0% found this document useful (0 votes)
462 views

Unit 2 Assignment Brief 2

The document provides an assignment brief for a networking infrastructure project. It outlines 3 parts to the assignment: 1. A report examining networking principles, protocols, devices, and justifying a topology for the given specification. 2. Designing an efficient LAN, including a blueprint, justified device choices, and test plan for bandwidth and costs. 3. Implementing and testing the network, conducting diagnostics, and making recommendations for growth and security. The assignment is for a BTEC Level 5 HND Diploma in Computing unit on networking. It involves designing a network for an educational institute with 235 users across 3 floors. Deliverables include a written report, evidence portfolio, and implemented

Uploaded by

Nguyen Manh Tai
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
462 views

Unit 2 Assignment Brief 2

The document provides an assignment brief for a networking infrastructure project. It outlines 3 parts to the assignment: 1. A report examining networking principles, protocols, devices, and justifying a topology for the given specification. 2. Designing an efficient LAN, including a blueprint, justified device choices, and test plan for bandwidth and costs. 3. Implementing and testing the network, conducting diagnostics, and making recommendations for growth and security. The assignment is for a BTEC Level 5 HND Diploma in Computing unit on networking. It involves designing a network for an educational institute with 235 users across 3 floors. Deliverables include a written report, evidence portfolio, and implemented

Uploaded by

Nguyen Manh Tai
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 62

ASSIGNMENT BRIEF SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number Unit 2: Networking

Assignment title Networking Infrastructure

Academic Year Fall 2019 (Part 2)

Unit Tutor Hồ Nguyễn Phú Bảo

Issue date Submission date December, 30th 2019

IV name and date Phùng Nguyễn Gia Huy

Submission format

Part 1

The submission is in the form of an individual written report. This should be written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using the Harvard
referencing system. Please also provide a bibliography using the Harvard referencing system. The
recommended word limit is 2,000–2,500 words, although you will not be penalized for exceeding the total word
limit.

Part 2

The submission is in the form of an individual evidence portfolio. This assignment can be completed as a group,
but each student must produce their own portfolio, which will contain:

 A LAN design plan and blueprint and justification document.

 A fully completed test plan including an evaluation of results and recommendations for improvements to
LAN.

 A proposed and justified maintenance schedule.

Part 3

 Evidence of an implemented network.

You are required to make use of headings, paragraphs, subsections and illustrations as appropriate, and all work
must be supported with research and referenced using the Harvard referencing system.

Unit Learning Outcomes

LO1: Examine networking principles and their protocols.


LO2: Explain networking devices and operations.

LO3: Design efficient networked systems.

LO4: Implement and diagnose networked systems.

Assignment Brief

You are employed as a Network Engineer by Nguyen Networking Limited, a high-tech networking solution
development company, which have branches in Hồ Chí Minh City, Hà Nội, Đà Nẵng and Cần Thơ.

The company has been contracted to implement a networking project from a local educational institute. The
specification of the project is given below:

People: 200 students, 15 teachers, 12 marketing and administration staff, 05 higher managers including the
head of academics and the program manager, 03 computer network administrators.

Resources: 50 student lab computers, 35 staff computers, 03 printers.

Building: 03 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located
on the first floor and another located on the second floor.

As a first task, the CEO of the company Mr. Nguyen has asked you to investigate and explain networking
principles, protocols and devices and submit a report.

Part 1
You will need to produce a report that includes the following:
1. An introduction to provide an overview of your report.

2. Benefits and constraints of different types of networks and networking standards.

3. The impact of network topology, speed of communication and bandwidth requirements.

4. Effectiveness of networking systems.

5. Discussion on operating principles of networking devices and server types and networking software.

6. Discuss the relationship of workstation hardware with networking software.

7. Explore a range of server types and justify the selection of a server, considering a given scenario
regarding cost and performance optimization.

8. For the given specification, identify the topology protocol for the efficient utilization of a networking
system.

The CEO Mr. Nguyen is happy with your first report and now he has asked you to analyze the specification
from the institution, as given earlier.

You need to design and implement the networking project within a given time frame:
Part 2 - Design efficient networked systems
1. Prepare a written step-by-step plan of how you are going to design a Local Area Network including a
blueprint of your LAN.

2. Justify your choice of devices for your network design.

3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per
user specifications.

4. Justify the security requirements and quality of services needed for selection of accessories.

5. Suggest a maintenance schedule to support the networked system.

Part 3 - Implement test and diagnose networked systems


1. Implement a networked system based on your prepared design.

2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc.

3. Record the test results and analyze these against expected results.

4. Investigate what functionalities would allow the system to support device growth and the addition of
communication devices.

5. Discuss the significance of upgrades and security requirements in your recommendations.

ASSESMENT CRITERIA

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Examine networking principles and their protocols. LO1 & 2


D1 Considering a given scenario,
P1 Discuss the benefits and M1 Compare common
identify the topology protocol
constraints of different network types networking principles and selected for the efficient
and standards. how protocols enable the utilization of a networking
effectiveness of networked system.
P2 Explain the impact of network systems.
topology, communication and
bandwidth requirements.

LO2 Explain networking devices and operations

P3 Discuss the operating principles of M2 Explore a range of server


networking devices and server types. types and justify the selection
of a server, considering a
P4 Discuss the inter-dependence of given scenario regarding cost
workstation hardware with relevant and performance
networking software. optimisation.

LO3 Design efficient networked systems

P5 Design a networked system to M3 Install and configure D2 Design a maintenance


meet a given specification. network services and schedule to support the
applications on your choice. networked system.
P6 Test and evaluate the design to
meet the requirements and analyse
user feedback.

