Enderoth School OCR Cambridge TEC (Certificate/Diploma) in IT Unit 07 - Computer Network Systems Student Name: Daniel McGinley Grade Awarded by: STR Date Awarded: __________ Grade: PASS/MERIT/DISTINCTION Unit 07 - Assignment Checklist - 11-12-2013 TASKS & LEVEL ACTIVITIES Feedback LO1 - Know types of network systems and protocols Task 1 (P1.1) Task 2 (M1.1) Task 3 (P1.2) Task 4 (P1.3) Task 5 (M1.2) Task 6 (P1.4) Task 7 (M1.3) Task 8 (P1.5) Task 9 (M1.4) Task 10 (P1.6) Task 11 (M1.5) Task 12 (P1.7) Task 13 (P1.8) Task 14 (P1.9) Describe the 3 different types of networks Describe how information is transferred around the system in terms of information flow Suggest and justify a network system type and workstation purchase that will suit the needs of your client and describe the benefits and drawbacks of this network Describe with examples WAN information transfer technologies. ATM X.25 and Frame Relay MPLS Describe how the 5 different network topologies work and how they transfer information Star Ring Bus Mesh Tree Suggest and justify a network topology for your client and describe the benefits and drawbacks of this topology Describe how the 2 different network access methods work and how they transfer information CSMA Token Passing Suggest and justify the benefits and drawbacks of the internal network access methods for the client and users Describe how the 2 different network access methods work and how they transfer information (HARDWARE) TCP/IP Peer to Peer Suggest and justify the benefits and drawbacks of the external network access methods for the client and users Describe what a Client Server network is and the technical hardware necessary to provide internal and external access Suggest and justify the benefits and drawbacks of operating a Client Server network for the client and users Describe the technologies behind the Network Layer Protocols • Discuss the advantages and disadvantages of each Protocol within a school environment TCP/IP Appletalk UDP 802 Standards FDDI Describe what the following network connections are - Bluetooth, Wi-Fi and 3G/4G Outline the factors affecting range and speed of wireless connections within a school environment WIFI Bluetooth 3g and 4g Describe what the functions are for the following application layers - DNS, DHCP, HTTP, FTP and SMTP Outline the practical applications used within a school environment DNS DHCP HTTP FTP SMTP LO2 - Understand the key components used in networking Task 1 (P2.1) Task 2 (M1.6) Task 3 (P2.2) Task 4 (M1.7) Task 5 (M1.8) Task 6 (P2.3) Task 7 (M1.9) Task 8 (P2.4) Task 9 (M1.10) Task 10 (P2.5) Page 1 of 3 Describe the practicalities of Base and Thin client workstations. • Outline the benefits and drawbacks of the different forms of networked workstations Suggest and justify a network setup for your client and focus on the benefits and drawbacks Describe the functions and uses of the different servers Print Server Mail Server File Server Proxy Server Web Server Suggest and justify the network setup of server(s) for your client and focus on the benefits and drawbacks Suggest and justify the network setup of hardware component(s) for your client and focus on the benefits and drawbacks Network Connection Motherboard Hard Drives Memory Processor Power Supply Describe the purposes, features and functions of a NIC, Router, Switch and Wireless Access Point Network Interface Cards – Router Switch Wireless Access Point - WAP NIC Suggest and justify the network setup of interconnection device(s) for your client and focus on the benefits and drawbacks Describe what a Leased and Dedicated Line connection is Suggest and justify the type of line connection for your client and focus on the benefits and drawbacks Describe the different kinds of Connections and Cabling within a Networking Environment © Enderoth • • • Task 11 (M1.11) Task 12 (M1.12) Coaxial Category 5e and 6 Fibre Optic BNC Connector Task 14 (P2.6) Task 15 (M1.14) Task 16 (P2.7) Task 17 (M1.15) Twisted Pair STP UPT RJ45 Connector Wireless Mobile Technology Suggest and justify the type(s) of Connections and Cabling methods your client would require within their network setup and focus on the benefits and drawbacks Suggest and justify the type of Network Operating System (Microsoft Server versus Novell Netware) your client would require within their network setup and focus on the benefits and drawbacks Windows NT Server Task 13 (M1.13) • • • Novell NetWare Mac OSX Linux Suggest and justify the alternative Commercial Systems your client would require within their network setup and focus on the benefits and drawbacks Describe the different forms of Software used for a Network Operating System File Sharing Security Directory Network Support Suggest and justify the type(s) of Software your client would require within their network setup and focus on the benefits and drawbacks Describe the importance of the different forms of protections used within a Networking Environment Suggest and justify the type(s) of protection measures your client would require within their network setup and focus on the benefits and drawbacks LO3 - Know the services provided by network systems Task 1 (P5.1) Describe the facility and importance of Directory Services within a network environment. Account Management Authentication Management Active Directory DNS Task 2 (M3.1) Describe the need for implementation of these Directory Services within a Primary School System in terms of security, Data Protection and ease of student use. Task 3 (D2.1) Within your PowerPoint, evaluate the Directory Services need your business needs to take to secure their Networks. Task 4 (P5.2) Describe the Range of Communication Services available to companies and the potential benefits of monitoring and controlling access to these. Task 5 (M3.2) Describe the need for monitoring Communication Services within a Primary School System in terms of security, Data Protection and filtered student use. Task 6 (D2.2) Within your PowerPoint, evaluate the procedures your organisations should take to secure their Communication Systems. Account Management Account