Net Rish
Net Rish
Ama
Assessor Internal Verifier
Unit 02: Networking
Unit(s)
LAN Design & Implementation for SYNTAX SOLUTIONS
Assignment title
M.M Mohammad Rishad
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1
Descripts
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Assessor Date
signature
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
Word Processing Rules
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No,
and Page Number on each page. This is useful if individual sheets become detached for any
reason.
5. Use word processing application spell check and grammar check function to help editing
your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your
work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation
and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct form. I further understand what it
means to copy another’s work.
[email protected]
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)
Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number
Unit Tutor
Issue Date
Submission Date
Submission format
The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although
you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
Scenario
SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The
Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They are
planning to make it one of the state-of-the-art companies in Matara with the latest facilities.
Customer Care 10
Finance 25
Legal 5
HR 10
Developers 55
Network Team 5
19 2.168 .1 0.0/24 is giv en and sh ou ld be used for a ll t he depa rt men ts exce pt the
server room. IP s should assig n us ing DHCP .
ERP and CRM Systems ne ed to be im pleme nte d in Mat ara b ra nch in loca l serve rs.
High level of redundancy is expec ted in ne twork desig n t o elim ina te sing le poin t
of fa ilures an d t ra ffi c b ott le nec ks.
Sales and Mark eti ng Team need to acce ss Netw ork re sourc es us ing W IFI
connec ti vity.
Assu me you hav e bee n app ointe d as the ne w netw ork consultan t of S YNTA X S OL UTIONS .
P re pare a ne twork a rch it ectu ra l desig n and im pleme nt it w ith your sugge sti ons an d
recomme nda ti on s to meet th e compa ny re quire me nt s.
(Note: Clearly state your assumpti ons. You ar e allowed to design the network according
to your assumpti ons, but main requir ements should not be violated)
Acti vity 01
D isc uss the bene fi ts and constraints of d iff e re nt ne twork sy ste m typ es that can be
imp le ment ed in th e Mata ra b ranc h an d the main IEEE Et herne t stan dards th at can
be u sed in ab ove LAN and W LAN de sign.
D isc uss the im porta nce an d im pact of ne twork topologies an d net work prot ocol
suites wh ile com parin g the main netw ork topologies and ne twork prot ocol suite s
th at a re u sed in netw ork de sign using examp le s. Rec om mend su ita ble net work
t opologies an d n etw ork prot ocol su ite s for above sc ena rio and justi fy you r answer
w ith va lid point s.
Acti vity 02
Discu ss t he op erati n g prin ciples of net work devices (E x: Rou ter, Sw itch , E tc.) and
se rve r typ es tha t can be u sed for abov e sc ena rio wh ile explorin g d iff e re nt se rve rs t hat
are ava ilab le in toda y’s marke t wit h the ir spec ifi ca ti on s. Recomme nd se rve r/se rv ers
for the abov e scena rio an d justi fy your se lec ti on w ith va lid poin ts.
Discu ss the inte r- depe nde nce of worksta ti on ha rdw are wit h n etw orking soft w are and
prov ide exa mp le s for ne tworkin g soft wa re th at can be u sed in abov e ne twork desig n.
Acti vity 03
Prepa re a writt en netw ork de sign pla n to meet the ab ove men ti one d user
re qu ireme nt s inc lud in g a b lue prin t drawn usin g a modelin g tool. (Ex : Microsoft Visio,
Edraw Max).
Supp ort y our an swe r by providing the VLA N and IP sub netti ng schem e for th e ab ove
scen ario and the list of dev ice s, net work comp one nt s and soft wa re use d to design the
netw ork for abov e scena rio an d wh ile ju sti f ying you r se lec ti on s.
Test and ev aluate the p ropose d desig n to meet the req uire me nts and an alyse use r
feed back by usin g a Use r feed back form .
Install an d confi g ure Netw ork se rv ice s, de vic es and app lica ti on s (Ex : VLA N,DHCP ,
DNS ,P roxy , Web , Etc. ) accord in g t o the prop osed desig n to accom plish the user
re qu ireme nt s an d desig n a deta iled M ainte nance sc hedu le for ab ove Net work .
Acti vity 04
Imp le ment a netw orke d sy ste m ba sed on your prepa re d de sign w ith valid evidenc es
and recomme nd p ote nti al fut ure enh ance ment s for the ne twork ed system wit h va lid
ju sti fi c ati ons to your rec omme nda ti on s. Use criti ca l refl ec ti on to c riti cally eva lu ate
the de sign, pla n, confi g urati on, and testi ng of you r ne twork wh ile ju sti f ying with valid
conc lu sion s.
Deve lop test cases and con duct ve rifi ca ti on (Ex: Ping, exten ded p ing , t race rout e,
telne t, SSH, etc. ) t o te st the ab ove Netw ork and analyse the test resu lt s aga in st the
expec ted resu lt s.
Grading Rubric
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.
P3
Discuss the operating principles of networking devices and
server types.
P4
Discuss the inter-dependence of workstation hardware with
relevant networking software.
M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.
LO 1 & LO2
D1 Critically evaluate the topology protocol selected for a given
scenario to demonstrate the efficient utilisation of a networking
system.
LO3 : Design efficient networked systems
P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
Install and configure network services and applications on your
choice.
D2
Design a maintenance schedule to support the networked
system.
LO4 : Implement and diagnose networked systems
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.
Activity 01
Network
The word "network topology" refers to the method in which connected devices are
connected geometrically. Devices are represented as vertices in a network, while their
connections are represented as edges. It defines the amount of connections that each device
has, their order, and the hierarchy type.
The bus topology, mesh topology, ring topology, star topology, tree topology, and hybrid
topology are all examples of common network configurations.
Figure 02:Types of topologies
The majority of home networks are configured in a tree topology and connected to the
Internet. While business networks usually use tree topologies, they frequently include both
star and intranet topologies.
