0% found this document useful (0 votes)
10 views

Unit 02 Networking

The document outlines an assignment brief for the HND in Computing program, focusing on LAN design and implementation for Alliance Health. It details the assessment criteria, submission guidelines, and specific requirements for the network design project, including departmental separation and Wi-Fi connectivity. The assignment aims to evaluate students' understanding of networking principles, devices, and systems through practical application in a real-world scenario.

Uploaded by

fathimahamna093
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Unit 02 Networking

The document outlines an assignment brief for the HND in Computing program, focusing on LAN design and implementation for Alliance Health. It details the assessment criteria, submission guidelines, and specific requirements for the network design project, including departmental separation and Wi-Fi connectivity. The assignment aims to evaluate students' understanding of networking principles, devices, and systems through practical application in a real-world scenario.

Uploaded by

fathimahamna093
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 152

INTERNAL VERIFICATION – ASSIGNMENT BRIEF

Programme Title: HND in Computing

Assessor Name: Oshada Lokuhetty

Internal Verifier Name: Mr. Thanulagshan

Unit or Component Number and


Unit 02 - Networking
Title:

Assignment title: LAN Design & Implementation for Alliance Health

Assessment criteria targeted by


LO1, LO2, LO3, LO4
this assignment brief:

Is this an Authorised Assignment N/A


Brief published by Pearson? If so,
has it been amended by the
Assessor in any way? Please give
details.
(If using the Authorised Assignment Brief
‘off the shelf’ with no amendments, please
answer the question marked * in the
checklist only)

Has this assignment been Yes No


submitted to the Assignment
Checking Service? √
(If Yes, please keep a copy of the ACS
feedback with this form)

INTERNAL VERIFIER CHECKLIST Y/N

Are the programme and unit details accurate? Y

*Are clear deadlines for assessment given? TBC

Is the time frame of an appropriate duration? Y

Is there a suitable vocational scenario or context? Y

Are the assessment criteria to be addressed stated accurately? Y

Does each task show which criteria are being addressed? Y

Do the tasks meet the assessment requirements of the unit/s? Y

MI. Mohamed Aseem Networking 1 |P age


Is it clear what evidence the learner needs to generate? Y

Is it likely to generate evidence that is valid and sufficient? Y

Overall, is the Assignment fit for purpose? Yes √ No

*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to b e addressed . The Assessor and
the Internal Verifier must then confirm that the action has b een undertaken and that the Assignm ent Brief is authorised
for use b efore b eing issued to learners.

MI. Mohamed Aseem Networking 2 |P age


Action required: Target Date for Date Action
(If none then please state n/a) Completion Completed

General Comments (if appropriate)

Assignment Brief Authorised for Use:

Internal Verifier signature Date

Assessor signature
Date

Lead Internal Verifier signature (if


[email protected] Date 2022/06/13
appropriate)

MI. Mohamed Aseem Networking 3 |P age


Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)

INTERNAL VERIFICATION – ASSESSMENT DECISIONS

Programme title BTEC Higher National Diploma in Computing

Mr. Infas Mr. Thanulagshan


Assessor Internal Verifier
Unit 02: Networking
Unit(s)
LAN Design & Implementation for Alliance Health
Assignment title
Mohamed Ismail Mohamed Aseem
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the Y/N
student work?

Has the work been assessed


Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
• Identifying opportunities for Y/N
improved performance?
• Agreeing actions? Y/N

Does the assessment decision need


Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if required)
Date

Confirm action completed

Remedial action taken


Give details:

Assessor signature Date

Internal Verifier
Date
signature

MI. Mohamed Aseem Networking 4 |P age


Programme Leader
Date
signature (if required)

MI. Mohamed Aseem Networking 5 |P age


Higher Nationals - Summative Assignment Feedback Form
Student Name/ID Mohamed Ismail Mohamed Aseem/ E185205

Unit Title Unit 02: Networking

Assignment Number 1 Assessor

04.02.2023 Date Received


Submission Date
1st submission
Date Received 2nd
Re-submission Date
submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.

Pass, Merit & Distinction P1 P2 M1 D1


Descripts

LO2 Explain networking devices and operations.

Pass, Merit & Distinction P3 P4 M2


Descripts

LO3 Design efficient networked systems.


Pass, Merit & Distinction P5 P6 M3 D2
Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & Distinction P7 P8 M4
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

MI. Mohamed Aseem Networking 6 |P age


Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place andgrades
decisions have been agreed at the assessment board.

Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

MI. Mohamed Aseem Networking 7 |P age


Feedback: Student to Assessor
I appreciate the way you take your time to answer our questions. It enhanced our
understanding of what you teach us.

Assessor Date
signature

Student [email protected] Date 04.02.2023


signature

MI. Mohamed Aseem Networking 8 |P age


Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01

MI. Mohamed Aseem Networking 9 |P age


General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use previous
page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the
before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then
be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course

MI. Mohamed Aseem Networking 10 | P a g e


Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my own,
and where I have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

Student’s Signature: Date:


[email protected] 04.02.2023

MI. Mohamed Aseem Networking 11 | P a g e


Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number Mohamed Ismail Mohamed Aseem/ E185205

Unit Number and Title Unit 2: Networking

Academic Year 2022/23

Unit Tutor Mr. Infas

Assignment Title LAN Design & Implementation for Alliance Health

Issue Date 25.10.2023

Submission Date 04.02.2023

IV Name & Date

Submission format

The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although
you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

MI. Mohamed Aseem Networking 12 | P a g e


Assignment Brief and Guidance:

Scenario

Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the
US healthcare industry where its global delivery center is located in Colombo. The company is
planning to expand their business operations with their latest branch at Matara and wants it to be
one of the state-of-the-art companies in Matara with the latest facilities .

Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
 Reception area
 Sales & Marketing Department (10 employees)
 Customer Services Area – with Wi-Fi facilities

Floor 2:
 Administration Department (30 Employees)
 HR Department (20 employees)
 Accounting & Finance Department (15 employees)
 Audit Department (5 employees)
 Business Development Department (5 employees)

Floor 3
 Video conferencing room
 IT Department (60 employees)
 The Server Room

MI. Mohamed Aseem Networking 13 | P a g e


The floor plan of the branch in Matara is as follows:
Floor 1:
 Reception area
 Customer Services Area– with Wi-Fi facilities

Floor 2:
 Administration Department (10 Employees)
 HR Department (7 employees)
 Accounting & Finance Department (8 employees)
 IT Department (50 employees)

Following requirements are given by the Management.


 Al l the de partme nts must be separated wi th unique subnet.

 The conferencing room of the head office and Customer Services Areas of e ach
branch are to be equipped with Wi -Fi connections.

 Connectivity between two branches (He ad Offi ce and Matara) woul d al l ow the
i ntra branch conne cti vi ty be twe e n de partme nts. (Use of VPN i s not compul sory)

 The necessary IP address classes and ranges must be de ci de d by the ne twork


de si gne r and shoul d be use d for al l the de partme nts except the server room.

 Number of servers required for the Server room ne e d to be de ci de d by the Ne twork


de si gne r and shoul d be assi gne d wi th 10.254. 1 0. 0/ 24 subne t. (Use s static IPs)

 Sales and Marketing Te am al so ne e ds to acce ss Ne twork re source s using WIFI


conne cti vi ty.

(N ot e: Clear ly st at e your assumpt ion s . You ar e allow ed t o design t he net w or k accor ding t o your
assumpt ion s , but main r equir eme nt s should not be violat ed)

MI. Mohamed Aseem Networking 14 | P a g e


Activity 01
 Di scuss the be ne fi ts and constrai nts of di ffe re nt ne twork syste m type s that can be
i mpl e me nte d i n the Matara branch and the mai n IEEE Ethe rne t standards that can
be use d i n above LAN and WLAN de si gn .

 Di scuss the i mportance and i mpact of ne twork topol ogi e s and asse ss the mai n
ne twork protocol sui te s that are use d i n ne twork de si gn usi ng e xampl e s.
Re comme nd sui tabl e ne twork topol ogy and ne twork protocol s for above sce nari o
and e val uate wi th val i d poi nts how the re comme nde d topol ogy de monstrate s the
e ffi ci e nt uti l i zati on of the ne tworki ng syste m of Matara branch.

Activity 02
 Di scuss the ope rati ng pri nci pl e s of ne twork de vi ce s (Ex: Route r, Swi tch, Etc.) and
se rve r type s that can be use d for above sce nari o whi l e e xpl ori ng di ffe re nt se rve rs
that are avai l abl e i n today’s marke t wi th the i r spe ci fi cati ons . Re comme nd
se rve r/se rve rs for the above sce nari o and justi fy your se l e cti on wi th val i d poi nts .

 Di scuss the i nte r-de pe nde nce of workstati on hardware and ne tworki ng software
and provi de e xampl e s for ne tworki ng software that can be use d i n above ne twork
de si gn.

Activity 03
 Pre pare a wri tte n ne twork de si gn pl an to me e t the above -me nti one d use r
re qui re me nts i ncl udi ng a bl ue pri nt drawn us i ng a mode l i ng tool ( Ex: Mi crosoft Vi si o,
EdrawMax) .Te st and e val uate the propose d de si gn by anal yzi ng use r fe e dback wi th
the ai m of opti mi zi ng your de si gn and i mprovi ng e ffi ci e ncy.

MI. Mohamed Aseem Networking 15 | P a g e


(Support your answe r by provi di ng the VLAN and IP subne tti ng sche me for the above
sce nari o and the l i st of de vi ce s, ne twork compone nts and software use d to de si gn the
ne twork for above sce nari o and whi l e justi fyi ng your se l e cti ons. )

 Instal l and confi gure Ne twork se rvi ce s , de vi ce s and appl i cati ons (Ex: VLAN,Wi Fi ,
DNS,Proxy, We b, Etc.) accordi ng to the propose d de si gn to accompl i sh the use r
re qui re me nts and de si gn a de tai l e d Mai nte nance sche dul e for above Ne twork.

*Note: - Screen shots of Configuration scripts should be presented.

Activity 04
 Impl e me nt a ne tworke d syste m bas e d on your pre pare d de si gn wi th val i d
e vi de nce s.

 De ve l op te st case s and conduct ve ri fi cati on (Ex: Pi ng, e xte nde d pi ng, trace route ,
te l ne t, SSH, e tc.) to te st the above Ne twork and anal yse the te st re sul ts agai nst
the e xpe cte d re sul ts. Re comme nd pote nti al future e nhance me nts for the
ne tworke d syste m wi th val i d justi fi cati ons and cri ti cal l y re fl e ct on the
i mpl e me nte d ne twork, i ncl udi ng the pl an, de si g n, confi gurati ons, te sts and the
de ci si ons made to e nhance the syste m.

MI. Mohamed Aseem Networking 16 | P a g e


Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols
enable the effectiveness of networked systems.

LO2 : Explain networking devices and operations

P3

MI. Mohamed Aseem Networking 17 | P a g e


Discuss the operating principles of networking devices and
server types.
P4
Discuss the interdependence of workstation hardware and
relevant networking software
M2
Explore a range of server types and justify the selection of a
server for a given scenario, regarding cost and performance
optimisation

LO 1 & LO2

D1 Evaluate the topology protocol selected for a given scenario and


how it demonstrates the efficient utilisation of a networking system.

LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6

MI. Mohamed Aseem Networking 18 | P a g e


Design a maintenance schedule to support the networked
system.

M3
Analyse user feedback on your designs with the aim of
optimising your design and improving efficiency.
D2
Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.

M4

MI. Mohamed Aseem Networking 19 | P a g e


Recommend potential enhancements for the networked
systems.
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.

MI. Mohamed Aseem Networking 20 | P a g e


LAN Design & Implementation for
Alliance Health

ASSIGNMENT- 02

UNIT 02 NETWORKING

Name: Mohamed Ismail Mohamed Aseem

Student ID: E185205

Unit - 02 Networking

HND in COM-22-SE-03 Batch

In ESOFT Metro Campus


MI. Mohamed Aseem Networking 1 |P age
Acknowledgment
I wish to express my sincerely gratitude to Mr. Infas, our Network lecture for providing me
an opportunity to do my Project and assignment, which also helped me in doing a lot of
research I came to know about new things.
I would like to express my special thanks of gratitude to all lectures as well as our General
Manager and ESOFT Metro campus, who gave this great opportunity and supported me on
this assignment. I am thankful to them.
I would also like to thank God, my parents, guardians and friends who help me a lot in
finalizing this project within the limited period.

MI. Mohamed Aseem Networking 2 |P age


Table of Contents
List of Figure ........................................................................................................................ 5

List of Table ......................................................................................................................... 9

LO1: Examine networking principles and their protocols. ................................................ 10

1.0. Introduction ................................................................................................................. 10

1.1. Computer Network...................................................................................................... 11

1.2. Types of Network........................................................................................................ 12

1.3. Network Standards ...................................................................................................... 21

1.4. Network Topologies.................................................................................................... 26

1.4.1. Logical Topology................................................................................................. 26

1.4.2. Physical Topology ............................................................................................... 27

1.5. Protocols in Networking ............................................................................................. 33

1.6. Network Communications .......................................................................................... 45

1.7. Bandwidth ................................................................................................................... 53

1.8. Common Networking Principles................................................................................. 55

LO2: Explain Networking Devices and Operation ............................................................ 60

2.1. Network Devices......................................................................................................... 60

2.2. Server .......................................................................................................................... 65

2.2.1. Types of server .................................................................................................... 66

2.2.2. Designs of Server................................................................................................. 69

2.3. Workstations ............................................................................................................... 79

2.4. Networking Software .................................................................................................. 80

3. LO3: Design efficient networked systems .................................................................. 84

3.1. Blueprint for Alliance Health...................................................................................... 84

3.2. User feedback.............................................................................................................. 86

3.3. Cisco Pocket Tracer Design for Alliance Health ........................................................ 90

3.4. Maintenance schedule for above network................................................................... 91

MI. Mohamed Aseem Networking 3 |P age


3.4.1. Maintenance schedule.......................................................................................... 92

LO4: Implement and diagnose networked systems............................................................ 94

4.1. Implement a networked system based on a prepared design ...................................... 94

4.1.1. Configure VLAN & Name in all department ...................................................... 94

4.1.2. VTP Server Configuration in switch ................................................................... 96

4.1.3. Providing all V-Lan IP address.......................................................................... 101

4.1.4. Configure DHCP in all department ................................................................... 103

4.1.4.1. Configure DHCP in Colombo ................................................................ 103

4.1.4.2. Configure DHCP in Matara.................................................................... 110

4.1.5. Server Creating and Providing IP Address ........................................................ 115

4.2. Pinging Test case statement ...................................................................................... 118

4.2.1. Pinging statement for Alliance Health............................................................... 118

4.2.2. Extend Ping........................................................................................................ 121

4.2.3. Traceroute .......................................................................................................... 123

4.2.4. Telnet ................................................................................................................. 124

4.2.5. SSH .................................................................................................................... 125

4.3. Future enhancements for the networked system and justify your recommendation. 126

4.4. Critical Reflection to Evaluate Own Work and Justify Valid Conclusions. ............. 127

Conclusion........................................................................................................................ 128

Self-criticism .................................................................................................................... 129

Gant Chart ........................................................................................................................ 130

References ........................................................................................................................ 131

