Networking
Networking
Task 1/ P1 Discuss the benefits and constraints of different network types and
standards.................................................................................................................................2
PEER TO PEER SERVER................................................................................................4
CLIENT SERVER..............................................................................................................6
requirements.........................................................................................................................13
Types of network topologies.............................................................................................13
Bus topologies................................................................................................................13
Ring topologies..............................................................................................................14
Star topology.................................................................................................................15
Tree topology.................................................................................................................15
Mesh topology...............................................................................................................16
Hybrid topology............................................................................................................17
Conclusion.........................................................................................................................18
Task 4 /P3 Discuss the operating principles of networking devices and server types......19
SERVER............................................................................................................................20
HUB...................................................................................................................................21
ROUTER...........................................................................................................................21
SWITCH............................................................................................................................22
BRIDGE............................................................................................................................22
MULTI LAYER SWITCH...............................................................................................23
FIREWALL......................................................................................................................24
HIDS (Hose-Based Intrusion Detection System) REPEATER......................................24
ACCESS POINT...............................................................................................................24
MODEM............................................................................................................................24
CONTENT FILTER.........................................................................................................25
LOAD BALANCER.........................................................................................................25
PACKET SHAPER..........................................................................................................25
VPN CONCENTRATOR.................................................................................................25
Task 1/ P1 Discuss the benefits and constraints of different network types and
standards.
In this task the main requirement of Nepal link company to present a report
considering the different system types as Peer Based, client-server, cloud, cluster,
centralized, virtualized, OSI model, TCP/IP model and the standards as IEEE, 802.x.
There is some company requirement list which is provide by the Nepal link
company. My responsibility is to full fill all the requirement of the task such as
definition, advantage, disadvantage and diagram so, I have tried to include necessary
things in my task.
Network
It is a group of system connection together for sharing information, data file etc. with
the help of fiber, optical cable, wireless. (GeeksforGeeks, 2019)
Types of network
Networks are divided into three types
LAN – (Local Area Network)
MAN— (Metropolitan Area Network)
WAN---(Wide Area Network)
Disadvantage
1. More cable is used.
2. It required high level technical person for manage.
3. Difficult to manage.
(GeeksforGeeks, 2019)
WAN---(Wide Area Network)
Wide area network is cover all over the world. It is a group of LAN and MAN
networks.
Advantage
Disadvantage
1. The security policy is unsecured because viruses, spyware, trojans, etc. easily
transfer.
2. Information of the data recover or holdup is challenging. Each computer has
their own back-up.
3. The copyrighted issue is faced in P2P when the file, movies, song etc. are
share.
Advantage
Disadvantage
1. Establishment and maintenance cost are high.
2. It required skillful person to handle.
3. One-part of the system damage whole system.
Fig: - Client server
Cloud server
A cloud server is a virtual server which is running in a cloud computing environment.
The cloud server is built, hosted and sending through a cloud computing platform by
way of the internet and can be accessed remotely. To running cloud server all
software is updated in them.
Advantage
Disadvantage
Cluster network
It is a group of computers which is strongly connection and work together so, it is
look like as a single computer. It is usually connection through a LAN network.
Fig: - Cluster Network
Advantage
1. Well manage network.
2. High security information.
3. Easy access data.
Disadvantage
1. It needs more servers and other physical equipment which rise the financial in
the time of established.
2. Skillful person should be hire for manage and maintenance.
Centralized network
It is a network where all users are connected to a particular server for sharing the data,
communication. Communication and user personal information also store inside the
server.
Fig: - Centralized Network
Advantage
1. Centralized network supports to reduce the cost.
2. It provide well data security.
3. Quick making decisions.
Disadvantage
1. It needs large data storage.
2. Network traffic can cause input/output data flow.
3. Server down whole system down.
Virtualized network
Advantage
1.
Disadvantage
1.
OSI Model (Open Systems Interconnection)
The main objective of OSI model is how application layers is communicated between
two endpoints and each layer is connected to each other for exchanging data. OSI
model has seven layers.
Application layer
Application layer is the seventh layer of the OSI model. This layers directly co-
operates with information for the end user. The application layer is used for different
services such as Simple Mail Transfer Protocol, File Transfer, Web Chat Email
Clients etc. This all kind of services is handling by end user.
