The Networking Assignment (1st Sem)
The Networking Assignment (1st Sem)
ANC ID 1001502
Student Declaration
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Final Grade
1 Mohamed Naveed
1001502
Networking
P5 Design a networked system to meet a
given specification. M3 Analyse user feedback on your designs
with the aim of optimising your design and
P6 Design a maintenance schedule to improving efficiency.
support the networked system.
implemented network, including the
design and decisions made to
LO4 Implement and diagnose networked systems
enhance the system.
P7 Implement a networked system based on
a prepared design. M4 Recommend potential enhancements for
the networked systems.
P8 Document and analyse test results
against expected results.
Student Name/ID
Unit Title
Assignment No Assessor
Assessor Feedback:
Resubmission Feedback:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place
and grades decisions have been agreed at the assessment board.
2 Mohamed Naveed
1001502
Networking
Higher Nationals – Grading Rubric
Achieved/Not
Grading Criteria Comment
Achieved
3 Mohamed Naveed
1001502
Networking
4 Mohamed Naveed
1001502
Networking
LO 1. Examine networking principles and their protocols
Section1.1 – Discuss the benefits and constraints of different network types and standards
Pro’s Con’s
*Faster communication *Limited Range
5 Mohamed Naveed
1001502
Networking
PAN (Personal Area Network)
Personal Area Network is a network arranged within an individual person, typically
within a range of 10 meters. Personal Area Network is used for connecting the computer
devices of personal use is known as Personal Area Network. Thomas Zimmerman was
the first research scientist to bring the idea of the Personal Area Network. Personal Area
Network covers an area of 30 feet. Personal computer devices that are used to develop
the personal area network are the laptop, mobile phones, media player and play stations.
There are 2 different types of PAN
1. Wired Personal Area Network
2. Wireless Personal Area Network
Pro’s Con’s
*Security *Unreliable
Pro’s Con’s
*High bandwidth capacity *High cost
*Cost-effective *Security risks
*Secure *Technical Complexity
7 Mohamed Naveed
1001502
Networking
*Scalable *Limited Access
8 Mohamed Naveed
1001502
Networking
WAN (Wide Area Network)
A Wide Area Network is a network that extends over a large geographical area such as
states or countries. A Wide Area Network is quite bigger network than the LAN. A Wide
Area Network is not limited to a single location, but it spans over a large geographical
area through a telephone line, fiber optic cable or satellite links. The internet is one of the
biggest WAN in the world. A Wide Area Network is widely used in the field of Business,
government, and education.
Examples of Wide Area Network –
-Mobile Broadband
-Last Mile
-Private Network
Pro’s Con’s
*Centralized data *Slow in speed
9 Mohamed Naveed
1001502
Networking
1.2 Explain the impact network topologies have on communication and
Bandwidth requirements
Network topology defines the layout, virtual shape, or structure of the network, not only
physically but also logically. A network can have one physical topology and multiple
logical topologies at the same time.
In computer networks, there are mainly 2 types of topologies namely
1. Physical Topology – The way in which the computer nodes are connected with
each other in a computer network.
2. Logical Topology – The way data flows from one computer to another. It is
bound to the network protocol and defines how the data is moved and which path
it takes.
10 Mohamed Naveed
1001502
Networking
In a computer network there are mainly 6 types of physical topologies namely
1. Bus Topology
2. Ring Topology
3. Star Topology
4. Mesh Topology
5. Tree Topology
6. Hybrid Topology
Bus Topology
Bus topology is the simplest kind of topology in which a common bus or channel is used for
communication in the network. The bus is connected to various taps and droplines. Taps are the
connectors, while droplines are the cables connecting the bus with the computer. In other words,
there is only a single transmission line for all nodes.
When a sender sends a message, all other computers can hear it, but only the receiver accepts it
(verifying the mac address attached with the data frame) and others reject it. Bus technology is
mainly suited for small networks like LAN, etc.
In this topology, the bus acts as the backbone of the network, which joins every computer and
peripherals in the network. Both ends of the shared channel have line terminators. The data is
sent only in one direction and as soon as it reaches the end, the terminator removes the data from
the communication line (to prevent signal bounce and data flow disruption).
