Unit 02 Networking
Unit 02 Networking
*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to b e addressed . The Assessor and
the Internal Verifier must then confirm that the action has b een undertaken and that the Assignm ent Brief is authorised
for use b efore b eing issued to learners.
Assessor signature
Date
Internal Verifier
Date
signature
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Resubmission Feedback:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place andgrades
decisions have been agreed at the assessment board.
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Assessor Date
signature
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous
page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the
before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then
be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.
Submission format
The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although
you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
Scenario
Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the
US healthcare industry where its global delivery center is located in Colombo. The company is
planning to expand their business operations with their latest branch at Matara and wants it to be
one of the state-of-the-art companies in Matara with the latest facilities .
Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
Reception area
Sales & Marketing Department (10 employees)
Customer Services Area – with Wi-Fi facilities
Floor 2:
Administration Department (30 Employees)
HR Department (20 employees)
Accounting & Finance Department (15 employees)
Audit Department (5 employees)
Business Development Department (5 employees)
Floor 3
Video conferencing room
IT Department (60 employees)
The Server Room
Floor 2:
Administration Department (10 Employees)
HR Department (7 employees)
Accounting & Finance Department (8 employees)
IT Department (50 employees)
The conferencing room of the head office and Customer Services Areas of e ach
branch are to be equipped with Wi -Fi connections.
Connectivity between two branches (He ad Offi ce and Matara) woul d al l ow the
i ntra branch conne cti vi ty be twe e n de partme nts. (Use of VPN i s not compul sory)
(N ot e: Clear ly st at e your assumpt ion s . You ar e allow ed t o design t he net w or k accor ding t o your
assumpt ion s , but main r equir eme nt s should not be violat ed)
Di scuss the i mportance and i mpact of ne twork topol ogi e s and asse ss the mai n
ne twork protocol sui te s that are use d i n ne twork de si gn usi ng e xampl e s.
Re comme nd sui tabl e ne twork topol ogy and ne twork protocol s for above sce nari o
and e val uate wi th val i d poi nts how the re comme nde d topol ogy de monstrate s the
e ffi ci e nt uti l i zati on of the ne tworki ng syste m of Matara branch.
Activity 02
Di scuss the ope rati ng pri nci pl e s of ne twork de vi ce s (Ex: Route r, Swi tch, Etc.) and
se rve r type s that can be use d for above sce nari o whi l e e xpl ori ng di ffe re nt se rve rs
that are avai l abl e i n today’s marke t wi th the i r spe ci fi cati ons . Re comme nd
se rve r/se rve rs for the above sce nari o and justi fy your se l e cti on wi th val i d poi nts .
Di scuss the i nte r-de pe nde nce of workstati on hardware and ne tworki ng software
and provi de e xampl e s for ne tworki ng software that can be use d i n above ne twork
de si gn.
Activity 03
Pre pare a wri tte n ne twork de si gn pl an to me e t the above -me nti one d use r
re qui re me nts i ncl udi ng a bl ue pri nt drawn us i ng a mode l i ng tool ( Ex: Mi crosoft Vi si o,
EdrawMax) .Te st and e val uate the propose d de si gn by anal yzi ng use r fe e dback wi th
the ai m of opti mi zi ng your de si gn and i mprovi ng e ffi ci e ncy.
Instal l and confi gure Ne twork se rvi ce s , de vi ce s and appl i cati ons (Ex: VLAN,Wi Fi ,
DNS,Proxy, We b, Etc.) accordi ng to the propose d de si gn to accompl i sh the use r
re qui re me nts and de si gn a de tai l e d Mai nte nance sche dul e for above Ne twork.
Activity 04
Impl e me nt a ne tworke d syste m bas e d on your pre pare d de si gn wi th val i d
e vi de nce s.
De ve l op te st case s and conduct ve ri fi cati on (Ex: Pi ng, e xte nde d pi ng, trace route ,
te l ne t, SSH, e tc.) to te st the above Ne twork and anal yse the te st re sul ts agai nst
the e xpe cte d re sul ts. Re comme nd pote nti al future e nhance me nts for the
ne tworke d syste m wi th val i d justi fi cati ons and cri ti cal l y re fl e ct on the
i mpl e me nte d ne twork, i ncl udi ng the pl an, de si g n, confi gurati ons, te sts and the
de ci si ons made to e nhance the syste m.
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols
enable the effectiveness of networked systems.
P3
LO 1 & LO2
P5
Design a networked system to meet a given specification.
P6
M3
Analyse user feedback on your designs with the aim of
optimising your design and improving efficiency.