A computer network is a collection of computers that are connected in such a way that they
can interact with one another and share resources, data, and applications.
According to its size, a computer network can be classified. There are four main kinds of
computer networks:
1.LAN
The term LAN refers to a 'Local Area Network.' As the name indicates, it connects
computers by surrounding them in a radius of between 10m and 1.5km. LANs are often
found in settings such as businesses, universities, schools, clusters of buildings, and
corporate organizations because to their restricted local area coverage.
A single person or small company controls and utilizes this network. This network enables
resource sharing, data storage, and document printing by linking devices such as printers,
scanners, projectors, and other storage components.
Ethernet cables and Wi-Fi are often used to connect the LAN, as are Token Ring and Fiber
Distributed Data Interface, or FDDI. The most commonly used protocol in this network is
TCP/IP.
LAN is also used to describe sharing your internet connection with another individual. A
LAN might consist of as little as two computers.
A LAN's transmission rate is normally between 4 and 16 megabits per second (Mbps), but
may go up to 100 Mbps. We may use any network architecture that meets the network's
needs to connect the hosts in a LAN, such as a bus or ring topology, to connect them.
We are capable of connecting up to 1000 computers to a LAN. The bulk of LANs are wired.
It is, however, now used wirelessly, i.e., in wireless communications. The advantages of this
network include its high speed, low operating costs, and security.
Figure 03 – Local Area Network
Features of LAN:
The network capacity of a LAN is limited to a single room and small geographical areas,
such as houses, small enterprises, and offices.
Due to the fact that backup files are stored on a server, file transfer and recovery are more
manageable on a local area network (LAN).
The LAN network is a privately owned network; no government body controls it.
Uses of LAN:
LANs are often used as a local network at home and on-campus at colleges and universities
for data sharing. Similarly, LANs are used as corporate intranets through wifi.
Advantages of LAN:
Unlimited data sharing through local area networks, which make use of computer resources
such as printers, DVD-ROM drives, modems, drives, and hard disks; this reduces costs.
Software Applications for Collaboration: It is more cost beneficial for each customer to
share the same software than to purchase individually licensed software.
Communication will be easy and affordable because to the rapid transmission of data and
messages between networked computers.
Because all user data is stored in the server's database, there is no chance of data or
document loss. Because there is a backup option for preventing such errors
Internet Sharing: A local area network makes it possible for all LAN users to share a single
Internet connection.
Disadvantages of LAN:
Although LANs save money over time by pooling computer resources, the initial cost of
setting up a local area network is quite high.
Server Load: If the server is not up to par, it cannot handle a large number of computer
connections without causing harm.
Security: There is a danger of insecurity due to the possibility of hackers breaking into the
system. Similarly, viruses and malware may infiltrate a LAN, wreaking havoc on everyone
connected.
Covers a Small Area: A local area network (LAN) is a network that covers a small area,
such as a house, an office, a building, or a cluster of neighboring buildings.
2.MAN
The term MAN refers to the 'Metropolitan Area Network.' The WAN is a more
sophisticated form of the LAN network that is often used in cities and other locations with a
range of 5-60 kilometers for the purpose of transmitting data at high rates.
Because they connect several LANs over a shared bridge, MANs are high-speed
connectivity networks.
This MAN network connects two or more local area networks. This link is referred to as a
backbone line, and it is often constructed utilizing optical fiber and twisted pair cables to
boost the speed of data transfer. This network connects the city's most illustrious
institutions, schools, government buildings, and business organizations.
Thus, a MAN network is made up of several LANs. Cable television is the best example of
a MAN, since its cable extends across the city and the user receives the service through the
cable network.
A MAN may be conceived of as a collection of one or more local area network (LAN)
networks that are connected by a single cable. The most widely used protocols in MAN
communication are RS-232, X-25, Frame Relay, and ATM.
Features Of MAN:
MAN has a greater network coverage than LAN but less than WAN.
Uses of MAN:
MAN is used in a wide array of government institutions, police stations, and commercial
establishments around a city. Officers and employees may easily communicate with one
another, as well as with their departments and branches, in order to quickly send essential
data and messages throughout this network without the need for an Internet connection.
As a result, it facilitates resource sharing across a wider area in the city than LAN networks
do.
Advantages of MAN
This provides a robust backbone for large networks and extends the reach of wide area
networks.
It connects a lot of towns and cities, giving good connection over large areas at a
reasonable cost.
MAN's dual bus design permits concurrent data flow in both directions.
Disadvantages of MAN
Additional cables are required to connect connections from one site to another in MAN.
The longer the cable, the more expensive it is to build the MAN. From such a wide distance,
anybody may hijack the network.
Due to the impossibility of securing every point of the network over vast areas, bad persons
may more easily obtain access to it for their own purposes.
The system has significant challenges in defending from hackers' graphic areas and
industrial espionage.
3.WAN
A WAN is an acronym for 'Wide Area Network.' A wide area network (WAN) is used to
connect computers that are geographically dispersed.
It is a grouping of numerous LANs that spans a much larger geographical area than LAN
and MAN. In contrast to LAN, WAN, and MAN networks, WAN networks have a more
wide geographical perimeter, such as a network of systems covering a whole city, country,
or even continent.
This network communicates in the same way as LANs and MANs do. The vast majority of
wide area networks (WANs) are public networks, which include telephone lines and
satellites, telephone systems, and leased lines.
In general, WANs use fiber optic cable as the transmission medium. This network runs at
the physical, data-link, and network layers of the OSI Reference Model. The equipment that
transport data, photographs, video, massive databases, and files via a WAN connection are
more diversified, ranging from routers to switches, bridges, and firewall modems, among
others.
Today, some of the most extensively used WAN protocols are Frame Relay, X-25,
Integrated Services Digital Network, or ISDN, and Point-to-Point Protocol, or PPP. The
Internet is an example of the largest WAN in the world. Individuals may connect from one
area to other computers or users situated anywhere on the world through the Internet. It is
conducted via the use of a public broadcasting system.