LO4 Implement and diagnose networked systems

P7 Implement a networked system M4 Recommend potential D3 Use critical reflection to


based on a prepared design. enhancements for the evaluate own work and
networked systems. justify valid conclusions.
P8 Document and analyse test results
against expected results.

P1 Discuss the benefits and constraints of different network types and


standards.
Local Area Network (LAN):
+ Local area network is the computer network that connects computers within
the limited area such as schools, colleges or universities.
+ Local area networks, generally called LANs, are privately-owned networks.
They provide a useful way of sharing resources between end users. The
resources such as printers, file servers, scanners, and internet are easily
sharable among other connected computers in a network.
Advantages of LAN:
+ Resource Sharing: LAN provides resource sharing such as computer
resources like printers, scanners, modems, DVD-ROM drives, and hard disks
can be shared within the connected devices. This reduces cost and hardware
purchases.
+ Software Applications Sharing: In a Local Area Network, it is easy to use the
same software in a number of computers connected to a network instead of
purchasing the separately licensed software for each client a network.
+ Easy and Cheap Communication: Data and messages can easily be shared
with the other computer connected to the network.
+ Centralized Data: The data of all network users can be stored on a hard disk
of the central/server computer. This help users to use any computer in a
network to access the required data.
+ Data Security: Since data is stored on the server computer, it will be easy to
manage data at only one place and the data will be more secure too.
+ Internet Sharing: Local Area Network provides the facility to share a single
internet connection among all the LAN users. In school labs and internet Cafes,
single internet connection is used to provide internet to all connected
computers.
Disadvantages of LAN:
+ High Setup Cost: The initial setup costs of installing Local Area Networks is
high because there is special software required to make a server. Also,
communication devices like an ethernet cable, switches, hubs, routers, cables
are costly.
+ Privacy Violations: The LAN administrator can see and check personal data
files of each and every LAN user. Moreover, he can view the computer and
internet history of the LAN user.
+ Data Security Threat: Unauthorised users can access important data of an
office or campus if a server hard disk is not properly secured by the LAN
administrator.
+ LAN Maintenance Job: Local Area Network requires a LAN Administrator
because there are problems such as software installations, program faults or
hardware failures or cable disturbances in Local Area Network. A LAN
Administrator is required to maintain these issues.
+ Covers Limited Area: LANs are restricted in size they cover a small area like
a single office, single building or a group of nearby buildings.
Link: https://computernetworktopology.com/local-area-network/. (1)
Wide Area Network (WAN):
+ Wide area network (WAN) is a type of network that provides transmission of
voice, data, images, and videos over the large geographical area. WAN is made
with the combinations of LAN and MAN. The transmission of data is carried
out with the help of hubs, switches, fiber optics, modem, and routers. To
transfer data from any computer over the internet we use some technologies
including:
 ISDN (Integrated service digital network).
 SMDS (Switched multimegabit data server).
 SONET (Synchronous optical network).
 HDLC (High data link control).
 SDLC (Synchronous data link control).
 Frame relay.

Advantages of WAN:
+ Covers large geographical area:
Wan covers a large geographical area of 1000 km or more If your office is in
different cities or countries then you can connect your office branches through
wan. ISP (Internet service provider) can give you leased lines by which you
can connect different branch offices together.
+ Centralized data:
Your company doesn’t need to buy email, files, and backup servers, they can
all reside on head office. All office branches can share the data through the
head office server. You can get back up, support, and other useful data from
the head office and all data are synchronized with all other office branches.
+ Get updated files and data:
Software companies work over the live server to exchange updated files. So all
the coders and office staff get updated version of files within seconds.
+ A lot of application to exchange messages:
With IOT (Internet of things) and new LAN technologies, messages are being
transmitted fast. A lot of web applications are available like Facebook
messenger, WhatsApp, Skype by which you can communicate with friends via
text, voice and video chat.
+ Sharing of software and resources:
Like LAN we can share software applications and other resources like a hard
drive, RAM with other users on the internet. In web hosting, we share
computer resources among many websites.
+ Global business:
Now everyone with computer skills can do business on the internet and expand
his business globally. There are many types of business like a shopping cart,
sale, and purchase of stocks etc.
+ High bandwidth:
If you get leased lines for your company then it gives high bandwidth than
normal broadband connection. You can get a high data transfer rate that can
increase your company productivity.
+ Distribute workload and decrease travel charges:
Another benefit of wide area network is that you can distribute your work to
other locations. For example, you have an office in the U.S then you can hire
people from any other country and communicate with them easily over WAN.
It also reduces your travel charges as you can monitor the activities of your
team online.
Disadvantages of WAN:
+ Security problems:
WAN has more security problem as compare to MAN and LAN. WAN has
many technologies combined with each other which can create a security gap.
+ Needs firewall and antivirus software:
As data transferred on the internet can be accessed and changed by hackers so
firewall needs to be enabled in the computer. Some people can also inject a
virus into the computer so antivirus software needs to be installed. Other
security software also needs to be installed on different points in WAN.
+ The setup cost is high:
Setting up WAN for the first time in office costs higher money. It may involve
purchasing routers, switches, and extra security software.
+ Troubleshooting problems:
As WAN covers a lot of areas so fixing the problem in it is difficult. Most of
WAN wires go into the sea and wires get broken sometimes. It involves a lot of
resources to fix lines under the sea. In ISP (Internet service provider) head
office many of internet lines, routers are mixed up in rooms and fixing issues
on the internet requires a full-time staff.
+ Server down and disconnection issue:
In some areas, ISP faces problems due to electricity supply or bad lines
structure. Customers often face connectivity issues or slow Internet speed
issues. The solution to this is to purchase a dedicated line from ISP.
Link: http://www.itrelease.com/2018/07/advantages-and-disadvantages-of-
wide-area-network-wan/. (2)
Metropolitan Area Network (MAN):
+ A metropolitan area network (MAN) is a network that interconnects users
with computer resources in a geographic area or region larger than LAN.
+It is similar to a local area network (LAN) but it covers an entire city or
campus.
+Many LANs connect together to form MAN Network.
+Thus, MANs are larger than LANs but smaller than wide-area networks
(WAN). The MAN network is very efficient. It provides fast communication
via high-speed fiber optic cables.
+A MAN is ideal for many kinds of network users because it is a medium-size
network.
+ MANs are using to build networks with high data connection speeds for
cities and towns. The main purpose of MAN is to interconnect two LAN
together.