D2
Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
LO4 : Implement and diagnose networked systems
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
ASSIGNMENT- 02
UNIT 02 NETWORKING
Unit - 02 Networking
4.3. Future enhancements for the networked system and justify your recommendation. 126
4.4. Critical Reflection to Evaluate Own Work and Justify Valid Conclusions. ............. 127
Conclusion........................................................................................................................ 128
1.0. Introduction
Networking is becoming a crucial element of modern communication in the world we live
in. Communication and information exchange are essential for success in today's digita l
environment, whether it is between computers, gadgets, or even people. This assignme nt
covers the principles of networking, including how networks are created, implemented, and
managed, through the completion of this assignment. In the networking sector, there are
numerous network kinds, but the most popular ones are Local Area Networks (LANs) and
Wide Area Networks (WAN), as well as the protocols and technologies that make it
possible to communicate over these networks.
These are the devices that are crucial for transferring data across many types of technology,
including wires and radio waves. This assignment will cover how to set up and troubleshoot
network equipment, including routers, switches, and firewalls, through the course of this
project.
Using computer networking, it is possible to link devices and endpoints to one another on
a local area network (LAN) or to a larger network, like the internet or a private wide area
network (WAN). To exchange resources, use or supply services, and communicate, this is
a crucial role for service providers, enterprises, and customers all over the world.
Communication is made possible by computer networks for all commercial, leisure, and
research purposes. Computer networks are responsible for the existence of the internet,
email, audio and video sharing, online shopping, live streaming, and social networks.
Figure 2: LAN
Figure 3: MAN
Figure 4: WAN
Peer-to-Peer
Peer-to-peer networks allow two or more computers to directly share files and resources
without the use of a server. Different nodes that function equally well in a network make
up a peer-to-peer network. Every nodes share the same amount of work. The computer in
this case is referred to as a node. To share resources like hard drives and printers, etc., all
of these nodes communicate with one another.
Users can manage a variety of operations using peer-to-peer applications.
Advantages of Peer-to-Peer:
Network operating system not required
Does not require a costly server because access to the files is made via individ ua l
workstations.
Due to the fact that each user controls whatever files they are willing to share with others,
there is no need for specialized staff like network specialists.
Disadvantages of Peer-to-Peer:
The user experience may be slowed down because each machine may be being accessed
by other people.
The duty for preventing the introduction of viruses to the network rests with each
individual user.
The backup of files and folders cannot be done centrally.
Client-Server
A client-server network is a type of internet network where one main computer serves as a
server and controls multiple other computers known as clients. By connecting to the server,
clients can access shared files and data stored on the serving machine. In addition, client-
server networks are conceptually comparable to peer-to-peer networks with the exception
that only the server may start a transaction.
Advantages of Client-Server:
All documents are kept in one location.
Centralized control is used for network peripherals.
Network security and backups are managed centrally.
Disadvantages of Client-Server:
It is necessary to use a specialized network operating system.
Cost of purchasing the server is high.
Network managers and other specialists are required.
Figure 6: Client-Server
Additionally, LAN connections make it simple to share resources, as well as make it easy
for users to send and receive messages and data.
Data of the users are located at the centralized server. So any workstation in Matara Branch
network can access the information from server additionally, people can log into their
individual accounts to see their own set of data.
In Matara Branch every devices should connect with internet. LAN has the capability to
share internet connection among all the LAN users. All of the connected computers share
the internet connection from a single PC. So LAN is the suitable network type for Matara
Branch.
Future-wise, I'd like to use MAN Connection to link the branches Matara and Colombo.
Standards Organizations
The following are a few well-known standards organizations:
a. American National Standards Institute (ANSI)
A US-based institution called the American National Standards Institute (or ANSI) is in
charge of the nation's standards and evaluation procedures. The computer and technology
industries are governed by these standards. The primary organization in charge of
organizing and disseminating data on standards in the networking and technology sector in
the United States is ANSI.
The American Standard Code for Information Interchange (ASCII) is one of the most
widely used and established standards they have created. This standard is in charge of the
codes used in computers, telecommunications equipment, and other digital devices to
represent text. You are taking advantage of the standards that control the text shown on
your screen by reading this content.
Figure 7: ANSI
Figure 8: ISO
Computer networks use a variety of IEEE standards. Here are some of them:
IEEE 802:
The physical and data link layer requirements for technologies like Ethernet and wireless
are covered by the IEEE 802 collection of networking standards. Local area networks
(LANs) and metropolitan area networks (MANs) are covered by these specifications. By
encouraging vendors to adhere to standards, IEEE 802 also helps to ensure interoperability
across different providers.
The way networks are set up and the relative locations of traffic flows are described by
network topologies. The ideal locations for each node and the best route for traffic flow can
be found using network topology diagrams by administrators. An organization may more
readily identify problems and resolve them, increasing the effectiveness of data transport,
with a clearly defined and well-planned network topology.