MI. Mohamed Aseem Networking 4 |P age


List of Figure
Figure 1: Computer Network ............................................................................................. 11
Figure 2: LAN .................................................................................................................... 13
Figure 3: MAN ................................................................................................................... 14
Figure 4: WAN ................................................................................................................... 15
Figure 5: Peer-to-Peer ........................................................................................................ 17
Figure 6: Client-Server ....................................................................................................... 18
Figure 7: ANSI ................................................................................................................... 21
Figure 8: ISO ...................................................................................................................... 22
Figure 9: IETF .................................................................................................................... 23
Figure 10: IEEE.................................................................................................................. 23
Figure 11: BUS Topology .................................................................................................. 28
Figure 12: Full vs Partial Mesh Network ........................................................................... 29
Figure 13: Star Topology ................................................................................................... 30
Figure 14: Ring Topology .................................................................................................. 31
Figure 15: OSI Model ........................................................................................................ 33
Figure 16: Components of Data Communication .............................................................. 45
Figure 17: Simplex Mode................................................................................................... 46
Figure 18: Half Duplex ...................................................................................................... 46
Figure 19: Full Duplex ....................................................................................................... 47
Figure 20: Point to Point Configuration ............................................................................. 47
Figure 21: Multipoint Connection...................................................................................... 48
Figure 22: Shielded Twisted Pair ....................................................................................... 49
Figure 23: Coaxial Cable.................................................................................................... 50
Figure 24: Optical Fibres.................................................................................................... 51
Figure 25: Radio Wave ...................................................................................................... 52
Figure 26: Infrared ............................................................................................................. 53
Figure 27: Bandwidth......................................................................................................... 53
Figure 28: Common Networking Principles ...................................................................... 55
Figure 29: Router ............................................................................................................... 60
Figure 30: Hub ................................................................................................................... 61
Figure 31: Switch ............................................................................................................... 62
Figure 32: Repeater ............................................................................................................ 63

MI. Mohamed Aseem Networking 5 |P age


Figure 33: Bridges .............................................................................................................. 64
Figure 34: Servers .............................................................................................................. 65
Figure 35: HPE ProLiant ML110 G10 Tower ................................................................... 74
Figure 36: Dell PowerEdge T30......................................................................................... 75
Figure 37: Dell PowerEdge T630 5U Tower Server.......................................................... 76
Figure 38: Fujitsu Primergy TX1310 M1 .......................................................................... 77
Figure 39: Workstations ..................................................................................................... 79
Figure 40: ManageEngine OpManager Interface ............................................................... 83
Figure 41: 1st Floor ............................................................................................................ 84
Figure 42: 2nd Floor........................................................................................................... 84
Figure 43: 3rd Floor ........................................................................................................... 85
Figure 44: User feedback 1 ................................................................................................ 86
Figure 45: User feedback 2 ................................................................................................ 86
Figure 46: User feedback 3 ................................................................................................ 87
Figure 47: Responses for Question 1 ................................................................................. 87
Figure 48: Responses for Question 2 ................................................................................. 88
Figure 49: Responses for Question 3 ................................................................................. 88
Figure 50: Responses for Question 4 ................................................................................. 88
Figure 51: Responses for Question 5 ................................................................................. 89
Figure 52: Cisco Packet Tracer Design .............................................................................. 90
Figure 53: Maintenance...................................................................................................... 91
Figure 54: Create VLAN for Colombo 1 ........................................................................... 94
Figure 55: Create VLAN for Colombo 2 ........................................................................... 94
Figure 56: Create VLAN for Matara 1 ............................................................................... 95
Figure 57: Create VLAN for Matara 2 ............................................................................... 95
Figure 58: VTP Server Configuration in Colombo Switch................................................ 96
Figure 59: VTP Server Configuration Result of Colombo Switch .................................... 96
Figure 60: VTP Client Configuration Result of 1st Floor.................................................. 97
Figure 61: VTP Client Configuration Result of 2nd Floor ................................................ 97
Figure 62: VTP Client Configuration Result of 3rd Floor ................................................. 98
Figure 63: VTP Server Configuration in Matara Switch ................................................... 99
Figure 64: VTP Server Configuration Result of Matara .................................................... 99
Figure 65: VTP Client Configuration Result of 1st Floor................................................ 100
Figure 66: VTP Client Configuration Result of 2nd Floor .............................................. 100
MI. Mohamed Aseem Networking 6 |P age
Figure 67: Provided IP Address in Colombo Router ....................................................... 101
Figure 68: Provided IP Address in Matara Router ........................................................... 102
Figure 69: Configure DHCP in 1st Floor Server.............................................................. 103
Figure 70: Reception Area DHCP.................................................................................... 103
Figure 71: Sales & Marketing Department DHCP........................................................... 104
Figure 72: Customer Service Area DHCP ....................................................................... 104
Figure 73: Configure DHCP in 2nd Floor Server ............................................................ 105
Figure 74: Administration Department DHCP................................................................. 105
Figure 75: HR Department DHCP ................................................................................... 106
Figure 76: Accounting & Finance Department DHCP .................................................... 106
Figure 77: Audit Department DHCP................................................................................ 107
Figure 78: Business Development Department DHCP .................................................... 107
Figure 79: Configure DHCP in 3rd Floor Server ............................................................. 108
Figure 80: IT Department DHPC ..................................................................................... 108
Figure 81: Video Conferencing Room DHCP ................................................................. 109
Figure 82: Configure DHCP in 1st Floor Server.............................................................. 110
Figure 83: Customer Services Area DHCP...................................................................... 110
Figure 84: Reception Area DHCP.................................................................................... 111
Figure 85: Configure DHCP in 1st Floor Server.............................................................. 112
Figure 86: Administration Department DHCP................................................................. 112
Figure 87: HR Department DHCP ................................................................................... 113
Figure 88: Accounting & Finance Department DHCP .................................................... 113
Figure 89: IT Department DHCP ..................................................................................... 114
Figure 90: DNS Server Static IP ...................................................................................... 115
Figure 91: HTTP Server Static IP .................................................................................... 116
Figure 92: PROXY Server Static IP................................................................................. 116
Figure 93: WEB Server Static IP ..................................................................................... 117
Figure 94: Successful Ping in Reception Area................................................................. 118
Figure 95: Successful Ping in Customer Service Area .................................................... 119
Figure 96: Successful Ping in Accounting & Finance Department ................................. 119
Figure 97: Successful Ping in Administration Department.............................................. 120
Figure 98: Successful Extend Ping - 1 ............................................................................. 121
Figure 99: Successful Extend Ping - 2 ............................................................................. 122
Figure 100: Successful Traceroute Result 01................................................................... 123
MI. Mohamed Aseem Networking 7 |P age
Figure 101: Successful Traceroute Result 02................................................................... 123
Figure 102: Telnet ............................................................................................................ 124
Figure 103: SSH ............................................................................................................... 125
Figure 104: Gantt chart .................................................................................................... 130

MI. Mohamed Aseem Networking 8 |P age


List of Table
Table 1: Matara Branch LAN Network Connection .......................................................... 19
Table 2: MAN Connection between Matara and Colombo Branches................................ 20
Table 3: IEEE Standard ...................................................................................................... 24
Table 4: OSI Model and Their Protocols ........................................................................... 34
Table 5: Advantage and Disadvantages of Rack Server .................................................... 70
Table 6: Advantage and Disadvantages of Blade Server ................................................... 71
Table 7: Advantage and Disadvantages of Tower Server .................................................. 72
Table 8: HPE ProLiant ML110 G10 Tower Specification................................................. 74
Table 9: Dell PowerEdge T30 Specification ...................................................................... 75
Table 10: Dell PowerEdge T630 5U Tower Server Specification ..................................... 76
Table 11: Fujitsu Primergy TX1310 M1 Specification...................................................... 77
Table 12: Maintenance Schedule ....................................................................................... 92

MI. Mohamed Aseem Networking 9 |P age


LO1: Examine networking principles and their protocols.

1.0. Introduction
Networking is becoming a crucial element of modern communication in the world we live
in. Communication and information exchange are essential for success in today's digita l
environment, whether it is between computers, gadgets, or even people. This assignme nt
covers the principles of networking, including how networks are created, implemented, and
managed, through the completion of this assignment. In the networking sector, there are
numerous network kinds, but the most popular ones are Local Area Networks (LANs) and
Wide Area Networks (WAN), as well as the protocols and technologies that make it
possible to communicate over these networks.
These are the devices that are crucial for transferring data across many types of technology,
including wires and radio waves. This assignment will cover how to set up and troubleshoot
network equipment, including routers, switches, and firewalls, through the course of this
project.

MI. Mohamed Aseem Networking 10 | P a g e


1.1. Computer Network
An information transmission and sharing system that connects two or more computing
devices is known as a computer network. Mobile phones and servers are both examples of
computing devices. These gadgets can be wireless or connected by physical connections
like fibre optic cables. Managing, maintaining, and using the network infrastructure,
software, and policies are all included in networking, in addition to designing, building,
and using the network (Scarpati, 2018).

Using computer networking, it is possible to link devices and endpoints to one another on
a local area network (LAN) or to a larger network, like the internet or a private wide area
network (WAN). To exchange resources, use or supply services, and communicate, this is
a crucial role for service providers, enterprises, and customers all over the world.

Communication is made possible by computer networks for all commercial, leisure, and
research purposes. Computer networks are responsible for the existence of the internet,
email, audio and video sharing, online shopping, live streaming, and social networks.

Figure 1: Computer Network

MI. Mohamed Aseem Networking 11 | P a g e


Benefits of Computer Network
The main benefits of networks include:
 File sharing - If authorized user save data on other linked devices, user can access it
remotely or share it with other people with ease.
 Resource sharing - Saving money can be achieved by sharing software among several
users or by employing network-connected devices like printers, scanners, and copiers.
 Sharing a single internet connection - If user effectively secure the network, it is
economical and can aid in system protection.
 Increasing storage capacity - Users have access to files and multimedia, includ ing
music and photographs that users have stored remotely on computers or network -
attached storage devices.

Risks of Computer Network


The main risk of networks include:
 Internal Security Threats - Human mistake is responsible for cyberattacks. Instances
of this include phishing scams, hasty decisions, using unsecure passwords, and more.
 Phishing Attacks - In phishing scams, hackers pose as a reliable business in an effort
to enter networks and obtain sensitive data like credit card numbers. Emails, texts, and
phone calls may all be used in phishing scams.
 Distributed Denial-Of-Service (DDoS) Attacks - Websites that are subjected to DDoS
attacks frequently crash, have technical difficulties, or load slowly. These incide nts
include cybercriminals infecting and turning into bots various internet-connected
devices (such as computers, smartphones, and so on). The bots are sent to a victim's IP
address by hackers.

1.2. Types of Network


Several kinds of network connections are available depending on the communication needs.
The most fundamental kind of networks include:
1. LAN (Local Area Network)
2. MAN (Metropolitan Area Network)
3. WAN (Wide Area Network)
4. Peer-to-Peer

MI. Mohamed Aseem Networking 12 | P a g e


5. Client-Server

LAN (Local Area Network)


The Local Area Network (LAN) is intended to link several network devices and systems
over a constrained geographic area. Several protocols are used to connect the devices so
that data and services can be exchanged between them in an effective and appropriate
manner. Less than 5000 networked devices spread over multiple buildings make up this
network (Kapoor, 2022).

Figure 2: LAN

Attributes of LAN Network:


 Compared to the other network kinds, MAN and WAN, the data transfer speed in LAN
networks is often higher.
 When exchanging data and services, LAN connects through cable to reduce mistake and
protect data security. It also uses private network addresses to connect to the network.

Advantages of LAN Network:


 Compared to other network connections, transmission of data and services is relative ly
higher.
 Inexpensive transmission media.
 Each connected device has the potential to interact with another device on the network.

MI. Mohamed Aseem Networking 13 | P a g e


 The Network Server serves as the network's core hub.
 The server's data storage is extremely secure.

Disadvantages of LAN Network:


 For operation, there must be ongoing management by professional engineers.
 Each mainframe utilized on the network requires a memory space for the LAN software.
This reduces the amount of RAM that the user's program can use.
 If it is essential to protect sensitive information, then a security system should be put
into action.
 Probability of LAN administration leaking private information.
 It covers a small geographical area.

MAN (Metropolitan Area Network)


The Metropolitan Area Network (MAN) is a sort of network that handles the network
connections for a complete city or a small area. A wired network, such as data cables,
connects the network's covered region. MAN is a tool used by government organizatio ns
to engage with the public and industry.

Figure 3: MAN

Attributes of MAN Network:


 A complete town or a section of a metropolis is covered by the network.
 As a result of the installation of optical cables and connected connections, data transfer
speed is relatively high.

MI. Mohamed Aseem Networking 14 | P a g e


Advantages of MAN Network:
 Enables devices to receive and send full-duplex data via a network channel.
 With optical cables, the network connection area can reach all or sections of a city.
 It offers increased access to WANs and strong support for networks of a large size.
 It enables the cost-effective sharing of shared resources like printers and other
equipment.
 It provides higher security compare to WAN.

Disadvantages of LAN Network:


 This network is complex and made up of many different local area networks, making its
management difficult.
 Due to the size of the networks, there is a high probability of assault from hackers and
cybercriminals.
 The cost of installation is very expensive, as is the requirement for high-qua lity
hardware.
 It requires more cables for connection from one place to the other compare to LAN.

WAN (Wide Area Network)


The Wide Area Network (WAN) is made to link devices over great distances, such as
between states or nations. Most of the time, the link is wireless and relies on radio towers
for communication. Several LAN and MAN networks may be included in the WAN
network. One of the largest WANs in the world is the internet. In business, governme nt,
and education, a wide area network is frequently used.

Figure 4: WAN

MI. Mohamed Aseem Networking 15 | P a g e


Attributes of WAN Network:
 Due to the significant distance travelled, WAN data transfer speeds are slower than those
of LAN and MAN networks.
 The WAN network transmits data between numerous locations and network towers
using a satellite medium.

Advantages of WAN Network:


 For long-distance connections, this network, which has a wide geographic coverage, is
used.
 Additionally, they deploy radio towers to link channels for users.
 Shares resources and application software with users.

Disadvantages of LAN Network:


 Network maintenance involves a high initial investment and the assistance of skilled
experts.
 A vast network is challenging to debug and prevent hacking.

Peer-to-Peer
Peer-to-peer networks allow two or more computers to directly share files and resources
without the use of a server. Different nodes that function equally well in a network make
up a peer-to-peer network. Every nodes share the same amount of work. The computer in
this case is referred to as a node. To share resources like hard drives and printers, etc., all
of these nodes communicate with one another.
Users can manage a variety of operations using peer-to-peer applications.

Attributes of WAN Network:


 There are fewer linked nodes in a peer-to-peer network. Each computer uses its own
security to store its own data, and each computer also shares data among itself.
 The drive, printer, and other resources are shared by the entire computer. The peer-to-
peer network's capability for sharing resources grows as the number of machines does.

MI. Mohamed Aseem Networking 16 | P a g e


Figure 5: Peer-to-Peer

Advantages of Peer-to-Peer:
 Network operating system not required
 Does not require a costly server because access to the files is made via individ ua l
workstations.
 Due to the fact that each user controls whatever files they are willing to share with others,
there is no need for specialized staff like network specialists.

Disadvantages of Peer-to-Peer:
 The user experience may be slowed down because each machine may be being accessed
by other people.
 The duty for preventing the introduction of viruses to the network rests with each
individual user.
 The backup of files and folders cannot be done centrally.