11 Mohamed Naveed
1001502
Networking
Pro’s Con’s
*Simple to use and easy to install *If bus fails, network will fail
*Less cabling *Security issues
*Cost-efficient to implement *Less efficient when nodes are increased
*If a node fails, it will not affect others *Congestion and traffic
Ring Topology
Ring topology is a topology in which each computer is connected to exactly two other computers
to form the ring. The message passing is unidirectional and circular in nature.
12 Mohamed Naveed
1001502
Networking
This network topology is deterministic in nature, i.e., each computer is given access for
transmission at a fixed time interval. All the nodes are connected in a closed-loop. This topology
mainly works on a token-based system and the token travels in a loop in one specific direction.
In a ring topology, if a token is free then the node can capture the token and attach the data and
destination address to the token, and then leaves the token for communication. When this token
reaches the destination node, the data is removed by the receiver and the token is made free to
carry the next data.
Pro’s Con’s
*Easy installation *If a node fails, the whole network fails
*Less cabling *Slow data transmission speed
*Easy to troubleshoot *Difficult to reconfigure
*Reduces chances of data collision
13 Mohamed Naveed
1001502
Networking
Star Topology
Star topology is a computer network topology in which all the nodes are connected to a
centralized hub. The hub or switch acts as a middleware between the nodes. Any node requesting
for service or providing service, first contact the hub for communication.
The central device (hub or switch) has point to point communication link (the dedicated link
between the devices which cannot be accessed by some other computer) with the devices. The
central device then broadcast or unicast the message based on the central device used. The hub
broadcasts the message, while the switch unicasts the messages by maintaining a switch table.
Broadcasting increases unnecessary data traffic in the network.
In a star topology, hub and switch act as a server, and the other connected devices act as clients.
Only one input-output port and one cable are required to connect a node to the central device.
This topology is better in terms of security because the data does not pass through every node.
Pro’s Con’s
*Centralized control *If central device fails, network fails
*Less expensive *Number of devices in the network is limited
*Easy to troubleshoot
*If a node fails, it will not affect others
14 Mohamed Naveed
1001502
Networking
Mesh Topology
Mesh topology is a computer network topology in which nodes are interconnected with each
other. In other words, direct communication takes place between the nodes in the network.
2 type of mesh
1. Full Mesh – Each node is connected to every other node in the network
2. Partial Mesh – Some nodes are not connected to every other node in the network
In a fully connected mesh topology, each device has a point to point link with every other device
in the network. If there are 'n' devices in the network, then each device has exactly '(n-1)' input-
output ports and communication links. These links are simplex links, i.e., the data moves only in
one direction. A duplex link (in which data can travel in both the directions simultaneously) can
replace two simplex links.
If we are using simplex links, then the number of communication links will be 'n (n-1)' for 'n'
devices, while it is 'n(n-1)/2' if we are using duplex links in the mesh topology.
Pro’s Con’s
*Dedicated links facilitate direct *Complex to implement and takes large space
communication to install network
*Very fast communication *Very high cabling required
*Maintains security due to separate channel *Cost inefficient to implement
15 Mohamed Naveed
1001502
Networking
for communication
*No congestion or traffic problems *Difficult installation and maintenance
Tree Topology
Tree topology is a computer network topology in which all the nodes are directly or indirectly
connected to the main bus cable. Tree topology is a combination of Bus and Star topology.
In a tree topology, the whole network is divided into segments, which can be easily managed and
maintained. There is a main hub and all the other sub-hubs are connected to each other in this
topology.
Pro’s Con’s
*Large distance network coverage *High cabling and hardware cost
*Least or no data loss *Complex to implement
*Fault finding is easy *Requires high maintenance
*Large number of nodes can be connected *If main bus fails, network fails
directly or indirectly
Hybrid Topology
16 Mohamed Naveed
1001502
Networking
A Hybrid topology is a computer topology which is a combination of two or more topologies. In
practical use, they are the most widely used.
In this topology, all topologies are interconnected according to the needs to form a hybrid. All
the good features of each topology can be used to make an efficient hybrid topology.
Pro’s Con’s
*Handles large volume of nodes *Complex design
17 Mohamed Naveed
1001502
Networking
Hence, after learning the various computer network topologies, we can conclude that some
points need to be considered when selecting a physical topology:
Ease of Installation.
Fault Tolerance.
Implementation Cost.
Cabling Required.
Maintenance Required.
Reliable Nature.
Ease of Reconfiguration and upgradation.
Section 1.3 Assess common networking principles and how protocols enable
the effectiveness of networked systems.