Physical topology and logical topology are two components of network geometry. In
network topology diagrams, devices are represented as network nodes, and the connections
between them are shown as lines. According to how the network must be set up, the type
of topology varies.
It is highly likely that two computers will collide if they broadcast at the same moment.
The transmitting computer simply pauses for a long period of time before retransmitting
the signal. Hence, a variety of approaches are offered in the LAN industry, with Ethernet
being the most widely used.
Virtual LAN
Ethernet, which operates on shared media, is used by LAN. In Ethernet, shared media only
creates one broadcast domain and one collision domain. When switches were added to
Ethernet, the problem with a single collision domain has been resolved, and each device
attached to a switch now operates in a separate collision domain. Even switches, however,
are unable to separate a network into distinct broadcast domains.
To divide a single broadcast domain into many broadcast domains, use a virtual local area
network (LAN). There is no communication between hosts in different VLANs. Every host
joins the same VLAN by default.
Token Ring
Token-ring networks are LAN topologies that use tokens to transfer data in one direction
to a predetermined number of destinations. The token serves as a representation of authority
for managing the transmission line. When the token reaches a sending station in the network
(ring), it enables that station to send data (IBM, 2021).
2. Mesh Topology
A point-to-point network with interconnected nodes that is complex and sophisticated in
design is called a mesh topology. Whole or partial mesh networks are both possible.
Routing and flooding are two alternative ways to transmit data that can be done using the
mesh topologies' web-like structure.
3. Star Topology
The most typical network structure, called a star topology, is set up so that every node is
directly connected to one main hub through coaxial, twisted-pair, or fibre-optic cable. A
hub is a central device that connects all of the network's devices together. When a device
1. Physical Layer:
The first layer that physically joins two compatible systems is called the physical layer. It
manages duplex or simplex modem transmissions and bit-wise data transfers. It also
manages the hardware, such as the wiring, cable terminators, topography, and voltage
levels that links the network interface card (NIC) to the network.
Physical Layer Protocol: Ethernet
Ethernet
Since Ethernet Protocol is the most widely used and oldest LAN technology, it is more
usually utilized in LAN environments, which are found in practically all networks,
including those in offices, residences, public spaces, businesses, and institutions. Due to its
maximum rates across greater distances using optical media, Ethernet has become
extremely popular.
The basis of the IEEE 802.3 standard, the star topology or linear bus, is used by the Ethernet
protocol. Ethernet is extensively used because it is easy to use, maintain, and deploy, offers
flexibility, and enables less expensive network implementation.
Advantages of Ethernet:
o Maintenance and administration are simple.
o The cable wont to connect systems in ethernet is strong to noise.
Advantages of PPP:
o It establishes the frame format used during transmission.
o It outlines the data exchange procedure, including the rate at which data will be sent.
o The encapsulation is the PPP protocol's key component. It specifies how information in
the payload and network layer is contained in the data link frame.
Disadvantages of PPP:
o It does not support flow control mechanism.
o It has a very simple error control mechanism.
Advantages of STP:
o Easy to implement and maintain
o Wide support for bridges and switches
o Proven technology
Disadvantage of STP:
o As data centres use more virtualization technologies, STP might not be able to handle
the increased input/output demands
3. Network Layer:
Information flow control, switching, and routing between workstations are all concerns of
the network layer. Additionally, it separates transport layer datagrams into smaller, error-
free datagrams.
Network Layer Protocols: IP, IGMP
IP (Internet Protocol)(IPv4):
A network layer protocol known as Internet Protocol Version 4 is used to transport packets
through a network and address and control information. IP and TCP function in conjunctio n
to move data packets over a network. A 32-bit IP address that includes the network and
host ID is assigned to each host. A network administrator assigns the host number, which
identifies a host on the network; the internet assigns the network number, which identifies
a network. TCP, a transport layer protocol, assists in rearranging the packets so that the IP
is only in charge of delivering them.
Disadvantages of IPv4:
o Each network has a distinct IP address, and IP uses network layer addresses to identify
end-points on networks.
o We require IP addresses of the next class if there are numerous hosts.
Advantages of IGMP:
o Due to the connectivity of all shared links, bandwidth is completely used.
o A multicast group can be left and another joined by the hosts.
Disadvantages of IGMP:
o It does not offer strong security and filtering efficiency.
o Congestion on the network can happen if TCP isn't present.
4. Transport Layer:
The transport layer divides data into data frames and sends services from the network layer
to the application layer. This allows for network segment-level fault checking.
Additionally, this prevents a fast host from overtaking a slower host on a network. In
essence, the transport layer makes sure that the message is delivered in its whole.