Client-Server
A client-server network is a type of internet network where one main computer serves as a
server and controls multiple other computers known as clients. By connecting to the server,
clients can access shared files and data stored on the serving machine. In addition, client-
server networks are conceptually comparable to peer-to-peer networks with the exception
that only the server may start a transaction.

MI. Mohamed Aseem Networking 17 | P a g e


A server provides resources and services to one or more clients according to the client-
server model. One server can provide resources to numerous clients at once because clients
and servers frequently have a one-to-many connection.

Characteristics of Client Server:


 Request and response is the basis of client-server computing.
 In order for the client and server to communicate with each other effectively, they need
use a standard protocol.

Advantages of Client-Server:
 All documents are kept in one location.
 Centralized control is used for network peripherals.
 Network security and backups are managed centrally.

Disadvantages of Client-Server:
 It is necessary to use a specialized network operating system.
 Cost of purchasing the server is high.
 Network managers and other specialists are required.

Figure 6: Client-Server

There are more type of networks such as:


a. Storage Area Network (SAN)
b. Controller Area Network (CAN)
c. Cloud 5
d. Cluster
MI. Mohamed Aseem Networking 18 | P a g e
e. Virtualized

Conclusion on Matara branch LAN connection network.


Matara Branch is a small area network, and a LAN connection is the best option for a small
area network. So I chose a LAN connection as the network type for Matara Branch.

Additionally, LAN connections make it simple to share resources, as well as make it easy
for users to send and receive messages and data.

Data of the users are located at the centralized server. So any workstation in Matara Branch
network can access the information from server additionally, people can log into their
individual accounts to see their own set of data.

In Matara Branch every devices should connect with internet. LAN has the capability to
share internet connection among all the LAN users. All of the connected computers share
the internet connection from a single PC. So LAN is the suitable network type for Matara
Branch.
Future-wise, I'd like to use MAN Connection to link the branches Matara and Colombo.

Table 1: Matara Branch LAN Network Connection

Matara Branch LAN Network Connection


Advantages Disadvantages
Hardware and software can be shared A virus can be spread more easily
Printing can be too much slow, long print
Does not cost too much
queues may develop
All the user work can be stored in a central
A constant need for an upgrade
place hub
It is easy to set up a security protocol to
High degree of maintenance
protect the LAN user from hackers
Internet Sharing Level of maintenance continues to grow

MI. Mohamed Aseem Networking 19 | P a g e


In Future MAN Connection between Matara and Colombo Branches:
The Matara and Colombo branches should be connected if information is to be shared
between them. So I choose MAN Connection as network type to connect Matara and
Colombo. Because the branch connections between Matara and Colombo require high-
speed data transfer and MAN often uses fibre optics cables for its data transmission. MAN
connections are capable of high speed. So MAN is suitable for this connection.

Additionally, MAN is a more inexpensive connection than WAN. Because In contrast to


WAN, MAN uses a very small amount of resources. Thus, the price of implementation is
greatly reduced. Plus, it costs less to combine a MAN and WAN network.

Table 2: MAN Connection between Matara and Colombo Branches

MAN Connection Between Matara and Colombo Branches


Advantages Disadvantages
It provides higher security compare to More cable require for a MAN connection
WAN from one place to another
MAN require fewer resources compare to
The data rate is slow compared to LAN
WAN. This saves the implementation cost
Increases the efficiency of handling data The large network difficult to manage
Easy to implement link

MI. Mohamed Aseem Networking 20 | P a g e


1.3. Network Standards
A networking standard is a document that has been created to offer technical standards,
specifications, and rules that must be followed consistently to ensure that the hardware,
software, and other elements that control networking are appropriate for the task at hand.
Standards guarantee effectiveness, safety, and high quality. One branch of technology is
networks, and there are well-established organizations that uphold and develop these
standards. We'll talk about some of the organizations that created these industry standards
presently.

Standards Organizations
The following are a few well-known standards organizations:
a. American National Standards Institute (ANSI)
A US-based institution called the American National Standards Institute (or ANSI) is in
charge of the nation's standards and evaluation procedures. The computer and technology
industries are governed by these standards. The primary organization in charge of
organizing and disseminating data on standards in the networking and technology sector in
the United States is ANSI.
The American Standard Code for Information Interchange (ASCII) is one of the most
widely used and established standards they have created. This standard is in charge of the
codes used in computers, telecommunications equipment, and other digital devices to
represent text. You are taking advantage of the standards that control the text shown on
your screen by reading this content.

Figure 7: ANSI

MI. Mohamed Aseem Networking 21 | P a g e


b. International Standards Organization (ISO)
The International Standards Organization (or ISO) is another standards body with a base in
Geneva, Switzerland, and is represented internationally by 17 national standards
organizations. National standards organizations that are members of ISO work together to
produce and promote international standards for a variety of topics, including technology,
societal challenges, working conditions, and scientific testing procedures. Documents
describing these standards are then sold by ISO and its members.
The manufactured goods used in network technology are covered by these standards. The
ISO/IEC/IEEE 8802-3:2017, for instance, regulates communication and informa tio n
exchange between systems in networking, where Ethernet technology serves as the basis
of the majority of local area networks (LANs).

Figure 8: ISO

c. Internet Engineering Task Force (IETF)


TCP/IP and other commonly used internet protocols are defined by the Internet Enginee r ing
Task Force (IETF).The Internet Architecture Board of the Internet Society is in charge of
the open standards body known as the IETF (IAB). The IETF was, however, backed by the
US federal government prior to 1993. The Internet Society's individual and organizatio na l
members are where the volunteers for the IETF are found. For each topic covered at IETF
meetings, members organize working groups, and area directors elect a chairperson (or co-
chairs).

MI. Mohamed Aseem Networking 22 | P a g e


Figure 9: IETF

d. Institute of Electronics and Electrical Engineers (IEEE)


The abbreviation IEEE stands for Institute of Electrical and Electronics Engineers. The
primary Objective of IEEE is to promote technological innovation and excellence for the
benefit of humanity. The IEEE standards for computer networks ensure communica tio n
between diverse devices. They also serve to ensure that the network service, or the Internet
and its related technologies, must adhere to a set of rules and procedures so that all
networking devices can connect and function properly. Project 802 was developed by the
IEEE's computer society in 1985 to provide uniform communication across diverse device s
due to the diversity of computer system vendors. The IEEE 802 wireless standards are those
that deal with computer networking (Gaurav, 2022).

Figure 10: IEEE

MI. Mohamed Aseem Networking 23 | P a g e


Table 3: IEEE Standard

IEEE 802 It is used for the overview and architecture of LAN/MAN.


IEEE 802.1 It is used for bridging and management of LAN/MAN.
IEEE 802.2 It is used in Logical Link Control (LLC).
IEEE 802.3 It is used in Ethernet (CSMA/CD access method).
It is used for token passing bus access methods and the physica l
IEEE 802.4
layer specifications.
It is used for token ring access methods and the physical layer
IEEE 802.5
specifications.
It is used in distributed Queue Dual Bus (DQDB) access method
IEEE 802.6
and for the physical layer specifications (MAN).
IEEE 802.7 It is used in broadband LAN.
IEEE 802.8 It is used in fibre optics.
IEEE 802.9 It is used in isochronous LANs.
IEEE 802.10 It is used in interoperable LAN/MAN security.
It is used in wireless LAN, MAC, and Physical layer
IEEE 802.11
specifications.
It is used in the demand-priority access method, in the physica l
IEEE 802.12
layer, and in repeater specifications.
IEEE 802.14 It is used in cable modems (not used now).
IEEE 802.15.1 Bluetooth
IEEE 802.15.4 Wireless Sensor/Control Network – “ZigBee”
IEEE 802.15.6 Wireless Body Area Network(BAN)-(e.g. Bluetooth low energy)
It is used in Wireless MAN (Wireless Metropolitan Area
IEEE 802.16
Network).

Computer networks use a variety of IEEE standards. Here are some of them:
 IEEE 802:
The physical and data link layer requirements for technologies like Ethernet and wireless
are covered by the IEEE 802 collection of networking standards. Local area networks
(LANs) and metropolitan area networks (MANs) are covered by these specifications. By
encouraging vendors to adhere to standards, IEEE 802 also helps to ensure interoperability
across different providers.

MI. Mohamed Aseem Networking 24 | P a g e


Aspects of networking's physical and data link components are covered by several sections
of IEEE 802. The Institute of Electrical and Electronics Engineers (IEEE) 802 LAN/MAN
Standards Committee, often known as the LMSC, is responsible for creating and
maintaining the standards family.

 IEEE 802.2 (Logical Link Control):


Defines the data-link layer's overall standard. The LLC and MAC layers (covered in the
preceding lesson) are the two sublayers that make up this layer according to the IEEE.
Distinct network types require distinct MAC layers, which are outlined in IEEE 802.3
standard.

 IEEE 802.3 (Ethernet):


The Institute of Electrical and Electronics Engineers (IEEE) maintains the IEEE 802.3
working group of standard specifications for Ethernet, a form of packet-based physical
communication in a local area network.
For a wired, fast Ethernet network connection, it specifies a physical layer and a data link
layer for media access control, or MAC address. Copper or fibre cables are used to establish
these physical connections between nodes or gadgets like routers, switches, and hubs.

 IEEE 802.6 (Metropolitan Area Networks (MAN)):


MANs, or metropolitan area networks, are data networks built for towns and cities, and
they are given standards. MANs are larger than LANs but smaller than WANs in terms of
geographic scope. MANs are typically distinguished by extremely fast connections made
possible by fibre-optic cables or other digital media.

MI. Mohamed Aseem Networking 25 | P a g e


1.4. Network Topologies
The placement of nodes and connections in a network, both physically and logically, is
known as its topology. Switches, routers, and software with switch and router
functionalities are typically included in nodes. A graph is a common way to represent
network topologies (Gillis, 2021).

The way networks are set up and the relative locations of traffic flows are described by
network topologies. The ideal locations for each node and the best route for traffic flow can
be found using network topology diagrams by administrators. An organization may more
readily identify problems and resolve them, increasing the effectiveness of data transport,
with a clearly defined and well-planned network topology.

Physical topology and logical topology are two components of network geometry. In
network topology diagrams, devices are represented as network nodes, and the connections
between them are shown as lines. According to how the network must be set up, the type
of topology varies.

1.4.1. Logical Topology


The logical topology specifies how the data should travel. Comparatively, the physical
topology consists of the arrangement of the cables, network equipment, and wiring.

Some of Logical Topologies are:


Ethernet
Ethernet is a well-known name for the IEEE 802.3 standard. On a bus-based topology, it
offers decentralized control over the broadcast network. It can operate at speeds of up to
100Mbps or 10Mbps. The server can be reached over Ethernet in accordance with the
process (EDUCBA, 2023).

It is highly likely that two computers will collide if they broadcast at the same moment.
The transmitting computer simply pauses for a long period of time before retransmitting
the signal. Hence, a variety of approaches are offered in the LAN industry, with Ethernet
being the most widely used.

MI. Mohamed Aseem Networking 26 | P a g e


There are two types of Ethernet:
 Fast-Ethernet
 Giga-Ethernet

Virtual LAN
Ethernet, which operates on shared media, is used by LAN. In Ethernet, shared media only
creates one broadcast domain and one collision domain. When switches were added to
Ethernet, the problem with a single collision domain has been resolved, and each device
attached to a switch now operates in a separate collision domain. Even switches, however,
are unable to separate a network into distinct broadcast domains.

To divide a single broadcast domain into many broadcast domains, use a virtual local area
network (LAN). There is no communication between hosts in different VLANs. Every host
joins the same VLAN by default.

Token Ring
Token-ring networks are LAN topologies that use tokens to transfer data in one direction
to a predetermined number of destinations. The token serves as a representation of authority
for managing the transmission line. When the token reaches a sending station in the network
(ring), it enables that station to send data (IBM, 2021).

Token-ring networks typically use a star-wired ring architecture to physically connect


stations to a wiring concentrator like the IBM® 8228 Multi-station Access Unit. Data is
sent around the concentrator at rates of 4 million, 16 million, or 100 million bits per second
(Mbps). Every station uses shielded twisted pair (STP) cabling to connect to the
concentrator.

1.4.2. Physical Topology


The actual connections (wires, cables, etc.) that make up the network's configuration are
referred to as the physical network topology. Tasks involving setup, upkeep, and
provisioning demand knowledge of the physical network.

MI. Mohamed Aseem Networking 27 | P a g e


There are lots of Physical Topologies in network such as:
1. Bus Topology:
A bus topology is also known as a "line topology" or "backbone topology" because it
arranges all the devices on a network along a single cable that runs in a single direction
from one end of the network to the other. The direction of data flow on the network also
matches the cable's path.

Advantages of Bus Topology:


 Easy installation
 Good for small businesses
 Low cost

Disadvantages of Bus Topology:


 Backbone performance is critical
 Easily congested on busy periods
 Data can only travel in one direction at any point in time

Figure 11: BUS Topology

2. Mesh Topology
A point-to-point network with interconnected nodes that is complex and sophisticated in
design is called a mesh topology. Whole or partial mesh networks are both possible.
Routing and flooding are two alternative ways to transmit data that can be done using the
mesh topologies' web-like structure.

MI. Mohamed Aseem Networking 28 | P a g e


Mesh Topology comes with two types:
 Full Mesh:
Each node in a complete mesh network topology has a direct connection to every other
node.
 Partial Mesh:
Only a portion of the nodes in the partial mesh are directly connected to one another.

Figure 12: Full vs Partial Mesh Network

Advantages of Mesh Topology:


 High speeds data transfers
 Very secure
 Easy to identify faulty equipment
Disadvantages of Mesh Topology:
 Easy to identify faulty equipment
 Takes a long time to set up
 Requires meticulous planning

3. Star Topology
The most typical network structure, called a star topology, is set up so that every node is
directly connected to one main hub through coaxial, twisted-pair, or fibre-optic cable. A
hub is a central device that connects all of the network's devices together. When a device

MI. Mohamed Aseem Networking 29 | P a g e


wishes to send information to another device, it must first send the information to the hub,
which then sends the information to the intended device.
Advantages of Star Topology:
 Easy to add and remove nodes
 Durable
 Low cable usage
 Robust in nature
 Easy fault detection because the link are often easily identified.

Disadvantages of Star Topology:


 Specialized network hardware is necessary (the switch)
 Makes the performance of the switch dependent on the network
 The network's growth is restricted by the finite number of switch ports
 Hub requires more resources and regular maintenance because it’s the central system of
star

Figure 13: Star Topology

MI. Mohamed Aseem Networking 30 | P a g e


4. Ring Topology
Nodes are organized in a circle in ring topology (or ring). Each device has exactly two
neighbours, and data can move across the ring network in either one direction or both
directions. For Ring topology with a lot of nodes, a lot of repeaters are used to transfer data
and stop data loss.
Advantages of Ring Topology:
 Low incidence of collision
 Suitable for small businesses
 Low cost
 Speed to transfer the data is very high in this type of topology.
 Ring network is extremely orderly organized where every device has access to the token
and therefore the opportunity to transmit.

