0% found this document useful (0 votes)
130 views36 pages

Networking

Uploaded by

Milan Bhantana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
130 views36 pages

Networking

Uploaded by

Milan Bhantana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 36

Contents

Task 1/ P1 Discuss the benefits and constraints of different network types and
standards.................................................................................................................................2
PEER TO PEER SERVER................................................................................................4
CLIENT SERVER..............................................................................................................6
requirements.........................................................................................................................13
Types of network topologies.............................................................................................13
Bus topologies................................................................................................................13
Ring topologies..............................................................................................................14
Star topology.................................................................................................................15
Tree topology.................................................................................................................15
Mesh topology...............................................................................................................16
Hybrid topology............................................................................................................17
Conclusion.........................................................................................................................18
Task 4 /P3 Discuss the operating principles of networking devices and server types......19
SERVER............................................................................................................................20
HUB...................................................................................................................................21
ROUTER...........................................................................................................................21
SWITCH............................................................................................................................22
BRIDGE............................................................................................................................22
MULTI LAYER SWITCH...............................................................................................23
FIREWALL......................................................................................................................24
HIDS (Hose-Based Intrusion Detection System) REPEATER......................................24
ACCESS POINT...............................................................................................................24
MODEM............................................................................................................................24
CONTENT FILTER.........................................................................................................25
LOAD BALANCER.........................................................................................................25
PACKET SHAPER..........................................................................................................25
VPN CONCENTRATOR.................................................................................................25
Task 1/ P1 Discuss the benefits and constraints of different network types and
standards.
In this task the main requirement of Nepal link company to present a report
considering the different system types as Peer Based, client-server, cloud, cluster,
centralized, virtualized, OSI model, TCP/IP model and the standards as IEEE, 802.x.
There is some company requirement list which is provide by the Nepal link
company. My responsibility is to full fill all the requirement of the task such as
definition, advantage, disadvantage and diagram so, I have tried to include necessary
things in my task.

Network
It is a group of system connection together for sharing information, data file etc. with
the help of fiber, optical cable, wireless. (GeeksforGeeks, 2019)
Types of network
Networks are divided into three types
 LAN – (Local Area Network)
 MAN— (Metropolitan Area Network)
 WAN---(Wide Area Network)

LAN – (Local Area Network)


Local area network is computer network which is interconnects in a limited zone such
as office, building, school etc. In LAN switch is used to make connection between
computers and devices.
Fig: - local area network
Advantage
1. Resources are sharing like printer, scanner.
2. High speed data share.
3. Security level high.
Disadvantage
1. Limited number of systems connected.
2. It covers small area.
(GeeksforGeeks, 2019)

MAN— (Metropolitan Area Network)


This network is larger than local area network and smaller than wide area network.
This network covers a large area or region. In MAN

Fig: - metropolitan area network


Advantage
1. Centralized the data in one location.
2. It covers large area.
3. Easy to share data.

Disadvantage
1. More cable is used.
2. It required high level technical person for manage.
3. Difficult to manage.
(GeeksforGeeks, 2019)
WAN---(Wide Area Network)
Wide area network is cover all over the world. It is a group of LAN and MAN
networks.

Fig: - wide area network


Advantage
1. Sharing information all over the world.
2. Centralized data.
3. Worldwide business established.
Disadvantage
1. Maintenance cost rise.
2. Crime rate is high like hacking, virus sharing.
3. It required high performance devices.
(GeeksforGeeks, 2019)

Peer to peer server


In peer to peer network, peer is called computer system which is connected to each
other by the help of internet. Without a central server, files are easily public from
system to system. In P2P server every single system can be capable to arrange a
server and a client at the same time. Without any hub and server, data are sending and
receiving easily form one system to another.

Advantage

1. It is easy to arrangement and manage.


2. The setup, maintenance, and operating cost are low.
3. It is not required for any server to storage or exchange message.
4. Failure of one peer does not affect the whole system.

Disadvantage

1. The security policy is unsecured because viruses, spyware, trojans, etc. easily
transfer.
2. Information of the data recover or holdup is challenging. Each computer has
their own back-up.
3. The copyrighted issue is faced in P2P when the file, movies, song etc. are
share.