MAN also uses routers and switches to transfer data. MAN has a range of over
50kms. The speed of the metropolitan area network is about 1000 Mbps.

Advantages of MAN:
+Less expensive:
It is less expensive to attach MAN with WAN. MAN gives you good efficiency
of data. All data on MAN is easily manageable in a centralized way.
+Sending local emails:
You can send local emails fast and free on MAN.
+High speed than WAN:
Speed of data can easily reach upon 1000 Mbps, as MAN uses fiber optics.
Files and database transfer rates are fast.
+Sharing of the internet:
With the installation of MANs, users can share their internet connection. In this
way, multiple users can get the same high-speed internet.
+Conversion of LAN to MAN is easy:
MAN is a combination of two or more LAN network. So it is a faster way to
connect two LAN networks together. It is possible by the fast configuration of
links.
+High Security:
MAN’s has a high-security level than WAN.
Disadvantages of MAN:
+ Difficult to manage:
It is very difficult to manage if the size and number of LANs network increase.
This is due to security and extra configuration problems.
+ Internet speed difference:
As it cannot work on phone copper wires. Copper wires affect the speed of
MAN.So high cost is needed for fiber optics.
+ Hackers attack:
In this network, there is a high risk of attacking hackers as compared to LAN.
So data may be a leak. Highly security staff is the need in MAN.
+ Technical staff requires to set up:
Highly technical people require to setup MAN. The technical people are
network administrators and troubleshooters.
+ Need More wires:
In MAN more than LAN network, cables require. As you know, it is a
combination of two LANs.
Link: https://am7s.com/what-is-man-network-advantages/. (3)
Wireless Network(WLAN):
+ WLAN stands for wireless local area network. Wireless made the
communication more easy in today’s world. This wireless communication
facility is confined to a area of few meters only. This facility is very useful for
communication within a building or campus. We use radio frequency for
communication in this network. It provides a very high data rate, coverage area
is small so the traffic. As light of sight is not required for the propagation, it is
a reliable form of communication. Any type of network uses some standard
protocol for transmission of information. IEEE standard provides architecture
and protocol for WLAN. IEEE stands for ” Institute for Electrical and
Electronics Engineers”. IEEE standard provides facility of time bounded and
asynchronous service. Asynchronous service means more band of frequency
for service in one direction than the other. Synchronous service allows same
band length in both the directions. WLAN uses two basic transmission
technologies for its setup. They are infrared transmission technology and radio
transmission technology. Now infrared technology is not used as it requires
line of sight and is easily hindered by the obstacles in its way. so, infrared is
not reliable. However wireless technologies are prone to interference and
noise . The interference can be due to environmental problems like rain,
thunder etc. But in spite of some disadvantages, wireless is more
advantageous. Wireless communication provides great flexibility.
Advantages of WLAN:
+Light of sight is not required for propagation.
+The signal is not blocked by any objects like buildings, trees etc.
+High data rate, as coverage area is small.
+Reliable type of communication
+Economical for a small area access.
+Wireless transmission provides great flexibility.
Disadvantages of WLAN:
+This communication is very prone to interference and noise.
+It has limited coverage area.
+Communication is not very secure and unauthorised access is common.
+Licence is required.
Link: https://blog.oureducation.in/wlan-advantages-disadvantages/. (4)
Storage Area Network(SAN):
+A storage area network is a network in which server machines are connected
to storage devices through switches. Fiber optics is used as a cable for
connection between switches, servers and storage devices. The reason for using
fiber optics is that it has high transfer speed i.e. 5 GBPS. The benefit of using
fiber optics is that servers feel that storage devices are attached to them directly
because of good data transfer speed.

Advantages of SAN:
+High speed of data transfer: SAN network is referred to as faster data transfer
network. It uses high-end speed technology with fiber optics by which client
and server communication becomes fast.

+Centralized backup: Data in SAN is centralized i.e. if any server disconnect


from the network then other server stabilize the data load and transferring of
data is resumed.
+Dynamic failover protection: If any server stops working then SAN will take
control of it and recover its storage through built-in redundancy and automatic
traffic rerouting. And networking of client-server is not disturbed if any server
goes to maintenance mode.
+Adding/removing of storage devices is easy: If SAN needs more storage
devices then it can be easily added to the network. Similarly, extra storage
devices can be removed from the network without any problem.
+Data security: Data in SAN is secured and cannot be stolen by an
unauthorized user.
Disadvantages of SAN:
+Not good for high traffic: If client computers need intensive data transfer then
SAN is not the right choice. SAN is good for low data traffic.
+Sensitive data may be leaked: As all the client computers share the same set
of storage devices so sensitive data can be leaked. It is better to not store
sensitive data on this network.
Link: http://www.itrelease.com/2019/05/advantages-and-disadvantages-of-
storage-area-network-san/. (5)
P2 Explain the impact of network topology, communication and bandwidth
requirements.
Networking Topology:
1) Point to Point:
Point-to-point topology is the easiest of all the network topologies. In this
method, the network consists of a direct link between two computers.