Disadvantages of Ring Topology:


 The network will collapse due to a single bad node
 Significant preventative maintenance and supervision is necessary
 With each new node, performance quickly drops
 Total dependence in on one cable.
 Addition and removal of any node during a network is difficult and may cause issue in
network activity. (Contributor, 2022)

Figure 14: Ring Topology

MI. Mohamed Aseem Networking 31 | P a g e


Suitable Topology for Matara Branch
As a Network Analyst, I recommend the Star architecture, a popular design in computer
networks, for the Matara branch. All of the network's components are linked to a central
hub or switch, which serves as the hub for communication.
Here are some strong reasons that show how the Matara branch's networking system is
effectively used with the suggested topology:
o High-speed communication:
High-speed device communication is possible through the star topology. This is due to the
fact that each device has a unique connection to the main hub or switch, which completely
eliminates the chance of congestion or accidents.
o Fault Tolerance:
When one node in a star topology suffers from a NIC failure or a broken cable, only that
one node is impacted. Users benefit from this due to a reduced risk of network failure
because each device connects separately to the central core. One cable connects the nodes
to one another. However, this structure could be more expensive than other plans. However,
generally speaking, the benefits exceed the drawbacks linked to it.
o Connecting multiple device types:
Users are able to connect several types of devices using the star topology. In Matara Branch,
They have a switch which can forward the data packet to many equipment kinds. So this
network is the greatest choice in terms of the range of applications.
o Low chances of data collisions:
Data collisions are less likely in star topology since each node is connected to the central
core by its own cable. Additionally, it has the capacity to handle data collisions and avoid
creating bottlenecks. This indicates that this network topology has unusually high
performance levels when compared to other network topologies.
o Centralized management:
The network is simple to operate and keep an eye on due to the central hub or switch. This
streamlines management and lessens the possibility of mistakes or incorrect configuratio ns.

MI. Mohamed Aseem Networking 32 | P a g e


1.5. Protocols in Networking
A network protocol is a set of accepted guidelines that describe how to format, send, and
receive data so that computer network endpoints, including computers, servers, routers, and
virtual machines, can communicate despite differences in their underlying infrastructures,
designs, or standards.
Devices on either side of a communication exchange must accept and abide by protocol
norms in order to correctly send and receive information. Support for protocols in
networking can be included in the hardware, the software, or both.
Without network protocols, it would be impossible for computers and other devices to
communicate with one another. Few networks would be able to operate as a result, and the
internet as we know it wouldn't exist outside of specialized networks constructed around a
particular architecture. Most network end users rely on network protocols to connect to the
internet.

How network protocols work: The OSI model


Across all network levels, network protocols divide bigger processes into distinct, carefully
defined tasks and functions. The Open Systems Interconnection (OSI) model, the industry
standard, stipulates that one or more network protocols control operations at each layer of
the communication exchange. The OSI model's upper layers deal with software and
applications, while the lower layers deal with data transit.

Figure 15: OSI Model

MI. Mohamed Aseem Networking 33 | P a g e


It's essential to comprehend how the seven OSI levels of the OSI model operate in order to
comprehend how network protocols operate. Let’s look at deeper.
Table 4: OSI Model and Their Protocols

OSI Model Protocols

Application Layer FTP, DHCP, DNS, SMTP

Presentation Layer AFP, NCP

Session Layer RTCP

Transport Layer UDP, TCP

Network Layer IP, IGMP

Data Link Layer PPP, STP

Physical Layer Ethernet

1. Physical Layer:
The first layer that physically joins two compatible systems is called the physical layer. It
manages duplex or simplex modem transmissions and bit-wise data transfers. It also
manages the hardware, such as the wiring, cable terminators, topography, and voltage
levels that links the network interface card (NIC) to the network.
Physical Layer Protocol: Ethernet
 Ethernet
Since Ethernet Protocol is the most widely used and oldest LAN technology, it is more
usually utilized in LAN environments, which are found in practically all networks,
including those in offices, residences, public spaces, businesses, and institutions. Due to its
maximum rates across greater distances using optical media, Ethernet has become
extremely popular.
The basis of the IEEE 802.3 standard, the star topology or linear bus, is used by the Ethernet
protocol. Ethernet is extensively used because it is easy to use, maintain, and deploy, offers
flexibility, and enables less expensive network implementation.

Advantages of Ethernet:
o Maintenance and administration are simple.
o The cable wont to connect systems in ethernet is strong to noise.

MI. Mohamed Aseem Networking 34 | P a g e


o In Ethernet, all the node have an equivalent privileges. It does not follow client-ser ver
architecture.
o
Disadvantages of Ethernet:
o It offers a nondeterministic service.
o As priority packets cannot be set, it’s not suitable for a client-server architecture.
o It provides connectionless communication over the network.

2. Data Link Layer:


Data delivery from one node to another through the physical layer must be error-free, and
this is the responsibility of the data-link layer. It is also the NIC's firmware layer. It
assembles datagrams into frames and assigns start and stop flags to each frame. It also
corrects problems caused on by faulty, misplaced, or duplicate frames.
Data Link Layer Protocols: PPP, STP
 PPP (Point-to-Point Protocol)
The Point-to-Point protocol is referred to as PPP. It is the protocol for point-to-point access
that is most frequently used. The PPP protocol will be utilized if the user wants to access
the internet from their house.
It belongs to the layer 2 of the OSI model and is a data connection layer protocol. In order
to transport data via serial links, it is utilized to encapsulate layer 3 protocols and all
available payload data. Both synchronous links like ISDN and asynchronous links like dial-
up are compatible with the PPP protocol. It is mostly utilized for inter-device
communication.

Advantages of PPP:
o It establishes the frame format used during transmission.
o It outlines the data exchange procedure, including the rate at which data will be sent.
o The encapsulation is the PPP protocol's key component. It specifies how information in
the payload and network layer is contained in the data link frame.

Disadvantages of PPP:
o It does not support flow control mechanism.
o It has a very simple error control mechanism.

MI. Mohamed Aseem Networking 35 | P a g e


o As PPP provides point-to-point communication, so it lacks addressing mechanism to
handle frames in multipoint configuration.

 STP (Spanning Tree Protocol)


A Layer 2 network protocol called Spanning Tree Protocol (STP) is used to stop loops from
forming inside a network topology. STP was developed to prevent the issues that occur
when computers exchange data over redundant channels in a local area network (LAN).
Data can become trapped in a loop that cycles around network segments if the flow of
traffic is not constantly monitored and maintained. This can impair performance and bring
traffic to a virtual standstill.

Advantages of STP:
o Easy to implement and maintain
o Wide support for bridges and switches
o Proven technology

Disadvantage of STP:
o As data centres use more virtualization technologies, STP might not be able to handle
the increased input/output demands

3. Network Layer:
Information flow control, switching, and routing between workstations are all concerns of
the network layer. Additionally, it separates transport layer datagrams into smaller, error-
free datagrams.
Network Layer Protocols: IP, IGMP
 IP (Internet Protocol)(IPv4):
A network layer protocol known as Internet Protocol Version 4 is used to transport packets
through a network and address and control information. IP and TCP function in conjunctio n
to move data packets over a network. A 32-bit IP address that includes the network and
host ID is assigned to each host. A network administrator assigns the host number, which
identifies a host on the network; the internet assigns the network number, which identifies
a network. TCP, a transport layer protocol, assists in rearranging the packets so that the IP
is only in charge of delivering them.

MI. Mohamed Aseem Networking 36 | P a g e


Advantages of IPv4:
o IPv4 security enables encryption to maintain security and privacy.
o Without NAT, connecting multiple devices across a large network becomes simple.
o Redefining IPV4 addresses allows for faultless encoding.

Disadvantages of IPv4:
o Each network has a distinct IP address, and IP uses network layer addresses to identify
end-points on networks.
o We require IP addresses of the next class if there are numerous hosts.

 IGMP (Internet Group Message Protocol):


IGMP is an acronym for Internet group message protocol. The multicasting communica tio n
technology IGMP effectively distributes message/data packets while utilizing availab le
resources. It is used for multicasting communication with IP networks by hosts and
neighbouring routers. Since multicast communication can have several senders and
recipients, IGMP can be used in streaming video, gaming, or web conferencing software.

Advantages of IGMP:
o Due to the connectivity of all shared links, bandwidth is completely used.
o A multicast group can be left and another joined by the hosts.

Disadvantages of IGMP:
o It does not offer strong security and filtering efficiency.
o Congestion on the network can happen if TCP isn't present.

4. Transport Layer:
The transport layer divides data into data frames and sends services from the network layer
to the application layer. This allows for network segment-level fault checking.
Additionally, this prevents a fast host from overtaking a slower host on a network. In
essence, the transport layer makes sure that the message is delivered in its whole.
Additionally, it verifies a successful data transmission and retransmits the data in the event
that an error is found.
Transport Layer Protocols: UDP, TCP

MI. Mohamed Aseem Networking 37 | P a g e


 UDP (User Datagram Protocol):
User Datagram Protocol (UDP) is the simplest protocol for transport layer communicatio n.
It has the bare minimum of channels for communication. It is regarded as an unreliab le
best-effort delivery technique. Neither the sender nor the receiver sends an
acknowledgment for a packet that has been received or sent because UDP does not provide
an acknowledgment mechanism.

Advantages of UDP:
o It is a suitable protocol for multicasting as UDP supports packet switching
o UDP produces a minimal number of overheads for data transmission
o UDP is the simplest transport layer protocol
o UDP protocol uses packets of smaller size
o For error detection, the UDP protocol use checksum

Disadvantages of UDP:
o UDP is a unreliable protocol.
o UDP protocol does not provide congestion control service.
o Flow control is also not provided by UDP protocol.
o It does not guarantee the order of data received as there is no concept of windowing in
UDP.

 TCP (Transmission Control Protocol):


Transmission Control Protocol is a layer 4 protocol that offers acknowledgement of the
received packets and is dependable since it resends the lost packets. Although it is superior
to UDP, these features come at an added overhead. Application protocols like HTTP and
FTP make use of it.
Advantages of TCP:
o It is a model that is widely used in the business and that works well for real-world
networking issues.
o It has a client-server architecture that is scalable. This makes it possible to add networks
without affecting the existing services.
o It is a set of open protocols. Since it is not held by a certain institution, anybody or any
group may utilize it.

MI. Mohamed Aseem Networking 38 | P a g e


Disadvantages of TCP:
o Its nature is not generic. As a result, it only accurately represents the TCP/IP protocol
suite.
o The notions of services, interfaces, and protocols are not well distinguished. Therefore,
describing new technologies in new networks is inappropriate.

5. Session Layer:
When two workstations need to connect in order to interact, the session layer creates that
connection. This layer is in charge of connection formation, session administration, and
authentication in addition to security.
Session Layer Protocol: RTCP
RTCP is a protocol that gives an RTP (Real-time Transport Protocol) session out-of-band
statistics and control data. The main purpose of RTCP is to offer feedback on the quality
of service (QoS) in media distribution by periodically transmitting statistical data to the
users of the streaming multimedia session, such as transmitted octet and packet counts or
packet loss.

6. Presentation Layer:
The data is retrieved from the application layer and formatted for network transmission at
the presentation layer, which is also known as the translation layer. It deals with the right
representation of data, including the information's syntax and semantics. Along with
ensuring file- level security, the presentation layer is also in charge of translating data to
network standards.
Presentation Layer Protocol: AFP, NCP
 AFP (Apple Filing Protocol):
Apple Filing Protocol is referred to as AFP. It is a Mac OS network protocol used to transfer
files between clients and servers. Users are able to access files that are located on systems
outside of their own. It is a protocol for the application and session layers.

Advantages of AFP:
o By implementing advanced file locking methods, it provides security protections to the
system that restrict users' access to potentially dangerous data.

MI. Mohamed Aseem Networking 39 | P a g e


o By establishing a connection with a remote file server, it provides both local and server
file access.
o It has built-in capabilities like Time Machine, Mac Aliases, Spotlight Search, and
Bonjour Services.

Disadvantages of AFP:
o Apple File System (APFS)-formatted storage devices cannot be used with it.
o It’s read and write sequential speeds are slower than those of the Server Message Block
(SMB) protocol.

 NCP (NetWare Core Protocol):


Many Novell, Inc. products employ the NCP network protocol type. Actually, the Local
Area Network (LAN) uses the Novell client-server protocol. It often has an operating
system connection to the NetWare OS. In addition to UNIX, Linux, and Windows NT, it
also functions with different operating systems.

7. Application Layer:
The user application requests are forwarded to lower levels by the application layer, which
is the top layer of the network. At this layer, popular applications like remote login, data
entry, email, file transfer and others operate.
Application Layer Protocols: FTP, DHCP, DNS, SMTP
 FTP (File Transfer Protocol):
The application layer protocol known as File Transfer Protocol (FTP) is used to transfer
files between local and remote file systems. Like HTTP, it operates on top of TCP. FTP
uses two TCP connections—a control connection and a data connection— in
simultaneously to transfer files.

Advantages of FTP:
o Speed is one of the advantages of FTP (File Transfer Protocol).
o File sharing also comes in the category of advantages of FTP in this between two
machines files can be shared on the network.
o Efficiency is more in FTP.

MI. Mohamed Aseem Networking 40 | P a g e


Disadvantages of FTP:
o File size limit is the drawback of FTP only 2 GB size files can be transferred.
o Multiple receivers are not supported by the FTP.
o FTP does not encrypt the data this is one of the biggest drawbacks of FTP.
o FTP is unsecured we use login IDs and passwords making it secure but they can be
attacked by hackers.

 DHCP (Dynamic Host Configuration Protocol):


Dynamic Host Configuration Protocol is known as DHCP. It is the essential component
that allows users of an enterprise network to connect. Enterprises may easily manage IP
address distribution to end-user clients' devices with the use of DHCP, including desktop,
laptop, and mobile devices.

Advantages of DHCP:
o Centralized management of IP addresses.
o The DHCP protocol gives the network administrator a method to configure the network
from a centralized area.
o Simple reconfiguration of the IP address space on the DHCP server without needing to
reconfigure each client.
o Reuse of IP addresses reduces the total number of IP addresses that are required.

Disadvantages of DHCP:
o IP conflict can occur.
o The client is not able to access the network in absence of a DHCP Server.
o The name of the machine will not be changed in a case when a new IP Address is
assigned.

 DNS (Domain Name System):


Domain Name System (DNS) is a hostname for IP address translation service. DNS is a
distributed database implemented in a hierarchy of name servers. It is an application layer
protocol for message exchange between clients and servers. It is required for the
functioning of the Internet.

MI. Mohamed Aseem Networking 41 | P a g e


Advantages of DNS:
o The DNS system is very flexible and consistent.
o They are easy to use and configure.
o The DNS system helps in providing security features for the users.
o They are very efficient systems in the computer network and internet industry.
o The domain name server and the system convert a domain name to the IP address for
accessible communication and connections.

Disadvantages of DNS:
o Hackers and spammers can hack DNS Servers. It has been observed that DNS servers
are attacked numerous times.
o They are difficult to manage because if a problem or defect appears in the system, we
must seek professional assistance, which occasionally comes at a higher expense.
o The issues that are hard to troubleshoot and diagnose, are related to DNS.
o Any application's or website's IP address is vulnerable to manipulation and compromis e
by unauthorized users. That could lead to misuse and infringement of data and
information.

 SMTP (Simple Mail Transfer Protocol):


SMTP is an application layer protocol. The majority of internet-based systems use SMTP
as a means of sending mail from one user to another. IMAP (internet message access
protocol) or POP (post office protocol) are used to retrieve emails at the recipient's end
whereas SMTP (a push protocol) is used to send mail. A TCP connection is established
between the client and the SMTP server before the mail is sent via the connection.

Advantages of SMTP:
o If necessary, the users can have a dedicated server.
o It allows for bulk mailing.
o Low cost and wide coverage area.
o Offer choices for email tracking.

