PART (1) : Assignment Brief and Guidance: (Scenario)
PART (1) : Assignment Brief and Guidance: (Scenario)
Part 1.
In this part, you will critically evaluate different topologies and protocols. You will use your research to
demonstrate the efficient utilisation of the networking system in Part 2.
You will need to produce a discussion of the operating principles of the main networking devices and server
types and relate this to the interdependence of workstation hardware to the appropriate networking software.
PART (1)
Compare common networking principles and explain how protocols enable the effectiveness of networked
systems?
1. The packet switching principle is used to store and forward the packet.
So, there are different principles of networking that include the switching, transmission, switching of the
network, and routing in the networks. There are also internetworking and congestion control principles.
1. The TCP/IP protocol is an internet protocol used for the transmission of data packets over the internet.
They are connected and provide always delivery to the users; this protocol is used in the Transport layer of
the internet layers protocol. The TCP/IP is a connection-oriented protocol and guarantees the delivery of the
packet.
2. UDP protocol: This is the user datagram protocol, is a connectionless protocol, this does not guarantee
delivery of the packet. This is used in wireless connections for transmission it is fast but not guaranteed.
The benefits and constraints of different Benifits and constraints of network types are Personal area network
Advantages
1)no extra space require for connecting two devices you need to enable Bluetooth on both
devices.
Disadvantages
infrared.
Advantages are
distance
Data and message can be easily shared with other computers connected to the
network.
3)software application sharing in LAN it is easy to use the same software in number of computers connected
to a network.
4)resource sharing computer resource like printer,scanner,modems,hard disk can shred within the connected
devices.
Disadvantages are
1)High setup cost initially setup cost of installing local area network is high. 2)covers limited area
office or campus if server hard disk is not properly secured by LAN administrator.
4)privacy violation
Advantages
1) it cover more than 1000 km.we can connect different offices branches through WAN. 2)high bandwidth it
has high bandwidth then
LAN
server.
5) resource sharing
1)security problems
4) troubleshooting problem because it covers large area it is difficult to fix the problem.
Advantages
1) less expensive
2)sending local emails using MAN we can send local email fast and free
3) high speed of WAN. MAN uses fibre optics so, it can transfer data fast.
Disadvantages
1) more wires are required in MAN we require additional cables to connect to LAN
2)increasing productivity
3) quality assurance
4)minimization of waste
5) ensuring safety
Disadvantages are
1) standard force to change the methods.
• In case of Network topology, there are various kinds of configuration for the network based on topology or how the
hardware is arranged in the network.
• Example. A bus network topology would have a different efficiency over a start topology looking at the examples.
1. LAN: Stands for Local Area network which is a group of computers connected together being
2. MAN: Stands for metropolitan area network is a large network that usually covers many building that are in same
area, much larger than a city etc.
3. WAN:
Stands for Wide area network, WAN is not limited to a single area, it is wide as wide as state or nation's network.
Internet is an example.
Network hardware can be classified by its location and role in the network.
Core
Core network components interconnect other network components.
Gateway: an interface providing a compatibility between networks by converting transmission speeds, protocols,
codes, or security measures.[2]
Router: a networking device that forwards data packets between computer networks. Routers perform the "traffic
directing" functions on the Internet. A data packet is typically forwarded from one router to another through the
networks that constitute the internetwork until it reaches its destination node.[3] It works on OSI layer 3.[4]
Switch: a device that connects devices together on a computer network, by using packet switching to receive, process
and forward data to the destination device. Unlike less advanced network hubs, a network switch forwards data only
to one or multiple devices that need to receive it, rather than broadcasting the same data out of each of its ports.[5] It
Multilayer switch: a switch that, in addition to switching on OSI layer 2, provides functionality at higher protocol
layers.
Protocol converter: a hardware device that converts between two different types of transmission, for interoperation.[9]
Bridge router (router): a device that works as a bridge and as a router. The brouter routes packets for known protocols
and simply forwards all other packets as a bridge would.[10]
Border
Hardware or software components which typically sit on the connection point of different networks (for example,
between an internal network and an external network) include:
Proxy server: computer network service which allows clients to make indirect network connections to other network
services.[11]
Firewall: a piece of hardware or software put on the network to prevent some communications forbidden by the
network policy.[12] A firewall typically establishes a barrier between a trusted, secure internal network and another
outside network, such as the Internet, that is assumed to not be secure or trusted.[13]
Network address translator (NAT): network service (provided as hardware or as software) that converts internal to
external network addresses and vice versa.[14]
Residential gateway: interface between a WAN connection to an internet service provider and the home network.
End stations
Other hardware devices used for establishing networks or dial-up connections include:
Network interface controller (NIC): a device connecting a computer to a wire-based computer network.
Wireless network interface controller: a device connecting the attached computer to a radio-based computer network.
Modem: device that modulates an analogy "carrier" signal (such as sound) to encode digital information, and that also
demodulates such a carrier signal to decode the transmitted information. Used (for example) when a computer
communicates with another computer over a telephone network.
ISDN terminal adapter (TA): a specialized gateway for ISDN.
Line driver: a device to increase transmission distance by amplifying the signal; used in base-band networks only.
We have many ranges of server's types available. Each of them is designed and work on basis of different
configurations. According to the market need and demand we can use the servers. Some types of servers are as
follows
Rack Server
This server is mounted inside a rack. Self- contained, means can run as a stand-alone or networked system: its own
power source, CPU, and memory. This allows to run intensive computing operations. They are highly efficient to
expand with additional memory, storage, and processors. Also, smaller deployments make energy efficiency at lower
• Blade Server
It is a server enclosure that houses multiple modular circuit boards called server
blades. Their modern architecture supports hot swaps. Blades have small external handles, so it's a simple matter to
pull out or replace them. They can scale to high performance levels, if the data centre has enough energy to support
the dense infrastructure. IN this server it provides high processing power while taking up minimal space. Also, it
allows to host primary operating systems, databases, applications, web services, and other enterprise processes and
applications which satisfies a multipurpose. But disadvantage is that due to high density blade servers require
advanced climate control which increase the energy cost.