Figure 05 – WAN (Image from vidyagyaan.com)
Feature of WAN:
It is often used in mobile and landline phone voice and data applications. This single
network permits the interaction of a large number of persons. Its data transport speed is
variable, ranging from slow to highly fast. A WAN's network range or coverage area is
much bigger, enabling us to transport data globally.
Uses of WAN:
Military services depend on wide area network (WAN) technology. This setup makes use of
satellite broadcasting. WAN is used in this sector to protect the security of military
communications and operations.
Airlines and railroads make ticket booking possible from any point in the country using
WAN networks. This is because client nodes are distributed around the country and are
connected through a single network to a centralized server.
Advantages of WAN:
This avoids instances where some users have access to more up-to-date copies of
information than others. All clients linked by WAN will stay in constant communication
with one another, removing the chance of a correspondence gap.
Disadvantages of WAN
A good firewall is needed to prevent anonymous hackers from hacking the data and
disrupting
the network.
Setting up a network is very expensive, slow, and complicated. The more comprehensive the
system, the more expensive it.
There is a need to appoint technicians and supervisors for the full-time maintenance
of
connections.
There is a need to spend many expenses for security purposes.
A robust firewall is necessary to prevent anonymous hackers from stealing data and
disrupting the network.
The larger the system, the more expensive it is. There is a need for full-time technicians and
supervisors to maintain connections.
A personal area network (PAN) is a computer network that is created exclusively for the use
of an individual. They are often used to connect multiple devices inside an individual user's
environment, including telephones, tablets, printers, computers, and other digital devices
(typically within 10 meters or 33 feet).
Personal Area Networks (PANs) are used for personal applications, such as data sharing
between devices within a range of ten meters or thirty-three feet. A Personal Area Network,
for example, is when a computer is connected to a printer, scanner, and digital camera
within a 33-foot radius.
It is a specialized high-speed network designed specifically for the storing of data. Servers,
switches, fiber optic connections, and storage devices all contribute to the network's
construction. Storage devices are not linked directly to the servers in this system.
Rather than that, switches are used to link storage devices to servers. Furthermore, optical
fibers are employed to link the devices. As a result, a SAN has an extremely high data
transmission rate. And it is for this reason that servers and operating systems treat hosted
data or storage devices as if they were local disk drives.
Additionally, it suggests that, despite the presence of various storage devices and servers,
SAN allows access to just block-level activities and aggregated data. And, like all other
types of data storage, SAN has both positive and negative aspects. We will discuss the
advantages and disadvantages of using a SAN in this article (Storage Area Network).
1.Security
If you're concerned about the security of your data, you should consider using SAN. You
may easily implement a range of security mechanisms on a SAN. For instance, you may use
a virtual SAN to isolate individuals, businesses, or divisions. Additionally, you may utilize
ACLs (Access Control Lists) inside the switches to restrict access to just approved users.
Apart from these, there are various more security measures you may take to protect the
SAN. As a consequence, the SAN's data is completely safeguarded.
If you're annoyed by the slow data transfer speeds of your storage network and storage
devices, you'll enjoy SAN. Because SAN technology is based on fiber optics, it is capable of
data transfer speeds surpassing 5 Gbps. It is one of the most modern network technologies
available today for data transfer.
SAN facilitates automated network operation. It makes no difference whether one or a few
servers fail or go down. In the case of a server failure, automatic traffic rerouting and built-
in redundancy would take over. As a result, your storage network will always be
functioning. This dynamic failover protection feature is beneficial while doing maintenance
on any of the servers.
4. Centralized Backup
Data is stored in a SAN on a block-by-block basis. Furthermore, a SAN centralizes all of its
data. That is, data will be duplicated automatically and kept in a centralized place. As a
result, even if a server disconnects or goes down in the network, the other servers take over
and stabilize the data load. As a consequence, the SAN's data transit remains unaffected.
As previously said, SAN makes use of a centralized backup method. Through the use of
centralized backup technology, one may automate the whole data backup process. Thus, all
of the data on your storage network will be backed up automatically and very
instantaneously. Additionally, it is less expensive than using any other sort of storage
network. Therefore, if backing up your data is taking too long and you'd want to speed it up,
you may utilize SAN, or Storage Area Network.
Improved disk management is another key advantage of SAN deployment. Due to the fact
that all of the storage arrays are connected through a centralized storage network, they may
be managed as a single unit. As a consequence, you may manage and assign storage at the
network level on a per-server basis. Without a SAN, you would have to buy and manually
install several storage disks in servers. By contrast, a SAN solves all of these disk
management issues.
SANs, or Storage Area Networks, are purpose-built to never fail or go down. This network
storage solution incorporates a number of failsafe features to ensure the integrity of your
data. As a result, your company or organization will always have access to the data and
applications it needs. Additionally, SAN uses a world-class data security algorithm that
ensures your data is always safe and consistent.
SAN has all of the required properties to be the optimal data center storage solution. There
are various benefits to adopting SAN in a data center over other storage alternatives. It is
secure, fault-tolerant, fast, and uses less power when operating. As a consequence, it may be
a perfect complement to massive data centers used by organizations.
Because you are not needed to manage several disk storage devices or cables on a daily
basis, SAN saves you a great lot of aggravation and important time. In a word, storage area
networking automates storage management from the ground up.
If more storage capacity is required, the SAN may be increased. Likewise, if more storage
devices are required, this may be accomplished quite quickly. You may adjust the storage
capacity of your storage network at any moment without affecting the servers' normal
functioning. Additionally, you will not need to restart or shut down your servers to add or
remove storage space, since they are not directly linked to the storage devices.
Due to the fact that all servers are linked through switches, you do not need to physically
transfer storage devices from one server to another to assign more storage space. A SAN
may be used as a single entity.