Disadvantages of SMTP:
o SMTP’s common port can be blocked by several firewalls.

MI. Mohamed Aseem Networking 42 | P a g e


o SMTP security is a bigger problem.
o Its simplicity restricts how useful it can be.
o If a message is longer than a certain length, SMTP servers may reject the entire message.

Conclusion
I recommended Ethernet protocol for Matara Branch as a network analyst. Ethernet is a
widely-used network protocol for connecting devices within a local area network (LAN).
Using Ethernet as a communication protocol has many advantages. Here are three main
factors that led me to suggest this protocol.

 Flexibility
Ethernet nowadays supports several topologies via various media. With the appropriate
cost, this flexibility helps to complement plant topology. It can be beneficial to have
distributed devices from a single area of the plant when constructing the topology. By using
star topology, it is possible to safeguard network devices that contain sensitive data and
prevent "man in the middle" attacks, which target the connection between network
endpoints.

 Reliability
High-speed data transfer with minimal error rates is made possible by the reliable Ethernet
protocol. Also Ethernet uses a cyclic redundancy check (CRC) algorithm to detect errors
in data transmission. Ethernet can either transmit the data or request the sender to do so if
an error is found. By doing this, data transmission accuracy and completeness are
guaranteed.

 Openness
My view of Ethernet openness is the capacity to mix several application protocols on the
same medium. These many application protocols offer various services to better meet the
operational requirements of a firm.
Other requirements during operations include those for IT connection, time
synchronization, and diagnostics. Businesses are able to use current standards like web-

MI. Mohamed Aseem Networking 43 | P a g e


based diagnostics over HTTP, time synchronization with NTP, and IT communicatio ns
using web services by using Ethernet.

Overall, Ethernet is the best and suitable protocol for Matara branch and these flexibility,
reliability and openness make it a strong contender for the Matara branch's networking
system.

MI. Mohamed Aseem Networking 44 | P a g e


1.6. Network Communications
A process of information exchange, instruction sharing, and resource sharing amongst
multiple computers is referred to as communication. Alternatively, to put it another way,
communication is the act or process by which we send or receive data. An interconnected
group of independent computers is referred to as a network of computers. When a computer
is autonomous, it cannot start, shut down, or command another computer (sonalijain2110,
2022).

Components of Data Communication


As Shown in the figure, a data communication model consists of 5 components.

Figure 16: Components of Data Communication

1. Message:
A message is a piece of data that needs to be sent from one person to another. Any type of
file could be used—text, audio, video, etc.
2. Sender:
It is just a device that transmits data messages. It could be a laptop, desktop, tablet,
smartphone, computer, video camera, workstation, etc.
3. Receiver:
It is a message-receiving device. It could be a workstation, a mobile phone, a computer,
etc.
4. Transmission Medium:
The medium that connects two or more workstations is called a communication channel.
Workstations can connect to each other wirelessly or over wired networks.

MI. Mohamed Aseem Networking 45 | P a g e


5. Protocols:
It is important for the sender of data to ensure that the recipient can understand it as well,
else the transmission is useless.

Type of Data Communication


Data communication, as we all know, is communication that allows us to send and receive
data from one device to another. There are three categories for data communication:
1. Simplex Communication:
It is one-way communication, or unidirectional communication, where one device only
receives data, and another device only transmits data, and the devices employ their entire
capacity for transmission. IoT, data entry using a keyboard, playing music thro ugh
speakers, etc. are a few examples.

Figure 17: Simplex Mode

2. Half Duplex communication:


It is two-way communication, or we may say it is bidirectional communication, where both
devices can transmit and receive data, but not simultaneously. When one device is
delivering data, another is just receiving it, and the opposite is true. a walkie-talkie, for
instance.

MI. Mohamed Aseem Figure 18: Networking


Half Duplex 46 | P a g e
3. Full-duplex communication:
Both devices can send and receive data simultaneously since it is a two-way
communication, or a bidirectional communication. For instance, landlines, cell phones, etc.

Figure 19: Full Duplex

Type of Connections
Between two endpoints, there are different types of communication connections such as:
1. Point-to-Point Connection
2. Multipoint Connection

Point-to-Point Connection
A point-to-point connection is a straight line that connects two devices, like a computer and
a printer. The gadgets are connected via a dedicated link. The transmission between those
two devices uses the entire link's capacity.

Figure 20: Point to Point Configuration

MI. Mohamed Aseem Networking 47 | P a g e


Multipoint Connection
A multipoint connection connects three or more devices together. Another name for it is
multi-drop configuration. Broadcast Networks are networks with a multipo int
configuration. A message or packet sent by any machine in a broadcast network is received
by every other machine in the network.

Figure 21: Multipoint Connection

Communication Channels
The medium used to connect two or more workstations is called a communication channel.
Workstations can connect to each other wirelessly or over wired networks. A transmiss io n
medium is another name for it. A link that transmits messages between two or more devices
is known as a transmission medium or channel. The communication media can be divided
into two categories:
 Guided media transmission
 Unguided media transmission
Guided media transmission
With this transmission method, the physical connection is made between two or more
computers or devices via wires or cables, and the data is then delivered as signals across
these lines. Transmission using guided media of the following kinds:
1. Twisted pair cable:
Two identical wires are wound together in a double helix inside twisted-pair cables. The
wire is twisted to lessen crosstalk. The wire is shielded by the twisting from both interna l
crosstalk and external signal interference.

MI. Mohamed Aseem Networking 48 | P a g e


Advantages of Twisted pair cable:
 It is the least expensive transmission medium for short distances.
 It is frequently used to transport both digital and analog data.
 It is comparatively simple to implement and terminate.
 Twisted pair cable is flexible to use
 Twisted Pair cable is easy to connect.
 Fewer vulnerable to electrical interference from surrounding wires or equipment.

Disadvantages of Twisted pair cable:


 It supports 10 mbps on a 10BASE-T up to a distance of 100 meters, which are regarded
as low bandwidth.
 It is quite simple to tap and offers poor security.
 They may be easily broken because they are thin.
 There is a lot of attenuation.

Twisted-Pair Cable Types:


 Unshielded Twisted Pair (UTP):
It is commonly utilized in phones and laptops. As there is no external shielding, as the name
would imply, it is not immune to outside interference. It costs less than STP.

 Shielded Twisted Pair (STP):


Due to the shield, it provides more protection against crosstalk. Shielding guards against
outside disturbance. It is more expensive and heavier than UTP.

Figure 22: Shielded Twisted Pair

MI. Mohamed Aseem Networking 49 | P a g e


2. Coaxial Cable:
It is made up of one or more shields made of foil or wire and a solid wire core. The signal
is carried by the coaxial cable's inner core, and the ground is provided by the outside shield.

Figure 23: Coaxial Cable

Advantages of Coaxial Cable:


 High bandwidth can be carried through coaxial wires.
 It is easy to install coaxial cables.
 Coaxial cables are more dependable and long-lasting because of their improved cut-
through resistance.
 Coaxial cables support multiple channels

Disadvantages of Coaxial Cable:


 Coaxial cables are expensive.
 To avoid any crosstalk, the coaxial wire needs to be grounded.
 Coaxial cables are particularly thick because they have several layers.
 Hackers might potentially break the coaxial line and attach a "t-joint," compromis ing
the data's security.

MI. Mohamed Aseem Networking 50 | P a g e


3. Optical fibres:
The use of optical fibre is significant. As a result of its rapid data transmission, it is
frequently utilized in internet cables. It travels inside a fine glass fibre and transmits data
as light.

Figure 24: Optical Fibres

Advantages of optical fibres


 Bandwidth is above copper cables
 Less power loss and allows data transmission for extended distances
 Optical cable is resistance for electromagnetic interference
 As cable are lighter, thinner, in order that they use less area as compared to copper wires
 This cable opposes most acidic elements that hit copper wired also are flexible in nature.

Disadvantages of optical fibres


 These cable are very difficult to merge so there’ll be loss of beam within cable
 The cost of installing the wires is reasonable. They are less durable due to wiring.
Typically, optical fibre requires specialized equipment.
 These cable are highly vulnerable while fitting
 These cables are more delicate than copper wires.

MI. Mohamed Aseem Networking 51 | P a g e


Unguided media transmission
Unguided transmission media is a transmission method that uses wireless signal
propagation from one device to another.

Unguided Media is further broken down into a number of sections:


1. Microwave:
Without the need for cables, communication is possible using microwave. Radio and
television signals are analogous to microwave signals. Long-distance communica tio n
employs it.

2. Radio wave:
Radio waves transmission is the process of communicating through radio frequencies. It
allows for movement. The transmitter and receiver make up this device. Both transmit and
receive the radio signal via antennas.

Figure 25: Radio Wave

MI. Mohamed Aseem Networking 52 | P a g e


3. Infrared:
It can communicate over short distances and through any barrier. It is typically utilized in
wireless mice, TV remote controls, etc.

Figure 26: Infrared

1.7. Bandwidth
The greatest speed at which data may be transmitted across a network connection, whether
wired or wireless, is referred to as network bandwidth. The amount of bits, kilobits,
megabits, or gigabits that may be transferred in a second is the standard definition of
bandwidth. The phrases bandwidth and capacity are interchangeable when referring to the
speed at which data is transmitted. The idea that bandwidth serves as a gauge for network
speed is a prevalent one (GeeksforGeeks, 2023).

Figure 27: Bandwidth

MI. Mohamed Aseem Networking 53 | P a g e


Working of bandwidth
The amount of data that may be sent and received at once depends on the bandwidth of a
data connection. The amount of data that a communication link can process per second
increases with its capacity.
The price of a network connection increases as bandwidth does as well. Hence, a dedicated
internet access (DIA) link with a 1 gigabit per second (Gbps) capacity will cost more than
one with a 250 megabits per second capacity (Mbps).

Importance of bandwidth
 In terms of bandwidth, physics and technology have limits.
 Bandwidth is not free
 The amount of bandwidth required is increasing quickly.
 Bandwidth is critical to network performance

Advantages of Bandwidth:
When it comes to figuring out the speed and quality of an internet or internet connection,
bandwidth is a crucial component. In general, your internet will be speedier and more
effective the higher the bandwidth.

Disadvantage of low bandwidth:


Similar to this, performance will be significantly slowed by a low bandwidth connect ion
supporting numerous network requests. Several requests and users can be served via a
connection with high bandwidth without sacrificing valuable speed. Again, it's crucial to
keep in mind that slow network performance is caused by inadequate bandwidth.

Fibre types and bandwidth:


 Single mode - 100 Ghz-km
 Graded index - 560 MHz-km at 1300 nm, 160 MHz-km at 850 nm
 Step index - 20 MHz-km

MI. Mohamed Aseem Networking 54 | P a g e


Copper cabling and bandwidth:
 Cat5 and Cat5e - 100MHz
 Cat6 - 250MHz
 Cat6a - 500MHz
 Cat7 - 600MHz

1.8. Common Networking Principles


A good network design should give users the impression that it is transparent, dependable,
and all-pervasive, and that quality, speed, security, control, and cost are balanced
appropriately. In order to develop, execute, and maintain networked systems, a set of
fundamental ideas known as networking principles must be followed.

While creating networks, these guidelines assist designers in giving consumers this
experience. Keep in mind that they are just concepts and not a rigid set of guidelines.
Designers are free to stray from them when there is a solid reason.

When we talk about users, we're talking about government end-users, or people who use a
service instead of buying or providing it. The setting for these ideas is shown in the diagram
below.

Figure 28: Common Networking Principles

MI. Mohamed Aseem Networking 55 | P a g e


Principle 1: Understand the user need
Networks differ greatly in their properties. On the diagram, we can see that some customers
are accessing services remotely through the greatest capacity fixed networks, while others
are doing so over a mobile link with constrained bandwidth.
Know:
 What business services your users depend on
 What network services they rely on to access them
Document your needs across different networks for:
 Bandwidth
 Availability
 Resilience
 Class of Service (CoS)
 Quality of Service (QoS)
 Price

Principle 2: Use services to protect your data, don’t rely on the network
Understand the threat:
Know:
 Who controls your networks?
 Who has access to your data and in what organizations and jurisdictions?
 Who you are allowing access to your network?
 Whether your data in transit security is sufficient?

Understanding how separation is performed in any multi-tenanted cloud services you may
use is analogous to this approach. Establish a detailed security plan. Threats should serve
as direct input for security and controls, which should be created to complement your
overall risk management strategy.

While the options offered by contemporary security technologies are numerous, they
shouldn't be enabled randomly. Controls may hinder performance and lead to unneeded
bottlenecks. Each option should have a distinct purpose for being enabled or disabled.

MI. Mohamed Aseem Networking 56 | P a g e


Principle 3: Design for interworking and flexibility
Use open standards:
Network traffic on data networks can take many different forms. Be sure the services
you choose adhere to published criteria. In the network layer, there are a variety of
proprietary standards and methods that should be avoided unless you have a very
particular specialist demand.

Maximise use of commoditised services:


You should:
 Make it simple to modify to accommodate shifting requirements.
 When you need something, buy it
 Use the usual commercial terms and conditions of providers when choosing networks
apart from other services.
 Reduce your own WAN estate and, when possible, share infrastructure.

Publish DNS names:


Distribute DNS records as broadly as you can. This makes it possible for the greatest
number of individuals to find a service and prevents limitations based on name recognitio n.
Do not use DNS record access restrictions as a security measure. Being able to access a
service does not necessarily mean knowing its IP address or domain name.

How protocols enable the effectiveness of networked systems

In various aspects, protocols are essential to networked systems' ability to functio n


effectively.

 Addressing and Routing

To address and route data packets within a network, protocols offer techniques. They give
each gadget a distinct address, enabling accurate identification and targeting of certain
locations. Routing protocols choose the most efficient routes for data to take through the

MI. Mohamed Aseem Networking 57 | P a g e


network while taking network topology, congestion, and connection availability into
account. This guarantees effective and trustworthy data transfer.

 Communication Efficiency

Protocols outline effective ways to send and receive data over a network. They outline
packet architectures, data encoding strategies, and error-correction methods. Protocols
reduce latency, optimize the utilization of network resources, and eliminate data overhead
by enhancing the communication process.

 Error Detection and Correction

To protect the integrity of data while it is being transmitted, protocols include systems for
error detection and correction. They include acknowledgment systems, cyclic redundancy
checks (CRC), and checksums to find and fix transmission mistakes. The correctness and
dependability of transmitted data are maintained via protocols, which look for mistakes and
retransmit damaged or lost packets.

 Standardization

In accordance with established protocols, communication takes place in standardized ways.


This standardization makes sure that various systems and devices can comprehend and
interpret the data sent back and forth between them. It enables interoperability, allowing
devices from diverse vendors to operate together without any problems.

 Security and Encryption

To enable safe communication within a network, protocols contain security features


including encryption, authentication, and access control. They allow for the creation of
secure connections, guard against unauthorized access to or tampering with critical data,
and offer secure remote access to network resources. Networked systems can protect data
and uphold privacy by employing strong security mechanisms.

 Quality of Service (QoS) Management

In order to control and prioritize network traffic according to particular needs, protocols
permit the installation of QoS methods. To maintain optimum performance and adhere to

MI. Mohamed Aseem Networking 58 | P a g e


particular service-level agreements (SLAs), QoS protocols enable the prioritization of
certain types of traffic, such as real-time applications or crucial data.