Additionally, it verifies a successful data transmission and retransmits the data in the event
that an error is found.
Transport Layer Protocols: UDP, TCP
Advantages of UDP:
o It is a suitable protocol for multicasting as UDP supports packet switching
o UDP produces a minimal number of overheads for data transmission
o UDP is the simplest transport layer protocol
o UDP protocol uses packets of smaller size
o For error detection, the UDP protocol use checksum
Disadvantages of UDP:
o UDP is a unreliable protocol.
o UDP protocol does not provide congestion control service.
o Flow control is also not provided by UDP protocol.
o It does not guarantee the order of data received as there is no concept of windowing in
UDP.
5. Session Layer:
When two workstations need to connect in order to interact, the session layer creates that
connection. This layer is in charge of connection formation, session administration, and
authentication in addition to security.
Session Layer Protocol: RTCP
RTCP is a protocol that gives an RTP (Real-time Transport Protocol) session out-of-band
statistics and control data. The main purpose of RTCP is to offer feedback on the quality
of service (QoS) in media distribution by periodically transmitting statistical data to the
users of the streaming multimedia session, such as transmitted octet and packet counts or
packet loss.
6. Presentation Layer:
The data is retrieved from the application layer and formatted for network transmission at
the presentation layer, which is also known as the translation layer. It deals with the right
representation of data, including the information's syntax and semantics. Along with
ensuring file- level security, the presentation layer is also in charge of translating data to
network standards.
Presentation Layer Protocol: AFP, NCP
AFP (Apple Filing Protocol):
Apple Filing Protocol is referred to as AFP. It is a Mac OS network protocol used to transfer
files between clients and servers. Users are able to access files that are located on systems
outside of their own. It is a protocol for the application and session layers.
Advantages of AFP:
o By implementing advanced file locking methods, it provides security protections to the
system that restrict users' access to potentially dangerous data.
Disadvantages of AFP:
o Apple File System (APFS)-formatted storage devices cannot be used with it.
o It’s read and write sequential speeds are slower than those of the Server Message Block
(SMB) protocol.
7. Application Layer:
The user application requests are forwarded to lower levels by the application layer, which
is the top layer of the network. At this layer, popular applications like remote login, data
entry, email, file transfer and others operate.
Application Layer Protocols: FTP, DHCP, DNS, SMTP
FTP (File Transfer Protocol):
The application layer protocol known as File Transfer Protocol (FTP) is used to transfer
files between local and remote file systems. Like HTTP, it operates on top of TCP. FTP
uses two TCP connections—a control connection and a data connection— in
simultaneously to transfer files.
Advantages of FTP:
o Speed is one of the advantages of FTP (File Transfer Protocol).
o File sharing also comes in the category of advantages of FTP in this between two
machines files can be shared on the network.
o Efficiency is more in FTP.
Advantages of DHCP:
o Centralized management of IP addresses.
o The DHCP protocol gives the network administrator a method to configure the network
from a centralized area.
o Simple reconfiguration of the IP address space on the DHCP server without needing to
reconfigure each client.
o Reuse of IP addresses reduces the total number of IP addresses that are required.
Disadvantages of DHCP:
o IP conflict can occur.
o The client is not able to access the network in absence of a DHCP Server.
o The name of the machine will not be changed in a case when a new IP Address is
assigned.
Disadvantages of DNS:
o Hackers and spammers can hack DNS Servers. It has been observed that DNS servers
are attacked numerous times.
o They are difficult to manage because if a problem or defect appears in the system, we
must seek professional assistance, which occasionally comes at a higher expense.
o The issues that are hard to troubleshoot and diagnose, are related to DNS.
o Any application's or website's IP address is vulnerable to manipulation and compromis e
by unauthorized users. That could lead to misuse and infringement of data and
information.
Advantages of SMTP:
o If necessary, the users can have a dedicated server.
o It allows for bulk mailing.
o Low cost and wide coverage area.
o Offer choices for email tracking.
Disadvantages of SMTP:
o SMTP’s common port can be blocked by several firewalls.
Conclusion
I recommended Ethernet protocol for Matara Branch as a network analyst. Ethernet is a
widely-used network protocol for connecting devices within a local area network (LAN).
Using Ethernet as a communication protocol has many advantages. Here are three main
factors that led me to suggest this protocol.
Flexibility
Ethernet nowadays supports several topologies via various media. With the appropriate
cost, this flexibility helps to complement plant topology. It can be beneficial to have
distributed devices from a single area of the plant when constructing the topology. By using
star topology, it is possible to safeguard network devices that contain sensitive data and
prevent "man in the middle" attacks, which target the connection between network
endpoints.