The data is kept on servers or storage disks in LAN-based storage networks. When a
consequence, you'll encounter bandwidth constraints as a large volume of data is transported
through LAN. As a result, if your website has a sudden surge in traffic, the servers will fail.
In the case of SAN, however, all data is saved on the SAN. As a result, the system always
has access to the resources of your servers and storage devices. Additionally, you will not
encounter any bandwidth limitations in the SAN.
To be quite candid, operating a decent storage Area Network system will cost a large
amount of money. This is because you are purchasing an unrivaled data storage and transfer
facility in the industry. As a result, if you do not operate a huge business, you may choose to
avoid SAN. Rather of that, you may look for more affordable solutions.
With a modest number of servers, it is possible to use SAN. It will, however, come at a cost
to you. Whereas you may manage such servers on your own without incurring significant
fees. In that regard, if your firm employs dozens or hundreds of expensive servers, SAN
may be advantageous.
Always use care to protect the SAN. Adding additional security features to a SAN, on the
other hand, is pricey. As a consequence, a sizable proportion of customers do not use them.
However, if necessary safeguards are not implemented, sensitive data may leak, since all
client PCs share the SAN's storage devices and servers.
A Controller Area Network (CAN) bus is a robust vehicle bus standard that allows
microcontrollers and devices to communicate with one another's applications without the
need for a host computer. It is a message-based protocol that was originally designed to
multiplex electrical wiring inside automobiles in order to save copper, but it may be used in
a number of different contexts. Each device receives data sequentially in a frame, but in
such a way that if more than one device transmits at the same time, the device with the
highest priority may continue while the others halt. Frames are acquired by all devices,
including the sender device.
Figure 08 – CAN (Image from researchgate.com)
The number of nodes or devices that may be linked is limited. In May, a maximum
of 64 nodes can be connected.
The nodes communicate in an unsatisfactory manner.
The CAN standard specifies a maximum length of 40 meters. It will encounter
difficulties if the vehicle or equipment exceeds 40 meters in length.
The expense of software creation and maintenance is considerable when it comes to
developing CAN.
Due to the disparate voltage levels, CAN generates a great deal of electrical noise.
An enterprise private network (EPN) is a network that is purpose-built for a company and is
formed and maintained by the firm in order to share corporate resources.
It connects a business's offices in many geographic areas and is meant to ensure that
bandwidth-intensive applications run smoothly and without overburdening the network.
Businesses may select between a completely private network and a hybrid network
connected to a network Communications Service Provider via an EPN (CSP).
EPNs are tailored to provide privacy throughout all network operations by using tunneling
protocols such as Layer 2 Tunneling Protocol (L2TP) and Internet Protocol Security (IPsec).
Branches are connected by MPLS technology.
You need secure communication between two sites but do not have a direct connection
between them. You must guarantee that clients spread across many sites have consistent
access to shared resources. Scalability and network expansion are required over time.
Your network team is resource constrained. EPNs need more time and effort to establish,
administer, and update. It is not feasible to establish redundant connections between
locations, since this would introduce more points of failure into the network.
Network System Types
1. Peer-to-Peer Network
Peer-to-peer networks connect two or more computers together and share resources such as
disk drives, DVD players, and printers. Each networked computer has access to these shared
resources. Each computer acts as both a client and a server, communicating directly with the
other computers. For example, in a peer-to-peer network, any computer in the network may
access a printer installed on another computer. These networks are quite cheap to establish.
All that is necessary is a connection mechanism, such as an Ethernet cable or a wireless
router.
2.Client-Server Network
In a client-server network, several clients, or workstations, are linked to at least one central
server. The bulk of data and applications are installed on the server. The server provides
access to these resources to clients. Frequently, servers have both private user directories
and a large number of public directories. Client-server networks often have faster access
speeds due to the massive number of consumers they are designed to serve. Clients are able
to function as workstations independently of one another. Upgrades are easier since all
software applications and data are kept on a single machine. Server software may be used to
administer the whole system. Security is enhanced in a client server network because the
server maintains security.
IEEE 802.3 defines Ethernet in a variety of standards. These standards establish the
requirements for Ethernet's physical and data-link layers. The most critical 802.3 standards
are as follows:
10Base-T (IEEE 802.3) – 10 Mbps with category 3 unshielded twisted pair (UTP)
wiring, up to 100 meters long.
100Base-TX (IEEE 802.3u) – known as Fast Ethernet, uses category 5, 5E, or 6 UTP
wiring, up to 100 meters long.
100Base-FX (IEEE 802.3u) – a version of Fast Ethernet that uses multi-mode optical
fiber. Up to 412 meters long.
1000Base-T (IEEE 802.3ab) – Gigabit Ethernet that uses Category 5 UTP wiring.
Up to 100 meters long.
Take note of how the first number in the standard's name denotes the network's speed in
megabits per second. The term baseband refers to signals that are sent unmodulated. The
last portion of the standard's name relates to the signal transmission cabling. For instance,
1000Base-T indicates that the network's speed will be up to 1000 Mbps, that baseband
signaling will be utilized, and that twisted-pair cabling will be used (T stands for twisted-
pair)
The term "I triple E" refers to the "Institute of Electrical and Electronics Engineers." IEEE is
a professional organization that creates, defines, and evaluates standards in electronics and
computer science. Its purpose is to "encourage technical innovation and excellence for the
greater good of mankind."
The IEEE dates all the way back to the 1800s, when electricity began to have an impact on
society. The AIEE (American Institute of Electrical Engineers) was founded in 1884 to
foster innovation in the electrical field. The IRE (Institute of Radio Engineers) was founded
in 1912 with the mission of developing wireless telegraphy standards. In 1963, the two
organizations combined to become the IEEE. Thousands more standards for consumer
electronics, computers, and telecommunications have been created since then.
IEEE 802
The IEEE Local Area Network Standards Committee (LMSC) founders began discussing
standardization opportunities in 1979, submitting a project proposal titled "Local network
for Computer Interconnection" to the IEEE in August 1979 via the IEEE Computer Society.