 Flow Control and Congestion Management

To control the data flow between sender and recipient, protocols use flow control methods.
They make ensuring that data is transmitted at a rate that the receiving device can manage,
reducing network congestion and overflow. Protocols improve network speed and avoid
packet loss or degradation by controlling the flow of data.

Within networked systems, protocols lay the groundwork for efficient communication and
data sharing. Protocols provide for the efficient functioning and efficacy of networked
systems by defining standardized procedures, maximizing efficiency, guaranteeing data
integrity, regulating resource allocation on the network, and strengthening security.

MI. Mohamed Aseem Networking 59 | P a g e


LO2: Explain Networking Devices and Operation

2.1. Network Devices


Networking hardware, usually referred to as network devices, are tangible objects that
enable hardware on a computer network to connect and communicate with one another.

Types of Network Devices


Here is the common network device list:
1. Routers
2. Hubs
3. Switch
4. Repeater
5. Bridge
6. Gateway
Let’s look at deeper:
1. Routers
A router directs data packets depending on their IP addresses. Mainly a Network Layer
device, the router. Routing decisions are made by routers, which typically connect LANs
and WANs, using a routing table that is dynamically updated. The broadcast domains of
hosts connecting through the router are divided.

Figure 29: Router

MI. Mohamed Aseem Networking 60 | P a g e


User's first line of protection is user's router, which needs to be set up to only pass traffic
that network administrators have allowed. The routes themselves have a static or dynamic
configuration option. If router is static, it can only be manually setup and remain set until
modified. If it is dynamic, it discovers nearby routers and utilize that knowledge to create
their routing tables.

How routers work:


By forwarding data packets between devices, a router links the devices together in a
network. This information can be transmitted online or from one device to another. The
router accomplishes this by giving each networked device a local IP address.

This prevents data packets from getting lost in the network and guarantees that they arrive
at their intended destination.

2. Hubs
A hub functions much like a multi-port repeater. A hub joins several wires that come from
several branches, like the connector in a star topology that joins various stations. Data
packets are delivered to all connected devices since hubs are unable to filter data. In other
words, all hosts connected by Hub continue to share a single collision domain.
Additionally, they lack the intelligence to choose the best route for data packets, which
results in waste and inefficiency.

Figure 30: Hub

MI. Mohamed Aseem Networking 61 | P a g e


Three basic types of hubs exist:
 Active Hub:
These hubs can enhance, clean, and relay the signal while also working with the network
and have their own power supply. It functions as a wiring centre as well as a repeater. The
maximum distance between nodes can be increased using these.

 Passive Hub:
These hubs are responsible for collecting electricity from the active hub and wiring from
nodes. These hubs cannot be utilized to increase the distance between nodes because they
just transport signals onto the network without boosting or cleaning them.

 Intelligent Hub:
It features remote management tools and functions as an active hub. They also provide
network devices adjustable data rates. An administrator can also use it to setup each port in
the hub and watch the traffic flowing through it.

3. Switch
A switch is a multiport bridge with a buffer and a design that can increase its performance
and efficiency (more ports mean less traffic). A data link layer device is a switch. The
switch may carry out error checking before forwarding data, which makes it incredib ly
efficient because it only forwards good packets to the right port and does not transmit
packets with mistakes. In other words, while the switch separates the hosts' collis io n
domain, the broadcast domain is left unchanged.

Figure 31: Switch

The ability to create virtual circuits makes switches more efficient for networks than hubs
or routers. Switches also increase network security since it is more challenging to employ
network monitors to inspect virtual circuits. Switches are vulnerable to distributed denial

MI. Mohamed Aseem Networking 62 | P a g e


of service (DDoS) attacks; flood guards are employed to stop malicious traffic from
shutting down the switch.

Types of Switch:
 Layer 2 switches
 Layer 3 switches
 Rack-mounted switches
 Managed switches
 Unmanaged switches
 Smart switches
 Gigabit switches
 PoE switches

4. Repeater
At the physical layer, a repeater operates. In order to expand the length to which the signal
can be broadcast over the same network, it must regenerate the signal over the same
network before it gets too weak or contaminated. It's vital to remember that repeaters
regenerate the signal in addition to amplifying it. When the signal deteriorates, they
incrementally copy it and restore it at the star topology connectors connected in accordance
with the initial strength. It is a two-port gadget.

Figure 32: Repeater

MI. Mohamed Aseem Networking 63 | P a g e


5. Bridge
A bridge operates at the data link layer. A bridge is a repeater with the additional capability
of content filtering via source and destination MAC address reading. Additionally, it is
utilized to connect two LANs that use the same protocol. It is a 2-port device because it has
a single input and output port.
Types of Bridges
 Transparent Bridges:-
These are the bridges where the stations are fully oblivious of the bridge's existence, hence
it makes no difference if a bridge is added to the network or removed from it whether or
not the stations need to be reconfigured. These bridges employ the bridge forwarding and
bridge learning procedures.

 Source Routing Bridges:-


The source station handles routing in these bridges, and the frame determines the route to
take. By sending a special frame known as the discovery frame, which travels over the
whole network utilizing all viable paths to the destination, the host can find the frame.

Figure 33: Bridges

6. Gateway
A gateway connects two networks that might use several networking models, as its name
suggests. They serve as messengers, transferring data from one system to another once it
has been analysed. Protocol converters are another name for gateways, which can work at
any network layer. In general, gateways are more complicated than switches or routers.
Another name for a gateway is a protocol converter. (GeeksforGeeks, 2023)

MI. Mohamed Aseem Networking 64 | P a g e


2.2. Server
A server is a powerful device created to compute, store, and manage data, devices, and
systems through a network. This complex computer system gives networking devices the
capabilities they need to do specific tasks like displaying web pages and sending or
receiving emails, among others (Kanade, 2023).

A server can be made up of computer hardware, software, or even virtual machines with
the necessary software capabilities. However, a server's capabilities go beyond those of a
regular computer. In addition to hosting websites with lots of material, managing multip le
user queries every second, and putting up a shared drive for network devices, they manage
complicated server functions like database transaction management, which demands a lot
of processing power.

The client-server concept is used by servers to respond to user requests. Here, the in-
network devices that make use of the resources the host device provides are referred to as
clients, while the host device that powers network devices is referred to as host-server.

Figure 34: Servers

Key components of a server:


Fundamental components that can execute code, send or receive data, and store that data
for a short while or for a long time make up server computers. These parts are found in
modern laptops, smartphones, and Internet of Things (IoT) devices, but they are far more
potent in server machines.

MI. Mohamed Aseem Networking 65 | P a g e


The four essential elements of a server are as follows:
 Processor
 RAM
 Storage
 Bandwidth

How does a server work?


Several servers are ready to supply the necessary information when a user types a website
URL into a web browser. Initially the URL is split into three components by the web
browser:
 Protocol
The hypertext transfer protocol (HTTP or HTTPS) is the first component. It serves as a
channel of communication between servers and browsers.
 Server name
The server name is referenced in the second component of the URL. A domain name server
(DNS) in this case converts the domain name into the server's IP address, which is where
the requested website is located.
 File name
The files that make up the required website, including HTML, CSS, fonts, photos, graphics,
and many other components, are contained in the final section.

The web browser contacts the DNS server with a domain name request in step one. The
DNS server then determines which IP address belongs to the requested domain. The
browser sends the user request to the target server after getting the IP address. In response
to the user query, the server then gathers the website data and the dynamic components
required to show the website on the user side and delivers them back to the user.

2.2.1. Types of server


Different kinds of servers are used today. A number of servers are capable of handling
numerous tasks, including hosting websites, sending and receiving emails, protecting

MI. Mohamed Aseem Networking 66 | P a g e


internal networks, etc. Dedicated servers, on the other hand, like database or print servers,
concentrate on a single task.
The following are some of the main server varieties that are essential to networking
environments:
1. Web server
Web servers are created to operate websites and apps through client software (web
browsers) like Internet Explorer, Chrome, Firefox, Opera, or Safari. They are in charge of
handling, processing, and providing users with web material. They support protocols that
are essential for data transfer between network devices, including HTTP, FTP, and SMTP.
In a network, web server software is installed on every machine hosting websites to better
control user access to hosted files.

2. Mail server
Clients can store and manage their emails more easily with the help of a mail server. It
sends and receives emails using several protocols. The Simple Mail Transfer Protocol
(SMTP), for instance, is used to transmit emails. The Post Office Protocol (POP3) is used
by the server to store and receive emails.

3. Application server
Regardless of their functionality, web-based programs can be developed, processed, and
run using an environment provided by an application server. The server executes the
software required to run PHP, Java, or.Net applications.

Due to their propensity to employ the HTTP protocol and respond to client requests,
application servers resemble web servers. But these servers concentrate on building
dynamic webpages that make use of things like message services and object pooling.
Some application servers come equipped with a web server component, allowing them to
operate as a web server when necessary.

4. Database server
Database servers provide client computers with database services. Users can use a query,
such as a SQL query, to access, edit, store, and retrieve data from a database. Security and
disaster recovery for database management systems (DBMS) are handled by database

MI. Mohamed Aseem Networking 67 | P a g e


servers. They keep digital files, application files, and files not related to databases. These
servers are used by big businesses to protect their sensitive and priceless corporate data.

5. DNS server
DNS servers are domain name servers. These systems resolve network-based server names.
As they convert navigable URLs into their corresponding IP addresses, DNS servers play
a crucial role in the functioning of the internet.

6. Proxy server
A proxy server serves as a bridge between regional networks and global networks. It
accepts queries from one network and forwards them using its own IP address to create a
communication link between interacting networks. These servers store frequently visited
web pages in a cache, which aids in quicker loading when viewed later. The network's
bandwidth is drastically decreased as a result.

Proxy servers are also essential for network load balancing because they filter network
traffic and are constantly accessible. These servers additionally maintain client anonymity
because a proxy is used in place of the client's actual IP address.

7. DHCP server
Computer systems that assign IP addresses to clients on a dynamic basis are referred to as
DHCP servers. This automated method has the advantage of minimizing problems that
manual management can introduce, such as typos or IP conflicts.

DHCP servers manage changes to network device configurations, such as updating or


replacing IP addresses that have expired or managing the IP addresses of devices that move
from one location to another. These servers are essential for network management since
they can handle numerous client requests at once.

8. File server
A machine that offers shareable disks that may be accessed by the workstations on a
network is referred to as a file server. The disk stores computer files like text, image,
graphic, audio, and video files, among others. File servers are frequently employed for

MI. Mohamed Aseem Networking 68 | P a g e


storage needs. As a result, they are unable to run programs or carry out computatio na l
activities.

Depending on the computing environment, file servers access files using a variety of
protocols. For instance, file servers on the internet can be accessed using the FTP and HTTP
protocols, whereas file servers on a local area network (LAN), such those found in
workplaces and classrooms, can be accessed using the SMB or NFS protocol.

9. Gaming server
Global online gaming communities are linked by gaming servers. Games with multipla yer
modes, including Counter-Strike and Minecraft, are supported. These servers also
coordinate player activities in the virtual world and maintain player and game data. Popular
game server hosting services like ScalaCube, HostHavoc, and Cloudzy let users rent game
servers for titles like ARK, Rust, and others.

10. Print server


Clients on a network can access printing devices using print servers. In preparation for the
possibility that printers won't be able to handle the volume of requests received in a specific
amount of time, they take print tasks from users and queue them. These servers carry out
print jobs using a variety of protocols, including JetDirect, the Line Printer Daemon
protocol, and the Internet Printing Protocol.

2.2.2. Designs of Server


 Rack Server
A server that is intended to be used as a rack, also known as a rack-mounted server, is a
computer that is built to be mounted inside of a rack. The rack has numerous mounting
bays, also known as mounting slots, each of which is intended to hold a hardware device
fastened in place with screws. In contrast to a tower server, which is housed in an upright,
independent cabinet, a rack server features a low-profile enclosure.

Multiple servers can be stacked one on top of the other in a single rack to consolidate
network resources and reduce the amount of floor space needed. Additionally, the rack

MI. Mohamed Aseem Networking 69 | P a g e


server arrangement makes network component cabling simpler. A specialized cooling
system is required in a server equipment rack to avoid the significant heat buildup that
would otherwise happen when several power-dissipating components are squeezed into a
compact area.

Table 5: Advantage and Disadvantages of Rack Server

Advantages of Rack Server Disadvantages of Rack Server


1. Performance: 1. Cooling requirements:
Rack servers have the performance to Despite being simpler to cool, rack servers
handle the needs of sophistica ted still need a powerful cooling system, which
applications. could increase energy expenditures.

2. Compact size: 2. Less efficiency:


Due to their smaller size and ability to place Rack servers are less energy-efficient
on a rack, rack servers are simpler to use.
3. Increased maintenance:
3. Easier cooling: More maintenance personnel are required
Rack servers are typically easier to cool to oversee and troubleshoot the servers in
because they frequently have internal fans dense racks. The time it takes to work with
built in. Additionally, the rack-style rack servers is also exacerbated by the
arrangement may result in more airflow. clumsier size and greater cable
management requirements.
4. Lower costs:
The rack-mounted alternative is typically
more affordable if you only require a small
number of servers.

 Blade Servers
Blade servers' modular construction enables them to cram more servers into a smaller space
while also providing scalability. They are often slimmer and include certain built- in
components, including as CPUs, integrated network controllers, memory, and occasionally
storage devices. The significant function of managing several blade servers simultaneo us ly
is performed by the massive server chassis, installed in a server rack. Power is provided, as

MI. Mohamed Aseem Networking 70 | P a g e


well as support for components like video cards. Additionally, the chassis contains
openings for blade servers to slide into.

Blade servers can run more effectively and with fewer internal components because to its
architecture. Users can run the blade servers singly or in a cluster. With blade servers, you
may achieve high availability and perform updates or maintenance without taking the
server offline. High CPU densities are also scalable, but those configurations require
stronger thermal and electrical demands.

Table 6: Advantage and Disadvantages of Blade Server

Advantages of Blade Server Disadvantages of Blade Server


1. Power management: 1. Higher upfront costs:
The chassis can effectively power Blade servers often have higher upfront
numerous servers while lowering total expenses than rack servers, includ ing
power usage. deployment and configuration. Simpler
maintenance and less energy use may result
2. Cable management: in lower ongoing expenditures, but those
It is simpler to manage because just one upfront costs can demand a sizable amount
cable needs to be run to the chassis. of capital.
Additionally, you might be able to prevent
safety issues caused by tangled wiring. 2. Higher cooling costs:
Blade servers frequently require stronger
3. High processing power: climate control systems due to their high
These servers have a very high processing density. These could increase the price and
capacity without taking up a lot of room. use more energy than what rack servers
need for cooling.
4. High availability:
Blade servers provide high availability
through centralized management, hot-
swapping, load balancing, and clustered
failover.

MI. Mohamed Aseem Networking 71 | P a g e


 Tower Server
The many network environment processes are handled by servers, which are centrally
located computers. To manage various areas of your organization, you could have many
servers. You might have an email server, file storage server, application server, and FTP
server, for instance. You might have a tower server for each individual machine. Although
they are not your only choice, several small and midsize businesses choose to use tower
servers.

A tower server uses any part that would be found in a typical desktop computer. The
primary distinction is how much advanced the computational resources are. The majority
of a tower server's components, particularly the CPU, memory, and video card, are typically
from the most recent generation. High-volume traffic must also be supported by the
network card. To conduct routing and other network functions, some tower servers include
two network cards.

Although it is constructed differently, a tower server functions the same as any other server.
A tower server's operation relies on what it is used for. One tower server with a huge storage
capacity can connect to the network and be used as a file server.

