0% found this document useful (0 votes)
32 views

E1593583 - UNIT 2 NETWORKING New

Uploaded by

teraX
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views

E1593583 - UNIT 2 NETWORKING New

Uploaded by

teraX
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 96

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)

INTERNAL VERIFICATION – ASSESSMENT DECISIONS


Programme title BTEC Higher National Diploma in Computing
MR.SUDESH
Assessor Internal
Verifier
Unit 02: Networking
Unit(s)
LAN Design & Implementation for SYNTAX SOLUTIONS
Assignment title
AJWARD MUHAMMADH MUHAMMEDH ASHFAQUE
Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST
Do the assessment criteria
awarded match those shown in the
assignment brief? Y/N
Is the Pass/Merit/Distinction grade
awarded justified by the assessor’s Y/N
comments on the student work?
Has the work been assessed
accurately? Y/N
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
• Identifying opportunities for improved Y/N
performance?
• Agreeing actions? Y/N

Does the assessment decision need


amending? Y/N

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature(if
required) Date
Confirm action completed
Remedial action
taken
Give details:
MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 1|P a g e

Assessor signature Date


Internal
Verifier Date
signature
Programme
Leader signature Date
(if required)
MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 2|P a g e
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID MUHAMMEDH ASHFAQUE/KAN00128456
Unit Title Unit 02: Networking
Assignment 1 Assessor
Number
11/09/22 Date 11/09/22
Submission Date Received 1st
submission
Date Received 2nd
Re-submission submission
Date

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & P1 P2 M1
Distinction Descripts

LO2 Explain networking devices and operations.


Pass, Merit & P3 P4 M2 D1
Distinction Descripts

LO3 Design efficient networked systems.


Pass, Merit & P5 P6 M3 D2
Distinction Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & P7 P8 M4 D3
Distinction Descripts

Grade: Assessor Signature: Date:


Resubmission Feedback:

Grade: Assessor Signature: Date:


Internal Verifier’s Comments:

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 4|P a g e


Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal
and external moderation has taken place and grades decisions have been agreed at the
assessment board.

Assignment Feedback
Formative Feedback: Assessor to Student

1. Write little more about OSI Model


2. What little more about IEEE
3. Write Little more about future recommendations and conclusion
4. Write about maintenance schedule

Action Plan

1. Wrote more about OSI Model


2. Wrote more about IEEE
3. Wrote more about future recommendations and conclusion
4. Wrote more about maintenance schedule

Summative feedback

Feedback: Student to Assessor

Assessor Date
signature

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 5|P a g e


Student [email protected] Date 10/09/2022
signature

Pearson Higher Nationals in Computing

Unit 02: Networking


Assignment 01

General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment.
Use previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 6|P a g e


4. All the assignments should be printedon A4 sized papers. Use
single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
Word Processing Rules

1. The font size should be 12point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment
No, and Page Number on each page. This is useful if individual sheets become
detached for any reason.
5. Use word processing application spell check and grammar check function to help editing
your assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the
body except for the before mentioned compulsory information will result in rejection of
your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as
illness, you may apply (in writing) for an extension.
8. Failure to achieve at least PASScriteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic REFERRAL.
You will then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly
using HARVARD referencing system to avoid plagiarism. You have to provide both
intext citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade
could be reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to
present it as my own without attributing the sources in the correct form. I further understand
what it means to copy another’s work.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 7|P a g e


1. I know that plagiarism is a punishable offence because it constitutes theft.
2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be
my own, and where I have made use of another’s work, I will attribute the source in the
correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is
not attached to the assignment.

[email protected] 11/09/2022

Student’s Signature: Date:


(Provide E-mail ID) (Provide Submission Date)

Higher National Diploma in Computing


Assignment Brief
Student Name /ID Number KAN00128456

Unit Number and Title Unit 2:Networking


Academic Year 2021/22

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 8|P a g e


Unit Tutor MR. SUDESH

Assignment Title LAN Design & Implementation for SYNTAX SOLUTIONS

Issue Date 16/06/22

Submission Date 11/09/22

IV Name & Date

Submission format

The submission should be in the form of an individual reportwritten in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using
Harvard referencing system. Please also provide an end list of references using the Harvard
referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.

Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

Assignment Brief and Guidance:

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 9|P a g e


Scenario

SYNTAX SOLUTIONSis a privately owned, well-known Software company located in Colombo.


The Management of SYNTAX SOLUTIONShas purchased a 3-story building in the heart of
Matara. They are planning to make it one of the state-of-the-art companies in Matara with the latest
facilities.

It is expected to have nearly 150 employees in Matara branch.


Department Number of Users

Customer Care 10

Sales and Marketing 20

Finance 25

Legal 5

HR 10

Developers 55

Network Team 5

Server Room Servers +ISP connections

Following requirements are given by the Management.


• All the departments must be separated with unique subnet and should not communicate
with each other unless there is a special requirement.

• 192.168.10.0/24 is given and should be used for all the departments except the server room.
IPs should assign using DHCP.

• ERP and CRM Systems need to be implemented in Matara branch in local servers.

• Number of servers required for the Server room need to be decided by

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 10|P a g e


MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 11|P a g e
the Network designer and should be assigned with 10.254.1.0/24 subnet. (Uses static IPs)

• High level of redundancy is expected in network design to eliminate single point of


failures and traffic bottle necks.

• Sales and Marketing Team need to access Network resources using WIFI connectivity.

• Proper methods for networking monitoring and troubleshooting need to be


established.

• All possible network security mechanisms should be implemented.

Assume you have been appointed as the new network consultant of SYNTAX SOLUTIONS.
Prepare a network architectural design and implementit with your suggestions and recommendations
to meet the company requirements.

(Note: Clearly state your assumptions. You are allowed to design the network according to your
assumptions, but main requirements should not be violated)

Activity 01
• Discuss the benefits and constraints of different network system typesthat can be
implemented intheMatara branch and themain IEEE Ethernet standards that can be used
in above LAN and WLAN design.

• Discuss the importanceand impact of network topologies and network protocol suites
while comparing the main network topologies and network protocol suites that are used
in network design using examples.Recommend suitable network topologies and network
protocol suites for above scenario and justify your answer with valid points.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 12|P a g e


MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 13|P a g e
Activity 02
• Discuss the operating principles of network devices (Ex: Router, Switch, Etc.)and server types
that can be used for above scenario while exploring different servers that are available in
today’s market with their specifications . Recommend server/servers for the above scenario and
justify your selection with valid points.

• Discuss the inter-dependence ofworkstation hardware with networking software and provide
examples for networking software that can be used in above network design.

Activity 03
• Prepare a written network design plan to meet the above mentioned user requirements including
a blueprint drawn using a modeling tool. (Ex: Microsoft Visio, EdrawMax).
Support your answer by providing the VLAN and IP subnetting scheme for the above scenario
and the list of devices, network components and software used to design the network for above
scenario and while justifying your selections.

• Test and evaluate the proposed design to meet the requirements and analyse user feedback by
using a User feedback form.

• Install and configure Network services, devices and applications (Ex: VLAN,DHCP,
DNS,Proxy, Web, Etc.) according to the proposed design to accomplish the user requirements
and design a detailed Maintenance schedule for above Network.

*Note: - Screen shots of Configuration scripts should be presented.

Activity 04

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 14|P a g e



Implement a networked system based on your prepared design with valid evidencesand
recommend potential future enhancements for the networked system with valid justifications to
your recommendations.Use critical reflection to critically evaluate the design, plan,
configuration, and testing of your network while justifying with valid conclusions.

• Develop test cases and conduct verification (Ex: Ping, extended ping, trace route, telnet, SSH,
etc.) to test the above Network and analyse the test results against the expected results.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 15|P a g e


MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 16|P a g e
Grading Rubric

Grading Criteria Achieved Feedback

LO1 :Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types and
standards.

P2
Explain the impact of network topology, communication and
bandwidth requirements.