Reliability
High-speed data transfer with minimal error rates is made possible by the reliable Ethernet
protocol. Also Ethernet uses a cyclic redundancy check (CRC) algorithm to detect errors
in data transmission. Ethernet can either transmit the data or request the sender to do so if
an error is found. By doing this, data transmission accuracy and completeness are
guaranteed.
Openness
My view of Ethernet openness is the capacity to mix several application protocols on the
same medium. These many application protocols offer various services to better meet the
operational requirements of a firm.
Other requirements during operations include those for IT connection, time
synchronization, and diagnostics. Businesses are able to use current standards like web-
Overall, Ethernet is the best and suitable protocol for Matara branch and these flexibility,
reliability and openness make it a strong contender for the Matara branch's networking
system.
1. Message:
A message is a piece of data that needs to be sent from one person to another. Any type of
file could be used—text, audio, video, etc.
2. Sender:
It is just a device that transmits data messages. It could be a laptop, desktop, tablet,
smartphone, computer, video camera, workstation, etc.
3. Receiver:
It is a message-receiving device. It could be a workstation, a mobile phone, a computer,
etc.
4. Transmission Medium:
The medium that connects two or more workstations is called a communication channel.
Workstations can connect to each other wirelessly or over wired networks.
Type of Connections
Between two endpoints, there are different types of communication connections such as:
1. Point-to-Point Connection
2. Multipoint Connection
Point-to-Point Connection
A point-to-point connection is a straight line that connects two devices, like a computer and
a printer. The gadgets are connected via a dedicated link. The transmission between those
two devices uses the entire link's capacity.
Communication Channels
The medium used to connect two or more workstations is called a communication channel.
Workstations can connect to each other wirelessly or over wired networks. A transmiss io n
medium is another name for it. A link that transmits messages between two or more devices
is known as a transmission medium or channel. The communication media can be divided
into two categories:
Guided media transmission
Unguided media transmission
Guided media transmission
With this transmission method, the physical connection is made between two or more
computers or devices via wires or cables, and the data is then delivered as signals across
these lines. Transmission using guided media of the following kinds:
1. Twisted pair cable:
Two identical wires are wound together in a double helix inside twisted-pair cables. The
wire is twisted to lessen crosstalk. The wire is shielded by the twisting from both interna l
crosstalk and external signal interference.
2. Radio wave:
Radio waves transmission is the process of communicating through radio frequencies. It
allows for movement. The transmitter and receiver make up this device. Both transmit and
receive the radio signal via antennas.
1.7. Bandwidth
The greatest speed at which data may be transmitted across a network connection, whether
wired or wireless, is referred to as network bandwidth. The amount of bits, kilobits,
megabits, or gigabits that may be transferred in a second is the standard definition of
bandwidth. The phrases bandwidth and capacity are interchangeable when referring to the
speed at which data is transmitted. The idea that bandwidth serves as a gauge for network
speed is a prevalent one (GeeksforGeeks, 2023).
Importance of bandwidth
In terms of bandwidth, physics and technology have limits.
Bandwidth is not free
The amount of bandwidth required is increasing quickly.
Bandwidth is critical to network performance
Advantages of Bandwidth:
When it comes to figuring out the speed and quality of an internet or internet connection,
bandwidth is a crucial component. In general, your internet will be speedier and more
effective the higher the bandwidth.
While creating networks, these guidelines assist designers in giving consumers this
experience. Keep in mind that they are just concepts and not a rigid set of guidelines.
Designers are free to stray from them when there is a solid reason.
When we talk about users, we're talking about government end-users, or people who use a
service instead of buying or providing it. The setting for these ideas is shown in the diagram
below.
Principle 2: Use services to protect your data, don’t rely on the network
Understand the threat:
Know:
Who controls your networks?
Who has access to your data and in what organizations and jurisdictions?
Who you are allowing access to your network?
Whether your data in transit security is sufficient?
Understanding how separation is performed in any multi-tenanted cloud services you may
use is analogous to this approach. Establish a detailed security plan. Threats should serve
as direct input for security and controls, which should be created to complement your
overall risk management strategy.
While the options offered by contemporary security technologies are numerous, they
shouldn't be enabled randomly. Controls may hinder performance and lead to unneeded
bottlenecks. Each option should have a distinct purpose for being enabled or disabled.
To address and route data packets within a network, protocols offer techniques. They give
each gadget a distinct address, enabling accurate identification and targeting of certain
locations. Routing protocols choose the most efficient routes for data to take through the
Communication Efficiency
Protocols outline effective ways to send and receive data over a network. They outline
packet architectures, data encoding strategies, and error-correction methods. Protocols
reduce latency, optimize the utilization of network resources, and eliminate data overhead
by enhancing the communication process.