Fig: - peer to peer


Client server
A client server network is an end user for client server, end user can access resources
success as songs, files, video, apps, and other services from a powerful computer
called server. Client server retrieve the data or information form the server as a client
required. Foe e.g. Client send a packet of email that email goes to the email server, it
tries to match email address and password if these permits competition the email
server will send email. (GeeksforGeeks, 2018)

Advantage

1. Centralization facility is setup.


2. Physical troubleshoot problem can easily solve because all part of server in
one place.
3. It is easy to back up and recover data from the server.
4. Security facility is high.
5. Client server can fulfill all the requirement of the client.

Disadvantage
1. Establishment and maintenance cost are high.
2. It required skillful person to handle.
3. One-part of the system damage whole system.
Fig: - Client server

Cloud server
A cloud server is a virtual server which is running in a cloud computing environment.
The cloud server is built, hosted and sending through a cloud computing platform by
way of the internet and can be accessed remotely. To running cloud server all
software is updated in them.

Advantage

1. It helps to reduce the space of personal computer.


2. We can easily access anything by the help of internet.
3. It has high security to secure the data.

Disadvantage

1. Lots of amount should be investing to established.


2. We cannot access files, software, videos and songs without internet
connection.
3. In the case of server down whole system will be down.

Fig: - Cloud Server

Cluster network
It is a group of computers which is strongly connection and work together so, it is
look like as a single computer. It is usually connection through a LAN network.
Fig: - Cluster Network

Advantage
1. Well manage network.
2. High security information.
3. Easy access data.
Disadvantage
1. It needs more servers and other physical equipment which rise the financial in
the time of established.
2. Skillful person should be hire for manage and maintenance.

(Uvindasiri and Posts, 2019)

Centralized network
It is a network where all users are connected to a particular server for sharing the data,
communication. Communication and user personal information also store inside the
server.
Fig: - Centralized Network

Advantage
1. Centralized network supports to reduce the cost.
2. It provide well data security.
3. Quick making decisions.
Disadvantage
1. It needs large data storage.
2. Network traffic can cause input/output data flow.
3. Server down whole system down.
Virtualized network

Advantage
1.
Disadvantage
1.
OSI Model (Open Systems Interconnection)
The main objective of OSI model is how application layers is communicated between
two endpoints and each layer is connected to each other for exchanging data. OSI
model has seven layers.

Application layer

Application layer is the seventh layer of the OSI model. This layers directly co-
operates with information for the end user. The application layer is used for different
services such as Simple Mail Transfer Protocol, File Transfer, Web Chat Email
Clients etc. This all kind of services is handling by end user.

Presentation layer

Presentation layer is the sixth layer of the OSI model. The main objective of this layer
is present data on the application. Sender send the data in such a way end user receive
that data in an accurate, well-defined and standardized format.

Session layer

Session layer is the fifth layer of the OSI model. Session layer oversees and
synchronize the discussion between two unique applications.
Transport layer

Transport layer is the fourth layer of OSI model. Data is accepted from above layer
and fragmented it into small unit. This all unit pass through the network layer and
make ensure all fragment unit arrive safely at the end point.

Network layer

Network layer is the third layer of OSI model. The propose of this layer is to bring
packets from source to end point. If both sender and receive are connected on same
link at that time, there is no need for a network layer otherwise network layer is
requirement for different channel.

Data link layer

Data link layer is the second layer of OSI model. The responsible of this layer is to
manage the data. Bits are converted into frame and forward to the network layer.
There are some functions like framing, physical addressing, flow control, error control
and access control.

Physical layer

It is the first layer of the OSI model. The responsible of the physical layer is sending
bits from one computer to another. In OSI model physical layer is the only one layer
which is deal with physical part like hardware equipment, cabling, wiring, frequencies
etc.

Website –

https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-
osi/

TCP/IP Model
TCP/IP Model was designed by Department of Defense (DoD) in 1960s and it based
on standard protocols.

OSI Model TCP/IP Model

1. OSI refers to Open Systems TCP refers to Transmission Control


Interconnection. Protocol
2. It has 7 layers. It has 4 layers.
3. It follows a vertical approach. It follows a horizontal approach.

4. It uses different session and In application layer, it uses both session


presentation layer. and presentation layer.
5. It is protocol independent. It is protocol dependent.

IEEE, 802.x.

Conclusion

In this task,

References:
1. Uvindasiri, T. and Posts, V. (2019). Introduction and Advantages/Disadvantages of
Clustering in Linux - Part 1. [online] Tecmint.com. Available at:
https://www.tecmint.com/what-is-clustering-and-advantages-disadvantages-of-
clustering-in-linux/ [Accessed 9 Apr. 2019].
2. GeeksforGeeks. (2019). Computer Network | Types of area networks - LAN, MAN
and WAN - GeeksforGeeks. [online] Available at:
https://www.geeksforgeeks.org/computer-network-types-area-networks-lan-man-wan/
[Accessed 10 Apr. 2019].
Task 2/ P2 Explain the impact of network topology, communication and
bandwidth requirements
In order to complete this task, I have to explain the impact of network technology
considering the speed of data transmission, the way the communication is made in
each of the topologies and the bandwidth requirements for each topology.