M1
Compare common networking principles and how protocols enable
the effectiveness of networked systems.

LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and server
types.

P4
Discuss the inter-dependence of workstation hardware with relevant
networking software.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 17|P a g e


M2
Explore a range of server types and justify the selection of a server,
considering a given scenario regarding cost and performance
optimization.

LO 1 &LO2
D1 Critically evaluate the topology protocol selected for a given
scenario to demonstrate the efficient utilisation of a networking
system.
LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and analyze
user feedback.

M3
Install and configure network services and applications on your
choice.

D2
Design a maintenance schedule to support the networked system.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 18|P a g e


LO4 :Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.

M4
Recommend potential enhancements for the networked systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.

Contents
ACKNOWLEDGEMENT........................................................................................................................................................................................20
Activity 1...................................................................................................................................................................................................................21
Scenario.....................................................................................................................................................................................................................21
Computer Network....................................................................................................................................................................................................21
Introduction to network.............................................................................................................................................................................................22

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 19|P a g e


IEEE Ethernet Standards...........................................................................................................................................................................................36
Network Topologies..................................................................................................................................................................................................37
Network Protocols......................................................................................................................................................................................................44
OSI Models (Open System Interconnection)............................................................................................................................................................44
TCP/IP Model (Transmission Control Protocol)......................................................................................................................................................47
A SUMMARY OF THE ABOVE QUESTION........................................................................................................................................................49
Activity 2...................................................................................................................................................................................................................50
Network Devices.......................................................................................................................................................................................................50
Servers.......................................................................................................................................................................................................................59
Workstation...............................................................................................................................................................................................................64
Recommended servers...............................................................................................................................................................................................65
2.2..............................................................................................................................................................................................................................66
Activity 3...................................................................................................................................................................................................................70
3.1..............................................................................................................................................................................................................................70
Network Scheme.......................................................................................................................................................................................................70
SUBNET SCHEME..................................................................................................................................................................................................71
Software and Network Components applied in Network Design.............................................................................................................................72
Feedback Form..........................................................................................................................................................................................................75
Activity......................................................................................................................................................................................................................76
3.3..............................................................................................................................................................................................................................76
Network Services,Application and Devices Configuration......................................................................................................................................76
Wire shark...............................................................................................................................................................................................................84
3.3 Maintenance schedule.........................................................................................................................................................................................87

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 20|P a g e


Activity 4...................................................................................................................................................................................................................88
NETWORK SCHEME..............................................................................................................................................................................................88
TEST CASE FOR SYNTAX SOLUTION................................................................................................................................................................90
4.1 Future enhancements to be implemented for the above network system............................................................................................................91
Conclusions...............................................................................................................................................................................................................92
References.................................................................................................................................................................................................................93

Figure 1 Wired Area Network ...................................................................................................................................................................................


26
Figure 2 Wired Area Network ...................................................................................................................................................................................
27
Figure 3 LAN .............................................................................................................................................................................................................
29
Figure 4 WIRELESS LAN ........................................................................................................................................................................................
32
Figure 5 MAN ............................................................................................................................................................................................................
33
Figure 6 WAN ............................................................................................................................................................................................................
35
Figure 7 Star topology ................................................................................................................................................................................................
38
Figure 8 Bus topology ................................................................................................................................................................................................
39

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 21|P a g e


Figure 9 Hybrid
topology ........................................................................................................................................................................................... 41
Figure 10 Mesh topology ...........................................................................................................................................................................................
42
Figure 11 OSI layer ....................................................................................................................................................................................................
45
Figure 12Router .........................................................................................................................................................................................................
51
Figure 13 switch .........................................................................................................................................................................................................
53
Figure 14Modem ........................................................................................................................................................................................................
54
Figure 15Access Point ...............................................................................................................................................................................................
55
Figure 16 Firewall ......................................................................................................................................................................................................
57
Figure 17Server ..........................................................................................................................................................................................................
58
Figure 18 Servers .......................................................................................................................................................................................................
62
Figure 19 Lenovo .......................................................................................................................................................................................................
63
Figure 20 Network Scheme ........................................................................................................................................................................................
70
Figure 21 HP Laptop ..................................................................................................................................................................................................
72
Figure 22 EDraw ........................................................................................................................................................................................................
73 Figure 23 Packet
Tracer .............................................................................................................................................................................................74

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 22|P a g e


Figure 24 VLAN
Assigning ....................................................................................................................................................................................... 76
Figure 25 Assigning Switchport ................................................................................................................................................................................
77
Figure 26 VLAN output .............................................................................................................................................................................................
78
Figure 27 Encap do ....................................................................................................................................................................................................
79
Figure 28 DHCP Configuration .................................................................................................................................................................................
80
Figure 29 DHCP Output ............................................................................................................................................................................................
81
Figure 30 Enable password ........................................................................................................................................................................................
82
Figure 31 Enable password 2 .....................................................................................................................................................................................
83
Figure 32 Wireshark 1 ................................................................................................................................................................................................
84
Figure 33 Wireshark 2 ................................................................................................................................................................................................
85
Figure 34 Wireshark 3 ................................................................................................................................................................................................
85
Figure 35 Network Scheme ........................................................................................................................................................................................
88

Table 1 FAST ETHERNET/GIGABIT ETHERNET ................................................................................................................................................


31

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 23|P a g e


Table 2
TCP/IP ........................................................................................................................................................................................................... 48
Table 3 DIFFERENCES OSI .....................................................................................................................................................................................
48
Table 4 ASPECTS OF ROUTER ..............................................................................................................................................................................
52
Table 5 ASPECTS OF SWITCH ...............................................................................................................................................................................
54
Table 6 MODEM .......................................................................................................................................................................................................
55
Table 7 ACCESS POINT ...........................................................................................................................................................................................
56
Table 8 Firewall .........................................................................................................................................................................................................
57
Table 9 SUBNET SCHEME ......................................................................................................................................................................................
71
Table 10 COMPUTER COMPONENTS ...................................................................................................................................................................
74
Table 11 FEEDBACK FORM ...................................................................................................................................................................................
75
Table 12 MAINTANENCE SCHEDULE .................................................................................................................................................................
87
Table 13 TEST CASE ................................................................................................................................................................................................
90
ACKNOWLEDGEMENT

I would like to express my special thanks of gratitude to all the individuals, and I would like to extend my sincere thanks to all of them. Specially
Our Networking lecture Mr. Sudesh for giving us the motivation and providing us with all the requirements and information that we needed to
complete the assignment and helped me in completion of this assignment without any barriers.
THANK YOU…

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 24|P a g e


Activity 1

Scenario

A famous privately held tech company, SYNTAX SOLUTIONS, has chosen to construct a company, three-story structure in Matara. The 152
workers of the Matara branch are splatted into 7 departments. Customer care, sales and marketing, economics, legal, human resources, and
network team departments in general. There is one server room here, and I can propose three. A respected privately held technology firm,
SYNTAX SOLUTIONS, has chosen to construct a product, three-story tower in Matara. The 152 employees of the Matara branch are splatted
into 7 departments. Client service, sales and marketing, economics, legal, human resources, and network team departments in general. I can offer
3 major servers for them as they operate a server room.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 25|P a g e


Computer Network

A computer network can be simply defined as the joining of two or more linked computers that allows the sharing of files, resources, and
communication. It can also be described as a group of computers sharing resources that are offered by or available on network nodes. The
computers connect with one another by digital connections implementing specified communication protocols. These connections are made up
of telecommunication network technologies, which could be arranged in a range of network topologies and are based on physically linked,
optical, and wireless server means. The type of network varies based on the number of devices as well as the location they are located, and the
distance separated there are from one another. (TECH TARGET)

Introduction to network

An important technological advance transpired in 1936 only with release of the first computer. But this needed until years later, in 1969, for the
first-ever computer-to-computer link to really be established. This innovation acted as the eventual spark for the Internet-driven world in which
we now live.