18 Mohamed Naveed
1001502
Networking
Domain Name System
DNS is a database that includes a website's domain name and its corresponding IP addresses.
People use a domain name to access a website, while devices use an IP address to locate a
website.
DNS translates the domain name into IP addresses, and these translations are included within the
DNS. Servers can cache DNS data, which is required to access the websites. DNS also includes
the DNS protocol, which is within the IP suite and details the specifications DNS uses to
translate and communicate.
DNS is important because it can provide users with information quickly and enable access to
remote hosts and resources across the internet.
19 Mohamed Naveed
1001502
Networking
When a device connects to a network, a DHCP handshake takes place. In this handshake process,
the device and DHCP server communicate using the following steps:
20 Mohamed Naveed
1001502
Networking
File Transfer Protocol (FTP)
FTP is a client-server protocol, with which a client requests a file and the server supplies it. FTP
runs over TCP/IP -- a suite of communications protocols -- and requires a command channel and
a data channel to communicate and exchange files, respectively. Clients request files through the
command channel and receive access to download, edit and copy the file, among other actions,
through the data channel.
21 Mohamed Naveed
1001502
Networking
FTP has grown less popular as most systems began to use HTTP for file sharing. However, FTP
is a common network protocol for more private file sharing, such as in banking.
2.1 Discuss the operating principles of networking devices and server types
Networking devices / infrastructure promote effective communication between users within the
network as well as external networks. At their core, network devices are communication devices.
They are the required components for communication and interaction between hardware on a
computer network. This hardware could be electronic devices like fax machines, computers,
22 Mohamed Naveed
1001502
Networking
printers, and other IT infrastructure. The primary purpose of network devices is to transmit and
receive data quickly and securely. "Network Devices" is a broad term that encompasses a range
of communication equipment including hubs, switches, routers, bridges, gateways, load
balancers, modems, repeaters, and more.
Hub
A Hub is a connectivity device where cables are attached together to form a network segment.
They connect multiple computer networking devices. Hubs can also act as a repeater or amplifier
for information that has to travel over long distances. Typically, a hub doesn't filter data, and
instead just retransmits it. Hubs can handle both digital and analogue data as long as settings
have been properly configured to use that data type. For example, if the incoming data is digital,
the hub will transmit it in packets; but if the incoming data is analogue, it will pass it on via a
signal.
Switch
Switches are more sophisticated than hubs, which are generally considered to be the simplest of
network connecting devices. With both switches and hubs, each computer is connected through a
single line, but switches are more intelligent about where it sends the data that comes through its
ports. It does this by reading the hardware addresses of incoming packets and basing forwarding
decisions on guidelines that are provided in the headers of the TCP/IP protocols. While switches
and hubs perform a similar function, switches are often preferred because they improve network
efficiency and network security. There are also multilayer switches, which function as both a
switch and a router.
Router
Routers filters and forward data based on logical addresses, for example, the IP address. Routers
can perform several functions. They store information about networks, can be configured to be
packet-filtering firewalls and can use access control lists. Routers play a critical role in
controlling traffic on the network as well as promoting efficiency.
Bridge
A0 bridge is a networking device that filters and forwards packets based on a physical address.
Bridges are used to connect two or more network segments together and store and forward
frames between the different segments. They are also used to divide more extensive networks
into smaller sections and manage the flow of data between the sections.
Gateway
23 Mohamed Naveed
1001502
Networking
A gateway is a node that acts as a "gate" between two autonomous networks that each can have
their own routing algorithms, protocols, domain name service, and topology. It allows traffic to
flow in and out of the network but also acts as a critical stopping point for data on its way in or
out of the network. It can also translate data it receives from outside the network into a format or
protocol that is recognized by devices in the internal network. Put simply, a gateway is a router
with additional functionality. For example, if a router has translation functionality, it becomes a
router.
Server Types
File Server
A file server stores data files for multiple users. They allow for faster data retrieval and saving or
writing files to a computer. This is a basic type of server used commonly by organizations where
lots of users need access to files that are more conveniently and safely stored on a server than a
personal computer.
Mail Server
A mail server stores and delivers mail for clients through email service platforms. Because mail
servers are set up to continually connect to a network, individual users can access their email
without running any systems through their own devices.
