0% found this document useful (0 votes)
38 views

Net Rish

This document contains details of an internal verification of assessment for a BTEC Higher National Diploma in Computing student. It includes the assessor's evaluation of the student's work against the assessment criteria for Unit 02: Networking. The internal verifier confirmed that the assessor's evaluation and awarded grades were accurate and justified. Minor feedback was provided to the assessor, but no changes were required to the assessment decision. The internal verifier and assessor both signed off on the verification.

Uploaded by

Rishad Jobbs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views

Net Rish

This document contains details of an internal verification of assessment for a BTEC Higher National Diploma in Computing student. It includes the assessor's evaluation of the student's work against the assessment criteria for Unit 02: Networking. The internal verifier confirmed that the assessor's evaluation and awarded grades were accurate and justified. Minor feedback was provided to the assessor, but no changes were required to the assessment decision. The internal verifier and assessor both signed off on the verification.

Uploaded by

Rishad Jobbs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 74

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)


INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title BTEC Higher National Diploma in Computing

Ama
Assessor Internal Verifier
Unit 02: Networking
Unit(s)
LAN Design & Implementation for SYNTAX SOLUTIONS
Assignment title
M.M Mohammad Rishad
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the Y/N
student work?

Has the work been assessed


accurately? Y/N

Is the feedback to the student:


Give details:
• Constructive?
Y/N
• Linked to relevant assessment criteria?
Y/N
• Identifying opportunities for Y/N
improved performance?
• Agreeing actions?
Y/N
Does the assessment decision need
amending? Y/N

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if required)
Date
Confirm action completed
Remedial action taken
Give details:

Assessor signature Date


Internal Verifier
signature Date
Programme Leader
signature (if required) Date
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID
Unit 02: Networking
Unit Title
Assignment Number 1 Assessor
Date Received
Submission Date 1st submission
Date Received 2nd
Re-submission Date submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1
Descripts

LO2 Explain networking devices and operations.


Pass, Merit & Distinction P3 P4 M2 D1
Descripts

LO3 Design efficient networked systems.


Pass, Merit & Distinction P5 P6 M3 D2
Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & Distinction P7 P8 M4 D3
Descripts

Grade: Assessor Signature: Date:


Resubmission Feedback:

Grade: Assessor Signature: Date:


Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.

Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

Assessor Date
signature

Student [email protected] Date


signature m
Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01

General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No,
and Page Number on each page. This is useful if individual sheets become detached for any
reason.
5. Use word processing application spell check and grammar check function to help editing
your assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your
work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation
and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct form. I further understand what it
means to copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

[email protected]
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)
Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number

Unit Number and Title Unit 2: Networking

Academic Year 2021/22

Unit Tutor

Assignment Title LAN Design & Implementation for SYNTAX SOLUTIONS

Issue Date

Submission Date

IV Name & Date

Submission format

The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although
you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

Assignment Brief and Guidance:

Scenario

SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The
Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They are
planning to make it one of the state-of-the-art companies in Matara with the latest facilities.

It is expected to have nearly 150 employees in Matara branch.

Department Number of Users

Customer Care 10

Sales and Marketing 20

Finance 25

Legal 5

HR 10

Developers 55

Network Team 5

Server Room Servers +ISP connections

Following requirements are given by the Management.


 A ll the depa rt men ts mus t be separated wit h unique subnet and shou ld not
commu nic ate with each ot her unless there is a special requirement .

 19 2.168 .1 0.0/24 is giv en and sh ou ld be used for a ll t he depa rt men ts exce pt the
server room. IP s should assig n us ing DHCP .

 ERP and CRM Systems ne ed to be im pleme nte d in Mat ara b ra nch in loca l serve rs.

 Number of s ervers required f or the Server room ne ed to be decide d b y t he


Netw ork de signe r and shou ld be assigne d w ith 10 .2 54.1.0/24 su bne t. (Use s stati c
IPs )

 High level of redundancy is expec ted in ne twork desig n t o elim ina te sing le poin t
of fa ilures an d t ra ffi c b ott le nec ks.

 Sales and Mark eti ng Team need to acce ss Netw ork re sourc es us ing W IFI
connec ti vity.

 Proper methods for networking monitoring and troubles hooti ng need to be


e stab lish ed .

 A ll p ossible network s ecurity mec han isms sh ou ld be im pleme nte d.

Assu me you hav e bee n app ointe d as the ne w netw ork consultan t of S YNTA X S OL UTIONS .
P re pare a ne twork a rch it ectu ra l desig n and im pleme nt it w ith your sugge sti ons an d
recomme nda ti on s to meet th e compa ny re quire me nt s.

(Note: Clearly state your assumpti ons. You ar e allowed to design the network according
to your assumpti ons, but main requir ements should not be violated)

Acti vity 01
 D isc uss the bene fi ts and constraints of d iff e re nt ne twork sy ste m typ es that can be
imp le ment ed in th e Mata ra b ranc h an d the main IEEE Et herne t stan dards th at can
be u sed in ab ove LAN and W LAN de sign.

 D isc uss the im porta nce an d im pact of ne twork topologies an d net work prot ocol
suites wh ile com parin g the main netw ork topologies and ne twork prot ocol suite s
th at a re u sed in netw ork de sign using examp le s. Rec om mend su ita ble net work
t opologies an d n etw ork prot ocol su ite s for above sc ena rio and justi fy you r answer
w ith va lid point s.

Acti vity 02
 Discu ss t he op erati n g prin ciples of net work devices (E x: Rou ter, Sw itch , E tc.) and
se rve r typ es tha t can be u sed for abov e sc ena rio wh ile explorin g d iff e re nt se rve rs t hat
are ava ilab le in toda y’s marke t wit h the ir spec ifi ca ti on s. Recomme nd se rve r/se rv ers
for the abov e scena rio an d justi fy your se lec ti on w ith va lid poin ts.

 Discu ss the inte r- depe nde nce of worksta ti on ha rdw are wit h n etw orking soft w are and
prov ide exa mp le s for ne tworkin g soft wa re th at can be u sed in abov e ne twork desig n.
Acti vity 03
 Prepa re a writt en netw ork de sign pla n to meet the ab ove men ti one d user
re qu ireme nt s inc lud in g a b lue prin t drawn usin g a modelin g tool. (Ex : Microsoft Visio,
Edraw Max).
Supp ort y our an swe r by providing the VLA N and IP sub netti ng schem e for th e ab ove
scen ario and the list of dev ice s, net work comp one nt s and soft wa re use d to design the
netw ork for abov e scena rio an d wh ile ju sti f ying you r se lec ti on s.

 Test and ev aluate the p ropose d desig n to meet the req uire me nts and an alyse use r
feed back by usin g a Use r feed back form .

 Install an d confi g ure Netw ork se rv ice s, de vic es and app lica ti on s (Ex : VLA N,DHCP ,
DNS ,P roxy , Web , Etc. ) accord in g t o the prop osed desig n to accom plish the user
re qu ireme nt s an d desig n a deta iled M ainte nance sc hedu le for ab ove Net work .

* Note: - Screen shots of Confi gurati on scripts should be pres ented.

Acti vity 04
 Imp le ment a netw orke d sy ste m ba sed on your prepa re d de sign w ith valid evidenc es
and recomme nd p ote nti al fut ure enh ance ment s for the ne twork ed system wit h va lid
ju sti fi c ati ons to your rec omme nda ti on s. Use criti ca l refl ec ti on to c riti cally eva lu ate
the de sign, pla n, confi g urati on, and testi ng of you r ne twork wh ile ju sti f ying with valid
conc lu sion s.

 Deve lop test cases and con duct ve rifi ca ti on (Ex: Ping, exten ded p ing , t race rout e,
telne t, SSH, etc. ) t o te st the ab ove Netw ork and analyse the test resu lt s aga in st the
expec ted resu lt s.
Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.

LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and
server types.
P4
Discuss the inter-dependence of workstation hardware with
relevant networking software.

M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.

LO 1 & LO2
D1 Critically evaluate the topology protocol selected for a given
scenario to demonstrate the efficient utilisation of a networking
system.
LO3 : Design efficient networked systems
P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
Install and configure network services and applications on your
choice.
D2
Design a maintenance schedule to support the networked
system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.
Activity 01

 Discuss the benefits and constraints of different network system types

Network

A network consists of two or more interconnected computers to share resources (such as


printers and CDs), exchange data, and enable electronic communication. A network's
computers may be connected through cables, telephone lines, radio waves, satellites, or
infrared light beams.