The IEEE formally approved the proposal on 13 March 1980. Today, the IEEE 802 Local
Metropolitan and Other Area Networks Standards Committee creates and maintains
networking standards and recommended practices for local metropolitan and other area
networks via an open, consensus-driven standards development process, and advocates for
them globally.
The IEEE 802 family of standards now includes 71 published standards and 54 under
development. IEEE 802 standards are extensively used in the following areas: Ethernet,
Bridging and Virtual Bridged LANs, Wireless LAN, Wireless PAN, Wireless MAN,
Wireless Coexistence, Media Independent Handover Services, and Wireless RAN, with
each area having a separate Working Group.
IEEE 802 also collaborates with other national and worldwide standards organizations,
including as ISO, which has published a number of IEEE 802 specifications as international
standards. Additionally, the IEEE 802 LMSC and working groups have a significant
international following, with regular meetings and sessions conducted across the globe.
Discuss the importance and impact of network topologies and network protocol suites
while comparing the main network topologies and network protocol suites that are
used in network design using examples. Recommend suitable network topologies and
network protocol suites for above scenario and justify your answer with valid points.
What is network topology?
The topology of a network refers to the arrangement of nodes (for example, networking
switches and routers) and connections.
No two networks or organizations are identical. However, many businesses rely on well-
established network architectures. The topologies of networks dictate how devices are
connected and how data is exchanged between them.
A logical network design illustrates how devices operate at different abstraction levels. This
graphic illustrates the physical connections between devices. It is possible to observe both
logical and physical topologies.
A topology map of a network illustrates the physical network arrangement of connected
devices. A network topology chart may assist you in comprehending how devices link and
how to resolve issues.
Enterprise networks have employed a number of topologies in the past and present. We will
look at several network topologies such as bus, ring, star, mesh, and hybrid.
1.Bus Topology - Budget-friendly, yet prone to failure, and only suitable for low-volume
traffic. Although it is no longer used in office networks, it is still present in many consumer
products.
2.Ring Topology - While it is simple to maintain and poses no collision danger, it does
require that all nodes be switched on and fully functioning. Nowadays, it is seldom used.
3.Star Topology - All devices are connected through a central switch, which enables the
insertion of new nodes without resetting old ones. This design eliminates the need for cable
and is simple to handle. However, the health of the switch is critical. This topology requires
monitoring and maintenance. However, this is a frequent topology.
5.Mesh Topology - Each node is directly connected to all other nodes. This design,
however, requires a great deal of wiring and is difficult to handle. Wireless networks enable
this topology.
6.Hybrid Topology - This topology is formed by the union of two or more. This is an
excellent method for rapidly integrating diverse networks into a unified system. In contrast
to "hybrid network topology," "hybrid system" refers to a combination of on-premises and
cloud resources.
Bus Topology
Pros:
Simple installation
Reduced cabling requirements compared to Mesh and Star topologies Beneficial for SMEs
Low cost
Easy to manage and expand
Cons:
A strong backbone is necessary.
Easily blocked during rush hours
Each extra node results in a decrease in efficiency.
At each point in time, data can only flow in one direction.
A bus topology is a network topology in which each device is connected to a single cable.
This network topology is sometimes referred to as line topology. A bus topology is capable
of transmitting data only in one way. Two terminals are present in a linear bus topology.
Coaxial or RJ45 cables are used to link devices in smaller networks. However, bus topology
is antiquated, and you are unlikely to come across a business that still uses it.
Advantages
Smaller networks, on the other hand, often used bus topologies. The arrangement is one of
the primary factors. Because everything is connected by a single cable, there is no need for
a sophisticated topology.
Additionally, the design reduced the cost of bus topologies by use a single wire. If more
devices are required, just connect your connection to another wire.
Disadvantages
However, depending on a single cable creates a vulnerability. When cables fail, networks
fail. Businesses would suffer financial and operational losses if their cable went down.
Because data travels via a single wire, increased traffic would affect network performance.
These are suitable for small networks. A bigger network equates to slower data transfer.
Notably, bus topologies are bidirectional, which means that data cannot flow in both
directions concurrently.
Ring Topology
Pros:
Cons:
Bidirectional ring topologies, as previously indicated, are referred to as dual ring topologies.
A twin ring architecture gives two connections to each node. Data may flow in any
direction.
Advantages
The use of token-based protocols, which restrict data transmission to a single station at a
time, mitigates the risk of packet collisions. This is compounded further by the fact that data
may travel swiftly across network nodes, which can be enhanced with the addition of new
nodes.
Dual ring topologies provide an additional layer of security against failure. For instance, if a
ring collides with a node, the next ring may act as a support. Additionally, rings were
inexpensive to install.
Disadvantages
Ring topologies were phased out because to their proclivity for failure. A single node failure
may bring a whole network to a halt. This indicates that ring topology networks must be
examined for node health on a frequent basis. Even if all of your nodes are functioning
normally, a transmission line failure might bring your network to a halt!
Scalability difficulties were associated with ring topologies. For instance, all network
devices share the same amount of bandwidth. When devices are added to a network,
communication delays occur. The number of devices added to a network design must be
carefully monitored to prevent network resources from being overstretched.
Modifications to existing nodes or addition of new nodes in a ring topology necessitated
network shutdown. To adjust the topological structure, you must account for downtime!
Star Topology
Pros:
Cons:
Each network node is connected to a single central switch through a star topology. It is
immediately connected to the switch and is indirectly connected to every other node. The
primary network hub functions as a server, and the other devices function as clients. The
central node is responsible for managing data flows across the network and acts as a
repeater. Star topologies connect computers through coaxial, twisted pair, or optical fiber
connections.
Advantages
Disadvantages
While star topologies are almost impenetrable, if the central switch fails, the whole network
collapses. As a consequence, the administrator must check the central node's health on a
frequent basis. The performance of the network is dependent on the setting of the central
node. Although star topologies are easy to administrate, they are not cheap to set up and run.