• Tower Servers
They are a stand-alone chassis configuration. This server allows their customers to customize their servers and
maintain a customized upgrade path. For a smaller business that needs a single powerful server to run multiple
processes and applications this will be highly a good option. They can share network storage like any other type of
server. With their low component density, towers are less expensive to cool than other two servers. They are more
scalable as they allow IT to customize and upgrade them based on business needs which are less
expensive.Eventhough it allows customization high-end hardware components and software will raise the ongoing
price considerably which highly increase the upgrading cost.
Virtual Server
It helps to reduce the distance among shared and hosting servers providing freedom to others, at a less cost. Now
adays its very popular among the data centres. So, the above discussed servers are the physical servers and here in
virtual server we see how this gives a broader view and its benefits. Some of its advantageous are : They empower
users to go beyond the limitations of hardware to achieve their end goals, provide centralized management and Full
compatibility with applications, allows migration of servers to new hardware transparently, cost reduction is possible
using small virtual servers less downtime, easy to change the virtual machine platform and increase its
performance, virtualization software reallocates hardware resources dynamically between a virtual machine and
another.
In short we can say that virtual servers are giving more benefits as it can solve and facilitate a number of operations to
avoid any kind of crisis more cost effective without compromising the performance.
Addressing Table
Background / Scenario
In this exercise you will connect the equipment in Packet Tracer as shown in the topology diagram. You will then
configure the devices to match the addressing table. After the configurations have been saved, you will verify your
configurations by testing for network connectivity.
After the devices have been configured and network connectivity has been verified, you will use IOS commands
to retrieve information from the devices to answer questions about your network equipment.
Network Devices
1 Router (Cisco 1941)
1 Switch (Cisco 2960)
2 PCs
Console cables to configure the Cisco IOS devices via the console ports
Ethernet cables as shown in the topology
Note: The Gigabit Ethernet interfaces on Cisco 1941 routers are autosensing and an Ethernet straight-through
cable may be used between the router and PC-B. If using another model Cisco router, it may be necessary to use
an Ethernet crossover cable.
Step 1: Retrieve hardware and software information from the network devices.
1. Use the show version command to answer the following questions about the router.
What information can you see?
R1# show versionCisco IOS Software, C1900 Software (C1900-UNIVERSALK9-M),
Version 15.2(4)M3, RELEASE SOFTWARE (fc1)Technical Support:
http://www.cisco.com/techsupportCopyright (c) 1986-2012 by Cisco Systems,
Inc.Compiled Thu 26-Jul-12 19:34 by prod_rel_teamROM: System Bootstrap,
Version 15.0(1r)M15, RELEASE SOFTWARE (fc1)R1 uptime is 10 minutesSystem
returned to ROM by power-onSystem image file is “flash0:c1900-universalk9-
mz.SPA.152-4.M3.bin”Last reload type: Normal ReloadLast reload reason:
power-onThis product contains cryptographic features and is subject to
UnitedStates and local country laws governing import, export, transfer
anduse. Delivery of Cisco cryptographic products does not implythird-party
authority to import, export, distribute or use encryption.Importers,
exporters, distributors and users are responsible forcompliance with U.S.
and local country laws. By using this product youagree to comply with
applicable laws and regulations. If you are unableto comply with U.S. and
local laws, return this product immediately.A summary of U.S. laws
governing Cisco cryptographic products may be found
at:http://www.cisco.com/wwl/export/crypto/tool/stqrg.htmlIf you require
further assistance please contact us by sending email to
[email protected].
License Info:
License UDI:
————————————————-
Device# PID SN
————————————————-
*0 CISCO1941/K9 FTX1636848Z
—————————————————————–
Technology Technology-package Technology-package
Current Type Next reboot
——————————————————————
ipbase ipbasek9 Permanent ipbasek9
security None None None
data None None None
____________________________________________________________________________________
Switch#
Step 3: Display a summary list of the interfaces on the router and switch.
There are several commands that can be used to verify an interface configuration. One of the most useful of these
is the show ip interface brief command. The command output displays a summary list of the interfaces on the
device and provides immediate feedback to the status of each interface.
1. Enter the show ip interface brief command on the router.
R1# show ip interface brief
Interface IP-Address OK? Method Status Protocol
Embedded-Service-Engine0/0 unassigned YES unset administratively down down
GigabitEthernet0/0 192.168.0.1 YES manual up up
GigabitEthernet0/1 192.168.1.1 YES manual up up
Serial0/0/0 unassigned YES unset administratively down down
Serial0/0/1 unassigned YES unset administratively down down
R1#
Reflection
1. If the G0/1 interface showed administratively down, what interface configuration command would you use to turn
the interface up?
________________no shutdown_______________________________________________
2. What would happen if you had incorrectly configured interface G0/1 on the router with an IP address of
192.168.1.2?
_______________________ PC-A would not be able to ping PE-B..This is because
192 168 PC-B is on a different network than PC-A which requires the default gateway router to
route these packets. PC-A is configured to use the IP address of 192.168.1.1 for the default-
gateway router, but this address is not assigned to any device on the LAN. Any Real Time packets
that need to be sent to the default-gateway for- routing will never reach their destination