To protect the integrity of data while it is being transmitted, protocols include systems for
error detection and correction. They include acknowledgment systems, cyclic redundancy
checks (CRC), and checksums to find and fix transmission mistakes. The correctness and
dependability of transmitted data are maintained via protocols, which look for mistakes and
retransmit damaged or lost packets.
Standardization
In order to control and prioritize network traffic according to particular needs, protocols
permit the installation of QoS methods. To maintain optimum performance and adhere to
To control the data flow between sender and recipient, protocols use flow control methods.
They make ensuring that data is transmitted at a rate that the receiving device can manage,
reducing network congestion and overflow. Protocols improve network speed and avoid
packet loss or degradation by controlling the flow of data.
Within networked systems, protocols lay the groundwork for efficient communication and
data sharing. Protocols provide for the efficient functioning and efficacy of networked
systems by defining standardized procedures, maximizing efficiency, guaranteeing data
integrity, regulating resource allocation on the network, and strengthening security.
This prevents data packets from getting lost in the network and guarantees that they arrive
at their intended destination.
2. Hubs
A hub functions much like a multi-port repeater. A hub joins several wires that come from
several branches, like the connector in a star topology that joins various stations. Data
packets are delivered to all connected devices since hubs are unable to filter data. In other
words, all hosts connected by Hub continue to share a single collision domain.
Additionally, they lack the intelligence to choose the best route for data packets, which
results in waste and inefficiency.
Passive Hub:
These hubs are responsible for collecting electricity from the active hub and wiring from
nodes. These hubs cannot be utilized to increase the distance between nodes because they
just transport signals onto the network without boosting or cleaning them.
Intelligent Hub:
It features remote management tools and functions as an active hub. They also provide
network devices adjustable data rates. An administrator can also use it to setup each port in
the hub and watch the traffic flowing through it.
3. Switch
A switch is a multiport bridge with a buffer and a design that can increase its performance
and efficiency (more ports mean less traffic). A data link layer device is a switch. The
switch may carry out error checking before forwarding data, which makes it incredib ly
efficient because it only forwards good packets to the right port and does not transmit
packets with mistakes. In other words, while the switch separates the hosts' collis io n
domain, the broadcast domain is left unchanged.
The ability to create virtual circuits makes switches more efficient for networks than hubs
or routers. Switches also increase network security since it is more challenging to employ
network monitors to inspect virtual circuits. Switches are vulnerable to distributed denial
Types of Switch:
Layer 2 switches
Layer 3 switches
Rack-mounted switches
Managed switches
Unmanaged switches
Smart switches
Gigabit switches
PoE switches
4. Repeater
At the physical layer, a repeater operates. In order to expand the length to which the signal
can be broadcast over the same network, it must regenerate the signal over the same
network before it gets too weak or contaminated. It's vital to remember that repeaters
regenerate the signal in addition to amplifying it. When the signal deteriorates, they
incrementally copy it and restore it at the star topology connectors connected in accordance
with the initial strength. It is a two-port gadget.
6. Gateway
A gateway connects two networks that might use several networking models, as its name
suggests. They serve as messengers, transferring data from one system to another once it
has been analysed. Protocol converters are another name for gateways, which can work at
any network layer. In general, gateways are more complicated than switches or routers.
Another name for a gateway is a protocol converter. (GeeksforGeeks, 2023)
A server can be made up of computer hardware, software, or even virtual machines with
the necessary software capabilities. However, a server's capabilities go beyond those of a
regular computer. In addition to hosting websites with lots of material, managing multip le
user queries every second, and putting up a shared drive for network devices, they manage
complicated server functions like database transaction management, which demands a lot
of processing power.
The client-server concept is used by servers to respond to user requests. Here, the in-
network devices that make use of the resources the host device provides are referred to as
clients, while the host device that powers network devices is referred to as host-server.
The web browser contacts the DNS server with a domain name request in step one. The
DNS server then determines which IP address belongs to the requested domain. The
browser sends the user request to the target server after getting the IP address. In response
to the user query, the server then gathers the website data and the dynamic components
required to show the website on the user side and delivers them back to the user.
2. Mail server
Clients can store and manage their emails more easily with the help of a mail server. It
sends and receives emails using several protocols. The Simple Mail Transfer Protocol
(SMTP), for instance, is used to transmit emails. The Post Office Protocol (POP3) is used
by the server to store and receive emails.
3. Application server
Regardless of their functionality, web-based programs can be developed, processed, and
run using an environment provided by an application server. The server executes the
software required to run PHP, Java, or.Net applications.