Network topologies and types of networks

The word "network topology" refers to the method in which connected devices are
connected geometrically. Devices are represented as vertices in a network, while their
connections are represented as edges. It defines the amount of connections that each device
has, their order, and the hierarchy type.

The bus topology, mesh topology, ring topology, star topology, tree topology, and hybrid
topology are all examples of common network configurations.
Figure 02:Types of topologies

Examples of network topologies

The majority of home networks are configured in a tree topology and connected to the
Internet. While business networks usually use tree topologies, they frequently include both
star and intranet topologies.

Computer Network Types

A computer network is a collection of computers that are connected in such a way that they
can interact with one another and share resources, data, and applications.

According to its size, a computer network can be classified. There are four main kinds of
computer networks:

Computer Network Types


LAN(Local Area Network)
PAN(Personal Area Network)
MAN(Metropolitan Area Network)
WAN(Wide Area Network)
Computer Network Types
LAN(Local Area Network)
PAN(Personal Area Network)
MAN(Metropolitan Area Network)
WAN(Wide Area NetwoComputer Network Typ
 LAN(Local Area Network)
 PAN(Personal Area Network)
 MAN(Metropolitan Area Network)
 WAN(Wide Area Network)

1.LAN

The term LAN refers to a 'Local Area Network.' As the name indicates, it connects
computers by surrounding them in a radius of between 10m and 1.5km. LANs are often
found in settings such as businesses, universities, schools, clusters of buildings, and
corporate organizations because to their restricted local area coverage.

A single person or small company controls and utilizes this network. This network enables
resource sharing, data storage, and document printing by linking devices such as printers,
scanners, projectors, and other storage components.

Ethernet cables and Wi-Fi are often used to connect the LAN, as are Token Ring and Fiber
Distributed Data Interface, or FDDI. The most commonly used protocol in this network is
TCP/IP.

LAN is also used to describe sharing your internet connection with another individual. A
LAN might consist of as little as two computers.

A LAN's transmission rate is normally between 4 and 16 megabits per second (Mbps), but
may go up to 100 Mbps. We may use any network architecture that meets the network's
needs to connect the hosts in a LAN, such as a bus or ring topology, to connect them.

We are capable of connecting up to 1000 computers to a LAN. The bulk of LANs are wired.
It is, however, now used wirelessly, i.e., in wireless communications. The advantages of this
network include its high speed, low operating costs, and security.
Figure 03 – Local Area Network

Features of LAN:

The network capacity of a LAN is limited to a single room and small geographical areas,
such as houses, small enterprises, and offices.

The advantage of the LAN is that it enables high-speed data transfer.

Due to the fact that backup files are stored on a server, file transfer and recovery are more
manageable on a local area network (LAN).

It is not linked to any external system, which ensures privacy.

The LAN network is a privately owned network; no government body controls it.

The network is between 1m and 1.5km in length.

Uses of LAN:

LANs are often used as a local network at home and on-campus at colleges and universities
for data sharing. Similarly, LANs are used as corporate intranets through wifi.

Advantages of LAN:
Unlimited data sharing through local area networks, which make use of computer resources
such as printers, DVD-ROM drives, modems, drives, and hard disks; this reduces costs.

Software Applications for Collaboration: It is more cost beneficial for each customer to
share the same software than to purchase individually licensed software.

Communication will be easy and affordable because to the rapid transmission of data and
messages between networked computers.

Because all user data is stored in the server's database, there is no chance of data or
document loss. Because there is a backup option for preventing such errors

Intermediate level of security.

Internet Sharing: A local area network makes it possible for all LAN users to share a single
Internet connection.

Disadvantages of LAN:

Although LANs save money over time by pooling computer resources, the initial cost of
setting up a local area network is quite high.

LAN Administration: A LAN administrator is responsible for software installation, wiring


configuration, hardware failures, and cable problems.

Server Load: If the server is not up to par, it cannot handle a large number of computer
connections without causing harm.

Security: There is a danger of insecurity due to the possibility of hackers breaking into the
system. Similarly, viruses and malware may infiltrate a LAN, wreaking havoc on everyone
connected.

Covers a Small Area: A local area network (LAN) is a network that covers a small area,
such as a house, an office, a building, or a cluster of neighboring buildings.

2.MAN

The term MAN refers to the 'Metropolitan Area Network.' The WAN is a more
sophisticated form of the LAN network that is often used in cities and other locations with a
range of 5-60 kilometers for the purpose of transmitting data at high rates.
Because they connect several LANs over a shared bridge, MANs are high-speed
connectivity networks.
This MAN network connects two or more local area networks. This link is referred to as a
backbone line, and it is often constructed utilizing optical fiber and twisted pair cables to
boost the speed of data transfer. This network connects the city's most illustrious
institutions, schools, government buildings, and business organizations.

Thus, a MAN network is made up of several LANs. Cable television is the best example of
a MAN, since its cable extends across the city and the user receives the service through the
cable network.

A major corporation's management information system is self-contained (MAN). Which it


utilizes to establish a connection to a distinct branch. When built on a college campus, these
networks are referred to as CANs (campus area network).

A MAN may be conceived of as a collection of one or more local area network (LAN)
networks that are connected by a single cable. The most widely used protocols in MAN
communication are RS-232, X-25, Frame Relay, and ATM.

Figure 04 – MAN (Image from sciencedirect.com)

Features Of MAN:

MAN has a greater network coverage than LAN but less than WAN.

It is bounded by enormous geographic areas, such as a town or metropolis.

The pace of data transport is rather sluggish.


It may be privately or publicly owned.

The network covers a distance of around 5 to 60 kilometers.

Uses of MAN:

MAN is used in a wide array of government institutions, police stations, and commercial
establishments around a city. Officers and employees may easily communicate with one
another, as well as with their departments and branches, in order to quickly send essential
data and messages throughout this network without the need for an Internet connection.

As a result, it facilitates resource sharing across a wider area in the city than LAN networks
do.

Advantages of MAN

MAN communicates at fast speeds using fiber optic cable.

This provides a robust backbone for large networks and extends the reach of wide area
networks.

It connects a lot of towns and cities, giving good connection over large areas at a
reasonable cost.

MAN's dual bus design permits concurrent data flow in both directions.

Disadvantages of MAN

Additional cables are required to connect connections from one site to another in MAN.

The longer the cable, the more expensive it is to build the MAN. From such a wide distance,
anybody may hijack the network.

Due to the impossibility of securing every point of the network over vast areas, bad persons
may more easily obtain access to it for their own purposes.
The system has significant challenges in defending from hackers' graphic areas and
industrial espionage.

3.WAN

A WAN is an acronym for 'Wide Area Network.' A wide area network (WAN) is used to
connect computers that are geographically dispersed.

It is a grouping of numerous LANs that spans a much larger geographical area than LAN
and MAN. In contrast to LAN, WAN, and MAN networks, WAN networks have a more
wide geographical perimeter, such as a network of systems covering a whole city, country,
or even continent.
This network communicates in the same way as LANs and MANs do. The vast majority of
wide area networks (WANs) are public networks, which include telephone lines and
satellites, telephone systems, and leased lines.

In general, WANs use fiber optic cable as the transmission medium. This network runs at
the physical, data-link, and network layers of the OSI Reference Model. The equipment that
transport data, photographs, video, massive databases, and files via a WAN connection are
more diversified, ranging from routers to switches, bridges, and firewall modems, among
others.

Today, some of the most extensively used WAN protocols are Frame Relay, X-25,
Integrated Services Digital Network, or ISDN, and Point-to-Point Protocol, or PPP. The
Internet is an example of the largest WAN in the world. Individuals may connect from one
area to other computers or users situated anywhere on the world through the Internet. It is
conducted via the use of a public broadcasting system.
Figure 05 – WAN (Image from vidyagyaan.com)

Feature of WAN:

It is often used in mobile and landline phone voice and data applications. This single
network permits the interaction of a large number of persons. Its data transport speed is
variable, ranging from slow to highly fast. A WAN's network range or coverage area is
much bigger, enabling us to transport data globally.