Government researchers utilized the Internet in the 1960s as a method for data transmission. In the 1960s, computers were big and static, and to
get to the information they carried, one had either drive to the address of the computer or have magnetic computer tapes sent through the
ordinary mail system.

Positive Aspects of Network

❖ Faster problem solving: -


By breaking up a large process into several small periods, each of which is handled by the equipment, a specific problem can be solved
more quickly.

❖ Role based access Security: -

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 26|P a g e


Since only authorized system users have access to certain records or applications, no one else can harm the
information security or protection.

❖ Reliability: -
Reliability advanced knowledge backup. Another copy of the same information is available on another workstation for future use in the
case that such PC becomes compromised or unavailable because of equipment failure, crashes, etc., providing for uninterrupted
operation.

❖ It maximizes storage capacity: -


Since you'll be sharing data, tools, and resources with others, you need to make sure that they are stored securely in the system. Thanks to
this advancement in system administration, you can control all of this with no difficulties, and you'll have sufficient capacity.

Harmful Aspectsof network

❖ Malware and Viruses: -


If even a computer system on a system becomes infected with a virus, there is a possibility that additional frameworks could become
vulnerable. Due to the number of devices present, a system can potentially obtain infected.

❖ Insufficient independence: -

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 27|P a g e


Because PC skill set a technique that is worked on computers, people will depend more on PC work than on
exerting themselves to accomplish their duties. Furthermore, as they will be dependent on the main document server, the system would
be rendered useless, and the users would cease using that.

❖ Expense of Network: –
The equipment and cabling necessary to set up the system could be costly.

The Importance of Network

❖ Most best platforms for communication strategy are provided.


❖ Advances in communication and expense resource pooling.
❖ Increasing storage's efficiency and capacity.
❖ Reducing Overall development cost.
❖ Reduced hardware prices.

Types of networks

We will explain about network types and the three main varieties of networks: LAN, MAN, and WAN. Computers can connect and
communicate with each other via any type of network because to the network.

There are many various varieties of networks: -


▪ Metropolitan area network (MAN)
▪ Personal area network (PAN)
▪ System area network (SAN)
▪ Wide area network (WAN)
▪ Wireless local area network (WLAN)
▪ Virtual private network (VPN)
▪ Storage area network (SAN)

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 28|P a g e


▪ Campus area network (CAN)
▪ Local area network (LAN)

Personal Area Network (PAN)

A PAN can work over cable interfaces like USB or wirelessly. A wireless personal area network (WPAN) is a PAN which uses a less powerful,
summary wireless network technology, including IrDA, Wireless USB, Bluetooth, or ZigBee (WPAN). The range of a WPAN may vary
between a few millimeters and a few meters. WPANs designed for low-power sensor operation are also referred to as low-powered personal
area networks (LPPAN) to identify the processes themselves from low-power wide-area networks (LPWAN). (CLOUD FLARE)

Wired Area Network:

By using wired personal area networks, devices are able short connections with each other. Technology examples include IEEE-1394,
Thunderbolt, and USB.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 29|P a g e


Figure 1 Wired Area Network

Wireless Area Network:

A wireless personal area network (WPAN) is a personal area network (PAN) with wireless connectivity (WPAN). IEEE 802.15 had developed
standards for a variety of PANs, including Bluetooth, using the ISM band. The Infrared Data Association have developed a standard for WPANs
that are using infrared communications (IrDA). A wireless personal area network (WPAN) is a personal area network (PAN) with wireless

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 30|P a g e


connectivity (WPAN). IEEE 802.15 also created standards for a variety of PANs, including Bluetooth, using the ISM
range. The Infrared Data Association is created rules for WPANs which use infrared communications (IrDA).

Figure 2 Wired Area Network

(eTutorials.org )

Positive and Harmful Aspects of Personal Area Network (PAN)

Positive Aspects: -

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 31|P a g e




Connect up with multiple devices at once PAN
will not really take up additional space.
❖ It's indeed effortless for using.
❖ It is effective.
❖ There is no requirement for additional wire or cable.
❖ It is conserved.
❖ It's found in air conditioner & TV remote controls, among many other functions.

Harmful Aspects: -
❖ This range with PAN is restricted.
❖ The gadgets are incompatible
❖ Infrared signals can only be followed in straight lines.
❖ Data transfer is laggy.
❖ It is only suitable for employment in the private domain.
❖ It connects with rf signals.
❖ It still only operates in the few various scenarios.

Local Area Network (LAN)

Ethernet and Wi-Fi are the two most broadly applied technologies for local area networks. Token Ring, AppleTalk, and ARCNET are among
the earlier network technologies.
Ethernet cables are linked to hubs, switches, and routers via their RJ45 ports. Thanks to LAN technology, communication efficiency has
significantly increased. (CISCO)

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 32|P a g e




Qualities OF Local Area Network (LAN)

LANs get a specific spatial reach and are privately run.


LANs allow computer and low-voltage device groups to access data and resources at short distances.
❖ Devices within a certain place, such as an apartment, office, school, or institution, that are connected via LANs.
❖ LANs can connect with each other via the Internet with leased lines, leased services, or virtual private network technologies.
❖ The most popular networks are LANs, that are the most extensively used, innovative, and foundational kinds of networks.

Figure 3 LAN

(IT Release)

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 33|P a g e



Advantages of Local Area Network


❖ Simple and cost effective
combination of resources
Software application access
❖ Speedy communication

Disadvantages Of Local Area Network


❖ Major limit due to the distance
❖ The expense and difficulties of LAN installation
❖ The big data applications security risk would be
❖ Sharing of information with Outside Sources

Cabling System in LAN

A LAN cable, then, is a cable that connects computers to network switches, and from the switch, it connects to a router, modem, or DSL, that is
what powers your internet from an internet service provider.

Types of Cable:
❖ coaxial Cable
❖ twisted pair Cable
❖ fiber-optic cable

RJ45Connector:

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 34|P a g e




Computers are normally linked to Ethernet-based local area networks that used an 8-pin/8-position plug or jack (LAN). Twisted-pair cable
ending onto the connector interface is performed via one of the two wiring systems, T568A or T568B.

Foil or mesh is applied to hold twisted pair cables that have been shielded from electromagnetic interference (STP). Ethernet cables which are
swift, and gigabit indicate this. And these are some of the distinctions among Fast and Gigabit Ethernet. Foil or mesh is used to contain twisted

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 35|P a g e


pair cables that have been shielded from electromagnetic interference (STP). Ethernet cables that are swift and gigabit
show this. And these are some of the characteristics in Fast and Gigabit Ethernet.

Fast Ethernet Gigabit Ethernet


coverage is capped to 10KM. coverage is capped to 70KM.

100 Mbps is the largest achievable fast Ethernet speed. GBPS is the high rate of gigabit Ethernet.

Table 1 FAST ETHERNET/GIGABIT ETHERNET

Wireless Local Area Network (WLAN)

A set of co - located computers or other devices that form a network based on radio transmissions rather than wired connections is called as a
wireless local-area network (WLAN). (CISCO)

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 36|P a g e


Figure 4 WIRELESS LAN

Positive and Harmful Aspects ofWireless Local Area Network (WLAN)

Positive Aspects
❖ Workstations can indeed be joined to or discarded more simply.
❖ You'll even transfer a workstation while maintaining connectivity.
❖ Because that minimizes the demand for physical connections, WLAN is a flexible form of communication.
❖ It's a dependable communication tool.
❖ Because of the confined coverage region, the price is high. ❖ WLAN significantly lowers the level of ownership.

Harmful Aspects
❖ Thunder or rain may make it hard to connect.
❖ There isn't a large amount of space to hide.
❖ Low security enables it for attackers to monitor the sent data.
❖ WLAN uses frequency, which could interfere with other devices that use frequency.
❖ WLAN needs a license.
❖ As there are more connected devices, the data transfer rate reduces.