Due to their propensity to employ the HTTP protocol and respond to client requests,
application servers resemble web servers. But these servers concentrate on building
dynamic webpages that make use of things like message services and object pooling.
Some application servers come equipped with a web server component, allowing them to
operate as a web server when necessary.
4. Database server
Database servers provide client computers with database services. Users can use a query,
such as a SQL query, to access, edit, store, and retrieve data from a database. Security and
disaster recovery for database management systems (DBMS) are handled by database
5. DNS server
DNS servers are domain name servers. These systems resolve network-based server names.
As they convert navigable URLs into their corresponding IP addresses, DNS servers play
a crucial role in the functioning of the internet.
6. Proxy server
A proxy server serves as a bridge between regional networks and global networks. It
accepts queries from one network and forwards them using its own IP address to create a
communication link between interacting networks. These servers store frequently visited
web pages in a cache, which aids in quicker loading when viewed later. The network's
bandwidth is drastically decreased as a result.
Proxy servers are also essential for network load balancing because they filter network
traffic and are constantly accessible. These servers additionally maintain client anonymity
because a proxy is used in place of the client's actual IP address.
7. DHCP server
Computer systems that assign IP addresses to clients on a dynamic basis are referred to as
DHCP servers. This automated method has the advantage of minimizing problems that
manual management can introduce, such as typos or IP conflicts.
8. File server
A machine that offers shareable disks that may be accessed by the workstations on a
network is referred to as a file server. The disk stores computer files like text, image,
graphic, audio, and video files, among others. File servers are frequently employed for
Depending on the computing environment, file servers access files using a variety of
protocols. For instance, file servers on the internet can be accessed using the FTP and HTTP
protocols, whereas file servers on a local area network (LAN), such those found in
workplaces and classrooms, can be accessed using the SMB or NFS protocol.
9. Gaming server
Global online gaming communities are linked by gaming servers. Games with multipla yer
modes, including Counter-Strike and Minecraft, are supported. These servers also
coordinate player activities in the virtual world and maintain player and game data. Popular
game server hosting services like ScalaCube, HostHavoc, and Cloudzy let users rent game
servers for titles like ARK, Rust, and others.
Multiple servers can be stacked one on top of the other in a single rack to consolidate
network resources and reduce the amount of floor space needed. Additionally, the rack
Blade Servers
Blade servers' modular construction enables them to cram more servers into a smaller space
while also providing scalability. They are often slimmer and include certain built- in
components, including as CPUs, integrated network controllers, memory, and occasionally
storage devices. The significant function of managing several blade servers simultaneo us ly
is performed by the massive server chassis, installed in a server rack. Power is provided, as
Blade servers can run more effectively and with fewer internal components because to its
architecture. Users can run the blade servers singly or in a cluster. With blade servers, you
may achieve high availability and perform updates or maintenance without taking the
server offline. High CPU densities are also scalable, but those configurations require
stronger thermal and electrical demands.
A tower server uses any part that would be found in a typical desktop computer. The
primary distinction is how much advanced the computational resources are. The majority
of a tower server's components, particularly the CPU, memory, and video card, are typically
from the most recent generation. High-volume traffic must also be supported by the
network card. To conduct routing and other network functions, some tower servers include
two network cards.
Although it is constructed differently, a tower server functions the same as any other server.
A tower server's operation relies on what it is used for. One tower server with a huge storage
capacity can connect to the network and be used as a file server.