Uses of WAN:

Military services depend on wide area network (WAN) technology. This setup makes use of
satellite broadcasting. WAN is used in this sector to protect the security of military
communications and operations.

Airlines and railroads make ticket booking possible from any point in the country using
WAN networks. This is because client nodes are distributed around the country and are
connected through a single network to a centralized server.

Advantages of WAN:

It covers a large geographical area, enabling the connectivity of long-distance organizations


and corporations through a single network. Workstations that are connected share software
and resources. Messages may be delivered to another system user very rapidly; the rate of
transmission is quite fast even when transmitting massive files greater than 10 MB. Each
user on the network has the same data available to them.

This avoids instances where some users have access to more up-to-date copies of
information than others. All clients linked by WAN will stay in constant communication
with one another, removing the chance of a correspondence gap.
Disadvantages of WAN

A good firewall is needed to prevent anonymous hackers from hacking the data and
disrupting
the network.
Setting up a network is very expensive, slow, and complicated. The more comprehensive the
system, the more expensive it.
There is a need to appoint technicians and supervisors for the full-time maintenance
of
connections.
There is a need to spend many expenses for security purposes.
A robust firewall is necessary to prevent anonymous hackers from stealing data and
disrupting the network.

Creating a network is unreasonably expensive, time intensive, and complex.

The larger the system, the more expensive it is. There is a need for full-time technicians and
supervisors to maintain connections.

Numerous charges are necessary to address security concerns.

PAN (Personal Area Network):

A personal area network (PAN) is a computer network that is created exclusively for the use
of an individual. They are often used to connect multiple devices inside an individual user's
environment, including telephones, tablets, printers, computers, and other digital devices
(typically within 10 meters or 33 feet).

Personal Area Networks (PANs) are used for personal applications, such as data sharing
between devices within a range of ten meters or thirty-three feet. A Personal Area Network,
for example, is when a computer is connected to a printer, scanner, and digital camera
within a 33-foot radius.

Figure 06 – PAN (Image from itrelease.com)


Advantages of Personal Area Network:

In PAN no extra space requires.


2. No need of extra cable and wire.
3. Used in office, conference, and meetings
4. It is used in TV remotes, AC remotes, etc.
5. Data can Synchronize between different devices.
6. Connect to many devices at a time
7. No extra space requires.
8. Affordable Cost.
9. Portable
10. Easy to use:
11. Reliable:
12. Secure:

In PAN no extra space requires.


2. No need of extra cable and wire.
3. Used in office, conference, and meetings
4. It is used in TV remotes, AC remotes, etc.
5. Data can Synchronize between different devices.
6. Connect to many devices at a time
7. No extra space requires.
8. Affordable Cost.
9. Portable
10. Easy to use:
11. Reliable:
12. Secure:
1. In PAN no extra space requires.
2. No need of extra cable and wire.
3. Used in office, conference, and meetings
4. It is used in TV remotes, AC remotes, etc.
5. Data can Synchronize between different devices.
6. Connect to many devices at a time
7. No extra space requires.
8. Affordable Cost.
9. Portable
10. Easy to use:
11. Reliable:
12. Secure:

Disadvantages of Personal Area Network:

1. PAN can be operated in less range of areas.


2. Can only be used for personal area
3. Slow data transfer
4. Interfere with radio signals:
5. Infrared signals travel only in a straight line
SAN (storage area network):

It is a specialized high-speed network designed specifically for the storing of data. Servers,
switches, fiber optic connections, and storage devices all contribute to the network's
construction. Storage devices are not linked directly to the servers in this system.

Rather than that, switches are used to link storage devices to servers. Furthermore, optical
fibers are employed to link the devices. As a result, a SAN has an extremely high data
transmission rate. And it is for this reason that servers and operating systems treat hosted
data or storage devices as if they were local disk drives.

Additionally, it suggests that, despite the presence of various storage devices and servers,
SAN allows access to just block-level activities and aggregated data. And, like all other
types of data storage, SAN has both positive and negative aspects. We will discuss the
advantages and disadvantages of using a SAN in this article (Storage Area Network).

Figure 07 – SAN (Image from datasolutions.com)

Advantages of Storage Area Network :

1.Security

If you're concerned about the security of your data, you should consider using SAN. You
may easily implement a range of security mechanisms on a SAN. For instance, you may use
a virtual SAN to isolate individuals, businesses, or divisions. Additionally, you may utilize
ACLs (Access Control Lists) inside the switches to restrict access to just approved users.
Apart from these, there are various more security measures you may take to protect the
SAN. As a consequence, the SAN's data is completely safeguarded.

2.High-Speed Data Transfer

If you're annoyed by the slow data transfer speeds of your storage network and storage
devices, you'll enjoy SAN. Because SAN technology is based on fiber optics, it is capable of
data transfer speeds surpassing 5 Gbps. It is one of the most modern network technologies
available today for data transfer.

3. Failover Protection (Dynamic)

SAN facilitates automated network operation. It makes no difference whether one or a few
servers fail or go down. In the case of a server failure, automatic traffic rerouting and built-
in redundancy would take over. As a result, your storage network will always be
functioning. This dynamic failover protection feature is beneficial while doing maintenance
on any of the servers.
4. Centralized Backup

Data is stored in a SAN on a block-by-block basis. Furthermore, a SAN centralizes all of its
data. That is, data will be duplicated automatically and kept in a centralized place. As a
result, even if a server disconnects or goes down in the network, the other servers take over
and stabilize the data load. As a consequence, the SAN's data transit remains unaffected.

5. Faster and Cheaper Backup

As previously said, SAN makes use of a centralized backup method. Through the use of
centralized backup technology, one may automate the whole data backup process. Thus, all
of the data on your storage network will be backed up automatically and very
instantaneously. Additionally, it is less expensive than using any other sort of storage
network. Therefore, if backing up your data is taking too long and you'd want to speed it up,
you may utilize SAN, or Storage Area Network.

6.Better Disk Utilization

Improved disk management is another key advantage of SAN deployment. Due to the fact
that all of the storage arrays are connected through a centralized storage network, they may
be managed as a single unit. As a consequence, you may manage and assign storage at the
network level on a per-server basis. Without a SAN, you would have to buy and manually
install several storage disks in servers. By contrast, a SAN solves all of these disk
management issues.

7.High-end Disaster Recovery

In a SAN facility, you may implement industry-leading disaster recovery technologies.


SANs often feature a secondary storage array to facilitate and expedite data backup. Thus,
in the case of a disaster, you'll have a backup of your data that can be recovered quickly if
necessary. While it is true that disaster recovery solutions for storage area networks are
expensive to implement. However, you will be grateful that you installed catastrophe
recovery since the Disaster Restore feature enables you to restore all lost data.

8. Better Availability of Your Data and Applications

SANs, or Storage Area Networks, are purpose-built to never fail or go down. This network
storage solution incorporates a number of failsafe features to ensure the integrity of your
data. As a result, your company or organization will always have access to the data and
applications it needs. Additionally, SAN uses a world-class data security algorithm that
ensures your data is always safe and consistent.

9. For Big Data Center Owners

SAN has all of the required properties to be the optimal data center storage solution. There
are various benefits to adopting SAN in a data center over other storage alternatives. It is
secure, fault-tolerant, fast, and uses less power when operating. As a consequence, it may be
a perfect complement to massive data centers used by organizations.

10. Simplifying Storage Administration

Because you are not needed to manage several disk storage devices or cables on a daily
basis, SAN saves you a great lot of aggravation and important time. In a word, storage area
networking automates storage management from the ground up.

11. Easy to Add or Remove Storage Devices

If more storage capacity is required, the SAN may be increased. Likewise, if more storage
devices are required, this may be accomplished quite quickly. You may adjust the storage
capacity of your storage network at any moment without affecting the servers' normal
functioning. Additionally, you will not need to restart or shut down your servers to add or
remove storage space, since they are not directly linked to the storage devices.

12. Everything at the Same Place

Due to the fact that all servers are linked through switches, you do not need to physically
transfer storage devices from one server to another to assign more storage space. A SAN
may be used as a single entity.