Types of network topologies.


Bus topologies
A bus topology connects each computer in a single wire like a bus. We have limited
length of cable and connection nodes if we break ours wire the whole connection
should be goes down. In this topology troubleshoot solving problem is very difficult.
It is not able for permanent network because in huge company or organization, there
is many regions but I include some. I already told there is limit length of cable and
connection nodes. There is maximum chance of data traffic which increase the data
collision rate. If we discuss about speed of this topology is to slow. Single cable
connects the whole computer so, all data transfer one computer to another by a wire.
In the same time data sending and receiving occur which make the data traffic and
time consume. (Nightcourses.com, 2018)

Fig: - Bus topology

Advantage
1. The cost is effective.
2. It is used in small network e.g. (School, college, library etc.)
3. Easily find out the problem.
4. Low maintains cost.

Disadvantage
1. Network traffic chance is more when all pc work together.
2. Length of the cable is limited.
3. Compare to the ring topology speed is slow.

Ring topologies
The computer in network are connected in a circular and data travels in one direction.
One computer is directly connected to the next computer nodes. It is easy to manage
and install. If problem in network, we can easily find out. (Nightcourses.com, 2018)

Fig: - Ring topology

Advantage
1. Cheap to install and manage.
2. Easy to point out problem.

Disadvantage
1. One computer failure makes whole network disturbs.
2. Troubleshooting is difficult.
Star topology
In this type of topology all the computer is connected to a single hub by the helps of
network cable. All cables are connected in a central hub. Data are sending and
receiving passing through the hub. (GeeksforGeeks, 2018)

Fig: - Star topology

Advantage
1. Easy to add and remove pc.
2. One computer failure does not affect the whole network.
3. Faster than bus and ring topology.

Disadvantage
1. Cost is high compare to bus and ring topology.
2. Data traffic and collision rate will be high.
3. Damage of hub make the whole network affect.

Tree topology
A tree topology is a combination of star and bus topology. In tree topology, nodes of
the original bus network topology are replaced with a complete star topology.
(Nightcourses.com, 2018)
Fig: - Tree topology

Advantage
1. Data traffic and collision is minimized due to hub to hub connection.
2. Number of computers is large.
3. Easily detected the problem.
4. Not disturbance the network while removing and adding devices.

Disadvantage
1. It required more cables and hub.
2. Set up and maintains cost is high.
3. Difficult to find out error.
4. If central hub fails whole network down.

Mesh topology
In mesh topology, all computer is connected by the help of cable. Every single pc is
connected more than one cable. Data transfer rate is high and error chance decrease.
(GeeksforGeeks, 2018)
Fig: - Mesh topology

Advantage
1. Direct connection between computer so, data transfer fast and secure.
2. One node does not affect the whole network.
3. Speed of transfer file is high.

Disadvantage
1. Cost is high
2. Difficult to setup.
3. Required more cable.

Hybrid topology
Hybrid topology is the combination of two or more than two topologies. Some of the
most commonly used hybrid topologies are star-bus topology, star-ring topology, bus-
ring topology. (Nightcourses.com, 2018)
Fig: - Hybrid topology

Advantage
1. Fault detection is easy.
2. We can easily create large network.

Disadvantage
1. It is expensive to established.
2. Cost of maintains is high.
3. Installation and configuration process are so much difficult.

Bandwidth
The quantity of data that can be transfer from one side to another in a particular time.
Expensive high bandwidth network transfer data much faster than a low bandwidth
network.

Conclusion
In this task, I have described
References

1. GeeksforGeeks. (2018). Network Topologies | Computer Networks - GeeksforGeeks.


[online] Available at: https://www.geeksforgeeks.org/network-topologies-computer-
networks/ [Accessed 10 Oct. 2018].
2. Nightcourses.com. (2018). The importance of Continuing Professional
Development .... [online] Available at: https://www.nightcourses.com/importance-
continuing-professional-development-cpd/ [Accessed 9 Oct. 2018].
3.
Task 4 /P3 Discuss the operating principles of networking devices and server
types.
In this task, I have described the operating principle of networking devices and server
which are in the given below.