Presentation layer
Presentation layer is the sixth layer of the OSI model. The main objective of this layer
is present data on the application. Sender send the data in such a way end user receive
that data in an accurate, well-defined and standardized format.
Session layer
Session layer is the fifth layer of the OSI model. Session layer oversees and
synchronize the discussion between two unique applications.
Transport layer
Transport layer is the fourth layer of OSI model. Data is accepted from above layer
and fragmented it into small unit. This all unit pass through the network layer and
make ensure all fragment unit arrive safely at the end point.
Network layer
Network layer is the third layer of OSI model. The propose of this layer is to bring
packets from source to end point. If both sender and receive are connected on same
link at that time, there is no need for a network layer otherwise network layer is
requirement for different channel.
Data link layer is the second layer of OSI model. The responsible of this layer is to
manage the data. Bits are converted into frame and forward to the network layer.
There are some functions like framing, physical addressing, flow control, error control
and access control.
Physical layer
It is the first layer of the OSI model. The responsible of the physical layer is sending
bits from one computer to another. In OSI model physical layer is the only one layer
which is deal with physical part like hardware equipment, cabling, wiring, frequencies
etc.
Website –
https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-
osi/
TCP/IP Model
TCP/IP Model was designed by Department of Defense (DoD) in 1960s and it based
on standard protocols.
IEEE, 802.x.
Conclusion
In this task,
References:
1. Uvindasiri, T. and Posts, V. (2019). Introduction and Advantages/Disadvantages of
Clustering in Linux - Part 1. [online] Tecmint.com. Available at:
https://www.tecmint.com/what-is-clustering-and-advantages-disadvantages-of-
clustering-in-linux/ [Accessed 9 Apr. 2019].
2. GeeksforGeeks. (2019). Computer Network | Types of area networks - LAN, MAN
and WAN - GeeksforGeeks. [online] Available at:
https://www.geeksforgeeks.org/computer-network-types-area-networks-lan-man-wan/
[Accessed 10 Apr. 2019].
Task 2/ P2 Explain the impact of network topology, communication and
bandwidth requirements
In order to complete this task, I have to explain the impact of network technology
considering the speed of data transmission, the way the communication is made in
each of the topologies and the bandwidth requirements for each topology.
Advantage
1. The cost is effective.
2. It is used in small network e.g. (School, college, library etc.)
3. Easily find out the problem.
4. Low maintains cost.
Disadvantage
1. Network traffic chance is more when all pc work together.
2. Length of the cable is limited.
3. Compare to the ring topology speed is slow.
Ring topologies
The computer in network are connected in a circular and data travels in one direction.
One computer is directly connected to the next computer nodes. It is easy to manage
and install. If problem in network, we can easily find out. (Nightcourses.com, 2018)
Advantage
1. Cheap to install and manage.
2. Easy to point out problem.
Disadvantage
1. One computer failure makes whole network disturbs.
2. Troubleshooting is difficult.
Star topology
In this type of topology all the computer is connected to a single hub by the helps of
network cable. All cables are connected in a central hub. Data are sending and
receiving passing through the hub. (GeeksforGeeks, 2018)
Advantage
1. Easy to add and remove pc.
2. One computer failure does not affect the whole network.
3. Faster than bus and ring topology.
Disadvantage
1. Cost is high compare to bus and ring topology.
2. Data traffic and collision rate will be high.
3. Damage of hub make the whole network affect.
Tree topology
A tree topology is a combination of star and bus topology. In tree topology, nodes of
the original bus network topology are replaced with a complete star topology.
(Nightcourses.com, 2018)
Fig: - Tree topology
Advantage
1. Data traffic and collision is minimized due to hub to hub connection.
2. Number of computers is large.
3. Easily detected the problem.
4. Not disturbance the network while removing and adding devices.
Disadvantage
1. It required more cables and hub.
2. Set up and maintains cost is high.
3. Difficult to find out error.
4. If central hub fails whole network down.
Mesh topology
In mesh topology, all computer is connected by the help of cable. Every single pc is
connected more than one cable. Data transfer rate is high and error chance decrease.