Metropolitan Area Network (MAN)


A metropolitan area network (MAN) is a networking device that includes over than one building and is smaller than a wide area network
spatially (WAN). A variety of LANs are typically connected by specific backbone connections. (CLOUDFLARE)

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 37|P a g e


Figure 5 MAN

(JAVAT POINT)

Positive and Harmful Aspects of Metropolitan Area Network (MAN)

Positive Aspects of (MAN)


❖ Optical fibers used in MAN networks, offering data speed of up to 1000 Mbps.
❖ Files and databases can be transferred efficiently over this network.
❖ Email service is fast and free on the MAN network, that also allows for fast transferring data.
❖ MAN provides great data transmission and is less expensive than LAN.
❖ MAN, networks manage data in a central location where all the nodes are linked to devices.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 38|P a g e


Harmful Aspects of (MAN)

❖ There is a security risk and a setup that makes management difficult due to the multiple LANs that are linked and the size of them.
❖ The construction of the MAN network over a normal phone copper line is not practical due to the low speed that would result. We must
therefore build fiber optics, which is costly to build the first time, if we want high speed.
❖ There is a security concern due to the large number of LANs connected and their size, and the configuration making management
difficult.
❖ MAN networks are more susceptible to stolen by hackers that LAN networks, which raises the risk that our data will be exposed. To
secure data, we need highly trained staff and security equipment.

Wide Area Network (WAN)

A wide-area network (WAN) is, its most basic form, a set of networked local-area networks (LANs) or other networks. The Internet is
the largest WAN in the world, and a WAN is essentially a network of networks. A wide-area network (WAN) is, in the most basic
form, a collection of linked local-area networks (LANs) or other networks. The Internet is the most powerful WAN in the world, as well
as a WAN is essentially a network of networks. (CISCO)

Figure 6 WAN

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 39|P a g e


(VidyaGyaan)

Positive and Harmful Aspects of Wide Area Network (WAN)

Positive Aspects of (WAN)


❖ A message might show areas, audio, video, etc. These data can be transmitted over large distances fairly fast.
❖ Multiple individuals can access and use the internet at one time.
❖ Data on the network is available to all System users.
❖ We can communicate over greater distances with the aid of Wan connections.
❖ The resources can be distributed over a bigger region.
❖ We transmit the data to the company's branches, which are spaced out over the worldwide.

Harmful Aspects Of (WAN)


❖ An effective firewall is needed to prevent unauthorized individuals from accessing the data.
❖ Fixing network-related issues is a cumbersome process.
❖ It can be a little challenging to provide user security.
❖ Regarding user privacy, there is no warranty. The data is easily available to a third party.
❖ Numerous highly competent technicians and network administrators are required to oversee the network servers.
❖ It can take longer to send the information than was planned.

IEEE Ethernet Standards

Through publications, conferences, and collaborations with academic institutions, IEEE primarily develops new electronic goods and
services, creates the standards that govern them, and disseminates, publishes, and promotes industry information. Electrical, electronics,
computer engineering, computer science, information technology, and most of their associated fields are the primary areas of interest for
IEEE. Main types of Networking standards

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 40|P a g e


For the creation of standard for internet protocol and its range of services, IEEE is well-known in the computing world. IEEE creates a wide
range of standards, including IEEE 802 and IEEE 802.11 (often referred to as Wi-Fi), and continues to innovate, update, and maintain these
standards. Additionally, IEEE maintains tens of thousands of professional and student chapters around the world, several focus societies, and
regularly supports conferences and seminars. Despite having a US base, the organization's standards frequently gain acceptance on a global
scale. (Techopedia, n.d.)

❖ Electronic Industries Association (EIA)


❖ Institute of Electronics and Electrical Engineers (IEEE)
❖ American National Standards Institute (ANSI)
❖ International Standards Organization (ISO)
❖ Internet Research Task Force (IETF)
❖ International Telecommunication Union (ITU)

IEEE 802

Wireless IEEE 802 requirements. IEEE 802 is a set of networking standards that includes the requirements for the physical and data-link layers
of technologies such Ethernet and wireless. Local area networks (LANs) and metropolitan area networks must conform to these standards
(MAN).

Network Topologies

The physical and logical structure of a network's links and nodes is known as its topology. Devices like switches, routers, and software with
switch and router features are usually included in nodes.

Star Network Topology

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 41|P a g e


A spoke-hub distribution model in computer networks is implemented by a star network. Every host in a star network is
linked to the main hub. In its most basic form, communications are transmitted through a single central hub. One of the most prevalent
computer network topologies is the star network.
The transmission lines connecting the hosts and hub plot the graph with the topology of a star. A star network's hub is the final stop before data
continues to its destination. All network operations are managed and under the authority of the hub. Additionally, it repeats the data flow.

Figure 7 Star topology

Advantages Of Star Topologies


❖ Easy defect identification because it's generally simple to identify the link.
❖ It is less expensive since every device only wants one I/O port and only wants to connect to the hub via one link. For each device
to connect to the hub, just one port is required.
❖ It operates well since there are no data collisions.
❖ When introducing or removing devices, there are no network hiccups.
❖ Robust by nature and simpler to adopt.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 42|P a g e


Disadvantages Of Star Topologies

❖ A single concentrator, or hub, decides performance.


❖ If the hub starts going down, everything declines because neither of the connected devices can function without it, which is more
costly than linear bus topology (network switches).
❖ The requirement for additional gear, including as hubs or switches, raises the price.
❖ As the star's main system, the hub necessitates more resources and ongoing repair.

Bus Topologies

Bus topology, usually called direct topology, is a type of network topology in which each device is connected to the network by an unique
coaxial or RJ-45 network wire. The single RJ-45 network cable or coaxial cable which unites all of the network's devices is referred to as the
bus, backbone, or trunk. Bus topology, also known as line topology, is a type of network topology in which all devices are connected to each
other.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 43|P a g e


Figure 8 Bus topology

Advantages Of Bus Topology:-

❖ When there is a little network, it operates quite well.


❖ Topology is easy to comprehend.
❖ Less wire is needed in this topology as in a star topology.
❖ This is the most basic network structure for connecting computers or peripherals in a linear way.
❖ Without impacting other devices, devices can be added to or removed from this network with easy. ❖ very cheap when compared to
mesh and star network topologies

Disadvantages Of Bus Topology:-


❖ Terminators are needed on the main cable's both sides.
❖ It becomes more difficult to identify issues if the entire network crashes.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 44|P a g e


❖ More devices are dragging down the network.
❖ Solving individual device issues is incredibly challenging.
❖ How Bus topology is not the ideal choice for large networks.

Hybrid Topology

Mesh topology, bus topology, and ring topology are just a few types of network topologies that can be combined to form a hybrid topology. Its
deployment and requirements, such as the desired network's performance, the number of computers, and their location, affect its use and
selection. The structure of a hybrid topology, typically includes various topology, appears in the picture below.

Figure 9 Hybrid topology

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 45|P a g e


Advantage Of Hybrid Topology: - ❖ Can
Be Changed to Suit Your Needs.
❖ It Is Quite Adaptable.
❖ When Two Networks Are Combined, The Topology's Speed Increases.
❖ Can Be Changed to Suit Your Needs.
❖ Takes Care ofa Lot Of Traffic.
❖ It Is Applied to Build Huge Networks.
❖ It Is Trustworthy.

Disadvantage Of Hybrid Topology: -


❖ The hardware is altered to link one topology to the other topology.
❖ The install is difficult.
❖ Since hybrid structures are often larger in size, installation requires for more connections.
❖ A hybrid network has a very complicated structure, and it is a special form of expensive network.

Mesh Network Topology: -

A type of networking named mesh topology includes connecting every computer with every other computer. The connections between devices
occur at random in mesh topology. Computers, switches, hubs, or any other kind of device could be one of the connected nodes. Even if one of
the connections in this topology breaks, it still allows the spread of other nodes. There is no hierarchy, no interdependency, and no consistent
pattern between nodes in this form of topology, which is also very expensive. The mesh topology's connections are not any easier to set.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 46|P a g e


Figure 10 Mesh topology

Types Of MeshTopology:-
1. Fully Connected Mesh topology
2. Partially Connected mesh Topology

Fully Connected Mesh topology: -

Each node in a total mesh network topology has a direct connection to every other node. Just those nodes in a partial mesh topology have deep
links to one another. A node often needs to pass through another node to reach a third node. A full mesh network contains deep links among
each node.