Tower Server:
Brand: Dell
Model: PowerEdge T440
Price: $ 1,859.00 (In Sri Lankan Rupees 557,700/=)
Power Supply: Single, Hot-plug Power Supply, 495W
Rack Server:
Brand: Dell
Model: PowerEdge R6515
Price: $2,499.00 (In Sri Lankan Rupees 744,700/=)
Power Supply: Single, Hot-plug Power Supply (1+0), 550W
Blade Server:
Brand: Dell
Model: PowerEdge MX740c Compute Sled
Price: $5,152.69 (In Sri Lankan Rupees 1,535,500/=)
HPE ProLiant
Model HPE ProLiant ML110 G10 Tower
CPU: Intel Xeon Scalable
RAM: 16GB (up to 64GB)
Specification Storage: Up to 40TB HDD
Connectivity: 8 x USB 3.0, serial, video, 2 x DisplayPort, audio,
Gigabit Ethernet
Advantage Perfect balance of value and performance
$1225 + Hard Drive + additional RAM cost
Cost
Sri Lankan Rupees: 282,000/=
Estimated to be $20/month for 290W @ 10 cents per KW/h +
Operating Expenses
hardware maintenance
Dell
Model Dell PowerEdge T30
CPU: Intel Xeon E3-1225 v5
Graphics: Intel HD Graphics P530
RAM: 4GB (up to 64GB)
Specification
Storage: Up to six SATA HDD
Connectivity: 10 x USB ports, HDMI, DisplayPort, VGA, serial,
PS2, Gigabit Ethernet
Advantage Very affordable, entry level server
$430 + hard drive + RAM costs
Cost
Sri Lankan Rupees: 129,000/=
Estimated to be $22/month for 290W @ 10 cents per KW/h +
Operating Expenses
hardware maintenance
Dell
Model Dell PowerEdge T630 5U Tower Server
CPU: 1 x Intel Xeon E5-2620 v4 Octa-core (8 Core) 2.10 GHz
RAM: 16GB
Specification Storage: 1TB 3.5 inch 7.2K RPM, 6Gbps SATA Hot Plug Hard
Drive (Support Up to 32TB HDD)
Fujitsu
Model Fujitsu Primergy TX1310 M1
CPU: Intel Xeon E3-1226 v3
RAM: 16GB
Eventually, workstation features were included into common PCs, which led to the market
segment for workstations declining. Additionally, the price difference between higher - end
PCs and lower-end workstations shrank. While high-end PCs employed potent processors
like the Intel Xeon, IBM Power, AMD Opteron, or Sun UltraSPARC - a powerhouse for
computer-processing work - low-end workstations used Intel Pentium 4 or AMD Athlon
64 CPUs. These latter devices, which are also referred to as workstation class PCs, have
capabilities like:
Error-correcting code (EEC) memory support
Additional memory sockets for registered modules
Multiple processor sockets for more powerful CPUs
Multiple displays
Reliable operating systems (OSs) with advanced features
High-performance graphics cards
Organizations can profit from network software. It has developed into a crucial instrume nt
for enabling continuous information sharing and enabling around-the-clock connectivity.
The close connection between productivity and network software is one of its most
important benefits. The centralized nature of network software boosts the overall system's
productivity. This lessens the need for technical support from end users.
It's crucial to remember, though, that older networks were hardware-based and included
components with integrated software, such routers and switches. SDN, or software-defined
networking, which separates software from hardware, works remarkably well to streamline
infrastructure administration and increase its adaptability to the IT industry's swiftly
changing direction. The introduction of SDN was a watershed event that fundamenta lly
altered networking.
Following are the responses gather from users for above feedback questions:
• Malware protection
• Network documentation updates
• Device inventory
• Power checks
• Device filter dusting
• Cable organization
Although new types of devices and administration have been made possible by
technological advancements, network maintenance chores have always been important and
are not anticipated to alter significantly in the future.
IT Department DHPC
In order to confirm that the host machine the user is attempting to connect is up and running,
Ping is also utilized diagnostically. Ping can be used on any operating system (OS) that has
networking capabilities, including the majority of embedded network administra tio n
program.
The remote computer is the one that is being connected to, or that accepts the connection.
The local computer will display whatever that is happening on the distant computer when
using telnet. The client/server model underlies Telnet's operation. A telnet client program
is used on the local computer, while a telnet server program is used on the distant
computers. (GeeksforGeeks, 2023)
A collection of tools that carry out the SSH protocol is also referred to as SSH. Strong
password and public key authentication, along with encrypted data transmissions between
two computers connected via an open network, like the internet, are all made possible by
Secure Shell. (Loshin, 2021)
Virus Protection
In response to the ongoing threat of computer viruses, implementing a comprehens ive
security approach is crucial. This includes controlling access to unwanted sites, disabling
USB plugins on servers, and employing measures to prevent viral infections. Proactive
virus protection measures will safeguard Alliance Health's network integrity, ensuring
uninterrupted operations and data security.
Network Surveillance
Given the significant reliance on technology for day-to-day operations, the deployment of
network monitoring tools is essential. Network monitoring aids in identifying and
addressing infrastructure issues promptly, enhancing overall network performance, and
increasing staff productivity. By providing a consolidated view of all network devices,
these tools contribute to maintaining the health and efficiency of the internal network.
Furthermore, I now recognize that networks are an integral component of the overall system
at Alliance Health, serving as a critical means to deliver various services. Users, programs,
and devices rely on network services that seamlessly integrate performance and
functionality to accomplish their tasks within the system. Building on this understanding, I
meticulously allocated the necessary resources, including PCs, switches, firewalls, servers,
routers, and access points, to each department within the organization as part of the network
design plan.
The culmination of this effort was the creation of a comprehensive report outlining the
deployment of the network infrastructure for Alliance Health. Through this reflection, I am
confident in concluding that the network I have designed not only meets but exceeds the
diverse needs of users across different departments. The system operates flawle ss ly,
aligning with Alliance Health's requirements and contributing to the overall efficiency of
the organization.