Table 7: Advantage and Disadvantages of Tower Server

Advantages of Tower Server Disadvantages of Tower Server


 It is easier to cool because component  If computing power were the same,
density is substantially lower than that larger and heavier than rack or blade
of blade or rack servers. servers.
 Easy to modify and customize to the  There are equipment problems because
precise requirements of the company each tower needs its own connection,
 Less space restrictions allow for the monitor, and KVM.
simple installation of extra drives.  When each tower server has its own
 Comparatively speaking to rack and dedicated AC unit, it is noisy.
blade setups, less maintenance is  For larger enterprises with fluctua ting
needed. processing requirements, not optimal.

MI. Mohamed Aseem Networking 72 | P a g e


 Ideal for small businesses that require
server functionality but have limited
computing power.

Examples for Tower, Rack and Blade servers in today market

 Tower Server:
Brand: Dell
Model: PowerEdge T440
Price: $ 1,859.00 (In Sri Lankan Rupees 557,700/=)
Power Supply: Single, Hot-plug Power Supply, 495W

 Rack Server:
Brand: Dell
Model: PowerEdge R6515
Price: $2,499.00 (In Sri Lankan Rupees 744,700/=)
Power Supply: Single, Hot-plug Power Supply (1+0), 550W

 Blade Server:
Brand: Dell
Model: PowerEdge MX740c Compute Sled
Price: $5,152.69 (In Sri Lankan Rupees 1,535,500/=)

Suitable server for Alliance Health


The server is essential to the success of the business and its clients. When buy a server we
should consider about important factors such as: specifications, performance, energy
efficiency, budget and support and warranty. And also there are lots of brands producing
servers, such as: Lenovo, Dell, HPE, etc.

MI. Mohamed Aseem Networking 73 | P a g e


Here are some server models that I assume are suitable for Alliance Health Company.
1. HPE ProLiant ML110 G10 Tower

Figure 35: HPE ProLiant ML110 G10 Tower

Table 8: HPE ProLiant ML110 G10 Tower Specification

HPE ProLiant
Model HPE ProLiant ML110 G10 Tower
CPU: Intel Xeon Scalable
RAM: 16GB (up to 64GB)
Specification Storage: Up to 40TB HDD
Connectivity: 8 x USB 3.0, serial, video, 2 x DisplayPort, audio,
Gigabit Ethernet
Advantage Perfect balance of value and performance
$1225 + Hard Drive + additional RAM cost
Cost
Sri Lankan Rupees: 282,000/=
Estimated to be $20/month for 290W @ 10 cents per KW/h +
Operating Expenses
hardware maintenance

MI. Mohamed Aseem Networking 74 | P a g e


2. Dell PowerEdge T30

Figure 36: Dell PowerEdge T30

Table 9: Dell PowerEdge T30 Specification

Dell
Model Dell PowerEdge T30
CPU: Intel Xeon E3-1225 v5
Graphics: Intel HD Graphics P530
RAM: 4GB (up to 64GB)
Specification
Storage: Up to six SATA HDD
Connectivity: 10 x USB ports, HDMI, DisplayPort, VGA, serial,
PS2, Gigabit Ethernet
Advantage Very affordable, entry level server
$430 + hard drive + RAM costs
Cost
Sri Lankan Rupees: 129,000/=
Estimated to be $22/month for 290W @ 10 cents per KW/h +
Operating Expenses
hardware maintenance

MI. Mohamed Aseem Networking 75 | P a g e


3. Dell PowerEdge T630 5U Tower Server

Figure 37: Dell PowerEdge T630 5U Tower Server

Table 10: Dell PowerEdge T630 5U Tower Server Specification

Dell
Model Dell PowerEdge T630 5U Tower Server
CPU: 1 x Intel Xeon E5-2620 v4 Octa-core (8 Core) 2.10 GHz
RAM: 16GB

Specification Storage: 1TB 3.5 inch 7.2K RPM, 6Gbps SATA Hot Plug Hard
Drive (Support Up to 32TB HDD)

Connectivity: 4 x Gigabit Ethernet

Advantage Quality hardware selections


$3449 + hard drive and additional RAM costs
Cost
Sri Lankan Rupees: 1,034,700/=
Estimated to be $20/month for 290W @ 10 cents per KW/h +
Operating Expenses
hardware maintenance

MI. Mohamed Aseem Networking 76 | P a g e


4. Fujitsu Primergy TX1310 M1

Figure 38: Fujitsu Primergy TX1310 M1

Table 11: Fujitsu Primergy TX1310 M1 Specification

Fujitsu
Model Fujitsu Primergy TX1310 M1
CPU: Intel Xeon E3-1226 v3
RAM: 16GB

Specification Graphics: Intel HD Graphics P4600


Storage: 120GB SSD and 500GB HDD

Connectivity: 5 x USB 3.0, 2 x Gigabit Ethernet

Advantage Has an optical drive


$171 + hard drive and additional RAM costs
Cost
Sri Lankan Rupees: 51,000/=

MI. Mohamed Aseem Networking 77 | P a g e


Conclusions
As a network analyst, I recommended HPE ProLiant ML110 G10 Tower. Because this is
the best value server. This server balances performance with price. And also it has good
specifications such as CPU, Graphics and RAM at these price range comparing to others.
So these servers are capable of handling the majority of chores that the typical business
may throw at them.
Why I didn’t recommend cheapest servers such as Fujitsu and Dell PowerEdge T30.
Because the cheapest servers will not perform as well as we expected. Because it doesn’t
have good specifications such as CPU, RAM, and graphics. Alliance Health Company isn’t
small business company. So we want good performance. So that these cheapest servers
aren’t suitable for Alliance Health Company.

MI. Mohamed Aseem Networking 78 | P a g e


2.3. Workstations
A workstation is a computer created for one user's specialized professional use. It often has
more storage than a personal computer, but it lacks the capability of a mainframe computer,
which is made to handle several users and very complicated calculations. Workstations give
individuals access to high-performance computing for a range of applications, such as
building three-dimensional digital models. Workstations are created by many computer
manufacturers, who can also create specialized systems upon request for particular uses.

Eventually, workstation features were included into common PCs, which led to the market
segment for workstations declining. Additionally, the price difference between higher - end
PCs and lower-end workstations shrank. While high-end PCs employed potent processors
like the Intel Xeon, IBM Power, AMD Opteron, or Sun UltraSPARC - a powerhouse for
computer-processing work - low-end workstations used Intel Pentium 4 or AMD Athlon
64 CPUs. These latter devices, which are also referred to as workstation class PCs, have
capabilities like:
 Error-correcting code (EEC) memory support
 Additional memory sockets for registered modules
 Multiple processor sockets for more powerful CPUs
 Multiple displays
 Reliable operating systems (OSs) with advanced features
 High-performance graphics cards

Figure 39: Workstations


MI. Mohamed Aseem Networking 79 | P a g e
2.4. Networking Software
The word "network software" is used to refer to a broad category of software that simplifies
computer network operations, design, monitoring, and deployment.
Any networking system must include network software as a basic component. It assists
network administrators and security personnel in managing, monitoring, and better
controlling network traffic as well as reducing network complexity. Network software is
essential for managing a network architecture and streamlining IT processes by enabling
sharing of information, data, and security.

Organizations can profit from network software. It has developed into a crucial instrume nt
for enabling continuous information sharing and enabling around-the-clock connectivity.
The close connection between productivity and network software is one of its most
important benefits. The centralized nature of network software boosts the overall system's
productivity. This lessens the need for technical support from end users.

Functions of network software


 Administrators can add or delete users from the network through user management.
This is especially helpful when recruiting or removing someone.
 Administrators can choose where to store data and manage user access to it through file
management.
 Users can access network resources without interruption due to access.
 Network security systems help administrators maintain security and stop data leaks.

It's crucial to remember, though, that older networks were hardware-based and included
components with integrated software, such routers and switches. SDN, or software-defined
networking, which separates software from hardware, works remarkably well to streamline
infrastructure administration and increase its adaptability to the IT industry's swiftly
changing direction. The introduction of SDN was a watershed event that fundamenta lly
altered networking.

MI. Mohamed Aseem Networking 80 | P a g e


Types of Network Software
There are many different varieties of network software available, with the majority falling
within the communications and security sector. The main features and prices of the various
types of network software vary. Here are the different types of network software:
1. Network management software
They have the main responsibility for managing, troubleshooting, and monitoring any
network performance issues that may arise throughout the entire infrastructure of devices.
Network management software is able to change and improve network performance, unlike
network monitoring software, which may only have some basic tools for troubleshooting
plugged in. Several top companies in the sector host these software programs.

2. Printer and fax software


A working organization cannot function without printers and fax machines. An
organization's network's total number of assets increases as it expands. Wi-Fi printing and
other common solutions might not always be the ideal option, especially for large
organizations or schools with multiple floors. This software has a user-friendly interface
that makes it possible to do and maintain numerous tasks.

3. Deployment and migration software


The constant updates or moving of assets that come with network management might
occasionally turn into an impossible chore. But it's not necessary to be that way.
Organizations can streamline procedures like system upgrades with the help of deployment
and migration tools. The program offers an interface that makes it simple to monitor any
deployment or data transfer between the network's hardware and databases. Additiona lly,
it ensures that all data transfers between normal backups and archives must through
required compatibility tests, greatly lowering the likelihood of data loss.

4. Asset management software


The maintenance of an effective network is one of the most difficult duties in any firm. To
do this, the network infrastructure must be more visible, and important metrics must be
continuously tracked and monitored. Software for asset management can help in this
situation. Asset management software works from a centralized server room or hub and is

MI. Mohamed Aseem Networking 81 | P a g e


not connected to any hardware, unlike the majority of its competitors. In terms of cost
savings, this is advantageous and provides users and clients with a top-notch experience.

5. Security surveillance software


The majority of network software is concerned with connecting devices and storing data.
They do not, however, include network protection. Software for security surveillance enters
an area in this situation. It links and keeps track of a network's many security measures.
Large networks are best served by specific software since it connects to various places with
ease and gives an organization reliable browser-based live and recorded video. Better-
targeted software, on the other hand, protects weak points by creating a network design that
minimizes attack surfaces and conceals components from any malevolent parties. By
creating outbound-only connections with cloud service and provider providers, this is
accomplished.

6. Patch management software


Installing updates on every device separately is a nightmare for IT staff. Furthermore, it
can be expensive and frequently time-consuming to ensure that updates are installed on
time in a network of many devices. Patch management software, as its name implies,
enables more efficient administration of updates across various networked devices through
the application of patches. This streamlines the procedure and makes it possible for each
computer to download a patch controlled by centralized software and carry out updates
automatically.

7. Data archiving software


Organizations have a lot of data that, while it may not need to be used every day, must
nonetheless be stored for a variety of reasons, including regular compliance. Data archiving
software makes it easier to manage this information and is the best way to reduce costs
while guaranteeing the security of the data. A word of caution, though: Archive software
doesn't work the same way as conventional backups. Determining that the archived data
won't need to be retrieved anytime soon is therefore always advised.

MI. Mohamed Aseem Networking 82 | P a g e


8. Network storage software
It is necessary to save data across a variety of devices and locations. With the help of
network storage software, companies can use a common interface to manage a huge number
of databases shared among users or clients. It works well as a manager of access across
various departments or important communities within an organization. This way, security
concerns are addressed while simultaneously allowing anyone with access to view or
retrieve information with just a click.

Suitable network software for Alliance Health Company


There are lots of network software in today market. As a network analyst, I suggest
ManageEngine OpManager as network software for Alliance Health Company because
it’s best for network configuration and real-time change management. Let’s look at the
software deeper.
OpManager is an excellent network management application that offers comprehens ive
visibility into switches, firewalls, LAN connectors, storage devices, routers, etc. on a
business network. You receive thorough real-time data on the performance and health of
the IP-based device. Additionally, the program allows for network management to be
simplified for IT teams by seeing the complete network.
Features of the software:
 Physical and virtual server management
 Fault management
 Network visualisation
 Distributed Network Management

Figure 40: ManageEngine OpManager Interface


MI. Mohamed Aseem Networking 83 | P a g e
3. LO3: Design efficient networked systems

3.1. Blueprint for Alliance Health

Figure 41: 1st Floor

Figure 42: 2nd Floor

MI. Mohamed Aseem Networking 84 | P a g e


Figure 43: 3rd Floor

MI. Mohamed Aseem Networking 85 | P a g e


3.2. User feedback
Designing a network architecture for Alliance Health's new branch in Matara is an
important task. Gathering user feedback on the network system will declare about the user
experiences and help to find out drawbacks in the network system. Follow is the feedback
form:

Figure 44: User feedback 1

Figure 45: User feedback 2

MI. Mohamed Aseem Networking 86 | P a g e


Figure 46: User feedback 3

Feedback Form Responses

Following are the responses gather from users for above feedback questions:

Figure 47: Responses for Question 1

MI. Mohamed Aseem Networking 87 | P a g e


Figure 48: Responses for Question 2

Figure 49: Responses for Question 3

Figure 50: Responses for Question 4

MI. Mohamed Aseem Networking 88 | P a g e


Figure 51: Responses for Question 5

MI. Mohamed Aseem Networking 89 | P a g e


3.3. Cisco Pocket Tracer Design for Alliance Health

Figure 52: Cisco Packet Tracer Design

MI. Mohamed Aseem Networking 90 | P a g e


3.4. Maintenance schedule for above network
Network maintenance is essential, but operations like designing and installing a new
network segment or introducing a new application can frequently conflict with these tasks.
The following network maintenance chores cannot be ignored by network teams,
notwithstanding the urgency of these kinds of projects.
• Data backups

• Malware protection
• Network documentation updates

• Device inventory

• Power checks
• Device filter dusting
• Cable organization
Although new types of devices and administration have been made possible by
technological advancements, network maintenance chores have always been important and
are not anticipated to alter significantly in the future.

Figure 53: Maintenance

MI. Mohamed Aseem Networking 91 | P a g e


3.4.1. Maintenance schedule
Creating a maintenance schedule for a network system is crucial to ensure its smooth
operation and security. Following is the maintenance schedule for Alliance Health.
Table 12: Maintenance Schedule

 Physical check of the equipment


Daily
 Backup all data
 Check software update
Weekly
Systems/ Servers  Fix software bugs
 Check Backup retention
6 Monthly  Restart all servers that haven't been started up
in the last six months.
 Checking the error affecting the network
Daily
systems performance
Networking
Quarterly  Check the firmware on your firewall and
switches.
 Check the threats in the system updates virus
guards.
Weekly  Endpoint security: Check the dashboard and
logs (verify licenses. Examine affected
devices)
Security Monthly  Check the firewall and server security logs.
Keep monitoring out for unauthorized access
attempts.
Quarterly  Review the firewall policies – access or NAT
policies (It could be necessary to clean up any
that are redundant)
 Check account lockouts for suspicious
Daily activity.
 Check the file servers' disk space availability.
Active Directory
 Check the membership of any sensitive or
Weekly administrative groups.
 Check the time configuration.

MI. Mohamed Aseem Networking 92 | P a g e


 Check for any inactive computer accounts or
users.
Monthly
 Review published security updates and install
them as necessary.