13. No Bandwidth Bottlenecks

The data is kept on servers or storage disks in LAN-based storage networks. When a
consequence, you'll encounter bandwidth constraints as a large volume of data is transported
through LAN. As a result, if your website has a sudden surge in traffic, the servers will fail.
In the case of SAN, however, all data is saved on the SAN. As a result, the system always
has access to the resources of your servers and storage devices. Additionally, you will not
encounter any bandwidth limitations in the SAN.

Disadvantages of Storage Area Network:

For Some, This Could Be Expensive

To be quite candid, operating a decent storage Area Network system will cost a large
amount of money. This is because you are purchasing an unrivaled data storage and transfer
facility in the industry. As a result, if you do not operate a huge business, you may choose to
avoid SAN. Rather of that, you may look for more affordable solutions.

Does Not Scale Well with a Few Servers

With a modest number of servers, it is possible to use SAN. It will, however, come at a cost
to you. Whereas you may manage such servers on your own without incurring significant
fees. In that regard, if your firm employs dozens or hundreds of expensive servers, SAN
may be advantageous.

Data may Become Public

Always use care to protect the SAN. Adding additional security features to a SAN, on the
other hand, is pricey. As a consequence, a sizable proportion of customers do not use them.
However, if necessary safeguards are not implemented, sensitive data may leak, since all
client PCs share the SAN's storage devices and servers.

Controller Area Network (CAN)

A Controller Area Network (CAN) bus is a robust vehicle bus standard that allows
microcontrollers and devices to communicate with one another's applications without the
need for a host computer. It is a message-based protocol that was originally designed to
multiplex electrical wiring inside automobiles in order to save copper, but it may be used in
a number of different contexts. Each device receives data sequentially in a frame, but in
such a way that if more than one device transmits at the same time, the device with the
highest priority may continue while the others halt. Frames are acquired by all devices,
including the sender device.
Figure 08 – CAN (Image from researchgate.com)

Some advantages of CAN are:-

 CAN is a high-speed communication protocol used to connect microcontrollers and


devices.
 CAN is less expensive than traditional networks due to the reduced amount of cables
required.
 Errors in the network may be more accurately detected and resolved more rapidly.
 Additionally, the weight of the car is lowered due to the usage of fewer cables.
 If a message is not received by any device, it might be retransmitted.
 Controller area networks are capable of operating in a variety of electrical
conditions.
 The maximum data transmission rate is around 1 Mbps.

Some disadvantages of CAN are:-

 The number of nodes or devices that may be linked is limited. In May, a maximum
of 64 nodes can be connected.
 The nodes communicate in an unsatisfactory manner.
 The CAN standard specifies a maximum length of 40 meters. It will encounter
difficulties if the vehicle or equipment exceeds 40 meters in length.
 The expense of software creation and maintenance is considerable when it comes to
developing CAN.
 Due to the disparate voltage levels, CAN generates a great deal of electrical noise.

Enterprise Private Network (EPN)


Bandwidth-intensive applications use a disproportionate share of an organization's network
resources, restricting data transfer and generating bottlenecks in business operations.

An enterprise private network (EPN) is a network that is purpose-built for a company and is
formed and maintained by the firm in order to share corporate resources.

It connects a business's offices in many geographic areas and is meant to ensure that
bandwidth-intensive applications run smoothly and without overburdening the network.

Businesses may select between a completely private network and a hybrid network
connected to a network Communications Service Provider via an EPN (CSP).

EPNs are tailored to provide privacy throughout all network operations by using tunneling
protocols such as Layer 2 Tunneling Protocol (L2TP) and Internet Protocol Security (IPsec).
Branches are connected by MPLS technology.

Figure 09 – EPN (Image from itrelease.com)

When is an EPN to be used:

You need secure communication between two sites but do not have a direct connection
between them. You must guarantee that clients spread across many sites have consistent
access to shared resources. Scalability and network expansion are required over time.

When not to use an EPN:

Your network team is resource constrained. EPNs need more time and effort to establish,
administer, and update. It is not feasible to establish redundant connections between
locations, since this would introduce more points of failure into the network.
Network System Types

1. Peer-to-Peer Network

Peer-to-peer networks connect two or more computers together and share resources such as
disk drives, DVD players, and printers. Each networked computer has access to these shared
resources. Each computer acts as both a client and a server, communicating directly with the
other computers. For example, in a peer-to-peer network, any computer in the network may
access a printer installed on another computer. These networks are quite cheap to establish.
All that is necessary is a connection mechanism, such as an Ethernet cable or a wireless
router.

2.Client-Server Network

In a client-server network, several clients, or workstations, are linked to at least one central
server. The bulk of data and applications are installed on the server. The server provides
access to these resources to clients. Frequently, servers have both private user directories
and a large number of public directories. Client-server networks often have faster access
speeds due to the massive number of consumers they are designed to serve. Clients are able
to function as workstations independently of one another. Upgrades are easier since all
software applications and data are kept on a single machine. Server software may be used to
administer the whole system. Security is enhanced in a client server network because the
server maintains security.

Figure 10:P2P Vs CS Networks – (Image from networkstraining.com)


peer to peer vs client server network

Figure 11 – EPN (Image from wix.com)


The main IEEE Ethernet standards that can be used in above LAN and WLAN design.

IEEE Ethernet standards

IEEE 802.3 defines Ethernet in a variety of standards. These standards establish the
requirements for Ethernet's physical and data-link layers. The most critical 802.3 standards
are as follows:

 10Base-T (IEEE 802.3) – 10 Mbps with category 3 unshielded twisted pair (UTP)
wiring, up to 100 meters long.

 100Base-TX (IEEE 802.3u) – known as Fast Ethernet, uses category 5, 5E, or 6 UTP
wiring, up to 100 meters long.

 100Base-FX (IEEE 802.3u) – a version of Fast Ethernet that uses multi-mode optical
fiber. Up to 412 meters long.

 1000Base-CX (IEEE 802.3z) – uses copper twisted-pair cabling. Up to 25 meters


long.

 1000Base-T (IEEE 802.3ab) – Gigabit Ethernet that uses Category 5 UTP wiring.
Up to 100 meters long.

 1000Base-SX (IEEE 802.3z) – 1 Gigabit Ethernet running over multimode fiber-


optic cable.

 1000Base-LX (IEEE 802.3z) – 1 Gigabit Ethernet running over single-mode fiber.

 10GBase-T (802.3.an) – 10 Gbps connections over category 5e, 6, and 7 UTP


cables.

Take note of how the first number in the standard's name denotes the network's speed in
megabits per second. The term baseband refers to signals that are sent unmodulated. The
last portion of the standard's name relates to the signal transmission cabling. For instance,
1000Base-T indicates that the network's speed will be up to 1000 Mbps, that baseband
signaling will be utilized, and that twisted-pair cabling will be used (T stands for twisted-
pair)

The term "I triple E" refers to the "Institute of Electrical and Electronics Engineers." IEEE is
a professional organization that creates, defines, and evaluates standards in electronics and
computer science. Its purpose is to "encourage technical innovation and excellence for the
greater good of mankind."
The IEEE dates all the way back to the 1800s, when electricity began to have an impact on
society. The AIEE (American Institute of Electrical Engineers) was founded in 1884 to
foster innovation in the electrical field. The IRE (Institute of Radio Engineers) was founded
in 1912 with the mission of developing wireless telegraphy standards. In 1963, the two
organizations combined to become the IEEE. Thousands more standards for consumer
electronics, computers, and telecommunications have been created since then.

IEEE 802

The IEEE Local Area Network Standards Committee (LMSC) founders began discussing
standardization opportunities in 1979, submitting a project proposal titled "Local network
for Computer Interconnection" to the IEEE in August 1979 via the IEEE Computer Society.
The IEEE formally approved the proposal on 13 March 1980. Today, the IEEE 802 Local
Metropolitan and Other Area Networks Standards Committee creates and maintains
networking standards and recommended practices for local metropolitan and other area
networks via an open, consensus-driven standards development process, and advocates for
them globally.

The IEEE 802 family of standards now includes 71 published standards and 54 under
development. IEEE 802 standards are extensively used in the following areas: Ethernet,
Bridging and Virtual Bridged LANs, Wireless LAN, Wireless PAN, Wireless MAN,
Wireless Coexistence, Media Independent Handover Services, and Wireless RAN, with
each area having a separate Working Group.