Advantages:
+This is faster and highly reliable than other types of connections since there is
a direct connection.
+No need for a network operating system
+Does not need an expensive server as individual workstations are used to
access the files
+No need for any dedicated network technicians because each user sets their
permissions
Disadvantages:
+The biggest drawback is that it only be used for small areas where computers
are in close proximity.
+You can't back up files and folders centrally
+There is no security besides the permissions. Users often do not require to log
onto their workstations.
2) Bus Topology:
Bus topology uses a single cable which connects all the included nodes. The
main cable acts as a spine for the entire network. One of the computers in the
network acts as the computer server. When it has two endpoints, it is known as
a linear bus topology.

Advantages:
+Cost of the cable is very less as compared to other topology, so it is widely
used to build small networks.
+Famous for LAN network because they are inexpensive and easy to install.
+It is widely used when a network installation is small, simple, or temporary.
+It is one of the passive topologies. So computers on the bus only listen for
data being sent, that are not responsible for moving the data from one computer
to others.
Disadvantages:
+In case if the common cable fails, then the entire system will crash down.
+When network traffic is heavy, it develops collisions in the network.
+Whenever network traffic is heavy, or nodes are too many, the performance
time of the network significantly decreases.
+Cables are always of a limited length.
3) Ring Topology:
In a ring network, every device has exactly two neighboring devices for
communication purpose. It is called a ring topology as its formation is like a
ring. In this topology, every computer is connected to another computer. Here,
the last node is combined with a first one.
This topology uses token to pass the information from one computer to
another. In this topology, all the messages travel through a ring in the same
direction.

Advantages:
+Easy to install and reconfigure.
+Adding or deleting a device in-ring topology needs you to move only two
connections.
+The troubleshooting process is difficult in a ring topology.
+Failure of one computer can disturb the whole network.
+Offers equal access to all the computers of the networks
+Faster error checking and acknowledgment.
Disadvantages:
+Unidirectional traffic.
+Break in a single ring can risk the breaking of the entire network
+Modern days high-speed LANs made this topology less popular.

+In the ring, topology signals are circulating at all times, which develops
unwanted power consumption.
+It is very difficult to troubleshoot the ring network.
+Adding or removing the computers can disturb the network activity.
4) Star Topology:
In the star topology, all the computers connect with the help of a hub. This
cable is called a central node, and all other nodes are connected using this
central node. It is most popular on LAN networks as they are inexpensive and
easy to install.

Advantages:
+Easy to troubleshoot, set up, and modify.
+Only those nodes are affected, that has failed. Other nodes still work.
+Fast performance with few nodes and very low network traffic.
+In Star topology, addition, deletion, and moving of the devices are easy.
Disadvantages:
+If the hub or concentrator fails, attached nodes are disabled.
+Cost of installation of star topology is costly.
+Heavy network traffic can sometimes slow the bus considerably.
+Performance depends on the hub's capacity
+A damaged cable or lack of proper termination may bring the network down.
5) Mesh Topology:
The mesh topology has a unique network design in which each computer on
the network connects to every other. It is develops a P2P (point-to-point)
connection between all the devices of the network. It offers a high level of
redundancy, so even if one network cable fails, still data has an alternative path
to reach its destination.
Types of Mesh Topology:
Partial Mesh Topology: In this type of topology, most of the devices are
connected almost similarly as full topology. The only difference is that few
devices are connected with just two or three devices.

Full Mesh Topology: In this topology, every nodes or device are directly
connected with each other.
Advantages:
+The network can be expanded without disrupting current users.
+Need extra capable compared with other LAN topologies.
+Complicated implementation.
+No traffic problem as nodes has dedicated links.
+It has multiple links, so if any single route is blocked, then other routes should
be used for data communication.
+P2P links make the fault identification isolation process easy.
+It helps you to avoid the chances of network failure by connecting all the
systems to a central node.
Disadvantages:
+Installation is complex because every node is connected to every node.
+Dedicated links help you to eliminate the traffic problem.
+A mesh topology is robust.
+Every system has its privacy and security
+It is expensive due to the use of more cables. No proper utilization of systems.
+It requires more space for dedicated links.
+Because of the amount of cabling and the number of input-outputs, it is
expensive to implement.
+It requires a large space to run the cables.
6) Tree Topology:
Tree topologies have a root node, and all other nodes are connected which form
a hierarchy. So it is also known as hierarchical topology. This topology
integrates various star topologies together in a single bus, so it is known as a
Star Bus topology. Tree topology is a very common network which is similar
to a bus and star topology.

Advantages:
+Failure of one node never affects the rest of the network.
+Node expansion is fast and easy.
+Detection of error is an easy process
+It is easy to manage and maintain
Disadvantages:
+It is heavily cabled topology
+If more nodes are added, then its maintenance is difficult
+If the hub or concentrator fails, attached nodes are also disabled.
7) Hybrid Topology:
Hybrid topology combines two or more topologies. You can see in the above
architecture in such a manner that the resulting network does not exhibit one of
the standard topologies.
For example, as you can see in the above image that in an office in one
department, Star and P2P topology is used. A hybrid topology is always
produced when two different basic network topologies are connected.