Partially Connected mesh Topology: -

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 47|P a g e


In the partial mesh topology, only a few nodes are linked to every other node. It implies that not all of the devices in this network have to be
linked to one another. It is less costly than complete mesh structure and offers basic redundancy to manage any node loss. In peripheral
networks, when they interact with a full-mesh backbone, the partial mesh topology is used.

Advantages of a Mesh Topology:


❖ Adding more devices won't be dealing with data flows.
❖ This structure provides many routes to the goal as well as a ton of redundancy, making failure identification straightforward.
❖ It guarantees high levels of privacy and security.
❖ The powerful properties of this architecture render it capable of handling any situation ❖ In a mesh, there is no central authority.
❖ Data transfer is more trustworthy because failure doesn't halt its processes.

Disadvantage Of Hybrid Topology: -


❖ The power demand is higher since each node must share the load and stay active all the time.
❖ The maintenance requirements for a mesh are hard.
❖ Each node has an additional utility cost to account for.
❖ Compared with other options, mesh is more expensive to implement.
❖ Installation in the mesh is difficult.
❖ There is a high likelihood of redundant connections.
❖ lengthy issue.

(AFTERACADEMY)

Network Protocols

An established set of standards that control how data is exchanged between various devices connected to the network is known as a network
protocol. In short, it enables linked devices to communicate with one another despite any variations in their inner operations, organizational, or
appearances.
Models

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 48|P a g e


OSI Models (Open System Interconnection)

The seven levels that computer systems employ to interact over a network are described by the Open Systems Interconnection (OSI) model.
Early in the 1980s, all significant computer and telecommunications businesses accepted it as the first industry standard for network
communications.
The simplified TCP/IP model, rather than OSI, is the foundation of the modern Internet. The OSI 7-layer model is still extensively used,
nevertheless, as it aids in both isolating and troubleshooting networking issues as well as helping to depict and convey how networks function.
OSI was first presented in 1983 by executives from the biggest computer and telecom firms, and it was accepted as an international standard in
1984 by ISO. (IMPERVA, n.d.)

Figure 11 OSI layer

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 49|P a g e


1. PHYSICAL LAYER

The physical layer oversees the wired or wireless connections that physically connect network nodes. In addition to defining the
connector, the electrical cable or wireless technology connecting the devices, it oversees bit rate regulation and the transmission of raw
data, which is just a stream of 0s and 1s.

2. DATA LINK LAYER

The data link layer creates and breaks connections between two network nodes that are physically close to one another. Frames are
created from packets, which are then sent from destination to source. This layer is made up of two components: Media Access Control
(MAC), which utilizes MAC addresses to connect devices and specifies permissions to transmit and receive data, and Logic Link
Control (LLC), which identifies network protocols, does error checking, and synchronizes frames.

3. NETWORK LAYER

The network layer serves two primary purposes. One is dividing segments to network packets, which are then put back together at the
other end. The alternative method of packet routing involves finding the optimum route through a physical network. To route packets to
a destination node, the network layer needs network addresses, which are commonly Internet Protocol addresses.

4. TRANSPORT LAYER

Data transferred in the session layer is divided into "segments" by the transport layer at the receiving end. On the receiving end, it is in
charge of putting the segments back together in order to create data that the session layer may use. The transport layer performs error
control, which determines whether data was received wrongly and, if not, requests it again, as well as flow control, which sends data at
a pace that fits the connection speed of the receiving device.

5. SESSION LAYER

The session layer establishes sessions, or channels of communication, between devices. It oversees starting sessions, making sure they
are active and open when data is being exchanged, and shutting them down once communication is complete. The session layer can also
establish checkpoints throughout a data transmission, allowing devices to pick up where they left off if the session is terminated.

6. PRESENTATION LAYER

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 50|P a g e


Data is prepared for the application layer by the presentation layer. In order for data to be correctly received on the other end, it specifies
how two or more devices should encode, encrypt, and compress data. All transmitted data by the application layer is processed by the
presentation layer before being delivered via the session layer.

7. APPLICATION LAYER

End-user applications like web browsers and email clients operate at the application layer. It offers protocols that let computer programs
transmit and receive data and give consumers useful information. The Hypertext Transfer Protocol (HTTP), File Transfer Protocol
(FTP), Post Office Protocol (POP), Simple Mail Transfer Protocol (SMTP), and Domain Name System are a few examples of
application layer protocols (DNS). (IMPERVA, n.d.)

TCP/IP Model (Transmission Control Protocol)


A collection of communication protocols named TCP/IP, or Transmission Control Protocol/Internet Protocol, are used to connect network
devices on the internet. Moreover, a private computer network uses TCP/IP as its communication mechanism (an intranet or extranet).

TCP/IP is a common term for the overall IP suite, a group of protocols. Although there are other protocols in the suite, TCP and IP are the two
more popular. The TCP/IP protocol suite serves as an abstraction layer between the routing and switching fabric and internet applications.

Qualities Of TCP/IP
TCP provides dependability and guarantees that out-of-order data will be placed back in order.
Supporting from a flexible TCP/IP architecture; allows for ease of adding new equipment to a
network As TCP offers flow control, a sender can never send too much data to a recipient. TCP is a
connection-oriented protocol.

TCP/IP has 4 Layers


Models Protocols Features

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 51|P a g e


Transport TCP, UDP Supports communications between different devices and networks.
To provide a dependable process for message delivery and error
delivery.
Network Access Ethernet, Frame Relay Is cost of the transfer between two devices on a network.
Application POP3, SMTP, FTP, HTTP Control discourse and deliver info.
To allow access to a network.
Internet IP, ARP,ICMP Select the most efficient approach for data transport.
To enable internetworking, transfer packets from source to destination.

Table 2 TCP/IP

Differences OSI and TCP/IP models

OSI Models TCP/IP


The ISO created it (International Standard Organization) TCP/IP is composed of four levels.

OSI takes an approach TCP/IP uses a horizontal technique


Under the OSI paradigm, interfaces, services, and protocols are TCP/IP uses just the Internet layer.
separate concepts.

The OSI model uses the two distinct levels of physical and data TCP/IP simply employ one layer (link).
connectivity to explain how the lowest layers behave.

Table 3 DIFFERENCES OSI

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 52|P a g e


A SUMMARY OF THE ABOVE QUESTION

My reasoning for picking the OSI Model.

By default, the OSI model is universal. In other words, it enjoys the support of various hardware suppliers. It is used by most computer
networks as their default model. The levels of the OSI model are clearly separate from one another. Changes made to one layer therefore have
no effect on the other. It is quite adaptable as it can be used with both connection-oriented and connectionless services. The separation of the
layers in the OSI model facilitates troubleshooting. By examining each tier, packet prioritization may be better able to determine the problem in
the case of a failure. Since the complete network is evaluated, no time is lost.

The logic behind my selection to use Hybrid as my network topology.

I chose the hybrid topology largely because I can combine the star, bus, ring, mesh, and tree topologies into one topology. Because I can build a
network according to the client's choices and needs, this may be the most practical option. As a result, developing my network will be without
challenges.
The final factor that affects my decision is how stable and scalable hybrid topology is. Additionally, the speed of the network greatly rises as a
result of combinations of topologies.
This fact that I can quickly identify and fix issues after building my network is yet another reason, I chose hybrid topology.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 53|P a g e


Activity 2

Network Devices

Network devices are real tangible things that link computers, printers, fax machines, and other electronic devices to a network. These devices
quickly, securely, and reliably transfer data over the same or separate networks. Wireless router can be either intra- or mutually. A NIC card or
RJ45 connection is an installed device, whereas a router, switch, or other network device is a network component. Let's take a closer look at a
few of these tools.