IEEE 802 also collaborates with other national and worldwide standards organizations,
including as ISO, which has published a number of IEEE 802 specifications as international
standards. Additionally, the IEEE 802 LMSC and working groups have a significant
international following, with regular meetings and sessions conducted across the globe.

IEEE Ethernet standards for LAN

Figure 12 – (Image from ccnahub.com)

IEEE Ethernet standards for WAN


Figure 13 – (Image from unknown.com)

Discuss the importance and impact of network topologies and network protocol suites
while comparing the main network topologies and network protocol suites that are
used in network design using examples. Recommend suitable network topologies and
network protocol suites for above scenario and justify your answer with valid points.
What is network topology?

The topology of a network refers to the arrangement of nodes (for example, networking
switches and routers) and connections.
No two networks or organizations are identical. However, many businesses rely on well-
established network architectures. The topologies of networks dictate how devices are
connected and how data is exchanged between them.
A logical network design illustrates how devices operate at different abstraction levels. This
graphic illustrates the physical connections between devices. It is possible to observe both
logical and physical topologies.
A topology map of a network illustrates the physical network arrangement of connected
devices. A network topology chart may assist you in comprehending how devices link and
how to resolve issues.

Types of network topology

Enterprise networks have employed a number of topologies in the past and present. We will
look at several network topologies such as bus, ring, star, mesh, and hybrid.

What are the types of network topology?

1.Bus Topology - Budget-friendly, yet prone to failure, and only suitable for low-volume
traffic. Although it is no longer used in office networks, it is still present in many consumer
products.

2.Ring Topology - While it is simple to maintain and poses no collision danger, it does
require that all nodes be switched on and fully functioning. Nowadays, it is seldom used.

3.Star Topology - All devices are connected through a central switch, which enables the
insertion of new nodes without resetting old ones. This design eliminates the need for cable
and is simple to handle. However, the health of the switch is critical. This topology requires
monitoring and maintenance. However, this is a frequent topology.

4.Tree Topology - A network of interconnected nodes. Between nodes, root-child


connections are established. This layout may fail if the root node fails. This topology is
complicated and requires a substantial amount of wire.

5.Mesh Topology - Each node is directly connected to all other nodes. This design,
however, requires a great deal of wiring and is difficult to handle. Wireless networks enable
this topology.

6.Hybrid Topology - This topology is formed by the union of two or more. This is an
excellent method for rapidly integrating diverse networks into a unified system. In contrast
to "hybrid network topology," "hybrid system" refers to a combination of on-premises and
cloud resources.

Bus Topology

Pros:
Simple installation
Reduced cabling requirements compared to Mesh and Star topologies Beneficial for SMEs
Low cost
Easy to manage and expand

Cons:
A strong backbone is necessary.
Easily blocked during rush hours
Each extra node results in a decrease in efficiency.
At each point in time, data can only flow in one direction.

A bus topology is a network topology in which each device is connected to a single cable.
This network topology is sometimes referred to as line topology. A bus topology is capable
of transmitting data only in one way. Two terminals are present in a linear bus topology.

Coaxial or RJ45 cables are used to link devices in smaller networks. However, bus topology
is antiquated, and you are unlikely to come across a business that still uses it.

Advantages

Smaller networks, on the other hand, often used bus topologies. The arrangement is one of
the primary factors. Because everything is connected by a single cable, there is no need for
a sophisticated topology.
Additionally, the design reduced the cost of bus topologies by use a single wire. If more
devices are required, just connect your connection to another wire.

Disadvantages

However, depending on a single cable creates a vulnerability. When cables fail, networks
fail. Businesses would suffer financial and operational losses if their cable went down.
Because data travels via a single wire, increased traffic would affect network performance.
These are suitable for small networks. A bigger network equates to slower data transfer.
Notably, bus topologies are bidirectional, which means that data cannot flow in both
directions concurrently.

Ring Topology

Pros:

Low chance of collision Cheap


Small-business-friendly
The dual-ring configuration provides redundancy.

Cons:

A single defective node may put the whole network to a halt.


Maintenance and monitoring on a preventative basis.
Each additional node degrades performance. Reorganizing the network necessitates the use
of a system.
In a circular design, ring networks connect computers. Each device in the network will be
connected to two other devices. Ring topologies were formerly common, but you'd be hard
pushed to find one now.
A loop is formed by connecting the initial and end nodes. As a result, packets must traverse
all network nodes in order to reach their destination.
One node configures and monitors the network in this arrangement. Half-duplex or full-
duplex ring topologies are possible. Dual Ring Topologies need two connections between
network nodes in order to construct full-duplex ring topologies.

Dual Ring Topology

Bidirectional ring topologies, as previously indicated, are referred to as dual ring topologies.
A twin ring architecture gives two connections to each node. Data may flow in any
direction.

Advantages

The use of token-based protocols, which restrict data transmission to a single station at a
time, mitigates the risk of packet collisions. This is compounded further by the fact that data
may travel swiftly across network nodes, which can be enhanced with the addition of new
nodes.
Dual ring topologies provide an additional layer of security against failure. For instance, if a
ring collides with a node, the next ring may act as a support. Additionally, rings were
inexpensive to install.

Disadvantages

Ring topologies were phased out because to their proclivity for failure. A single node failure
may bring a whole network to a halt. This indicates that ring topology networks must be
examined for node health on a frequent basis. Even if all of your nodes are functioning
normally, a transmission line failure might bring your network to a halt!
Scalability difficulties were associated with ring topologies. For instance, all network
devices share the same amount of bandwidth. When devices are added to a network,
communication delays occur. The number of devices added to a network design must be
carefully monitored to prevent network resources from being overstretched.
Modifications to existing nodes or addition of new nodes in a ring topology necessitated
network shutdown. To adjust the topological structure, you must account for downtime!

Star Topology

Pros:

The switch is the only point of control.


Node addition and deletion
Durable\sAffordability
Beneficial for SMEs

Cons:

Hardware expertise is necessary (the switch).


It is conditional on the switch's performance.
The number of switch ports limits the size of the network.

Each network node is connected to a single central switch through a star topology. It is
immediately connected to the switch and is indirectly connected to every other node. The
primary network hub functions as a server, and the other devices function as clients. The
central node is responsible for managing data flows across the network and acts as a
repeater. Star topologies connect computers through coaxial, twisted pair, or optical fiber
connections.

Advantages

The star topology is popular because it enables network administration to be performed


through a single switch. As a consequence, even if a non-central node fails, the network
remains operational. As a result, star topologies are more resilient to faults than other
topologies. Additionally, as with a ring topology, additional computers may be added
without disrupting the network.
Star topologies use fewer cables than other types of networks. This simplifies their setup
and administration. The general simplicity of the network design simplifies administration
tasks such as diagnosing network performance problems.

Disadvantages

While star topologies are almost impenetrable, if the central switch fails, the whole network
collapses. As a consequence, the administrator must check the central node's health on a
frequent basis. The performance of the network is dependent on the setting of the central
node. Although star topologies are easy to administrate, they are not cheap to set up and run.

Tree Topology

Pros:

A hybrid bus/star topology


Easy to manage
Easy to expand
Appropriate for SMBs

Cons:

The network's health is entirely dependent on the root node.


Networking expertise
Numerous cables
Monitoring is required for larger deployments.
Can be somewhat pricey

A network with a tree topology is shaped like a tree with several branches. The root node of
a tree is connected to the node hierarchy of another tree. Parent-child hierarchy with just
one reciprocal connection. A tree topology must include three levels of hierarchy in order to
be classified as such. This design is used in Wide Area Networks to accommodate a large
number of geographically scattered devices.

Advantages

Tree topologies are most often used to expand bus and star topologies. It's simple to expand
the network's nodes as your business develops in size using this hierarchical structure.
Additionally, this structure is advantageous for locating and resolving faults, since it allows
for systematic examination of network performance issues across the tree.

Disadvantages

In tree topology, the root node is the weakest connection. If the root node fails, the subtrees
are partitioned. Other network devices, such as the failed node's parent, will continue to
have restricted connectivity.

Maintaining the network system is likewise challenging, since adding nodes increases its
complexity. Additionally, a tree topology needs more wires. Cables are required to connect
each item in the hierarchy, complicating the network topology.