Advantages:
+Offers the easiest method for error detecting and troubleshooting
+Highly effective and flexible networking topology
+It is scalable so you can increase your network size
Disadvantages:
+The design of hybrid topology is complex
+It is one of the costliest processes
Link: https://www.guru99.com/type-of-network-topology.html. (6)
OSPF:
+ It is a routing protocol generally used for larger network either a single
network or a group network. It is designed by Internet Engineering Task Force.
It can also use as a Gateway Protocol.
FTP:
+File Transfer Protocol (FTP) is mainly a standard protocol of Network which
is used to transfer data from client to host or one server to another server. If
user or admin want to upload a file on a website he or she needs a username,
password and host address.
SMTP:
+Simple mail transfer protocol is like a media which transfers e-mail. SMTP
always work with POP3 service.
TCP/IP:
+Transmission Control Protocol and Internet Protocol is a set of a protocol
stack. Basically it is tow different protocol. TCP/IP is closely related with FTP,
SMTP, HTTP
Data communications:
+Transmission of signals.
+Send and receive information over communications lines.
+Encoding, interfacing, signal integrity, multiplexing etc.
Networking:
+Topology & architecture used to interconnect device.
+Networks of communication systems.
Bandwidth:
Bandwidth is the capacity of a wired or wireless network communications link
to transmit the maximum amount of data from one point to another over a
computer network or internet connection in a given amount of time -- usually
one second. Synonymous with capacity, bandwidth describes the data transfer
rate. Bandwidth is not a measure of network speed -- a common
misconception.
The impact of network bandwidth requirements:
Bandwidth affects how long it takes to download or upload information over
the Internet. A connection that has plenty of bandwidth available provides a
smooth, responsive user experience. The more available bandwidth, the more
quickly data can be transferred; however, the law of diminishing returns
applies here. Once you have sufficient bandwidth, Internet performance is not
further affected.
P3 Discuss the operating principles of networking devices and server types.
Networking Devices:
+ Switch
+ Bridges
+ Router,
+ Hub
+ Gateways
+ Network interface card
Link: https://pt.slideshare.net/MubassirAmbekar/networking-devices-
64424520/9. (7)
The operating principles of server types:
Server Types:
This list categorizes the many different types of servers used in the marketplace
today.
Proxy Server:
A proxy server sits between a client program (typically a Web browser) and an
external server (typically another server on the Web) to filter requests, improve
performance, and share connections.
Mail Server:
Almost as ubiquitous and crucial as Web servers, mail servers move and store
mail over corporate networks (via LANs and WANs) and across the Internet.
Server Platforms:
A term often used synonymously with operating system, a platform is the
underlying hardware or software for a system and is thus the engine that drives
the server.
Web Server:
At its core, a Web server serves static content to a Web browser by loading a
file from a disk and serving it across the network to a user's Web browser. This
entire exchange is mediated by the browser and server talking to each other
using HTTP.
Application Server:
Sometimes referred to as a type of middleware, application servers occupy a
large chunk of computing territory between database servers and the end user,
and they often connect the two.
Real-Time Communication Server:
Real-time communication servers, formerly known as chat servers or IRC
Servers, and still sometimes referred to as instant messaging (IM) servers,
enable large numbers users to exchange information near instantaneously.

FTP Server:
One of the oldest of the Internet services, File Transfer Protocol makes it
possible to move one or more files securely between computers while
providing file security and organization as well as transfer control.
Collaboration Server:
In many ways, collaboration software, once called 'groupware,' demonstrates
the original power of the Web. Collaboration software designed to enable users
to collaborate, regardless of location, via the Internet or a corporate intranet
and to work together in a virtual atmosphere.
List Server:
List servers offer a way to better manage mailing lists, whether they be
interactive discussions open to the public or one-way lists that deliver
announcements, newsletters or advertising.
Telnet Server:
A Telnet server enables users to log on to a host computer and perform tasks as
if they're working on the remote computer itself.
Open Source Server:
From your underlying open source server operating system to the server
software that help you get your job done, open source software is a critical part
of many IT infrastructures.
Virtual Server:
In 2009, the number of virtual servers deployed exceeded the number of
physical servers. Today, server virtualization has become near ubiquitous in the
data center.
Link: https://www.webopedia.com/quick_ref/servers.asp. (8)
P4 Discuss the inter-dependence of workstation hardware with relevant
networking software.
What is a workstation?
+ A workstation is a computer specially designed for scientific or technical
applications and designed mainly to be used by only one person at a time,
usually connected to a working local area network and multi-user operating
system.
The inter-dependence of workstation hardware with relevant networking
software:
+ The workstation is a computer designed to be used individually and to
outperform a personal computer. Because they are PC, they can be used
independently of mainframes assuming they have their own applications
installed and stored their own hard drives.
+ A network interface card is a piece of computer hardware that groups
computers into a network, usually a local area network. Networked computers
always communicate with each other using the specified protocol to transmit
data packets. The network interface card acts as a translator allowing the
machine to send and retrieve data from each other on the local network
Link: https://www.transtutors.com/questions/discuss-the-interdependence-of-
workstation-hardware-with-relevant-networking-softwar-2824686.htm. (9)
P5 Design a networked system to meet a given specification.
Logical:
FIRST FLOOR:

Staff and teacher room


Main server and work
SECOND FLOOR:
Lab and classs room
THIRD FLOOR:

Lab and classroom


Gaming PC - Dante 2060 - i3 9100F/ B365M/ 8GB/ 120GB/ RTX 2060/
550W:
Product Description
- CPU: Intel Core i3-9100F 4 Cores 4 Threads 3.6 - 4.2GHz
- VGA: MSI Geforce RTX 2060 Ventus 6G OC
- Main: Asus EX-B365M-V5
- RAM: Corsair Vengeance LPX 16GB (2x8GB) DDR4 Bus 2666Mhz
(Including 8GB RAM promotion offer)
- PSU: AEROCOOL LUX RGB 550W - 80 Plus Bronze
- SSD: Adata SU650 120GB Sata3 2.5 "
- Case: Aerocool Bolt LED RGB
Price: 17.000.000Đ.
Number: 35
Total : 600.000.000Đ.
Router:
AX11000 Dual Band Gaming Router ASUS GT-AX11000:
- ASUS GT-AX11000 (Gaming Router) standard 802.11ax, speed AX11000.
- Built-in WTFast, dual band, AiMesh support.
- Support 3 bands including: 2.4Ghz: 1148Mbps + 5GHz: 4804Mbps + 5GHz:
4804Mbps and 8 detachable antennas 5dBi.
- Port: 4 ports x 10/100/1000 Lan, 1x 10/100/1000 Wan, 2 x USb 3.1.
- 1.8GHz quad core CPU.
- RAM: 1GB.
- Fash: 256MB.
- MU-MIMO: separate maximum speed for multiple devices connected at the
same time.
- Adaptive QoS: prioritize game packages for smoother online play.
- WTFast: finding and protecting the shortest possible path between gaming
device and game server, minimizing game latency.
- OFDMA: divides each channel into subchannels, allows simultaneous
bundling and transmitting of signals to multiple devices, reducing Wi-Fi
latency.
- AiProtection Pro: lifetime free security by Trend Micro.
Price: 15.000.000Đ.
Number: 2
Total: 30.000.000 Đ
SWITCH:

TP-Link TL-SG1024DE - 24-Port Network Splitter:


Price: 3.000.000Đ
Number: 4
Total: 12.000.000 Đ

Total network: 642.000.000Đ

P6 Test and evaluate the design to meet the requirements and analyze user
feedback.
Performance Test:
Performance testing is a form of software testing that focuses on how a system
running the system performs under a particular load. This is not about finding
software bugs or defects. Performance testing measures according to
benchmarks and standards. Performance testing should give developers the
diagnostic information they need to eliminate bottlenecks.
Seven Performance Testing Steps:

Also known as the test bed, a testing environment is where software, hardware,
and networks are set up to execute performance tests. To use a testing
environment for performance testing, developers can use these seven steps:
1. Identify the testing environment.
Identify the hardware, software, network configurations and tools available
allows the testing team design the test and identify performance testing
challenges early. Performance testing environment options include:
+Subset of production system with fewer servers of lower specification
+Subset of production system with fewer servers of the same specification
+Replica of productions system
+Actual production system
2. Identify performance metrics.
In addition to identifying metrics such as response time, throughput and
constraints, identify what are the success criteria for performance testing.
3. Plan and design performance tests.
Identify performance test scenarios that take into account user variability, test
data, and target metrics. This will create one or two models.
4. Configure the test environment.
Prepare the elements of the test environment and instruments needed to
monitor resources.
5. Implement your test design.
Develop the tests.
6. Execute tests.
In addition to running the performance tests, monitor and capture the data
generated.
7. Analyze, report, retest.
Analyze the data and share the findings. Run the performance tests again using
the same parameters and different parameters.
Link: https://stackify.com/ultimate-guide-performance-testing-and-software-
testing/?
fbclid=IwAR0kX0OOICGdFkEV8B6zaeYLSnxvVzT5VCrm6fi0a6TpslHbZN
Cred6bwpY. (10)
Stress Test:
Stress Testing is defined as a type of Software Testing that verified the stability
& reliability of the system. This test mainly determines the system on its
robustness and error handling under extremely heavy load conditions.
It even tests beyond the normal operating point and evaluates how the system
works under those extreme conditions. Stress Testing is done to make sure that
the system would not crash under crunch situations.
Stress Testing process can be done in 5 major steps:
+Planning the Stress Test. Here you gather the system data, analyze the system,
define the stress test goals
+Create Automation Scripts: In this phase, you create the Stress testing
automation scripts, generate the test data for the stress scenarios.
+Script Execution: In this stage, you run the Stress testing automation scripts
and store the stress results.
+Results Analysis: In this stage, you analyze the Stress Test results and
identify bottlenecks.
+Tweaking and Optimization: In this stage, you fine-tune the system, change
configurations, optimize the code with goal meet the desired benchmark.
Link: https://www.guru99.com/stress-testing-tutorial.html?
fbclid=IwAR2t7iqRCFhWtGt3YpZ1QpSDTSto-
tV1DQG22ud5A981qUltxIvOvuS-tK4#2/ (11)
Failure Analysis Testing:
When a product or device fails, you need to know why. Root cause failure
analysis helps a business get to the source of a product failure. More
importantly, it provides the manufacturer with the information needed to
address and correct the issue causing the failure.
Root cause failure analysis is usually a multidisciplinary process. The tools
NTS uses during an analysis include visual inspections, metallographic,
environmental and chemical analysis and simulation tests. The specific tests
utilized depend on the type of product and the failure mode. Root cause failure
examinations are designed to determine the cause of the failure and the
corrective actions needed to prevent it. However, product failure can be a
complicated process. In our experience, device failure is rarely due to a single
event.
The physical signs of failure, such as a cracked metal component or a
malfunctioning electronic device, are the most obvious. However these signs
are often little more than symptoms of failure. NTS looks for the root cause of
the failure.

Determining the root cause of a failure is a three-part process.


