and cons.
The following is main three positive of Window Server OS.
User Friendly: The interface and function of OS is more familiar for user and easy to use
Easy to Manage: there already consists of many server roles and features in the OS like ADDS,
ACDS, ADFS, DHCP, DNS, Web and print server roles etc. It can be installed and managed
easily.
Software Compatibility: Most of the software are compatible in this OS than other since most of
the enterprise business are using this window server operating system.
Page 8 of 12
Primary core switch 1 will provide VLAN and DHCP services. Hyper- V as hypervisor is installed
at the dedicated server to be install the necessary network operating systems. There will be
number of virtual guest operating systems (AD, File and Print servers) inside the Hyper-V. Two
ethernet cables are combined with NIC teaming to have more bandwidth and redundancy at the
server. There are two wireless SSID names at each floor that is coming from one or more
wireless access points. One of them is for cooperated devices and another one is for BYOD.
Antivirus Software: the antivirus software will be installed at all computer systems of the
organization to be able protect various of malware and ransomware.
DHCP Snooping: DHCP snooping is a type of security technologies base on working layer 2
switch. It can prevent the unauthorized DHCP server that are trying to become DHCP server
from the network. Therefore, this service will be configured at all ports of the switch exclude the
port connect authorized DHCP server from network.
Data Storage Space: there will be data storage space at the file server that can store the data
for individual user and common shared space of each classroom. storage space has limitation.
So should not allow to store unrelated data with organization and large files such video file for
long term solution of storage capacity.
Firmware upgrade: the updated and latest firmware announced by official provider related
network devices installed the network, should be upgraded regularly to support additional
features and security functions consist in the updated firmware.
Page 9 of 12
Network Infrastructure Maintenance: Maintenance should be done logically and physical to
review the stability and performance of the network.
Weak Encryption: most of IoT devices are weak in encryption of data for data transmission
between each other. it is the main security issues because an attacker can capture and steal
the sensitive information easily.
Man-in-the-middle: the attacker can act as a fake IoT device between two devices connected
normal to steal the information.
Weak passcode: most of the IoT device come with default password. the default and simple
password left/created by user or vendor. So, the attacker can access it easily by botnets attack.
References
Cisco Press. (2003, 3 14). Network Media Types. Récupéré sur Cisco:
https://www.ciscopress.com/articles/article.asp?p=31276
DIGITALAIR THE WI-FI EXPERTS. (s.d.). DIGITALAIR THE WI-FI EXPERTS. Récupéré sur
POE: https://www.digitalairwireless.com/articles/blog/what-is-poe-what-does-it-have-to-
do-with-switches
Farahani, S. (2008). Sciencedirect. Récupéré sur Shahin Farahani:
https://www.sciencedirect.com/topics/computer-science/wireless-site-survey
Firewall CX. (s.d.). Récupéré sur Firewall CX: https://www.firewall.cx/networking-topics/cabling-
utp-fibre/112-network-cabling-utp.html
Krukova, A. (2022, 1 13). TreConf. Récupéré sur https://trueconf.com/blog/reviews-
comparisons/tcp-vs-udp.html
Micro Ai. (s.d.). Micro AI. Récupéré sur IoT Security: https://micro.ai/blog/iot-security-the-top-
six-risks
Page 10 of 12
Oracle . (s.d.). Oracle. Récupéré sur Oracle: https://www.oracle.com/internet-of-things/what-is-
iot/
TP link. (s.d.). Tplink. Récupéré sur https://www.tp-link.com/us/wifi6/:
https://www.tp-link.com/us/wifi6/
Williams, L. (2022, 12 17). type-of-network-topology. Récupéré sur GURU99:
https://www.guru99.com/type-of-network-topology.html
Page 11 of 12