Assignment 2 Computer Networks
Assignment 2 Computer Networks
The IT admin is there to make sure that the network and all
connected computers are maintained and kept up to date
to make sure viruses are kept away and that all computers
are working.
Internet browser:
An internet browser is a piece of software which
allows the user to access the internet and search
through information from a web server which has
lots of stored information.
When a user requests a web page from a website
the browser retrieves the content from a web
service and displays it on the users device.
Software Resources
Operating system:
An operating system is a piece of software that
communicates with the hardware and allows
programs to be run on the computer. There are
2 types of operating systems GUI (graphical
user interface) and CLI (command line
interface) the graphical gives the user images
and interactive buttons to control different
operations whereas CLI uses commands in a
terminal to control functions of the computer.
Software Resources
Email:
Email is a free way of allowing people to contact each
other over the internet from one computer to another. It
uses packets sent between the devices and allows
information to be sent digitally. It can also be used to send
images and videos
Software Resources
Firewall:
A firewall is a piece of utility software which is
installed on a computer which monitors all
incoming and outgoing traffic based on user set
rules to help prevent attacks and unauthorised
access to your computer. It can also block certain
applications from having access to the internet to
help stop any unwanted communication.
Software Resources
Antivirus software:
Antivirus software is also a piece of utility
software which helps keep your computer free of
unwanted software that may have malicious
intents. It scans all files on your computer and
blocks and suspicious applications that may be
installed. It needs to be regularly updated to be
able to recognise all new threats such as trojans,
viruses, and many other forms of attacks.
Spotify
Spotify is an online music streaming and downloading site which can be used for free. It
allows users to search through thousands of songs to find what they are looking for. There is
a paid plan which allows users to download music and save it for offline use, and it also has
no restriction on how many times you can skip through songs.
Hardware devices
Hub
Internet
Terminator Terminator
Switch
Firewall Workstation
Workstation
IP 192.168.0.2 IP 192.168.0.3
Router Server
Test Plan
Devices Ip User Status Connection to Printer Music Microsoft
address Credentials internet Status software Package
Download
& Working
searching Status
Computer 3: 192168.0. User: Stewart Working/ Able to connect to Able to Yes/no Yes/No
4 Pass: Not internet/Not able to print /Not
Stewart123 working connect able to print
Printer: 192168.0. User: Admin Working/ Able to connect to Able to Yes/no Yes/No
5 Pass: Admin123 Not internet/Not able to print /Not
working connect able to print
Alternate Design
192.168.0.2 192.168.0.3 192.168.0.4 192.168.0.5
Internet
Switch
Firewall
Router Server
How can a network be developed?
A network can be developed in many ways including: Some components of networks can be developed, things
such as:
Topology variations such as BUS which connects all devices to a Instead of a hub you could instead use a switch which
single connection with terminators at each end. connects devices together such as a printer and a
Advantages: computer and assigns it with a MAC address which
The network is simple to use an install meaning you don’t need to identifies which device is connected and allos
spend much time getting it all set up. information transfer to be much more secure because
It is cheaper to set up because there is less cabling required to you know exactly which computer you are sending the
connect all of the devices together since they all connect to a information to.
single larger cable.
Disadvantages: A server can also be switched out because it isn’t
The more devices that you connect the lower the efficiency gets technically needed to store information as it could also
because the signal strength decreases with each new device. be stored locally on computers but without the large
Security is a big issue because any message that is sent on the capacity that servers can offer.
network can be ready by any connected device meaning you don’t
have any privacy.
IP Address and Subnet Mask
An IP address (internet protocol) is a number which A subnet mask is used to split an IP address into two
defined a certain device such as a mobile phone and can parts. One part specifies the host computer and he other
be used to communicate over a network. It allows other part specifies the network which the device is connected
devices to know who they are communicating with and to. It allows a larger network to be divided into smaller
maes sending information more secure and easier. IP sub-networks which is more efficient and conserves lots
addresses can identify the source and destination of of addresses. It also reduces network traffic by adding
transmitted information with the internet protocol. subnets without a new network number. It is useful when
a single network number must be used across multiple
parts of a LAN (local area network)
Access Permission
Name Role Access Permission Reason for providing
the certain type of
access
Set up cost:£120