Step 1: Data Collection
The first step in a root cause failure analysis is data collection. During this step,
NTS will collect information about how the device failed and when it occurred.
We will also work with you to determine your goals for the failure analysis
examination, determine how the part should operate, and consult with
additional subject matter experts, if needed.
During this phase, we will conduct tests on the product being analyzed. It is
common to test a representative sample of failed devices as well as those that
are working properly. This can help to determine what components are failing
and when the failure occurs.
Whenever possible, we prefer non-destructive tests in the failure analysis
testing. This tends to provide the most accurate data and is more economically
efficient for the customer. Sometimes the failure analysis requires cross-
sections of the material or perform thermal testing. In these cases, we perform
these tests later in the data collection process.
Step 2: Analyze Data Collected to Determine Root Cause Failure
The next step in the failure analysis process is to determine the root cause of
the failure. Device failure is rarely the result of a single incident. Our
experience has shown there are multiple inputs into even a “simple” failure.
This indicates there are often different ways to prevent the failure in the future.
Consider this example of an electronic device failure. An organization has
received customer complaints of a device short circuiting periodically and
contracts with NTS to conduct a root cause failure analysis. Electronic failure
analysis tests show the component short circuits because depending on where
the metal in the part is located the metal used is of the wrong hardness.
Step 3: Determining Corrective Actions
For most organizations, determining corrective actions is the most important
part of a root cause failure analysis. When you use NTS for root cause failure
analysis, you will receive a comprehensive report on both the causes and
effects of device failure. NTS may also provide recommendations for
correcting problems.
Many of the recommendations for correcting a problem are small changes that
can have a significant impact. Small changes in how source materials and
product components are tested, treated and stored can significantly reduce
device failure.
In other cases, we find that failure occurs when customers use a device for too
long or in the wrong operating conditions. In these cases, our recommendations
might include additional product education for marketing and sales staff. These
employees can then provide this information to customers. This prevents
device failures from improper use or application.
We can also help you to determine whether corrective action is necessary.
Some organizations may decide the economic costs of correcting rare product
failure is unnecessary. If device failure is rare and has minimal consequences,
replacing failed components may be more cost effective than changing the
manufacturing process. Failure analysis testing can provide you with
knowledge needed to make an informed decision.
Failure Analysis Tests
Root cause failure analysis uses a variety of tests to determine the true source
of a product failure. These tests are divided into two categories: non-
destructive tests, which keep a product intact; and destructive tests, which
require the product to be altered in order to examine cross-sections or thermal
behavior
NTS begins its analysis with non-destructive analysis (NDA) as these tests are
intended to prevent further damage to the product. Starting with NDA is
generally more cost-effective. This is also the preferred method to preserve
evidence of the failure mode.
Link: https://www.nts.com/services/testing/failure-analysis/?
fbclid=IwAR2t7iqRCFhWtGt3YpZ1QpSDTSto-
tV1DQG22ud5A981qUltxIvOvuS-tK4. (12)
P7 Implement a networked system based on a prepared design.

UNIT2 ASSIGNMENT 1.pkt

P8 Document and analyze test results against expected results.


Performance test.
I will access random computer, choose desktop and press Command Prompt.
Then I will enter the ping command on a computer that has a specific IP
address. It’s like a way of transferring data between devices and helps me
know if the connection is good.
Computer (pc 63) ping (pc 17) (ping 192.168.4.32)

The result:
To make sure all computers are possible, I will check again with another
computer (PC 42) at (PC24)

The test is similar to the previous one, so I only show the test results
PC 24 (192.168.4.14)
The result:
I will continue to check if I can connect to the Internet:
Here is the implementation:
I will choose pc39 as a template. First, go to Pc46 and select the desktop, then
select the web browser
Stress Test :
I will first choose the machine (PC3) and (PC 14) (192.168.4.28). To perform
this test

go to (PC3) select the desktop then select Command Prompt. Then enter the
command line
ping -t 192.168.4.28 and press the ctrl c key to complete the command
Failure test

 The following test goes to the failure test stage


 To complete this test, you must turn off the router and schedule a ping to
any computer to another room and another floor.

 I turned off the router


I chose (pc 40) 1st floor and (pc 41) on the 1st floor to do this test and I chose
(pc 37) 3rd floor and (pc 49) on the 2nd floor to do this test.

When I turned off the main router, I started to check connections of machines
of the same floor (PC40) and (PC41)

PC 40
Desktop PC 40 Choose Command Prompt:
(PC 41 : 192.168.2.15)
Ping 192.168.2.15
Machines on the same floor always ping each other
When I turned off the main router, I started to check connections of machines
of the same floor (PC37) and (PC49)( 192.168.3.19)

PC 37
Desktop PC 37 Choose Command Prompt:
(PC 49 : 192.168.3.19)
Ping 192.168.3.19
We can see that when we turn off the main router, we cannot ping from one
layer to another or ping the server.