The below are a few examples of the various network device kinds that can be found in systems.

.
❖ Hub
❖ Switch
❖ Router
❖ Bridge
❖ Gateway
❖ Modem
❖ Repeater
❖ Access Point

Router

A network router is a form of network equipment that is used in computer systems to route traffic from one network to another. These two
networks could be personal or belong to a corporation that is publicly traded. By directing various traffic networks in different directions, a
router, for instance, serves as a traffic cop at a junction.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 54|P a g e


A networking device with a network port takes the cable's other end. If you want to connect more network devices to your router, it must
have more ports and cabling. These ports are referred to as Local Area Network (LAN) ports, and both the router and the end devices use
them. They are also known as RJ45 ports or Ethernet ports. When you plug a device into a router, your network is automatically wired.
Network elements with an RJ45 network connection are called to as Ethernet-ready devices.

Figure 12Router
(India Mart)
Positive and Harmful Aspects of Router

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 55|P a g e


Positive Aspects Harmful Aspects
Domain crossings lessen network traffic Network traffic is raised via dynamic router communication.

It may choose the most efficient route through the internetwork Over a bridge or repeater, a router is more costly.
using dynamic routing algorithms. are computer systems

It offers full routing, flow management, and traffic isolation The router is slower than a bridge or repeater as it has to monitor
services. data transit from the physical to the network layer.

The network manager can set policies based on routing settings Only routable network protocols work with routers; not all network
because they are reprogrammable. protocols are routable.

To save network traffic, create broadcast domains. Need several initial settings on occasion.
Table 4 ASPECTS OF ROUTER

Switch

A router enables you to share a single IP address among many network devices, whereas a network switch connect various devices and
networks to expand the LAN. In plainer terms, the router allows connections between networks while the Ethernet switch generates new
networks. A router enables you to share a single IP address among several network devices, whereas a network switch connects various devices
and networks to expand the LAN. In plainer terms, the router enables connections between networks while the Ethernet switch creates new
networks.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 56|P a g e


Figure 13 switch

(Infinity-Cable)

Positive and Harmful Aspects of Switch

Positive Aspects Harmful Aspects


support for centralized management There may be problems with the broadcast traffic.
.

Permit many chats to happen at once. Design and configuration should be done right in order to handle
multicast packets.

Logical segmentation is made clearer by supporting VLANs. It may be difficult to identify the cause of a network connectivity
problem while utilizing a switch
The variety of broadcast domains has decreased. High cost

It can map ports to MAPs and used the CAM table. Even when having a small broadcast, they are not as efficient as
routers.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 57|P a g e


They help to reduce the work placed on each host PC. The network fails to operate when a switch bridge fails.

Table 5 ASPECTS OF SWITCH


Modem

A modem is a device that links your home to your Internet service provider (ISP), such as Xfinity, generally over a coax cable connection. The
modem turns signals from your ISP into signals that may be used by your local devices and the other way around.

Figure 14Modem
(Science ABC)

Positive and Harmful Aspects of Modem

Positive Aspects Harmful Aspects


For LAN to internet connections, more effective Possible intermediate step of a modem.
Price does influence speed. The modem is ignorant of the route it will take to arrive.
A system has a small supply of linkages it can form. LAN only serves as a conduit between the internet and LAN.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 58|P a g e


Sluggish in relative to hub speed There isn't any repair being made on the traffic.
Table 6 MODEM
Access Point

A WLAN, or wireless local area network, is formed by an access point, typically in an office or big building. An access point transmits a WiFi
signal to a defined region after joining via an Ethernet cable to a wired router, switch, or hub.

Figure 15Access Point


(Linksys: US)

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 59|P a g e


Positive and Harmful Aspects ofAccess point

Positive Aspects Harmful Aspects


A longer transmission range Unsuitable for use alone
increased user access High Price
Interconnection of Many APNs Absence of stability

Table 7 ACCESS POINT


Fire Wall
A firewall is a network security device that can be either hardware- or software-based. It analyzes all incoming traffic and makes the decision
whether to accept, reject, or drop it based on a predetermined set of security rules.

Allow the traffic to tell:


If you reject, block the traffic and offer a "unreachable error" reply.
Drop, the road, and leave a message

A firewall isolates secured internal networks from external, uncontrolled networks like the Internet.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 60|P a g e


Figure 16 Firewall

Positive and Harmful Aspects Of Firewall


Positive Aspects Harmful Aspects
It helps safeguard. can slow down internet connection
Enhanced network monitoring and security capabilities protect the This is hampered because each packet must be examined before
data. entering the network.

It provides protection from Trojans. Expert management is essential.

Better privacy and security are ensured Depending on the degree of expertise needed, installing a firewall
could be expensive.

A firewall prevents hackers and remote access. For firewall maintenance and upgrades, extra employees and
resources are required.
Table 8 Firewall

Sever

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 61|P a g e


A computer program or equipment’s that offers a service to another computer program and its user, also known as the client, is referred to as a
server. The real computer that a server program runs on in a data center is also frequently referred to as a server.

Figure 17Server

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 62|P a g e


Servers
A server in computing is a program or device that delivers functionality to what is known as clients, which are other programs or devices. The
client-server model is the name of this architecture. The spreading of a single overall calculation over various processes or devices. Services are
the many functionalities that servers may offer. These services include doing computation for a client or transferring data or resources among
many clients. A single server can serve several clients, and a single client can use many servers. On the same server, a client process can be
functioning. To run on a different device, it can also connect over a network to a server. Database servers, mail servers, print servers, file servers,
web servers, application servers, and games are a few examples of servers.

The request-response pattern, when a client submits a request to the server, is the one utilized to create client-server systems most frequently. In
this model, the server does some action and then gives the client a response, usually with a finish or an acknowledgement. A computer is
specialized for operating servers when it is known to as server-class hardware. This means that it is more powerful and dependable than regular
personal computers. Large computing clusters, however, can be built from a variety of cheap, easily replaced server parts.

Different server types and the is using with each:

Application Server

Users on the network will run and use web apps (software that works inside a web browser) on these servers while having to put a copy of it on
their own devices. These servers don't have to be linked to the Internet. Web-enabled PCs function as their clients.

Communication Server

These servers keep up the environment need for one communication endpoint to identify and then communicate with other endpoints.
Depending on the network's openness and security configurations, these servers may or may not include a directory of communication
endpoints and a presence detection service. Their users are points of communication.

Database Server

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 63|P a g e


Any type of database can also be kept and shared using these servers via a network. A structured collection of data with
defined properties that may be shown in a table is said to as a database. Spreadsheets, accounting software, asset management software, and
nearly every other computer program that consumes well-organized data, especially in large volumes, are clients of these servers.

Catalog Server

These servers keep a table of contents or index of the information that is distributed across a large, distributed network. Computers, users, files
shared via file servers, and web apps all can be part of a distributed network. Directory servers and name servers are a few examples of catalog
servers. Any computer program that must search the network is one of their clients. An email client seeking for an email address, a user looking
for a file, or a Domain member trying to log in are a few instances.

Game Server

Many Personal computers or video game consoles will play multiplayer games according to these servers. Their clientele are personal computers
or gaming consoles.

Computer Server

Over a network, these servers share a large amount of computing resources, such as CPU and random-access memory. These kinds of servers
may be used by any computer program that needs more CPU and RAM than a single computer is verified closely to provide. To implement the
client-server model, which is important, the client must be a networked computer.