Mesh Topology
Pros:

Data transfer is lightning fast.


A network that is not reliant on any nodes and has a high degree of resilience
Extremely secure
Appropriate for all sizes of high-value networks
Detecting faulty equipment

Cons:

Requires a substantial amount of cable


It's difficult to conceal every wire.
Setup is time consuming.
Meticulously planned
Each computer has a maximum cable capacity.

Mesh topology is the connecting of nodes on a point-to-point basis. In this design, data is
routed and inundated. Routing logic is used by a node to determine the shortest route to the
packet's destination. In comparison, flooding distributes data to all nodes in the network.
Flooding operates independently of any routing theory.

There are two forms of mesh topology: partial mesh topology and full mesh topology. In a
partial mesh design, nodes are partially connected to two or three other nodes. Each node is
connected by a complete mesh topology.
Advantages

Mesh topologies are used because they are reliable. Due to their linked nature, nodes are
very robust to failure. No one machine is capable of bringing the whole network to a halt.
The fact that there is no single point of failure is one reason this is a popular topology.
Additionally, this arrangement is secure.

Disadvantages

Mesh topologies are inherently inefficient. They need substantial configuration once
introduced. The topological arrangement is more difficult than that of many other
topologies, which is reflected in the setup time. You'll need to install a significant amount of
new wiring, which might get costly.

Hybrid Topology

Pros:

Adaptable
Appropriate for medium-sized and big companies
Indestructible
Adaptable to the equipment that we use

Cons:

Expert management is required.


a program for surveillance
Expensive equipment

A hybrid topology is formed by the combination of two or more distinct topologies. Hybrid
topologies are particularly prevalent in larger businesses, where different departments have
their own network topologies. By combining these topologies, a hybrid topology is created.
As a consequence, the topology affects the capabilities and vulnerabilities.

Advantages

Hybrid topologies are used for a variety of reasons, the majority of which need flexibility. A
hybrid topology may accommodate a variety of network constraints and can integrate many
topologies. As a result, hybrid topologies are scalable. Scalability is an advantage of hybrid
designs for larger networks.

Disadvantages

Hybrid topologies may be somewhat intricate, depending on the topologies employed. Your
hybrid topology must be managed in accordance with its specific network requirements.
Administrators will be required to maintain many topologies rather than simply one,
increasing the difficulty of their work. Additionally, a hybrid topology may be rather costly
to implement.

1.2.2 Logical Topology

1.2.2.1 Ethernet topology

IEEE 802.3 is the Ethernet standard. It is a decentralized broadcast network based on buses.
It may operate at a speed of 10 Mbps or 100 Mbps. Computers linked using Ethernet have
the ability to broadcast at will. When two or more devices broadcast simultaneously,
packets clash. After a certain time period, the transmitting computers simply retransmit.
Ethernet is the most extensively used LAN technology.

Ethernet was invented at the University of Hawaii to connect computers across the islands.
It was a design for a radio. Ethernet is the most frequently used local area network (LAN)
protocol, accounting for around 85 percent of all computer networks. Ethernet is composed
of three primary components:

1.The physical medium over which Ethernet communications flow.


2.Each Ethernet interface has a set of rules (protocols) that regulate data access.
3.Ethernet frames are a collection of bits that are used to send data over a network.

Ethernet operates in the following manner:

Ethernet node is a term that refers to a computer that is connected to an Ethernet network.
Ethernet nodes all share a common medium through which Ethernet signals are serially
sent, one data bit at a time. To transmit data, a station must first listen to the channel and
then send data through an Ethernet frame, or packet. Ethernet rules (protocol) are designed
to ensure that each node has an equal opportunity to send frames.
Each Ethernet frame sent over the shared channel performs a destination address check. The
interfaces compare the frame's destination address to their own. The Ethernet interface with
the same address as the destination of the transmission will read the whole frame and
discard the data.

1.2.2.2 Fast-Ethernet topology

Ethernet standard with a data transfer rate of 100 Mbps. Fast Ethernet, as specified by IEEE
802.3u, is used to link departmental backbones, high-speed server connections, and
workstations running bandwidth-intensive programs such as CAD or multimedia.
Fast Ethernet networks use the same CSMA/CD media access control protocol as standard
Ethernet 10Mbps networks. All 100BaseT technologies are implementations of Fast
Ethernet. They employ Fast Ethernet hubs and switches in a star topology. Fast Ethernet is
available in three different transmission or cabling configurations:

1.The most prevalent implementation of Fast Ethernet is 100BASE-TX. As with 10BaseT


Ethernet, 100BaseTX utilizes two pairs of wires in Category 5 cabling.

2.A duplex multimode fiber-optic cable equipped with ST connectors for usage as a
backbone cable.

3. 100BASE-T4: This standard utilizes four wires and enables the transmission of Fast
Ethernet over category 3 or above cable.

Due to the auto-negotiation characteristics of the Fast Ethernet standard, manufacturers may
now provide dual 10/100-Mbps networking equipment capable of easily integrating Fast
Ethernet into existing 10BaseT networks.
It is without a doubt the easiest and most cost-effective method of meeting escalating
bandwidth needs. The following are the advantages of upgrading to Fast Ethernet:

1.Fast Ethernet does not need extra network administration or troubleshooting tools when
added to existing 10-Mbps Ethernet networks.
2.In contrast to ordinary Ethernet, which is limited to 10 Mbps for voice, data, and video.

3. Fast Ethernet networks use the same deployed media as 10 Mbps Ethernet networks.

4. Transition to Fast Ethernet slowly using autosensing 10/100 hubs and network interface
cards.

1.2.2.3 Giga Ethernet Topology

Since its inception at Xerox in the early 1970s, Ethernet has been the dominant networking
protocol. Ethernet has the most deployed ports and the greatest cost-performance ratio for
desktop connections when compared to Token Ring, Fiber Distributed Data Interface
(FDDI), and Asynchronous Transfer Mode (ATM). Fast Ethernet is a straightforward and
cost-effective backbone and server connection solution that increased Ethernet speed from
10 to 100 Mbps.
Due to the fact that it is built on top of Ethernet, it is ten times quicker at 1000 Mbps (1
gigabit per second) than Fast Ethernet (Gbps). This protocol was established in June 1998
for use with high-speed local area network backbones and server communication. Because
Gigabit Ethernet is built on Ethernet, users can operate and maintain gigabit networks using
their existing expertise.

This technical brief will discuss Gigabit Ethernet in general.


1. The architecture of the Gigabit Ethernet protocol, including physical interfaces, 802.3x
flow control, and media connection options.

2. The work and timeline associated with the Gigabit Ethernet standard

3. Ethernet Gigabit vs. ATM

4.Ethernet 4-g topologies

5. Plans for Gigabit Ethernet migration Ethernet Protocol Gigabit

Numerous changes to the physical interface are necessary to increase the speed of 100 Mbps
Fast Ethernet to 1 Gbps. Gigabit Ethernet will be similar to Ethernet at the data link layer.
IEEE 802.3 Ethernet and ANSI X3T11 Fibre Channel were combined to overcome the
speed limitations of 1 Gbps.

1.2.2.4 Virtual LAN


These are logical groupings of devices that are connected through a common broadcast
domain. VLANs are built on switches by assigning certain interfaces to one broadcast
domain and others to another. A VLAN is a subset of the switch ports of an Ethernet LAN.

VLANs are multi-switch networks that may be categorised as independent subnets or


broadcast domains. This means that frames distributed over the network will be switched
only across VLAN ports.
A VLAN is a virtual LAN that permits the grouping of hosts regardless of whether they are
linked to the same switch. The primary reasons for using VLANs are as follows:

1. VLANs increase the number of broadcast domains while decreasing their size.

2. VLANs protect against security concerns by restricting the number of hosts that switch
frames to.

3. To increase security, separate essential data hosts into their own VLAN.

4. You may create networks that group users according to their departments rather than their
actual locations.

5. Network configuration is simplified by assigning a port to the appropriate VLAN.

Without VLANs, a broadcast from host A would reach all network devices. Each device
will receive and analyze broadcast frames, resulting in increased CPU load and a reduction
in network security.

Compare common networking principles and how protocols enable the effectiveness of
networked systems.