Proxy Server
Proxy servers act as a bridge between a host server and a client server. A proxy sends data from a
website to your computer IP address after it passes through the proxy's server. This practice adds
a layer of security since the information is requested then transferred from the source to the
proxy server and never directly from a client to another user. A proxy server can filter out
various harmful internet entities.
24 Mohamed Naveed
1001502
Networking
Organizations that use workstation hardware need to have a dedicated networking operating
system to ensure that their devices can communicate with each other properly. While there are
many different types of networking operating systems available, workstation hardware is
typically only compatible with a handful of them. This can make it difficult for organizations to
switch to a new networking operating system if their current one is no longer supported.
Workstations are computers that are used by a group of people to do business or work
independently. A workstation, also known as a PC or mainframe terminal, is a piece of hardware
located on a local area network (LAN). To connect a computer workstation to the network, a
network interface card (NIC) must be installed. A collection of software programs designed with
a specific goal in mind. Hardware includes input devices, processing units, output devices, and
auxiliary storage devices. It manages hardware resources on computers. The server is a piece of
hardware and software that stores data, manages network resources, and performs client tasks.
One of the most important types of operating systems is the network operating system. The
Network Operating System is installed on a server and enables it to manage data, users, groups,
security, applications, and other network functions. In the software and hardware industries,
there is no distinction between them. It is the responsibility of both of them to make a computer
useful. The use of software necessitates the installation of necessary hardware. The hardware
cannot be used unless it is supported by a set of programs.
2.3 Explore a range of server types and justify the selection of a server for a
given scenario, regarding cost and performance optimization.
25 Mohamed Naveed
1001502
Networking
ii. VPN Server – As Reliance is a company that serves customers over multi-
national companies and also as the headquarters are located in the US, the
need for a secure connection between the head-office located in the US and
the branch located in Colombo is necessary, thus arising the need for a VPN
server. The purpose of the VPN server is to provide encrypted information
between two locations, which results in data privacy and security.
iii. Backup Server – As Reliance is a Mass scale company dealing with a huge
quantity of customer data, the ability of there being a data breach or loss of
data is eminent, therefore arising the need of a Backup Server. This server
makes sure that the data is backed up automatically to the server making it
easy to access the data in case of a data breach or loss of data.
v. File Server – As seen by the customer base of Reliance and the amount of data
it has to deal with on a daily basis, a file server can be seen as an important
addition to the company as it acts as a centralized storage center for the
company which results in easy management of the company data, client data
and other important information related to the company.
As for the type of server I would choose to have at Reliance, I would select a database server as
this server massively contributes to the efficiency and productivity of the company where it
reduces time and cost related to inserting and retrieving of data. The addition of this database
server to the company is going to allow the employees and the clients of Reliance to efficiently
and effectively insert and retrieve their data from any given place, time and instance.
26 Mohamed Naveed
1001502
Networking
3.1 Design a networked system to meet a given specification.
The following is the network diagram that I designed for the newly proposed network system for
Reliance.
27 Mohamed Naveed
1001502
Networking
Monthly Maintenance
ii. Backup Checks - Check on the backups and make sure that the data have
been backed up successfully by comparing the data from the backup servers to
the file servers. Do scenario tests to make sure the backup server are running
as planned
iii. System Checks – Check the system/network for any security bugs and update
all security features to date.
Quarterly Maintenance
ii. Access of Users – Check on the user permissions and roles and the privileges
that each user has.
i. Updates – Make sure that the Hardware drivers and the Software being used
are up to date.
Yearly
28 Mohamed Naveed
1001502
Networking
i. A complete assessment of the security – Run a complete check of the network
to assess the security status of the network, if any issues identified, take
relevant measures to fix them up.
3.3 Analyze user feedback on your designs with the aim of optimizing your design and
improving efficiency.
One of the methods of collecting feedback from the user is by designing a form page with the
relevant questions and submitting it to the user in the form of a report that is needed to be filled.
A template of that form is shown as follows
29 Mohamed Naveed
1001502
Networking
30 Mohamed Naveed
1001502
Networking
31 Mohamed Naveed
1001502
Networking
32 Mohamed Naveed
1001502
Networking
Through the above form let’s take into assumption 3 possible replies:
I. Kasun
The above created network design was implemented on Cisco Packet Tracer. The results are as
follows:
33 Mohamed Naveed
1001502
Networking
Installation and Configuration
To go ahead with the Configuration process, first an IP address must be selected for this network,
then it has to be Subnetted for each and every Layer and then they can be configured.