(GeeksforGeeks, 2018)
Fig: - Mesh topology
Advantage
1. Direct connection between computer so, data transfer fast and secure.
2. One node does not affect the whole network.
3. Speed of transfer file is high.
Disadvantage
1. Cost is high
2. Difficult to setup.
3. Required more cable.
Hybrid topology
Hybrid topology is the combination of two or more than two topologies. Some of the
most commonly used hybrid topologies are star-bus topology, star-ring topology, bus-
ring topology. (Nightcourses.com, 2018)
Fig: - Hybrid topology
Advantage
1. Fault detection is easy.
2. We can easily create large network.
Disadvantage
1. It is expensive to established.
2. Cost of maintains is high.
3. Installation and configuration process are so much difficult.
Bandwidth
The quantity of data that can be transfer from one side to another in a particular time.
Expensive high bandwidth network transfer data much faster than a low bandwidth
network.
Conclusion
In this task, I have described
References
SERVER
A server is a computer program which provide service to other computer in a real
time as a client need.
Fig:- server
Types of server
Web server
File server
A server which is used to share file, folder and storage space to hold in the file server.
(Definitions and Hope, 2018)
Database server
A database server is a computer system that provides other computer systems with
services related to accessing and retrieving statistics from a database. (Definitions and
Hope, 2018)
Virtualization server
A single physical device where two operation systems are installing and run at a same
time. To run Virtualization server, we need software called VMware. It helps to save
time, hardware, money power and other resources.
Print server
Printer server is small device which is connected to a client’s computer over the
network. The purpose of using printer server is accepted the request from the client
and forward this request to the printer. (Anon, 2019)
HUB
A hub could be a common connection purpose for devices in a network. Hubs
are commonly used to connect segments of a local area network. A hub contains
multiple ports. When a packet arrives at one port, it is derived to the opposite ports in
order that all segments of the local area network will see all packets. In the case of
broadcasting data traffic is increased because all the data are sending and receiving
from the same path.
Fig: - Hub
ROUTER
Router is a device which is used to connect more than two different networks
together. When we send data-packet forwarded from one router to another router
through the internet. Router receive a data packet and it identify the IP address and
send the data from their destination.
Fig: - Router
SWITCH
A switch is a device which select the most easy or direct path to send a data packet for
there its destination. Switch also called intelligent hub. When It receive a data packet
it makes direct connection between sender and receive and forward data packet the
destination computer only.
Fig: - Switch
BRIDGE
Bridge is used to connect two different network sectors together. It is the connecting
device between hubs. It passes data packets between multiple network segment that
use same communication protocol.
Fig: - Bridge
Fig: - Firewall
WIRELESS DEVICES
The device which connect without any physical connection. The most common
wireless technology use is radio wave. The distance of wireless signal is short or also
their capacity. Some wireless devices are keyboard, mouse, headset, satellite
television etc.
ACCESS POINT
Access point (AP) is a networking hardware device that allows a wi-fi device to
connect to a wired network.
MODEM
Modem stands for Modulator and DEModulator. It is a device, which is used to
translates data from binary codes to analog data that is connect telephone to computer
for data sharing purpose.
CONTENT FILTER
Content filter is a set of programs which decide what types of contents are acceptable
for a viewer or end user from the internet. This type of set program or software are
mainly used in company, organization because may be employer are waste working
hours. (Anon, 2019)
LOAD BALANCER
Load balancing is a technique which is used to distribute over workloads in a
computer or server resources to run network efficiency, reliability and capacity. Load
balancer will be a physical application either software instance or combination of
both. (SearchNetworking, 2018)
PACKET SHAPER
Packet shaper, also known as ‘traffic shaper’. Traffic shaping is a bandwidth
management technique used on computer networks which delays some or all
datagrams to bring them into compliance with a desired traffic profile.
VPN CONCENTRATOR
VPN concentrator is a networking device which is setup to handle multiple secure
connections into the given network and it also create multiple VPN tunnels.
(SearchNetworking, 2018)
References
Task 5 /P4 Discuss the inter dependence of workstation hardware with relevant
networking software.
In this task we have required different computer hardware to installed in the
workstation server and other different networking software.
Workstation
A workstation is a unique computer designed for technical or scientific application.
Intended especially to be used with the aid of one character at a time, they are
regularly related to a local region network and run multi-user working system.
(Engineering & Technology Jobs, 2018)
A software which is specifically design for the server only. It has advance feature and
architecture are include to handle clients but similar computing environment as a
client.
Memory – 8 GB RAM
The client operating software is the system which is able to operate from desktops and
portable devices. Printers, monitors, scanner, cameras etc. are manage from client
operating software.