SERVER
A server is a computer program which provide service to other computer in a real
time as a client need.

Fig:- server

Types of server

Web server

A Web server is a program that makes use of HTTP (Hypertext Transfer Protocol) to


serve the archives that form Web pages to users, in response to their requests.
(Definitions and Hope, 2018)

File server

A server which is used to share file, folder and storage space to hold in the file server.
(Definitions and Hope, 2018)

Database server

A database server is a computer system that provides other computer systems with
services related to accessing and retrieving statistics from a database. (Definitions and
Hope, 2018)

Virtualization server
A single physical device where two operation systems are installing and run at a same
time. To run Virtualization server, we need software called VMware. It helps to save
time, hardware, money power and other resources.

Print server

Printer server is small device which is connected to a client’s computer over the
network. The purpose of using printer server is accepted the request from the client
and forward this request to the printer. (Anon, 2019)

HUB
A hub could be a common connection purpose for devices in a network. Hubs
are commonly used to connect segments of a local area network. A hub contains
multiple ports. When a packet arrives at one port, it is derived to the opposite ports in
order that all segments of the local area network will see all packets. In the case of
broadcasting data traffic is increased because all the data are sending and receiving
from the same path.

Fig: - Hub

ROUTER
Router is a device which is used to connect more than two different networks
together. When we send data-packet forwarded from one router to another router
through the internet. Router receive a data packet and it identify the IP address and
send the data from their destination.
Fig: - Router

SWITCH
A switch is a device which select the most easy or direct path to send a data packet for
there its destination. Switch also called intelligent hub. When It receive a data packet
it makes direct connection between sender and receive and forward data packet the
destination computer only.

Fig: - Switch

BRIDGE
Bridge is used to connect two different network sectors together. It is the connecting
device between hubs. It passes data packets between multiple network segment that
use same communication protocol.
Fig: - Bridge

MULTI LAYER SWITCH


Multi-layer switch is a networking device which provide extra function on higher OSI
layers. It can perform the function of the switch as well as that of the router at
incredibly fast speeds. (Cisco, 2018)

Fig: - Multilayer switch


FIREWALL
A firewall can either be software-based or hardware or both which is used for give a
security in the network. It controls the incoming and outgoing network traffic by
analyzing the data packets from an unauthorized access site. (Cisco, 2018)

Fig: - Firewall

HIDS (Hose-Based Intrusion Detection System) REPEATER


Today, cyber-attacks and hacking are come all over the news so, company’s security
is first priority. Firewall is not enough for secure the company data. Therefore, HIDS
is used for an additional security and It provide system monitoring functions for a
cyber-attack.

WIRELESS DEVICES

The device which connect without any physical connection. The most common
wireless technology use is radio wave. The distance of wireless signal is short or also
their capacity. Some wireless devices are keyboard, mouse, headset, satellite
television etc.

ACCESS POINT
Access point (AP) is a networking hardware device that allows a wi-fi device to
connect to a wired network.

MODEM
Modem stands for Modulator and DEModulator. It is a device, which is used to
translates data from binary codes to analog data that is connect telephone to computer
for data sharing purpose.
CONTENT FILTER
Content filter is a set of programs which decide what types of contents are acceptable
for a viewer or end user from the internet. This type of set program or software are
mainly used in company, organization because may be employer are waste working
hours. (Anon, 2019)

LOAD BALANCER
Load balancing is a technique which is used to distribute over workloads in a
computer or server resources to run network efficiency, reliability and capacity. Load
balancer will be a physical application either software instance or combination of
both. (SearchNetworking, 2018)

PACKET SHAPER
Packet shaper, also known as ‘traffic shaper’. Traffic shaping is a bandwidth
management technique used on computer networks which delays some or all
datagrams to bring them into compliance with a desired traffic profile.