Network protocols

Network protocols establish the means through which devices interact with one another
across a network. In other words, network protocols are languages that two devices must
understand in order to communicate smoothly, regardless of their architecture or design.

The OSI model: How network protocols work

To grasp network protocols, one must first grasp the notion of Open Systems
Interconnection (OSI). The OSI model is the fundamental architectural paradigm for
communications over the internet.

According to the OSI model, network communication is divided into seven layers. Each of
these layers has a task or group of tasks. Each layer is self-contained, with its own set of
functions.
To put this into context, the following is an example of two network devices interacting
using the OSI model:

The OSI model is composed of seven layers: upper layers (7, 6, and 5) and lower layers (4,
3, and 2). (4, 3, 2, and 1). The upper layers are concerned with applications, whereas the
lower layers are concerned with data transport.

Each layer of the OSI model is associated with a distinct set of network protocols. A
network protocol is used at each stage of the communication exchange.

The following sections provide detailed descriptions of how network protocols function at
each OSI layer:
Classification of network protocols

Once you've grasped the OSI model, you may begin classifying protocols. These are the
most frequently used network protocols.

Application layer network protocols

1. DHCP: Dynamic Host Configuration Protocol

DHCP is a protocol that enables network managers to automate the assigning of IP


addresses. Each device connecting to the internet through IP requires a unique IP address.
DHCP enables network managers to centrally manage IP address distribution and to
automatically assign new addresses when a device joins through a different network. DHCP
is a client-server protocol.

Advantages of using DHCP

IP address administration on a centralized scale


New customers are smoothly integrated into a network.
IP addresses may be reused to decrease the number required.
Disadvantages of using DHCP

Monitoring internet activity becomes more difficult if a device's IP address changes over
time.
Because DHCP-enabled machines' IP addresses vary, they cannot be servers.

2. DNS: Domain Name System protocol

DNS is a protocol that translates host names to IP addresses. Dns is a client-server system
that makes use of a distributed database that is shared amongst name servers.

IP addresses are used to identify hosts, however they are difficult to memorize. Due to the
dynamic nature of IP addresses, it is critical to map domain names to IP addresses. The
Domain Name System (DNS) resolves this issue by converting domain names to IP
addresses.

Advantages

The Domain Name System (DNS) facilitates internet access.


There is no need to memorize IP addresses.

Disadvantages

DNS queries do not include any client-specific data. Due to the fact that the DNS server
only sees the request's IP address, hackers may control the server.
If hackers compromise DNS root servers, they may reroute users to other websites for
phishing.

3. FTP: File Transfer Protocol

TCP-based File Transfer Protocol (FTP) enables file sharing between local and remote
locations. FTP establishes two TCP connections: one for control and one for data. The
control connection exchanges control data such as passwords and file retrieval and storage
requests, while the data connection exchanges actual files. Both connections function in
parallel during the file transfer.

Advantages

Allows for the sharing of large files and several directories. Permits you to continue
exchanging files.
Allows for data recovery and scheduling of file transfers.
Disadvantages

FTP is an insecure protocol. Data, usernames, and passwords are sent in clear text, which
makes them vulnerable to hackers.
FTP is not encrypted and so does not satisfy industry standards.

4. HTTP: Hyper Text Transfer Protocol

HTTP is an application-layer protocol that enables distributed, collaborative, and rapid data
exchange. The web browser is the client in a client-server system. HTTP is used to transport
text, images, and other multimedia content. In a request-response protocol, the client
initiates communication with the server, which processes the request before giving a
response.

HTTP is a stateless protocol, which means that the client and server communicate only
while they are connected. The client and server then lose track of one another. Both the
client and server are unable to retain data as a result of this incident.

Advantages

Concurrent connections are minimized, which results in decreased memory and CPU use.
You are not need to disconnect in order to report issues!
Reduced TCP connections results in decreased network congestion.

Disadvantages

HTTP is vulnerable due to its lack of encryption.


HTTP requires a greater amount of power to connect and transfer data.

5.IMAP and IMAP4: Internet Message Access Protocol (version 4)

IMAP enables users to view and modify messages stored on a mail server directly from
their email client. IMAP is a client-server protocol that enables concurrent access to a mail
server by many clients. IMAP enables the creation, deletion, and renaming of mailboxes, as
well as the setting and removal of flags. IMAP has been upgraded to version 4 revision 1.

Advantages

This is due to the fact that emails are stored on the mail server.
If you delete emails or data inadvertently, you may always retrieve them from the mail
server.

Disadvantages

Emails will not function without internet access.


End-user email use demands more mailbox storage, which increases costs.
6.POP and POP3: Post Office Protocol (version 3)

It is a method of communicating through email. It enables users to download emails from


the mail server directly into their email client. Emails can be viewed without an internet
connection once they have been downloaded. Additionally, when emails are transferred
locally, the mail server deletes them, freeing up space. In contrast to IMAP4, POP3 is not
designed to do extensive message modification. POP3 is the most recent version of the Post
Office Protocol.

Advantages

Offline email reading on local devices.


Due to the fact that emails are deleted as they are transmitted locally, the mail server does
not need a lot of storage.

Disadvantages

If the local device that downloaded the emails dies or is stolen, the emails are gone.

7.SMTP: Simple Mail Transfer Protocol

SMTP is a very dependable and efficient technology for transporting email. SMTP is a push
protocol for email transmission, while POP and IMAP are used for email retrieval. SMTP is
used to transmit and receive emails between computers. SMTP enables a client to send
email to another client on the same network or through a relay or gateway to another
network.

Advantages

Installability.
There are no restrictions on the kind of system to which you may connect.
It is not dependent on your contribution.

Disadvantages

Interactions between servers might cause message delivery to be delayed and message
delivery failure rates to rise.
Certain firewalls block SMTP ports.
8.Telnet: Terminal emulation protocol

Telnet is an application layer protocol that enables communication between distant devices.
On the user's computer, a Telnet client program is installed that establishes a connection to a
remote system running a Telnet server application.

Network administrators use it to manage remote devices. After inputting the remote device's
IP address or host name, the network administrator is presented with a virtual terminal
through which the host may be communicated with.

Advantages

Compatible with several operating systems.


Time is saved via rapid communication with remote devices.

Disadvantages

Telnet lacks encryption and transmits sensitive data in plain text, which makes hacking
easier.
Costly as a result of slow typing.

9.SNMP: Simple Network Management Protocol

SNMP is used to manage servers, workstations, routers, switches, and other IP network
components. A network administrator may use SNMP to diagnose and resolve issues.
SNMP is composed of three components: managed devices, agents, and managers.

The SNMP agent for the controlled device. The agent is a software module that is familiar
with the local management environment and translates it to a format compatible with

SNMP administrator To aid network administrators in managing nodes, the SNMP manager
presents data from the SNMP agent.

SNMP is available in three flavors: v1, v2, and v3. SNMP versions 1 and 2 are comparable,
however SNMP 2 introduces additional protocol functionalities. SNMP v3 enhances
previous versions with security and remote configuration.
Presentation layer network protocols

LPP: Lightweight Presentation Protocol

The Lightweight Presentation Protocol assists in simplifying OSI application service


support in TCP/IP networks in certain restricted circumstances. LPP is designed for OSI
applications with a single Association Control Service Element (ACSE) and a single
Remote Operations Service Element (ROSE) (ROSE). LPP is not applicable to entities
having a broader application environment, including a Reliable Transfer Service Element.

Session layer network protocols


RPC: Remote Procedure Call protocol

RPC is a protocol for requesting a service from a remote computer's software via a network.
RPC communicates between apps through TCP or UDP. RPC is a protocol that
communicates between clients and servers. The client makes a request for services, which
the server fulfills.

Advantages

RPC omits multiple layers to increase performance.


RPC eliminates the requirement for code rewrites and rebuilds.

Disadvantages

On wide-area networks, this has not yet been shown.


RPC is only compatible with TCP/IP.

Transport layer network protocols


1.TCP: Transmission Control Protocol

TCP's sequenced acknowledgement enables applications to provide dependable stream


delivery and virtual connection services. TCP is a connection-oriented protocol that requires
applications to establish a connection before data can be sent. TCP (transmitter/receiver
protocol) utilizes flow control to detect faults. TCP ensures data sequencing by guaranteeing
that data packets arrive in their correct order. TCP enables the retransmission of data
packets that have been lost.