RAM- 4GB
Client software
The software which is used for client pc is called client software. Many software is
available in the market to operate for client.
Server software
Server software is a type of software which is design to operate and manage the all
client.
Firewall
Firewall is a hardware or software system which is used to control network traffic and
secure incoming and outgoing data. It can work on the based on encoded security
rules. Firewall helps to safe from untrusted external network. (Support.hp.com, 2019)
References
1. Engineering & Technology Jobs. (2018). Why CPD is so important in any career |
Engineering & Technology Jobs. [online] Available at: https://engineering-
jobs.theiet.org/article/why-cpd-is-so-important-in-any-career/ [Accessed 17 Dec.
2018].
2. Support.hp.com. (2019). HP Web Jetadmin - System Requirements | HP® Customer
Support. [online] Available at: https://support.hp.com/gb-en/document/c05996521
[Accessed 22 Apr. 2019].
3. Support.hp.com. (2019). HP Web Jetadmin - System Requirements | HP® Customer
Support. [online] Available at: https://support.hp.com/gb-en/document/c05996521
[Accessed 22 Apr. 2019].
Task 8/ P5 Design a networked system to meet a given specification.
In this task, the requirement of design a network diagram using a Visio Tool and
considering the various server technology Virtual private network, Windows
Deployment Services Network, Network components etc. I have included all kind of
devices which is required to established the network in the institute according to the
institute policy. The given diagram is show in the below.
The given diagram is created in Visio Tool. There are 50 computers in first and
second floors. In ground floor there are 25 pc, 3 printer, one switch and one front desk
are included in it. According to the employers need they can used 3 printer which is
presented in the ground floor. Switch helps to connected to all pc and printer to each
other for communication.
In first floor there are 25 pc, one switch and access point are available in first
computer lab. Access point is used for wireless devices for e.g. mobile, tap late and
other wireless devices.
In Second floor is divided for staff room. In that room there are 26 pc for staff and 3
pc for network admin. At the same room there are two servers are contained. One
server is used for HTTP, FTP, DNS, DC and second server is used for secondary
DNS.
Third floor is used for admin. In that room, there are 5pc, one access point, one router
and one switch are including in different place in room. Router is used for make the
connection worldwide. Router is connected with firewall then ISP (Internet Service
Provider). The main purpose of firewall is to save the company from unauthorized
access or private network. By the help of ISP, we can connect with world.
Task 9/ P6 Test and evaluate the design to meet the requirements and analyze
user feedback
Independent Feedback
Date: 2019-01-01
Have identified the all server (DHCP, DNS, ye Yes, all server is
MAIL SERVER, FTP SERVER) s identified.
Have Front End and Back End of the system ye Yes, both front end
has been designed? s and back end are
designed.
Does the system have been implemented in ye Yes, all the design
align with the proper design? s is in proper
implemented.
Have been critically tested and reviewed the ye Yes, the critically
system or not? s tested and reviewed
the system.
Does the system solve the problem of the ye Yes, the system
client? And deign the security? s solves the problem
of the client.
Project 1) In this project there are only types of user i.e. user and
Limitation admin.
Feedback Evaluation
Date:
Design: -
The company got a network project for an education institute so; all design is based
to configure network. According to the scenario I am analyze the project to finish
the project in a given time framework. There are 600 students, 40 teachers, 12
marketing and administration staff, 5 higher managers and 3 computer network
administrators are included in the project. Different types of electronic devices are
connected in whole project. All devices have their own function so, devices like
Printer, Server, Hub, Router, Switch, Multi-Layer Switch, Firewalls, HIDS,
Repeater, Bridges, Access Point, Content Filter, Load Balancer, Modem, Packet
Shaper, VPN Concentrator.
Function of hardware: -
Server – Server are used for provide the service for client computer.
Router- Router is used for make communication between two different networks.
Switch- Switch is a device which select the most easy or direct path to send a data
packet for there its destination.
Multi-Layer Switch- Multi-Layer Switch can perform the function of the switch as
well as that of the router at incredibly fast speeds.
Security: - Security mean secure the data from virus, hacker, malware and other
third party. There are many types of security to secure the organization such as
firewall devices, used VPN etc.
Security:
Task 13/ P8 Document and analyze test results against expected result.