After reopening the router, the computer was able to ping normally
References
(1) Computer Network Topology. (2019). Local Area Network |
Advantages and Disadvantages of LAN (2019). [online] Available at:
https://computernetworktopology.com/local-area-network/ [Accessed 29
Dec. 2019].
(2) (WAN), A., Rehman, J. and Rehman, J. (2019). Advantages and
disadvantages of wide area network (WAN). [online] IT Release.
Available at: http://www.itrelease.com/2018/07/advantages-and-
disadvantages-of-wide-area-network-wan/ [Accessed 29 Dec. 2019].
(3) Am7s. (2019). What is MAN Network?Advantages and
disadvantages of MAN-Am7s. [online] Available at:
https://am7s.com/what-is-man-network-advantages/ [Accessed 29 Dec.
2019].
(4) Sharma, K. (2019). WLAN with its Advantages and Disadvantages.
[online] OurEducation. Available at: https://blog.oureducation.in/wlan-
advantages-disadvantages/ [Accessed 29 Dec. 2019].
(5) (SAN), A., Rehman, J. and Rehman, J. (2019). Advantages and
disadvantages of storage area network (SAN). [online] IT Release.
Available at: http://www.itrelease.com/2019/05/advantages-and-
disadvantages-of-storage-area-network-san/ [Accessed 29 Dec. 2019].
(6) Guru99.com. (2019). [online] Available at:
https://www.guru99.com/type-of-network-topology.html [Accessed 29
Dec. 2019].
(7) Ambekar (2019). Networking devices. [online] Pt.slideshare.net.
Available at: https://pt.slideshare.net/MubassirAmbekar/networking-
devices-64424520/9 [Accessed 29 Dec. 2019].
(8) Webopedia.com. (2019). Server Types - Webopedia.com. [online]
Available at: https://www.webopedia.com/quick_ref/servers.asp
[Accessed 29 Dec. 2019].
(9) Australia, A., Brisbane, A., Melbourne, A., Perth, A., Sydney, A.,
Canada, A., Singapore, A., Malaysia, A., help, A., help, C., help, E., help,
E., help, F., help, H., help, M., help, M., help, N., help, S. and help, S.
(2019). (Solved) - Discuss the interdependence of workstation hardware
with relevant... | Transtutors. [online] Transtutors.com. Available at:
https://www.transtutors.com/questions/discuss-the-interdependence-of-
workstation-hardware-with-relevant-networking-softwar-2824686.htm
[Accessed 29 Dec. 2019].
(10) Stackify. (2019). Performance Testing Types, Steps, Best Practices,
and Metrics. [online] Available at: https://stackify.com/ultimate-guide-
performance-testing-and-software-testing/?
fbclid=IwAR0kX0OOICGdFkEV8B6zaeYLSnxvVzT5VCrm6fi0a6Tpsl
HbZNCred6bwpY [Accessed 29 Dec. 2019].
(11) Guru99.com. (2019). What is STRESS Testing in Software
Testing? Tools, Types, Examples. [online] Available at:
https://www.guru99.com/stress-testing-tutorial.html?
fbclid=IwAR2t7iqRCFhWtGt3YpZ1QpSDTSto-
tV1DQG22ud5A981qUltxIvOvuS-tK4#2/ [Accessed 29 Dec. 2019].
(12) National Technical Systems. (2019). Failure Analysis - Root Cause
Failure Analysis | NTS. [online] Available at:
https://www.nts.com/services/testing/failure-analysis/?
fbclid=IwAR2t7iqRCFhWtGt3YpZ1QpSDTSto-
tV1DQG22ud5A981qUltxIvOvuS-tK4 [Accessed 29 Dec. 2019].
Reference:
(1) Am7s. (2019). What is PAN Network?7 Advantages Disadvantages
PAN network. [online] Available at: https://www.am7s.com/what-pan-
network-advantages-disadvantages/. [Accessed 1 Dec. 2019].
(2) VidyaGyaan. (2019). Metropolitan Area Network (MAN) -
VidyaGyaan. [online] Available at:
http://www.vidyagyaan.com/computer-knowledge/types-of-computer-
network-lan-man-and-wan/attachment/metropolitan-area-network-
man/. [Accessed 1 Dec. 2019].
(3) types, T. (2019). The different network types. [online] IONOS
Digitalguide. Available at:
https://www.ionos.co.uk/digitalguide/server/know-how/the-different-
network-types/. [Accessed 1 Dec. 2019].
(4) People.eecs.berkeley.edu. (2019). Convergence of telecommunications
and computing. [online] Available at:
http://people.eecs.berkeley.edu/~messer/PAPERS/96/Proc1/.
[Accessed 1 Dec. 2019].
(5) Ewart.org.uk. (2019). Network Topology. [online] Available at:
http://www.ewart.org.uk/it/network/topology/topology.htm. [Accessed
1 Dec. 2019].
(6) https://patientengagementhit.com/news/how-technology-can-enhance-
family-communication-satisfaction. (2019). [online] Available at:
https://patientengagementhit.com/news/how-technology-can-enhance-
family-communication-satisfaction. [Accessed 1 Dec. 2019].
(7) Technicaltoday.in. (2019). Impact of Technology on Communication –
Technical Today. [online] Available at:
http://technicaltoday.in/impact-of-technology-on-communication/.
[Accessed 1 Dec. 2019].
(8) Executionists | Web Design, Development and Marketing Agency.
(2019). An Explanation Of Bandwidth: What It Means And How
Much You Need - Executionists | Web Design, Development and
Marketing Agency. [online] Available at:
https://www.executionists.com/an-explanation-of-bandwidth/.
[Accessed 1 Dec. 2019].
(9) Anon, (2019). [online] Available at:
https://searchnetworking.techtarget.com/definition/bandwidth.
[Accessed 1 Dec. 2019].
(10) GeeksforGeeks. (2019). Network Devices (Hub, Repeater, Bridge,
Switch, Router, Gateways and Brouter) - GeeksforGeeks. [online]
Available at: https://www.geeksforgeeks.org/network-devices-hub-
repeater-bridge-switch-router-gateways/. [Accessed 1 Dec. 2019].
(11) Router-switch.com. (2019). Cisco Router, Cisco Switch, New Used
Cisco Prices Comparison. [online] Available at: https://www.router-
switch.com/faq/types-of-servers-and-common-network-servers.html.
[Accessed 1 Dec. 2019].
(12) Pediaa.Com. (2019). Difference Between Hardware and Software -
Pediaa.Com. [online] Available at: https://pediaa.com/difference-
between-hardware-and-software/. [Accessed 1 Dec. 2019].

You might also like