0% found this document useful (0 votes)
2 views7 pages

Computer and Network Technology Handbook PART 2

The document outlines the essential networking concepts for junior network administrators, covering network standards, protocols, structures, and the hardware and software necessary for intranet setup. It emphasizes the importance of standards for interoperability, scalability, security, and compliance in network design. Additionally, it provides an overview of different network topologies and the roles of various network components.

Uploaded by

kavi2004dec
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views7 pages

Computer and Network Technology Handbook PART 2

The document outlines the essential networking concepts for junior network administrators, covering network standards, protocols, structures, and the hardware and software necessary for intranet setup. It emphasizes the importance of standards for interoperability, scalability, security, and compliance in network design. Additionally, it provides an overview of different network topologies and the roles of various network components.

Uploaded by

kavi2004dec
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Learner Name Kavindu Shehan Muthugala

Learner Registration No. 241029026

Study Centre Name Summerset Campus

Qualification Title OTHM Level 5 Extended Diploma in Information Technology

Unit Reference No. L/617/2268

Unit Title Computer and Network Technology (PART 2)

Submission Date

Declaration of authenticity:
1. I declare that the attached submission is my own original work. No significant part of it has been submitted for any other
assignment and I have acknowledged in my notes and bibliography all written and electronic sources used.
2. I acknowledge that my assignment will be subject to electronic scrutiny for academic honesty.
3. I understand that failure to meet these guidelines may instigate the center’s malpractice procedures and risk failure of the unit
and / or qualification.

_________________
_________________
Tutor signature
Learner signature
Date:
Date:
Part 2: Core Networking Concepts for Junior Network
Administrators

1. Network Standards and Protocols


Definition
Standards for networks are guidelines that are obeyed to provide interoperability among devices and
systems within a network. A protocol is an established set of rules for how data is sent or received over a
network.

Primary Network Standards


 IEEE 802 Standards: Identify the LAN and WLAN technologies, for example, Ethernet – IEEE
802.3, Wi-Fi – IEEE 802.11
 ITU-T Standards: Set international telecommunication and broadband standards.
 ISO/OSI Model: A seven-layered (from physical to application) conceptual model which
standardizes communication functions.

Common Network Protocols

Protocol Function

TCP/IP Core suite for internet communication. TCP


handles reliable delivery, IP manages addressing
and routing.
HTTP/HTTPS Used for web browsing. HTTPS encrypts using
SSL/TLS.
FTP/SFTP For transferring files between systems.
DNS Resolves domain names to IP addresses.
SMTP/IMAP/POP3 Email protocols for sending (SMTP) and
retrieving (IMAP/POP3) mail.
DHCP Assigns IP addresses to devices dynamically.
SNMP Used for monitoring and managing network
devices.

Importance: Standards and protocols ensure devices from different manufacturers can
communicate, support scalability, and allow easier troubleshooting.
2. Network Structures.

Network architecture is what we term the structure of how computers, servers and
other devices talk to each other in a network. What topology you choose will in turn
affect performance, fault tolerance and scalability.

 Star Topology

o All devices are connected to a main hub or switch.

o Easy to set up and troubleshoot.

o However should the central switch fail the entire network goes down.

o Common in modern LAN environments.

 Bus Topology

o Devices share a single communication line.

o Cheap and simple, but easily congested.

o A main cable failure may bring down the whole network.

o Today that issue of scale which causes them to not be used often.

 Ring Topology

o Devices form a closed loop.

o Each device connects to two others.

o Data flows in one way which reduces collisions.

o A network wide issue may result from a ring break unless dual rings are
used.
 Mesh Topology

o Devices are interconnected.

o Highly fault-tolerant and reliable.

o Costly and complex to implement.

o In critical applications or backbone networks.

 Hybrid Topology

o Combines various topologies.

o Offers flexibility and scalability.

o Complexity increases with size.

o Frequently used in enterprise networks.

Choosing which topology is best for your network is determined by your


organization’s size, budget, and reliability needs (Forouzan, 2012).

3. Network Standards’ Role in which they play.

Using as a base set of protocols and technologies brings many benefits:

Interoperability

 Standard in technology is what which allows companies to use products from


various vendors together. For instance a Cisco router may be used with an HP
switch via shared protocols like TCP/IP.
Scalability

 Standards like IPv6 which allow for network expansion without major redesign
are a must. This is very much the case for growing businesses and cloud
environments.

Security

 Protocols such as HTTPS and WPA3 improve data protection. We see that
which standards put forth by the cyber security frameworks like NIST are best
to adopt.

Performance

 QoS (Quality of Service) is used to put priority on certain traffic which is very
much so for services like VoIP and video calls.

Compliance and Regulation

 Adherence to industry standards is what which in turn meets the requirements


of laws like GDPR, HIPAA, or ISO 27001.

In the end we have seen that it is from the use of standardized technologies that
reliable, secure, and future ready networks come.
4. Network Hardware and Software for Intranet Setup
An intranet is a private network designed for internal communication, data sharing, and collaboration
within an organization. Setting up a reliable intranet requires appropriate hardware and software.

Component Function

Router Connects different networks and manages traffic


between them.

Switch Distributes data within the network. Modern


switches are intelligent and can manage traffic
efficiently.

Firewall Protects against unauthorized access. Can be


hardware- or software-based.

Access point Allows wireless devices to connect to the wired


network.

Cabling (Ethernet/Fiber) Physical medium for data transfer.


Network Interface Card (NIC) Enables devices to connect to the network.
Modem (if internet is needed) Converts signals between analog and digital
formats.

Essential Network Software

Software Purpose

Network operating System (NOS) Manages file sharing, permissions, and resource
access (e.g., Windows Server, Linux Ubuntu
Server).

Firewall Software Adds an extra layer of protection against malware


or unauthorized users.

Antivirus/Endpoint Protection Secures devices on the intranet from threats (e.g.,


Bitdefender, Symantec).

Monitoring Tools Analyze traffic and monitor uptime (e.g.,


Wireshark, Nagios, SolarWinds).

Dictionary Services Manages users and policies (e.g., Microsoft


Active Directory).

VPN Software Provides secure access to the intranet from remote


locations.

REFERENCES

 Cisco Systems, 2023. Types of Network Topologies. [online] Cisco. Available at:
https://www.cisco.com/c/en/us/solutions/small-business/resource-center/networking/
network-topology.html [Accessed 15 May 2025].

 Forouzan, B.A., 2012. Data Communications and Networking. 5th ed. New York:
McGraw-Hill.

 IEEE, 2024. IEEE 802 LAN/MAN Standards Committee. [online] IEEE Standards
Association. Available at: https://www.ieee802.org/ [Accessed 15 May 2025].

 Kurose, J.F. and Ross, K.W., 2020. Computer Networking: A Top-Down Approach. 8th
ed. Boston: Pearson.

 Microsoft Learn, 2024. Active Directory Domain Services Overview. [online] Microsoft.
Available at: https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/get-
started/active-directory-domain-services-overview [Accessed 15 May 2025].

 Mitchell, B., 2022. Network Protocols You Need to Know. [online] Lifewire. Available
at: https://www.lifewire.com/common-network-protocols-817985 [Accessed 15 May
2025].

 Tanenbaum, A.S. and Wetherall, D.J., 2011. Computer Networks. 5th ed. Boston:
Pearson Education.

You might also like