Tree Topology
Pros:
Cons:
A network with a tree topology is shaped like a tree with several branches. The root node of
a tree is connected to the node hierarchy of another tree. Parent-child hierarchy with just
one reciprocal connection. A tree topology must include three levels of hierarchy in order to
be classified as such. This design is used in Wide Area Networks to accommodate a large
number of geographically scattered devices.
Advantages
Tree topologies are most often used to expand bus and star topologies. It's simple to expand
the network's nodes as your business develops in size using this hierarchical structure.
Additionally, this structure is advantageous for locating and resolving faults, since it allows
for systematic examination of network performance issues across the tree.
Disadvantages
In tree topology, the root node is the weakest connection. If the root node fails, the subtrees
are partitioned. Other network devices, such as the failed node's parent, will continue to
have restricted connectivity.
Maintaining the network system is likewise challenging, since adding nodes increases its
complexity. Additionally, a tree topology needs more wires. Cables are required to connect
each item in the hierarchy, complicating the network topology.
Mesh Topology
Pros:
Cons:
Mesh topology is the connecting of nodes on a point-to-point basis. In this design, data is
routed and inundated. Routing logic is used by a node to determine the shortest route to the
packet's destination. In comparison, flooding distributes data to all nodes in the network.
Flooding operates independently of any routing theory.
There are two forms of mesh topology: partial mesh topology and full mesh topology. In a
partial mesh design, nodes are partially connected to two or three other nodes. Each node is
connected by a complete mesh topology.
Advantages
Mesh topologies are used because they are reliable. Due to their linked nature, nodes are
very robust to failure. No one machine is capable of bringing the whole network to a halt.
The fact that there is no single point of failure is one reason this is a popular topology.
Additionally, this arrangement is secure.
Disadvantages
Mesh topologies are inherently inefficient. They need substantial configuration once
introduced. The topological arrangement is more difficult than that of many other
topologies, which is reflected in the setup time. You'll need to install a significant amount of
new wiring, which might get costly.
Hybrid Topology
Pros:
Adaptable
Appropriate for medium-sized and big companies
Indestructible
Adaptable to the equipment that we use
Cons:
A hybrid topology is formed by the combination of two or more distinct topologies. Hybrid
topologies are particularly prevalent in larger businesses, where different departments have
their own network topologies. By combining these topologies, a hybrid topology is created.
As a consequence, the topology affects the capabilities and vulnerabilities.
Advantages
Hybrid topologies are used for a variety of reasons, the majority of which need flexibility. A
hybrid topology may accommodate a variety of network constraints and can integrate many
topologies. As a result, hybrid topologies are scalable. Scalability is an advantage of hybrid
designs for larger networks.
Disadvantages
Hybrid topologies may be somewhat intricate, depending on the topologies employed. Your
hybrid topology must be managed in accordance with its specific network requirements.
Administrators will be required to maintain many topologies rather than simply one,
increasing the difficulty of their work. Additionally, a hybrid topology may be rather costly
to implement.
IEEE 802.3 is the Ethernet standard. It is a decentralized broadcast network based on buses.
It may operate at a speed of 10 Mbps or 100 Mbps. Computers linked using Ethernet have
the ability to broadcast at will. When two or more devices broadcast simultaneously,
packets clash. After a certain time period, the transmitting computers simply retransmit.
Ethernet is the most extensively used LAN technology.
Ethernet was invented at the University of Hawaii to connect computers across the islands.
It was a design for a radio. Ethernet is the most frequently used local area network (LAN)
protocol, accounting for around 85 percent of all computer networks. Ethernet is composed
of three primary components:
Ethernet node is a term that refers to a computer that is connected to an Ethernet network.
Ethernet nodes all share a common medium through which Ethernet signals are serially
sent, one data bit at a time. To transmit data, a station must first listen to the channel and
then send data through an Ethernet frame, or packet. Ethernet rules (protocol) are designed
to ensure that each node has an equal opportunity to send frames.
Each Ethernet frame sent over the shared channel performs a destination address check. The
interfaces compare the frame's destination address to their own. The Ethernet interface with
the same address as the destination of the transmission will read the whole frame and
discard the data.
Ethernet standard with a data transfer rate of 100 Mbps. Fast Ethernet, as specified by IEEE
802.3u, is used to link departmental backbones, high-speed server connections, and
workstations running bandwidth-intensive programs such as CAD or multimedia.
Fast Ethernet networks use the same CSMA/CD media access control protocol as standard
Ethernet 10Mbps networks. All 100BaseT technologies are implementations of Fast
Ethernet. They employ Fast Ethernet hubs and switches in a star topology. Fast Ethernet is
available in three different transmission or cabling configurations:
2.A duplex multimode fiber-optic cable equipped with ST connectors for usage as a
backbone cable.
3. 100BASE-T4: This standard utilizes four wires and enables the transmission of Fast
Ethernet over category 3 or above cable.
Due to the auto-negotiation characteristics of the Fast Ethernet standard, manufacturers may
now provide dual 10/100-Mbps networking equipment capable of easily integrating Fast
Ethernet into existing 10BaseT networks.
It is without a doubt the easiest and most cost-effective method of meeting escalating
bandwidth needs. The following are the advantages of upgrading to Fast Ethernet:
1.Fast Ethernet does not need extra network administration or troubleshooting tools when
added to existing 10-Mbps Ethernet networks.
2.In contrast to ordinary Ethernet, which is limited to 10 Mbps for voice, data, and video.
3. Fast Ethernet networks use the same deployed media as 10 Mbps Ethernet networks.
4. Transition to Fast Ethernet slowly using autosensing 10/100 hubs and network interface
cards.