MI. Mohamed Aseem Networking 93 | P a g e


LO4: Implement and diagnose networked systems

4.1. Implement a networked system based on a prepared design

4.1.1. Configure VLAN & Name in all department


VLAN & Name for Colombo

Figure 54: Create VLAN for Colombo 1

Figure 55: Create VLAN for Colombo 2

MI. Mohamed Aseem Networking 94 | P a g e


VLAN & Name for Matara

Figure 56: Create VLAN for Matara 1

Figure 57: Create VLAN for Matara 2

MI. Mohamed Aseem Networking 95 | P a g e


4.1.2. VTP Server Configuration in switch
VTP Server Configuration for Colombo

Figure 58: VTP Server Configuration in Colombo Switch

Figure 59: VTP Server Configuration Result of Colombo


MI. Mohamed Aseem Switch
Networking 96 | P a g e
VTP Client Configuration for Colombo

Figure 60: VTP Client Configuration Result of 1st Floor

Figure 61: VTP Client Configuration Result of 2nd Floor

MI. Mohamed Aseem Networking 97 | P a g e


Figure 62: VTP Client Configuration Result of 3rd Floor

MI. Mohamed Aseem Networking 98 | P a g e


VTP Server Configuration for Matara

Figure 63: VTP Server Configuration in Matara Switch

Figure 64: VTP Server Configuration Result of Matara

MI. Mohamed Aseem Networking 99 | P a g e


VTP Client Configuration for Matara

Figure 65: VTP Client Configuration Result of 1st Floor

Figure 66: VTP Client Configuration Result of 2nd Floor

MI. Mohamed Aseem Networking 100 | P a g e


4.1.3. Providing all V-Lan IP address
Providing IP Address in Colombo Router

Figure 67: Provided IP Address in Colombo Router

MI. Mohamed Aseem Networking 101 | P a g e


Providing IP Address in Matara Router

Figure 68: Provided IP Address in Matara Router

MI. Mohamed Aseem Networking 102 | P a g e


4.1.4. Configure DHCP in all department

4.1.4.1. Configure DHCP in Colombo

Configure DHCP in 1st Floor Server

Figure 69: Configure DHCP in 1st Floor Server

Reception Area DHCP

Figure 70: Reception Area DHCP


MI. Mohamed Aseem Networking 103 | P a g e
Sales & Marketing Department DHCP

Figure 71: Sales & Marketing Department DHCP

Customer Service Area DHCP

Figure 72: Customer Service Area DHCP


MI. Mohamed Aseem Networking 104 | P a g e
Configure DHCP in 2nd Floor Server

Figure 73: Configure DHCP in 2nd Floor Server

Administration Department DHCP

Figure 74: Administration Department DHCP

MI. Mohamed Aseem Networking 105 | P a g e


HR Department DHCP

Figure 75: HR Department DHCP

Accounting & Finance Department DHCP

Figure 76: Accounting & Finance Department DHCP


MI. Mohamed Aseem Networking 106 | P a g e
Audit Department DHCP

Figure 77: Audit Department DHCP

Business Development Department DHCP

Figure 78: Business Development Department DHCP

MI. Mohamed Aseem Networking 107 | P a g e


Configure DHCP in 3rd Floor Server

Figure 79: Configure DHCP in 3rd Floor Server

IT Department DHPC

Figure 80: IT Department DHPC

MI. Mohamed Aseem Networking 108 | P a g e


Video Conferencing Room DHCP

Figure 81: Video Conferencing Room DHCP

MI. Mohamed Aseem Networking 109 | P a g e


4.1.4.2. Configure DHCP in Matara

Configure DHCP in 1st Floor Server

Figure 82: Configure DHCP in 1st Floor Server

Customer Services Area DHCP

Figure 83: Customer Services Area DHCP

MI. Mohamed Aseem Networking 110 | P a g e


Reception Area DHCP

Figure 84: Reception Area DHCP

MI. Mohamed Aseem Networking 111 | P a g e


Configure DHCP in 2nd Floor Server

Figure 85: Configure DHCP in 1st Floor Server

Administration Department DHCP

Figure 86: Administration Department DHCP

MI. Mohamed Aseem Networking 112 | P a g e


HR Department DHCP

Figure 87: HR Department DHCP

Accounting & Finance Department DHCP

Figure 88: Accounting & Finance Department DHCP


MI. Mohamed Aseem Networking 113 | P a g e
IT Department DHCP

Figure 89: IT Department DHCP

MI. Mohamed Aseem Networking 114 | P a g e


4.1.5. Server Creating and Providing IP Address
As an Network Administer, I choose 4 servers for providing security purpose in our
company, I create IP in FLSM methods (mail server, proxy server, web server, DNS server)
and Number of servers required for the Server room need to be decided by the Network
designer and should be assigned with 10.254.10.0/24 subnet. (Uses static IP) given my
company.

DNS Server IP Address

Figure 90: DNS Server Static IP

MI. Mohamed Aseem Networking 115 | P a g e


HTTP Server IP Address

Figure 91: HTTP Server Static IP

PROXY Server IP Address

Figure 92: PROXY Server Static IP


MI. Mohamed Aseem Networking 116 | P a g e
Web Server IP Address

Figure 93: WEB Server Static IP

MI. Mohamed Aseem Networking 117 | P a g e


4.2. Pinging Test case statement
A basic Internet program called ping (Packet Internet or Inter-Network Groper) enables
users to check whether a specific target IP address is reachable and capable of receiving
requests in computer network administration. The acronym was created to match with a
term used by submariners to describe the sound of a sonar pulse that has returned (Zola,
2021).

In order to confirm that the host machine the user is attempting to connect is up and running,
Ping is also utilized diagnostically. Ping can be used on any operating system (OS) that has
networking capabilities, including the majority of embedded network administra tio n
program.

4.2.1. Pinging statement for Alliance Health


 Connecting Pc to Pc in Reception Area in Colombo

Figure 94: Successful Ping in Reception Area

MI. Mohamed Aseem Networking 118 | P a g e


 Connecting Pc to Pc in Customer Service Area in Colombo

Figure 95: Successful Ping in Customer Service Area

 Connecting Pc to Pc in Accounting & Finance Department in Matara

Figure 96: Successful Ping in Accounting & Finance Department


MI. Mohamed Aseem Networking 119 | P a g e
 Connecting Pc to Pc in Administration Department in Matara

Figure 97: Successful Ping in Administration Department

MI. Mohamed Aseem Networking 120 | P a g e


4.2.2. Extend Ping
Connecting Sales & Marketing Department’s PC to Administration Department’s PC in
Colombo:

Figure 98: Successful Extend Ping - 1

MI. Mohamed Aseem Networking 121 | P a g e


Connecting Customer Services Area’s PC to HR Department’s PC in Matara:

Figure 99: Successful Extend Ping - 2

MI. Mohamed Aseem Networking 122 | P a g e


4.2.3. Traceroute
Traceroute is a network demonstration tool that tracks the path travelled by a packet on an
IP network from source to destination. Traceroute also keeps track of the time it takes for
each bounce the packet makes on its way to its destination. Alliance Health Ping Statement.

Traceroute of Colombo Router to Reception Area PC

Figure 100: Successful Traceroute Result 01

Traceroute of Matara Router to HR Department PC

Figure 101: Successful Traceroute Result 02

MI. Mohamed Aseem Networking 123 | P a g e


4.2.4. Telnet
Teletype Network is referred to as TELNET. One computer can connect to the local
computer using this kind of communication. It is utilized as a common TCP/IP protocol for
ISO's virtual terminal service. The local computer is the one that establishes the connection.

The remote computer is the one that is being connected to, or that accepts the connection.

The local computer will display whatever that is happening on the distant computer when
using telnet. The client/server model underlies Telnet's operation. A telnet client program
is used on the local computer, while a telnet server program is used on the distant
computers. (GeeksforGeeks, 2023)

Figure 102: Telnet

MI. Mohamed Aseem Networking 124 | P a g e


4.2.5. SSH
SSH is a network protocol that allows users, especially system administrators, to securely
access a computer across an unprotected network. It is often referred to as Secure Shell or
Secure Socket Shell.

A collection of tools that carry out the SSH protocol is also referred to as SSH. Strong
password and public key authentication, along with encrypted data transmissions between
two computers connected via an open network, like the internet, are all made possible by
Secure Shell. (Loshin, 2021)

Figure 103: SSH

MI. Mohamed Aseem Networking 125 | P a g e


4.3. Future enhancements for the networked system and justify
your recommendation.
In anticipation of future advancements and the continued growth of the networked system
at Alliance Health, the following recommendations have been formulated to ensure
scalability, security, and efficiency:
 Improving Cloud Storage
As data continues to grow exponentially with the expansion of Alliance Health's business,
adopting cloud storage solutions is essential. Cloud providers offer unlimited storage,
eliminating the need to delete existing files to accommodate new data. This approach not
only ensures efficient storage management but also provides data recovery options in case
of server or hardware failures.

 Virus Protection
In response to the ongoing threat of computer viruses, implementing a comprehens ive
security approach is crucial. This includes controlling access to unwanted sites, disabling
USB plugins on servers, and employing measures to prevent viral infections. Proactive
virus protection measures will safeguard Alliance Health's network integrity, ensuring
uninterrupted operations and data security.

 Network Surveillance
Given the significant reliance on technology for day-to-day operations, the deployment of
network monitoring tools is essential. Network monitoring aids in identifying and
addressing infrastructure issues promptly, enhancing overall network performance, and
increasing staff productivity. By providing a consolidated view of all network devices,
these tools contribute to maintaining the health and efficiency of the internal network.

 Using Fiber Optic Cable


Considering the business growth of Alliance Health, upgrading the network infrastruc ture
to fiber optic cable is advisable. Fiber optic cables, with their high bandwidth and capability
for long-distance data transmission, provide a reliable solution for future network demands.
This upgrade from Cat6e cable ensures improved data performance and supports the
network's evolving requirements.

MI. Mohamed Aseem Networking 126 | P a g e


 Firewall Production
Recognizing the evolving threat landscape, the introduction of a physical firewall device is
recommended to enhance network security. A firewall serves as a crucial network security
device, regulating both incoming and outgoing traffic. By implementing a physical firewa ll,
Alliance Health can establish more robust control over network access, preventing
unauthorized access and potential security breaches.

4.4. Critical Reflection to Evaluate Own Work and Justify Valid


Conclusions.
In my role as a network analyst at Alliance Health, I undertook the design and
implementation of a robust network infrastructure. This chapter has provided me with a
comprehensive understanding of network analysis, architecture, and design, including the
methodologies involved in these processes. The importance of conducting thor ough
network analysis to inform a well-defended architecture and design has been a key
takeaway from this experience.

Furthermore, I now recognize that networks are an integral component of the overall system
at Alliance Health, serving as a critical means to deliver various services. Users, programs,
and devices rely on network services that seamlessly integrate performance and
functionality to accomplish their tasks within the system. Building on this understanding, I
meticulously allocated the necessary resources, including PCs, switches, firewalls, servers,
routers, and access points, to each department within the organization as part of the network
design plan.

The culmination of this effort was the creation of a comprehensive report outlining the
deployment of the network infrastructure for Alliance Health. Through this reflection, I am
confident in concluding that the network I have designed not only meets but exceeds the
diverse needs of users across different departments. The system operates flawle ss ly,
aligning with Alliance Health's requirements and contributing to the overall efficiency of
the organization.

MI. Mohamed Aseem Networking 127 | P a g e


Conclusion
In this networking course, I got a terrific opportunity to learn about networking princip les,
protocols, networking devices, and software. I have also learned a great lot about servers
and different sorts of servers. I was aware of how to select a server for the networking
system while taking the project's budget into consideration and specifications. The most
crucial thing is to understand how switches and routers work. In this course, I've acquired.
The switch, router, and computers' networking are equally significant I also configured the
PCs, network, and switch. It offers helpful knowledge of networking, which I anticipate
becoming very important in the future. Utilizing cat5 cable the network was built using a
star topology, and the connections were.

MI. Mohamed Aseem Networking 128 | P a g e


Self-criticism
During this time, I had to put in a lot of effort to finish my assignments before the deadline.
I was worried about whether I would be able to deliver my assignment on time. As I was
working on my assignment, I wanted to keep the consistency in mind. As a result, I had to
revise the contents of the task and the page templates multiple times. Well, I gave it my all
to finish this assignment before the deadline. This assignment revealed some of my
strengths and weaknesses to me and finally fining my assessment on time.

MI. Mohamed Aseem Networking 129 | P a g e


Gant Chart

Figure 104: Gantt chart

MI. Mohamed Aseem Networking 130 | P a g e


References
Contributor, S., 2022. What is network topology? best guide to types & diagrams. [Online ]
Available at: https://www.dnsstuff.com/what- is-network-topo lo gy
[Accessed 24 November 2022].
EDUCBA, 2023. Ethernet topology: What are the advantages and disadvantages?.
[Online]
Available at: https://www.educba.com/ethernet-topolo gy/
[Accessed 22 November 2022].
Gaurav, S., 2022. IEEE standards in Computer Networks. [Online ]
Available at: https://www.scaler.com/topics/computer-network/ieee-standards- in-
computer-networks/
[Accessed 14 November 2022].
GeeksforGeeks, 2023. Introduction to telnet. [Online ]
Available at: https://www.geeksforgeeks.org/introduction-to-telnet/
GeeksforGeeks, 2023. Network devices (hub, repeater, Bridge, switch, router, gateways
and Brouter). [Online]
Available at: https://www.geeksforgeeks.org/network-devices-hub-repeater-brid ge-
switch-router- gateways/
[Accessed 29 November 2022].
GeeksforGeeks, 2023. What is bandwidth? definition, working, importance, uses.
[Online]
Available at: https://www.geeksforgeeks.org/what- is-bandwidth-definition-work ing-
importance-uses/?ref=gcse
[Accessed 25 November 2022].
Gillis, A. S., 2021. What is network topology? - definition from searchnetworking.
[Online]
Available at: https://www.techtarget.com/searchnetworking/definition/network -
topology#:~:text=What%20is%20a%20network%20topology,often%20represented%20
as%20a%20graph.
[Accessed 19 November 2022].
IBM, 2021. Token-ring networks. [Online ]
Available at: https://www.ibm.com/docs/en/i/7.1?topic=standards-token-ring-netwo rks
[Accessed 23 November 2022].

MI. Mohamed Aseem Networking 131 | P a g e


Kanade, V., 2023. Complete guide to servers, types, and features: Spiceworks. [Online ]
Available at: https://www.spiceworks.com/tech/tech-general/articles/what- is-a-ser ver /
[Accessed 03 December 2022].
Kapoor, A., 2022. Importance of Types of Networks: LAN, MAN, and WAN: Simplilearn.
[Online]
Available at: https://www.simplilearn.com/tutorials/networking-tutorial/importance- of-
types-of-networks-lan- man-wan
[Accessed 28 October 2022].
Loshin, P., 2021. What is SSH (secure shell) and how does it work? definition from
TechTarget. [Online]
Available at: https://www.techtarget.com/searchsecurity/definition/Secure-Shell
Scarpati, J., 2018. What is networking (computer)?: Definition from TechTarget. [Online ]
Available at: https://www.techtarget.com/searchnetworking/definition/network ing
[Accessed 25 October 2022].
sonalijain2110, 2022. Data Communication - definition, components, types, channels.
[Online]
Available at: https://www.geeksforgeeks.org/data-communication-definitio n-
components-types-channels/
[Accessed 25 November 2022].
Zola, A., 2021. What is a ping and how does it work?. [Online ]
Available at: https://www.techtarget.com/searchnetworking/definition/ping

MI. Mohamed Aseem Networking 132 | P a g e

You might also like