Subnetting
i. For this Network, I chose the IP address 192.168.10.0 / 24. As there are 2
Floors and 1 room dedicated for the servers, the above IP address has to be
subnetted into 3 portions.
The subnetting looked as follows
Below shows the configuration process for each and every device on the Network
I. Server Configs
DNS Server
35 Mohamed Naveed
1001502
Networking
The ip address 192.168.10.131 has been assigned to the DNS server under the Default Gateway
address 192.168.10.129.
36 Mohamed Naveed
1001502
Networking
For this particular server, the ip 192.168.10.130 has been assigned and the mail service has been
enabled
37 Mohamed Naveed
1001502
Networking
Enabling services and setting up for the host PC’s
38 Mohamed Naveed
1001502
Networking
Floor 1
I. PC configuration
39 Mohamed Naveed
1001502
Networking
VPN
As the Head-Quarters of US has to access the branch in Colombo, VPN connections need to be
setup for secure communications.
40 Mohamed Naveed
1001502
Networking
Making sure that the servers work
41 Mohamed Naveed
1001502
Networking
I. Mail server
In order to test the connection of the Mail server with the rest of the devices, we need to ping
them. In this instance we are going to take the IP address from one of the pc’s in a specific floor
and we are going to ping it to test the connection
As we see here, a connection has been established among the pc’s and the mail server as there
has been no packet loss, we can prove that the mail server is connected and working as desired.
42 Mohamed Naveed
1001502
Networking
I. Network Connectivity test
44 Mohamed Naveed
1001502
Networking
4.3 Recommend potential enhancements for the networked systems.
iv. Recovery – Due to there being the possibility of data breaches and losses,
regular data backups and other procedures need to be taken to make sure that
the data is being secured in case of loss of hardware/software or any data
breach/loss
v. Feedback from Users – Keep gathering useful information not only from the
end customer but also from the employees when it comes to increasing the
performance, security, efficiency networks. With this information, the
networks need to be updated and improved
References
https://www.comparitech.com/ (2020) Variable Length Subnet Mask (VLSM) Tutorial [online]
Available at: https://www.comparitech.com/net-admin/variable-length-subnet-mask-vlsm-
tutorial/ [Accessed 1 August 2022]
https://www.comptia.org/ (n.d.) What Is a Network Protocol, and How Does It Work? [online]
Available at: https://www.comptia.org/content/guides/what-is-a-network-protocol [Accessed 1
August 2022]
45 Mohamed Naveed
1001502
Networking
https://www.ibm.com/uk-en (2021) Networking [online] Available at: https://www.ibm.com/uk-
en/cloud/learn/networking-a-complete-guide [Accessed 1 August 2022]
https://www.ibm.com/uk-en (2022) TCP/IP protocols [online] Available at:
https://www.ibm.com/docs/en/aix/7.2?topic=protocol-tcpip-protocols [Accessed 1 August 2022]
https://www.lifewire.com/ (2022) What Is Bandwidth? Definition, Meaning, and Details [online]
Available at: https://www.lifewire.com/what-is-bandwidth-2625809 [Accessed 1 August 2022]
https://www.adobe.com/ (n.d.) DNS/DHCP/EMAIL VIA PACKET TRACER [online] Available
at: https://express.adobe.com/page/7ogipygZfOh0B/ [Accessed 1 August 2022]
https://techgenix.com/ (2019) Tips and tools for simulating a complex network in a virtual lab
[online] Available at: https://techgenix.com/simulating-network-in-virtual-lab/ [Accessed 1
August 2022]
https://www.eve-ng.net/ (2022) EVE - The Emulated Virtual Environment For Network, Security
and DevOps Professionals [online] Available at: https://www.eve-ng.net/ [Accessed 1 August
2022]
https://www.serverwatch.com/ (2021) Network Server [online] Available at:
https://www.serverwatch.com/servers/network-server/ [Accessed 1 August 2022]
https://www.techtarget.com/ (2022) IoT gateway [online] Available at:
https://www.techtarget.com/iotagenda/definition/IoT-gateway [Accessed 1 August 2022]
Turnitn Report
46 Mohamed Naveed
1001502
Networking
47 Mohamed Naveed
1001502
Networking
48 Mohamed Naveed
1001502
Networking