Management Task 7 (P5.3) Task 8 (M3.3) Task 9 (D2.3) Task 10 (P5.4) Task 11 (M3.4) Task 12 (D2.4) Task 13 (P5.5) Task 14 (M3.5) Task 15 (P5.6) Task 16 (M3.6) Task 17 (D2.5) Task 18 (P5.7) Task 19 (M3.7) Task 20 (P5.8) Task 21 (M3.8) Task 22 (D2.6) Email Remote Desktop Email Remote Desktop Email Remote Desktop Authentication Management Authentication Management IRC IRC IRC Active Directory Active Directory Discussion Boards Social Networking Discussion Boards Social Networking Discussion Boards Social Networking DNS DNS Remote Access File Transfer Remote Access File Transfer Email File Transfer Describe the Process and Benefits to companies of configuring File Sharing management services. Describe the circumstances in which File Sharing management takes place with a school environment. Within your PowerPoint, evaluate the procedures your organisations should take to secure their student information if instigating file sharing rights. Describe the need for Databases, Web and Proxy Services on a system to ensure consistent functionality. Describe the circumstances in which Application Management takes place with a school environment. Within your PowerPoint, evaluate the procedures your organisations should take to secure their Application Software if instigating student management rights. Describe the need for sharing devices on a system to ensure consistent availability. Describe the circumstances in which Device Sharing Management takes place with a school environment. Describe the need for Storage Space allocation and management on a system to ensure consistent functionality. Describe the circumstances in which Storage Management takes place with a school environment. Within your PowerPoint, evaluate the Storage Space needs of your organisations and the procedures that should be taken to allocate required student and department space. Describe the facility of VOIP and Mobile Working within a Networking environment. Describe the circumstances in which VOIP and Mobile Working takes place with a school environment. Describe the Policies of Authentication and the benefits of setting these access rights. Describe the circumstances in which Authentification Rights takes place with a school environment. Within your Client’s system, describe the different Access and Authentification Rights between Students and Staff and discuss the need for this security measure. LO4 - Be able to make networked systems secure Page 2 of 3 © Enderoth Task 01 (P6.1) State why Passwords are essential to Network systems with examples of the risks and give examples of strong and weak passwords. Task 02 (P6.2) State the policy of Access Control Lists and Permission Rights on files, folders and programs and state the need to secure these right within a school environment. Task 03 (P6.3) Describe the importance and method of restoring files on a network and give examples related to your Client of the need to generate a Policy of Recovery. Task 04 (P6.4) Describe Encryption and Encryption Keys and state how secure this method might be in securing the data within a school environment. Task 05 (P6.5) Describe the different technologies that exist in biometrics and analyse their relative value within your Clients Network. Task 06 (P6.6) State the different methods of physical security available and for your client, state the possible benefits and implications of these security measures. Task 07 (P6.7) Describe the two different kinds of firewalls available for Networks and explain the need for your Client to maintain this protection. Task 08 (P6.8) Describe with examples Spyware, Adware and Malware and describe how your company can minimise the threat of each of these. Task 09 (P6.9) Describe the different types of risks that exist to information storage and describe to your client and the level of risk they pose. Task 10 (P6.10) Describe what an Antivirus program is and in detail describe the precautions your client should take to protect their network. Task 11 (P6.11) State and explain the different Software methods of detecting an intruder and state the need for your Client to manage the network needs through software and vigilance. Loss of Service Loss of Service Loss of Service Loss of Service Loss of Service Loss of Service Loss of Service Loss of Service Loss of Service Loss of Service Loss of Service Loss of Business Loss of Business Loss of Business Loss of Business Loss of Business Loss of Business Loss of Business Loss of Business Loss of Business Loss of Business Loss of Business Increased Costs Increased Costs Increased Costs Increased Costs Increased Costs Increased Costs Increased Costs Increased Costs Increased Costs Increased Costs Increased Costs Confidentiality Confidentiality Confidentiality Confidentiality Confidentiality Confidentiality Confidentiality Confidentiality Confidentiality Confidentiality Confidentiality System Integrity System Integrity System Integrity System Integrity System Integrity System Integrity System Integrity System Integrity System Integrity System Integrity System Integrity Evaluate the current levels of security the school will need to prepare for in order to maintain a degree of security. Task 12 (D2.7) Task 13 (P6.12) Task 14 (P6.12) Task 15 (P6.12) Task 16 (P6.12) Task 17 (P6.12) Page 3 of 3 Passwords Authorisation Levels of Risk Security Issues Backing up and restoring Intrusion Detection Systems Encryption Biometrics Antivirus Software Physical Security Create a guide that demonstrates to a new user with network rights the stages of installing and configuring a Virus Checker and Firewall protections. Create a guide that demonstrates to a new user with network rights the stages of configuring a new User Account. Within this guide that demonstrates to a new user with network rights the stages of configuring the TCP/IP setting to connect to an existing network. Within this guide that demonstrates to a new user with network rights the stages of configuring Pop3 and SMTP Mail services. Within this guide that demonstrates to a new user with network rights the stages of configuring a Network Printer. © Enderoth