Advantages

Three things are guaranteed by TCP: data comes on time and without duplicate.
TCP automatically compresses data before to transmission.

Disadvantages

TCP cannot be used with broadcast or multicast.


2. UDP: User Datagram Protocol

Unix domain protocol (UDP) is a simple yet insecure communicating technology. Unlike
TCP, UDP is not reliable, does not have flow control, and does not support error recovery.
When TCP's reliability measures are not needed, UDP is advantageous. UDP does not
provide packet retransmission.

Advantages

UDP connections may be broadcast or multicast.


TCP is outperformed by UDP.

Disadvantages

A packet might be delivered twice or not at all with UDP.


Manual disintegration of packets is necessary.

Network layer protocols


1.IP: Internet Protocol (IPv4)

IPv4 is a network layer protocol that comprises addressing and control information that
assists in the routing of packets across a network. IP and TCP operate in unison to transport
data packets over a network. Each host is allocated a 32-bit IP address that is composed of
two basic components: the network address and the host address. The network number
uniquely identifies a network and is issued by the internet, but the host number uniquely
identifies a host on the network and is assigned by a network administrator. IP is alone
responsible for delivering the packets, whereas TCP assists in reordering them.

Advantages

IPv4 ensures the security of data by encrypting it.


The Internet Protocol (IP) enables more efficient data routing.

Disadvantages

IPv4 is time-consuming, complex, and prone to errors.

2. IPv6: Internet Protocol version 6

IPv6 is the Internet Protocol's most recent version, a network layer protocol that facilitates
packet routing. IPv6 was created to succeed IPv4. Instead of 32 levels of addressing, there
are now 128.
Advantages

IPv6 provides much quicker routing and packet processing than IPv4. Superior than IPv4
security.

Disadvantages

IPv6 is incompatible with machines that use IPv4.


Upgrading to IPv6 is challenging.

3. ICMP: Internet Control Message Protocol

ICMP is a protocol at the network layer that is used to transmit error messages and
operational data. Out-of-band network messaging is accomplished via ICMP messages
included inside IP packets. ICMP is a protocol that is used to communicate network faults,
congestion, and timeouts.

Advantages

ICMP is used to diagnose network problems.

Disadvantages

Flooding ICMP messages increases network traffic.


By delivering multiple ICMP unreachable packets, malicious individuals may have an effect
on end users.

Data link layer network protocols


1.ARP: Address Resolution Protocol

The Address Resolution Protocol (ARP) assists in mapping IP addresses to recognized


physical machine addresses (or MAC addresses in the case of Ethernet). A database known
as an ARP cache is used to maintain a correlation between each IP address and its
associated MAC address. ARP provides the rules necessary to establish these correlations
and assists in address conversion in both directions.

Advantages

The ARP cache saves all MAC addresses and transforms them to IP addresses
automatically.
Disadvantages

The ARP protocol is susceptible to ARP spoofing attacks.


A hacker may sometimes disable all traffic by using ARP. A denial of service attack using
ARP.

2. SLIP: Serial Line IP

SLIP is a protocol that is used to establish TCP/IP-based point-to-point serial


communications. SLIP is a protocol that is used on dedicated serial cables and sometimes
for dial-up connections. SLIP is advantageous because it enables communication between
hosts and routers; for example, host-host, host-router, and router-router topologies are all
popular SLIP network configurations. SLIP is a protocol for framing data packets: It
specifies a set of characters that operate as a frame for IP packets sent over a serial line. It
lacks facilities for addressing, packet type identification, error detection and repair, and
compression.

Advantages

Because of its minimal overhead, it is well-suited for microcontrollers. It makes use of


existing dial-up and phone connections.
It's straightforward to configure, since it makes use of IP.

Disadvantages

SLIP does not permit the simultaneous establishment of network connections across several
OSI levels.
SLIP does not handle synchronous connections, such as those established between a modem
and an internet service provider via the internet (ISP).
Activity 02

Discuss the operating principles of network devices (Ex: Router, Switch, Etc.) and
server types that can be used for above scenario while exploring different servers that
are available in today’s market with their specifications. Recommend server/servers
for the above scenario and justify your selection with valid points.

Discuss the operating principles of networking devices and server types.

Network Devices and Their Types

The term "network devices" or "network equipment" refers to electronic devices used in
networking. Network devices are used in computer networks to send data quickly and
securely between computers, fax machines, and printers, among other devices. Devices that
connect to an intranet or an internetwork. Certain devices are integrated within the device,
such as an RJ45 connection or a network interface card, while others are network devices,
such as a switch or router. These devices properly handle digital or electrical connections in
order to perform their functions. This article discusses the operation of network devices.

What are Network Devices?

In a computer network, network devices are utilized to communicate amongst the different
hardware components. Sometimes known as hardware, network equipment, or computer
networking devices, these products are also referred to as computer networking devices.
Each network device in a computer network performs a certain function and serves a
defined purpose at each segment.

Types of Network Devices

In a computer network, several kinds of network devices are utilized, including the
following.

1.Network Hub
2.Network Switch
3.Modem
4.Network Router
5.Bridge
6.Repeater
Network Hub

A network hub is a networking device that is used to communicate with and deliver data
between other network hosts. A computer network may be used to send data packets. While
processing data from a host to a network hub, it is possible to transfer data to all connected
ports. Likewise, all ports identify inefficient and inefficient data pathways. As a result, a
network hub cannot be considered safe and secure. Copies of data packets across all ports
cause the hub to slow down, requiring the usage of a network switch.
Activity 03

Prepare a written network design plan to meet the above mentioned user requirements
including a blueprint drawn using a modeling tool. (Ex: Microsoft Visio, EdrawMax).
Support your answer by providing the VLAN and IP subnetting scheme for the above
scenario and the list of devices, network components and software used to design the network
for above scenario and while justifying your selections.

3.1 Prepare a written network design plan to meet the above mentioned user
requirements including a blueprint drawn using a modeling tool.

Project Scope

SYNTAX SOLUTIONS wants to establish a trustworthy network. We're creating a


building's network in Matara. Marketing and sales want VLAN-separated wifi in seven
departments.

ERP and CRM must be installed on separate servers for customer service and legal, finance,
and HR.

3.1.2 Project hardware requirements

1. Twisted Pair Cable CAT6 - 5000M


2. Network Switches
a. 16 port – 03
b. 24 port – 03
c. 48 port – 03

3. Servers 05
4. Routers 02
5. Wifi access point 01

Support your answer by providing the VLAN and IP subnetting scheme for the above
scenario and the list of devices, network components and software used to design the
network for above scenario and while justifying your selections.
3.1.3 VLAN and IP subnetting scheme

Department No of Vlan ID Network ID Broadcast ID Subnet Mask


Users
Customer 10 10 192.168.10.144 192.168.10.159 255.255.255.240
Care
Sales and 20 20 192.168.10.96 192.168.10.127 255.255.255.224
Marketing
Finance 25 30 192.168.10.64 192.168.10.95 255.255.255.224
Legal 5 40 192.168.10.160 192.168.10.167 255.255.255.248
HR 10 50 192.168.10.128 192.168.10.143 255.255.255.240
Developers 55 60 192.168.10.0 192.168.10.63 255.255.255.192
Network 5 70 192.168.10.168 192.168.10.175 255.255.255.248
Team
Server Room 5 100 10.254.1.0 10.254.1.255 255.255.255.0

3.1.4 list of devices and network components

Hardware Components

1. Routers
2. Switches
3. Wifi access point
4. Servers
5. PCs
6. Transmission Media(UTP)

Software Components

7. Networking Operating System(Windows server)


8. Protocol Suite(TCP/IP)

Software used to design the network(Draw.IO)

Draw.IO builds flowcharts, UML diagrams, floor plans, and office layouts. Infographics and
tech drawings are supported.
Using templates and symbols, start network design instantly. Professional templates abound.
Draw.IO imports and exports Visio diagrams. Visio, Word, PDF, HTML, JPEG.
Draw.online IO works on every device and OS system. Online-only Draw.IO.

This network design tool offers HTML-linked schematic sharing. Cloud storage allows
collaboration from several devices.
Test and evaluate the proposed design to meet the requirements and analyse user
feedback by using a User feedback form.

You might also like