VPN CONCENTRATOR
VPN concentrator is a networking device which is setup to handle multiple secure
connections into the given network and it also create multiple VPN tunnels.
(SearchNetworking, 2018)

References

1. Definitions, M. and Hope, C. (2018). What is a Mail Server?. [online]


Computerhope.com. Available at:
https://www.computerhope.com/jargon/m/mailserv.htm [Accessed 11 Dec. 2018].
2. Cisco. (2018). Cisco IOS Switching Services Configuration Guide, Release 12.2 -
Multilayer Switching Overview [Cisco IOS Software Release 12.2]. [online] Available
at:
https://www.cisco.com/c/en/us/td/docs/ios/12_2/switch/configuration/guide/fswtch_c/x
cfmsov.html [Accessed 11 Dec. 2018].
3. Cisco. (2018). Cisco IOS Switching Services Configuration Guide, Release 12.2 -
Multilayer Switching Overview [Cisco IOS Software Release 12.2]. [online] Available
at:
https://www.cisco.com/c/en/us/td/docs/ios/12_2/switch/configuration/guide/fswtch_c/x
cfmsov.html [Accessed 11 Dec. 2018].
4. SearchNetworking. (2018). What is load balancing? - Definition from WhatIs.com.
[online] Available at: https://searchnetworking.techtarget.com/definition/load-
balancing [Accessed 12 Dec. 2018].
5. SearchNetworking. (2018). What is load balancing? - Definition from WhatIs.com.
[online] Available at: https://searchnetworking.techtarget.com/definition/load-
balancing [Accessed 12 Dec. 2018].
6. Anon, (2019). [online] Available at: http://www.tech-faq.com/print-server.html
[Accessed 27 Apr. 2019].
7. Support.hp.com. (2019). HP  Web Jetadmin - System Requirements | HP® Customer
Support. [online] Available at: https://support.hp.com/gb-en/document/c05996521
[Accessed 22 Apr. 2019].

Task 5 /P4 Discuss the inter dependence of workstation hardware with relevant
networking software.
In this task we have required different computer hardware to installed in the
workstation server and other different networking software.

Workstation
A workstation is a unique computer designed for technical or scientific application.
Intended especially to be used with the aid of one character at a time, they are
regularly related to a local region network and run multi-user working system.
(Engineering & Technology Jobs, 2018)

Different software which are given follows:


Server operating software

A software which is specifically design for the server only. It has advance feature and
architecture are include to handle clients but similar computing environment as a
client.

Server Name – windows server 2012 R2

Processor – 2.8 GHz or higher processor speed

Processor cores – 4 or more processor cores

Memory – 8 GB RAM

Hard disk space – 1000 GB

Optical Driver – DVD-ROM drive. (Support.hp.com, 2019)

Client operating software

The client operating software is the system which is able to operate from desktops and
portable devices. Printers, monitors, scanner, cameras etc. are manage from client
operating software.

Operation system- Windows 7 (64 bit)

Application versions- Versions 11.0, 11.2 of client software

Processor -2.0 GHz

Processor core – Dual core

RAM- 4GB

Hard disk- 500 GB

Client software

The software which is used for client pc is called client software. Many software is
available in the market to operate for client.

Server software
Server software is a type of software which is design to operate and manage the all
client.

Firewall

Firewall is a hardware or software system which is used to control network traffic and
secure incoming and outgoing data. It can work on the based on encoded security
rules. Firewall helps to safe from untrusted external network. (Support.hp.com, 2019)

References
1. Engineering & Technology Jobs. (2018). Why CPD is so important in any career |
Engineering & Technology Jobs. [online] Available at: https://engineering-
jobs.theiet.org/article/why-cpd-is-so-important-in-any-career/ [Accessed 17 Dec.
2018].
2. Support.hp.com. (2019). HP  Web Jetadmin - System Requirements | HP® Customer
Support. [online] Available at: https://support.hp.com/gb-en/document/c05996521
[Accessed 22 Apr. 2019].
3. Support.hp.com. (2019). HP  Web Jetadmin - System Requirements | HP® Customer
Support. [online] Available at: https://support.hp.com/gb-en/document/c05996521
[Accessed 22 Apr. 2019].
Task 8/ P5 Design a networked system to meet a given specification.
In this task, the requirement of design a network diagram using a Visio Tool and
considering the various server technology Virtual private network, Windows
Deployment Services Network, Network components etc. I have included all kind of
devices which is required to established the network in the institute according to the
institute policy. The given diagram is show in the below.

The given diagram is created in Visio Tool. There are 50 computers in first and
second floors. In ground floor there are 25 pc, 3 printer, one switch and one front desk
are included in it. According to the employers need they can used 3 printer which is
presented in the ground floor. Switch helps to connected to all pc and printer to each
other for communication.

In first floor there are 25 pc, one switch and access point are available in first
computer lab. Access point is used for wireless devices for e.g. mobile, tap late and
other wireless devices.

In Second floor is divided for staff room. In that room there are 26 pc for staff and 3
pc for network admin. At the same room there are two servers are contained. One
server is used for HTTP, FTP, DNS, DC and second server is used for secondary
DNS.