Servers

DELL PowerEdge R550 Rack Server:

Processer - Intel® Xeon® Silver 4310 2.1G, 12C/24T, 10.4GT/s, 18M Cache, Turbo, HT (120W) DDR4-2666

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 64|P a g e


Memory - 8GB RDIMM, 3200MT/s, Single Rank

Hard Drive - 2TB Hard Drive SATA 6Gbps 7.2K 512n 3.5in Hot-Plug

Storage - Up to 16 x 2.5-inch SAS/SATA (HDD/SSD) max 7.68 TB


Up to 8 x 2.5-inch SAS/SATA (HDD/SSD) max 7.68 TB
Up to 8 x 3.5-inch SAS/SATA (HDD/SSD) max 16 TB

Security - Cryptographically signed firmware


Secure Boot
Secure Erase
Silicon Root of Trust
System Lockdown (requires iDRAC9 Enterprise or Datacenter)
TPM 1.2/2.0 FIPS, CC-TCG certified, TPM 2.0 China NationZ

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 65|P a g e


Figure 18 Servers

Lenovo ThinkSystem SR650

Proceser:Up to 2 second-generation Intel® Xeon® Platinum processor

Memory: Supports Intel® Optane™ DC Persistent Memory

Network Interface: 2/4-port 1GbE LOM; 2/4-port 10GbE LOM (Base-T or SFP+); 1x dedicated 1GbE management port
Power (Energy Star 2.0 compliant): 2x hot swap/redundant: 550W/750W/1100W/1600W 80 PLUS Platinum; or 750W 80 PLUS Titanium; or
48V DC 80 PLUS Platinum

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 66|P a g e


Systems Management: XClarity Controller embedded management, XClarity Administrator centralized
infrastructure delivery, XClarity Integrator plugins, and XClarity Energy Manager centralized server power management

Operating Systems Supported: Microsoft, Red Hat, SUSE, VMware. Visit lenovopress.com/osig for details.

Figure 19 Lenovo

Workstation

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 67|P a g e


A personal computer is slower and less strong than a workstation, which is a computer designed for individual use. It is
created with business or professional use in mind (rather than home or recreational use). Small engineering firms, architects, graphic artists, and
any other group, department, or individual requiring a faster CPU, a lot computers random access memory (RAM), and unique features like
high-speed graphics adapters utilize workstations and programs made for them. The UNIX operating system, which is frequently used as the
workstation operating system, was historically developed technologically about the same time and for the same target audience as the
workstation. Sun Microsystems, Hewlett-Packard, DEC, and IBM are some of the most successful producers of this type of workstation.

Tower workstation ThinkStation P920

Energy Source: 1400 W @ 92%

Operating System: Windows 10 Pro 64 for Workstation is installed on Windows 11 Pro 64 for Workstation and Windows 11 Pro 64 for
Workstations through downgrade rights.

Memory: Supports both RDIMM and LRDIMM, up to 1 TB DDR4 2933MHz MHz, 16 DIMMs, and 64 GB DIMM capacity.

NVIDIA® RTXTM A5500 24GB, NVIDIA® RTXTM A6000 48GB, and NVIDIA® Quadro® GV100 32GB are the graphics devices.

Up to Dual Intel® Platinum, Gold, and Silver Processor (up to 28 cores, up to 4.4GHz per CPU)

Recommended servers
We install DELL PowerEdge R550 Rack Server and Tower workstation ThinkStation P920 Workstation hardware and applications
server software, DHCP server, File Transfer Protocol server, Email server, DNS server, and WEBServer for the Matara branch so
that we can manage network security and get data backup. We can hold all files in one location so that any authorized user can access

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 68|P a g e


them. Using the same brand of workstation and server also improves things. Servers ensure the safety of the
network. It enables resource sharing between users. Using these server kinds and hardware, we may boost our business.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 69|P a g e


2.2
❖ The name "network software" is a broad class of software that facilitates the deployment, operation, and planning of computer networks
better.
❖ Workstation equipment includes a computer that is more efficient than a PC (personal computers). The majority of companies employ
workstation hardware to meet their needs. To run networking technology efficiently, we need workstation hardware.

Network Management Software and Tools

Auvik: -

For Managed Service Providers (MSPs), Auvik is a simple cloud-based network monitoring tool that also includes a complete set of network
control features like IPAM or configuration management.

Zabbix: -

As they claim, Zabbix is an open-source infrastructure tracking system that is capable of monitoring anything. Zabbix is an excellent
option for expensive goods if you are preparing for the heavy configuration effort that comes with open-source monitoring software.

Checkmk: -

Operating on both Linux and Windows, Checkmk is a full IT infrastructure and application monitoring solution. It is supplied as a
subscriptionbased Enterprise edition or an open-source Raw edition.

In a few minutes, a single package can be used to set up the basic monitoring tool. The auto-discovery feature looks for devices and services on
your network and sets up the initial monitoring for you automatically.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 70|P a g e


Datadog: -

Network, synthetic, and real user monitoring, as well as log and application performance management, too are elements of the SaaS-based
monitoring platform Datadog.

ManageEngine OpManager

ManageEngine Zoho Corporation's OpManager is an effective monitoring tool. The instruments focus on infrastructure monitoring and offers
all the features needed for monitoring various network metrics and parameters. Identical to PRTG, it provides iOS and Android mobile apps for
network scanning and simple troubleshooting.

Network Operating OS

An operating system for computers known as a "network operating system" (NOS) is primarily designed to operate workstations, personal
computers, and often older terminals that are linked together over a local area network (LAN). A NOS's supporting software allows resource
sharing and interaction between multiple routers.

A NOS's usual hardware system consisting of several personal computers, a printer, a server, and file servers that are linked by a local network.
The NOS's job is to then offer basic network services and features that handle numerous input requests concurrently in a multiuser
environment.

Most Popular Operating Systems

Linux Operating System


Linux is unique from Windows and Apple in that it is a family of open-source systems rather than a proprietary one. In other words, it is open
to modification and redistribution. Although it may not be the most well-known option on this list, Linux is free and has a range of open-source
editions. Linux is well-liked because it's simple to modify and gives users who know how to use it a variety of options. Linux is a good choice
if you know how to alter and work with operating systems. And if you find programming and back-end work interesting, it might be a good
idea to buy a Linux system and start fooling it around.

Microsoft Windows

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 71|P a g e


Since the 1980s, there have numerous updates and versions of the Windows os (including Windows 95, Windows Vista,
Windows 7/8/10, etc.). One of the most used operating systems is Microsoft Windows, which comes installed on most new computer hardware.
Microsoft starts working to enhance their users' experience, hardware, and software with every new update or release of Windows, making
Windows more accessible and simpler to use.

Apple macOS

Apple's macOS goes head-to-head with Microsoft Windows. Both macOS and Windows are instances of proprietary operating systems, that
denote that the company created, developed, and is currently offering its own OS. They are created and marketed by the businesses; users are
not allowed to meddle with or modify them. The exclusive macOS and OS X operating systems, the first of which was released 20 years ago,
power Apple and Macintosh computers. There are also previous iterations or updates, such as:

❖ El Capitan (OS X 10.11)


❖ Sierra (macOS 10.12)
❖ Mavericks (OS X 10.9)
❖ Mountain Lion (OS X 10.8)
❖ Yosemite (OS X 10.10) ❖ Kodiak (OS X 10 Beta)
❖ Lion (OS X 10.7)

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 72|P a g e


Activity 3

3.1

Network Scheme

Figure 20 Network Scheme

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 73|P a g e


SUBNET SCHEME

Department Vlan IP address range Subnet mask Prefix


Developers 10 192.168.10.0 - 255.255.255.192 26
192.168.10.63
Customer Care 20 192.168.10.64 - 255.255.255.224 27
192.168.10.95
Sales and 30 192.168.10.96 - 255.255.255.224 27
Marketing 192.168.10.127
Network Team 40 192.168.10.128 - 255.255.255.240 28
192.168.10.143
Legal 50 192.168.10.144 - 255.255.255.240 28
192.168.10.159
Finance 60 192.168.10.160 - 255.255.255.248 29
192.168.10.167
HR 70 192.168.10.168- 255.255.255.248 29
192.168.10.175
Table 9 SUBNET SCHEME

Software and Network Components applied in Network Design

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 74|P a g e


Wi-Fi- Router
Specification Justification

Device name DESKTOP-OL358AI More information will be great.