Since its inception at Xerox in the early 1970s, Ethernet has been the dominant networking
protocol. Ethernet has the most deployed ports and the greatest cost-performance ratio for
desktop connections when compared to Token Ring, Fiber Distributed Data Interface
(FDDI), and Asynchronous Transfer Mode (ATM). Fast Ethernet is a straightforward and
cost-effective backbone and server connection solution that increased Ethernet speed from
10 to 100 Mbps.
Due to the fact that it is built on top of Ethernet, it is ten times quicker at 1000 Mbps (1
gigabit per second) than Fast Ethernet (Gbps). This protocol was established in June 1998
for use with high-speed local area network backbones and server communication. Because
Gigabit Ethernet is built on Ethernet, users can operate and maintain gigabit networks using
their existing expertise.
2. The work and timeline associated with the Gigabit Ethernet standard
Numerous changes to the physical interface are necessary to increase the speed of 100 Mbps
Fast Ethernet to 1 Gbps. Gigabit Ethernet will be similar to Ethernet at the data link layer.
IEEE 802.3 Ethernet and ANSI X3T11 Fibre Channel were combined to overcome the
speed limitations of 1 Gbps.
1. VLANs increase the number of broadcast domains while decreasing their size.
2. VLANs protect against security concerns by restricting the number of hosts that switch
frames to.
3. To increase security, separate essential data hosts into their own VLAN.
4. You may create networks that group users according to their departments rather than their
actual locations.
Without VLANs, a broadcast from host A would reach all network devices. Each device
will receive and analyze broadcast frames, resulting in increased CPU load and a reduction
in network security.
Compare common networking principles and how protocols enable the effectiveness of
networked systems.
Network protocols
Network protocols establish the means through which devices interact with one another
across a network. In other words, network protocols are languages that two devices must
understand in order to communicate smoothly, regardless of their architecture or design.
To grasp network protocols, one must first grasp the notion of Open Systems
Interconnection (OSI). The OSI model is the fundamental architectural paradigm for
communications over the internet.
According to the OSI model, network communication is divided into seven layers. Each of
these layers has a task or group of tasks. Each layer is self-contained, with its own set of
functions.
To put this into context, the following is an example of two network devices interacting
using the OSI model:
The OSI model is composed of seven layers: upper layers (7, 6, and 5) and lower layers (4,
3, and 2). (4, 3, 2, and 1). The upper layers are concerned with applications, whereas the
lower layers are concerned with data transport.
Each layer of the OSI model is associated with a distinct set of network protocols. A
network protocol is used at each stage of the communication exchange.
The following sections provide detailed descriptions of how network protocols function at
each OSI layer:
Classification of network protocols
Once you've grasped the OSI model, you may begin classifying protocols. These are the
most frequently used network protocols.
Monitoring internet activity becomes more difficult if a device's IP address changes over
time.
Because DHCP-enabled machines' IP addresses vary, they cannot be servers.
DNS is a protocol that translates host names to IP addresses. Dns is a client-server system
that makes use of a distributed database that is shared amongst name servers.
IP addresses are used to identify hosts, however they are difficult to memorize. Due to the
dynamic nature of IP addresses, it is critical to map domain names to IP addresses. The
Domain Name System (DNS) resolves this issue by converting domain names to IP
addresses.
Advantages
Disadvantages
DNS queries do not include any client-specific data. Due to the fact that the DNS server
only sees the request's IP address, hackers may control the server.
If hackers compromise DNS root servers, they may reroute users to other websites for
phishing.
TCP-based File Transfer Protocol (FTP) enables file sharing between local and remote
locations. FTP establishes two TCP connections: one for control and one for data. The
control connection exchanges control data such as passwords and file retrieval and storage
requests, while the data connection exchanges actual files. Both connections function in
parallel during the file transfer.
Advantages
Allows for the sharing of large files and several directories. Permits you to continue
exchanging files.
Allows for data recovery and scheduling of file transfers.
Disadvantages
FTP is an insecure protocol. Data, usernames, and passwords are sent in clear text, which
makes them vulnerable to hackers.
FTP is not encrypted and so does not satisfy industry standards.
HTTP is an application-layer protocol that enables distributed, collaborative, and rapid data
exchange. The web browser is the client in a client-server system. HTTP is used to transport
text, images, and other multimedia content. In a request-response protocol, the client
initiates communication with the server, which processes the request before giving a
response.
HTTP is a stateless protocol, which means that the client and server communicate only
while they are connected. The client and server then lose track of one another. Both the
client and server are unable to retain data as a result of this incident.
Advantages
Concurrent connections are minimized, which results in decreased memory and CPU use.
You are not need to disconnect in order to report issues!
Reduced TCP connections results in decreased network congestion.
Disadvantages
IMAP enables users to view and modify messages stored on a mail server directly from
their email client. IMAP is a client-server protocol that enables concurrent access to a mail
server by many clients. IMAP enables the creation, deletion, and renaming of mailboxes, as
well as the setting and removal of flags. IMAP has been upgraded to version 4 revision 1.
Advantages
This is due to the fact that emails are stored on the mail server.
If you delete emails or data inadvertently, you may always retrieve them from the mail
server.
Disadvantages
Advantages
Disadvantages
If the local device that downloaded the emails dies or is stolen, the emails are gone.
SMTP is a very dependable and efficient technology for transporting email. SMTP is a push
protocol for email transmission, while POP and IMAP are used for email retrieval. SMTP is
used to transmit and receive emails between computers. SMTP enables a client to send
email to another client on the same network or through a relay or gateway to another
network.
Advantages
Installability.
There are no restrictions on the kind of system to which you may connect.
It is not dependent on your contribution.
Disadvantages
Interactions between servers might cause message delivery to be delayed and message
delivery failure rates to rise.
Certain firewalls block SMTP ports.
8.Telnet: Terminal emulation protocol
Telnet is an application layer protocol that enables communication between distant devices.
On the user's computer, a Telnet client program is installed that establishes a connection to a
remote system running a Telnet server application.
Network administrators use it to manage remote devices. After inputting the remote device's
IP address or host name, the network administrator is presented with a virtual terminal
through which the host may be communicated with.