Third floor is used for admin. In that room, there are 5pc, one access point, one router
and one switch are including in different place in room. Router is used for make the
connection worldwide. Router is connected with firewall then ISP (Internet Service
Provider). The main purpose of firewall is to save the company from unauthorized
access or private network. By the help of ISP, we can connect with world.

Task 9/ P6 Test and evaluate the design to meet the requirements and analyze
user feedback

Independent Feedback

Project Title: Educational institute

Feedback Given By: Signature:

Date: 2019-01-01

Project Description (in brief):

To complete educational institute project, company got a specification time


framework. In the project there are many requirements to complete. The institute
has located in 4 floors building. Inside the building different types of devices are
connected to each other for sharing and operate the data. Ground floor and first
floor has 50 pc for lap room and other devices like router, desktop, access point,
switch is used for client requirement. Rest floors are separate for staff and admin
room. Inside this room main servers are place. According to the project all kinds of
requirement are fulfills.
Important 1) User friendly and effective.
Features of the
2) This project is run on every platform because cisco
Design
systems are used

3) This project contains well managed design, security,


organized IP, interdepartmental contacts and data
transfer facilities, etc.

4) All the information in the table can be automatically


retrieved from database.

5) Duplicate user cannot be added.

6) It allows login for only the valid users having correct


user name and password. And the admin has different
authentication than a user.

7) It provides remote management to handle the


troubleshooting
8) This design automatic transfer and manage the data
from outside as well as inside.

Checklists YES NO Comment

Have identified the all server (DHCP, DNS, ye Yes, all server is
MAIL SERVER, FTP SERVER) s identified.

Have system requirements been defined and ye All system


are they clear? s requirements are
clear.

Have Front End and Back End of the system ye Yes, both front end
has been designed? s and back end are
designed.
Does the system have been implemented in ye Yes, all the design
align with the proper design? s is in proper
implemented.

Have been critically tested and reviewed the ye Yes, the critically
system or not? s tested and reviewed
the system.

Does the system solve the problem of the ye Yes, the system
client? And deign the security? s solves the problem
of the client.

Does the system fulfill the requirements of ye Yes, the system


the clients? s fulfills the
requirements of the
And arrange the IP as per client
client.
requirements?

Have implement routing and switching ye Yes, I implement


s router and switching
in the design.

Significance of 1) The design has well defined and manage IP and


the Project hardware systems

2) The information can be transferred any time within


network as well as outside of local network.

3) All the information in the table can be automatically


retrieved from database.

4) Duplicate user cannot be added for mail server or


hardware security is also there for protect unauthorized
access of router, switch and servers.

5) It allows login for only the valid users having correct


user name and password. And the admin has different
authentication than a user.

6) It supports remote management using telnet.

7) It also supports Vlan, InterVlan and VPN


communication with other branches securely.

Project 1) In this project there are only types of user i.e. user and
Limitation admin.

2) Without internet communication can make within


LAN outside communication cannot be there.

3) High security like ACL, NAT, Port security etc. are


not there

4) Low range of hardware are used.

Feedback Evaluation

Feedback Evaluated By: Signature:

Date:

Evaluation of the System:

Design: -
The company got a network project for an education institute so; all design is based
to configure network. According to the scenario I am analyze the project to finish
the project in a given time framework. There are 600 students, 40 teachers, 12
marketing and administration staff, 5 higher managers and 3 computer network
administrators are included in the project. Different types of electronic devices are
connected in whole project. All devices have their own function so, devices like
Printer, Server, Hub, Router, Switch, Multi-Layer Switch, Firewalls, HIDS,
Repeater, Bridges, Access Point, Content Filter, Load Balancer, Modem, Packet
Shaper, VPN Concentrator.

Function of hardware: -

Server – Server are used for provide the service for client computer.

Hub- Hubs are commonly used to connect segments of a local area network.

Router- Router is used for make communication between two different networks.

Switch- Switch is a device which select the most easy or direct path to send a data
packet for there its destination.

Multi-Layer Switch- Multi-Layer Switch can perform the function of the switch as
well as that of the router at incredibly fast speeds.

Security: - Security mean secure the data from virus, hacker, malware and other
third party. There are many types of security to secure the organization such as
firewall devices, used VPN etc.

Recommendations for future consideration:


Design:

Security:

Task 12/ P7 Implement a networked system based on a prepared design.

Task 13/ P8 Document and analyze test results against expected result.

You might also like