Processor 11th Gen Intel(R) Core (TM) i3-1115G4 @ 3.00GHz
3.00 GHz We may use this to access the internet.
Installed RAM 4.00 GB (3.73 GB usable)

Figure 21 HP Laptop

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 75|P a g e


WonderShareEdraw Max EdrawMax users may develop intriguing charts,
presentations, infographics, and other visual
materials to convey tales.

Operates on Linux, macOS, and Windows.

With EdrawMax, a Visio substitute, users may


create more than 280 unique types of diagrams,
from infographics to technical diagrams
.
capable of creating Office layouts, Smart
Layouts, Network and UML diagrams.

Figure 22EDraw

Software

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 76|P a g e


CISCO Packet Tracer
• We can build, set up, configure, and debug large
networks using virtual equipment.

It delivers an educational space with lifelike


simulations and visualizations.

It gives a teaching setting with real simulations


Figure 23 Packet Tracer and visualizations.

We can build, set up, configure, and manage large


networks using virtual equipment.

Table 10 COMPUTER COMPONENTS

Feedback Form

SYNTAX SOLLUTION FEEDBACK FORM

NAME

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 77|P a g e


DATE

TASK
EXCELLENT GOOD WEAK

0-30% 30-60% 60-100%

Does our resources meet your requirements?


Security of the network
Is it easy to use and install?
Access speed
Server Responses
effectiveness
Overall performances of the system?
Any other suggestions or opinions
SIGNATURE

Table 11 FEEDBACK FORM


Activity

3.3

Network Services,Application and Devices Configuration

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 78|P a g e


Vlan Configuration Assigning Vlan on swich

Figure 24 VLAN Assigning

Assigning Switchport

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 79|P a g e


Figure 25 Assigning Switchport

VLAN Output

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 80|P a g e


Figure 26 VLAN output

Sub Interface Router

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 81|P a g e


Figure 27Encap do

DHCP Configuration

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 82|P a g e


Figure 28 DHCP Configuration

DHCP Output

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 83|P a g e


Figure 29 DHCP Output

Enable Password

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 84|P a g e


Figure 30 Enable password

Figure 31 Enable password 2

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 85|P a g e


Wire shark
Installation

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 86|P a g e


Figure 32 Wireshark 1

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 87|P a g e


Figure 33Wireshark 2

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 88|P a g e


Figure 34Wireshark 3

Figure 35 wireshark 4

3.3 Maintenance schedule

An organization's networked maintenance tasks schedule is required. The network needs to be supported and maintained according to
plan to combat risks and failures. Additionally, this will help to maintain and enhance the network in an effective and efficient manner.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 89|P a g e


Plan Daily Monthly Annuall
y

Run Virus Scan

Clean Computer and Network


Devices

Windows Update

Monitoring network

Check for network upgrade

Table 12 MAINTANENCE SCHEDULE

Activity 4

NETWORK SCHEME

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 90|P a g e


Figure 36 Network Scheme

Author applied the MESH topology for this network, which not allows for a single point of failure. Additionally, a successful network
can send data through other ports (can discover alternative methods to transfer data) and will not be negatively impacted if one trunk
port goes down under any situation. In this company there are 7 departments so we have segregated this network in to 7 so between
department they can communicate.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 91|P a g e


We have used switches for this system in futer we can add more switches to this system. We can easily add those
switches. Because of this we upgrade our system
We can connect devices without cables and manage devices with ease because to that same wireless connection that the author of the
sales and marketing network has designed using ACCESS POINT.

TEST CASE FOR SYNTAX SOLUTION

Case Name Description Details Expected Actual


ID Results Results
T001 R1 login User tries to Password – User should Expected
log in R1 abcd be able to results
using login match

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 92|P a g e


password actual
results.
T002 ping Ping 192.168.10.10 Ping should Expected
developers To be successful results to sales and
192.168.10.70 match marketing. actual
results.

T003 R1 User tries to Password – User should Expected


login(incorrect) log in R1 SA000 not be able to results
using login match
incorrect actual
password results.
T004 Ping Ping HR to 192.168.10.170 Ping should Expected
legal To be successful results
192.168.10.150 match actual results.

Table 13 TEST CASE


4.1 Future enhancements to be implemented for the above network system

Using biometrics devices. It will secure company data or if unauthorised persons accessed devices, he can be a big threat for the company,
prevent from this for the security purpose we can use biometric devices.

We can use cloud backup because of this we can access our data anytime, anywhere it’s also providing a faster transition so we can organise a
remote workspace. Physical damages can’t be done for an example natural disaster so Using cloud backup offers advanced online security.

A unique network should be set up exclusively for the visitor. To avoid this, it is preferable to establish a separate network for the visitors, so
that they may access the internet as they please and the business materials and data can also be secured. The guests who visit our company will

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 93|P a g e


need to use the internet or it will increase the data transfer rate of the network and internet which can slow down.
Additionally, if visitors can access company network, they can harm our data.

Utilizing biometric tools, we can utilize biometric devices for security purposes to prevent unauthorized individuals from accessing equipment
and gaining access to company data, which could constitute a serious threat to the business.

One option is cloud backup. As a result, we have access to our data from anywhere at any time, and it makes setting up a remote workstation
easier. Because physical damages from a natural disaster, for instance, cannot be repaired, using cloud backup provides superior online
protection.

Conclusions

The network design process begins with acquiring consumer information, and in want to do so, we must engage with the client. Effective
contact with the client enables the assessment of customer requirements.

Some faults were found after testing, but once they were fixed, the network satisfied users and met all SYNTAX Extreme urgency.
DHCP is used to assign IP address. Access point has been created to access WIFI by Sales and Management to meet client requirements. This
network has gone through many errors and has been fixed several times meeting the client requirements of SYNTAX SOLUTION.

The LAN network design of the SYNTAX SOLUTIONS Matara branch is a successful design since it satisfies the needs of users and clients
and fulfils all requirements, such as separating the 7 departments and implementing appropriate security measures.

Mesh topology is the network topology that was employed in the design. Planning for configuration and cable management was difficult, but it
was eventually successful after several attempts. Mesh topology is the ideal topology because it maintains high redundancy and prevents single
points of failure.
Many faults were found during testing, but once they were fixed, the network satisfied users and met all SYNTAX SOLUTION requirements.

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 94|P a g e


References
AFTERACADEMY. (n.d.). Retrieved from What is network topology and types of network topology?: https://afteracademy.com/blog/what-
isnetwork-topology-and-types-of-network-topology
CISCO. (n.d.). Retrieved from Waht is LAN?: https://www.cisco.com/c/en/us/products/switches/what-is-a-lan-local-
areanetwork.html#:~:text=A%20local%20area%20network%20(LAN,in%20an%20office%20or%20school.
CISCO. (n.d.). Retrieved from WHAT IS WIRELESS LAN?: https://www.cisco.com/c/en/us/products/wireless/wirelesslan.html#:~:text=A
%20wireless%20local%2Darea%20network,webpage%20is%20using%20a%20WLAN.
CISCO. (n.d.). Retrieved from WHAT IS WAN?: https://www.cisco.com/c/en/us/products/switches/what-is-a-wan-wide-area-network.html
CLOUD FLARE. (n.d.). Retrieved from What is personal area network?: https://www.cloudflare.com/learning/network-layer/what-is-
apersonal-area-network/

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 95|P a g e


CLOUDFLARE. (n.d.). Retrieved from MAN: https://www.cloudflare.com/learning/network-layer/what-is-a-
metropolitan-areanetwork/#:~:text=A%20metropolitan%20area%20network%20(MAN)%20is%20a%20computer%20network%20that,wide
%20area%20networ k%20(WAN).
TECH TARGET. (n.d.). Retrieved from Computer Network: https://www.techtarget.com/searchnetworking/definition/network
TECHOPEDIA. (n.d.). Retrieved from What Does IEEE 802.3 Mean?: https://www.techopedia.com/definition/19938/ieee-8023

MUHAMMEDH ASHFAQUE UNIT 2 NETWORKING 96|P a g e

You might also like