Advantages
Disadvantages
Telnet lacks encryption and transmits sensitive data in plain text, which makes hacking
easier.
Costly as a result of slow typing.
SNMP is used to manage servers, workstations, routers, switches, and other IP network
components. A network administrator may use SNMP to diagnose and resolve issues.
SNMP is composed of three components: managed devices, agents, and managers.
The SNMP agent for the controlled device. The agent is a software module that is familiar
with the local management environment and translates it to a format compatible with
SNMP administrator To aid network administrators in managing nodes, the SNMP manager
presents data from the SNMP agent.
SNMP is available in three flavors: v1, v2, and v3. SNMP versions 1 and 2 are comparable,
however SNMP 2 introduces additional protocol functionalities. SNMP v3 enhances
previous versions with security and remote configuration.
Presentation layer network protocols
RPC is a protocol for requesting a service from a remote computer's software via a network.
RPC communicates between apps through TCP or UDP. RPC is a protocol that
communicates between clients and servers. The client makes a request for services, which
the server fulfills.
Advantages
Disadvantages
Advantages
Three things are guaranteed by TCP: data comes on time and without duplicate.
TCP automatically compresses data before to transmission.
Disadvantages
Unix domain protocol (UDP) is a simple yet insecure communicating technology. Unlike
TCP, UDP is not reliable, does not have flow control, and does not support error recovery.
When TCP's reliability measures are not needed, UDP is advantageous. UDP does not
provide packet retransmission.
Advantages
Disadvantages
IPv4 is a network layer protocol that comprises addressing and control information that
assists in the routing of packets across a network. IP and TCP operate in unison to transport
data packets over a network. Each host is allocated a 32-bit IP address that is composed of
two basic components: the network address and the host address. The network number
uniquely identifies a network and is issued by the internet, but the host number uniquely
identifies a host on the network and is assigned by a network administrator. IP is alone
responsible for delivering the packets, whereas TCP assists in reordering them.
Advantages
Disadvantages
IPv6 is the Internet Protocol's most recent version, a network layer protocol that facilitates
packet routing. IPv6 was created to succeed IPv4. Instead of 32 levels of addressing, there
are now 128.
Advantages
IPv6 provides much quicker routing and packet processing than IPv4. Superior than IPv4
security.
Disadvantages
ICMP is a protocol at the network layer that is used to transmit error messages and
operational data. Out-of-band network messaging is accomplished via ICMP messages
included inside IP packets. ICMP is a protocol that is used to communicate network faults,
congestion, and timeouts.
Advantages
Disadvantages
Advantages
The ARP cache saves all MAC addresses and transforms them to IP addresses
automatically.
Disadvantages
Advantages
Disadvantages
SLIP does not permit the simultaneous establishment of network connections across several
OSI levels.
SLIP does not handle synchronous connections, such as those established between a modem
and an internet service provider via the internet (ISP).
Activity 02
Discuss the operating principles of network devices (Ex: Router, Switch, Etc.) and
server types that can be used for above scenario while exploring different servers that
are available in today’s market with their specifications. Recommend server/servers
for the above scenario and justify your selection with valid points.
The term "network devices" or "network equipment" refers to electronic devices used in
networking. Network devices are used in computer networks to send data quickly and
securely between computers, fax machines, and printers, among other devices. Devices that
connect to an intranet or an internetwork. Certain devices are integrated within the device,
such as an RJ45 connection or a network interface card, while others are network devices,
such as a switch or router. These devices properly handle digital or electrical connections in
order to perform their functions. This article discusses the operation of network devices.
In a computer network, network devices are utilized to communicate amongst the different
hardware components. Sometimes known as hardware, network equipment, or computer
networking devices, these products are also referred to as computer networking devices.
Each network device in a computer network performs a certain function and serves a
defined purpose at each segment.
In a computer network, several kinds of network devices are utilized, including the
following.
1.Network Hub
2.Network Switch
3.Modem
4.Network Router
5.Bridge
6.Repeater
Network Hub
A network hub is a networking device that is used to communicate with and deliver data
between other network hosts. A computer network may be used to send data packets. While
processing data from a host to a network hub, it is possible to transfer data to all connected
ports. Likewise, all ports identify inefficient and inefficient data pathways. As a result, a
network hub cannot be considered safe and secure. Copies of data packets across all ports
cause the hub to slow down, requiring the usage of a network switch.
Activity 03
Prepare a written network design plan to meet the above mentioned user requirements
including a blueprint drawn using a modeling tool. (Ex: Microsoft Visio, EdrawMax).
Support your answer by providing the VLAN and IP subnetting scheme for the above
scenario and the list of devices, network components and software used to design the network
for above scenario and while justifying your selections.
3.1 Prepare a written network design plan to meet the above mentioned user
requirements including a blueprint drawn using a modeling tool.
Project Scope
ERP and CRM must be installed on separate servers for customer service and legal, finance,
and HR.
3. Servers 05
4. Routers 02
5. Wifi access point 01
Support your answer by providing the VLAN and IP subnetting scheme for the above
scenario and the list of devices, network components and software used to design the
network for above scenario and while justifying your selections.
3.1.3 VLAN and IP subnetting scheme
Hardware Components
1. Routers
2. Switches
3. Wifi access point
4. Servers
5. PCs
6. Transmission Media(UTP)
Software Components
Draw.IO builds flowcharts, UML diagrams, floor plans, and office layouts. Infographics and
tech drawings are supported.
Using templates and symbols, start network design instantly. Professional templates abound.
Draw.IO imports and exports Visio diagrams. Visio, Word, PDF, HTML, JPEG.
Draw.online IO works on every device and OS system. Online-only Draw.IO.
This network design tool offers HTML-linked schematic sharing. Cloud storage allows
collaboration from several devices.
Test and evaluate the proposed design to meet the requirements and analyse user
feedback by using a User feedback form.