E121707-1662831818256-180949-Abdullah Networking

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 169

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)


INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title BTEC Higher National Diploma in Computing

Assessor Internal
Verifier
Unit 02: Networking
Unit(s)
LAN Design & Implementation for SYNTAX SOLUTIONS
Assignment title
M.N.ABDULLAH
Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief?
Y/N
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
accurately? Y/N
Is the feedback to the student:
Give details:
• Constructive?
• Linked to relevant assessment criteria? Y/N
• Identifying opportunities for improved Y/N
performance? Y/N

• Agreeing actions?
Y/N
Does the assessment decision need
amending? Y/N

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if
required) Date
Confirm action completed

Remedial action taken


Give details:

Assessor signature Date


Internal
Verifier Date

signature

Programme Leader
signature (if Date
required)
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID M.N.ABDULLAH COL00098095
Unit Title Unit 02: Networking

Assignment Number Assessor


Date
Submission Date Received 1st
submission
Date Received 2nd
Re-submission Date submission

Assessor Feedback:
LO1 Examine networking principles and their
protocols.
Pass, Merit & Distinction P1 P2
Descripts M1

LO2 Explain networking devices and operations.

Pass, Merit & Distinction P3 P4


Descripts
M2 D1
LO3 Design efficient networked systems.
Pass, Merit & Distinction P5 P6
Descripts M3 D2

D3
LO4 Implement and diagnose networked systems.
Pass, Merit & Distinction P7 P8 M4
Descripts

Grade: Assessor Signature: Date:


Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:


* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades
decisions have been agreed at the assessment board.

Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

Assessor Date
signature

Student Date
signature

Pearson Higher Nationals in


Computing
Unit 02: Networking Assignment
01
General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.

2. Attach this brief as the first section of your assignment.

3. All the assignments should be prepared using a word processing software.

4. All the assignments should be printed on A4 sized papers. Use single side printing.

5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 points, and should be in the style of Time New Roman.

2. Use 1.5 line spacing. Left justify all paragraphs.

3. Ensure that all the headings are consistent in terms of the font size and font style.

4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.

5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.

2. Avoid using page borders in your assignment body.

3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.

4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.

6. You must take responsibility for managing your own time effectively.

7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.

8. Failure to achieve at least PASS criteria will result in a REFERRAL grade.

9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.

10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.

11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my
own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

Student’s Signature:
(Provide E-mail ID) (Provide Submission Date)

Higher National Diploma in Computing


Assignment Brief
Student Name /ID Number M.N.ABDULLAH COL00098095
Unit Number and Title Unit 2: Networking

Academic Year 2021/22

Unit Tutor

Assignment Title LAN Design & Implementation for SYNTAX SOLUTIONS

Issue Date

Submission Date

IV Name & Date

Submission format

The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although
you will not be penalised for exceeding the total word limit.

Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

Assignment Brief and Guidance:


Scenario

SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The
Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They are
planning to make it one of the state-of-the-art companies in Matara with the latest facilities.

It is expected to have nearly 150 employees in Matara branch.


Department Number of Users

Customer Care 10

Sales and Marketing 20

Finance 25

Legal 5

HR 10

Developers 55

Network Team 5

Server Room Servers +ISP connections

Following requirements are given by the Management.

• All the departments must be separated with unique subnet and should not communicate with each
other unless there is a special requirement.

• 192.168.10.0/24 is given and should be used for all the departments except the server room. IPs
should assign using DHCP.

• ERP and CRM Systems need to be implemented in Matara branch in local servers.

• Number of servers required for the Server room need to be decided by the Network designer and
should be assigned with 10.254.1.0/24 subnet. (Uses static IPs)
• High level of redundancy is expected in network design to eliminate single point of failures and
traffic bottle necks.

• Sales and Marketing Team need to access Network resources using WIFI connectivity.

• Proper methods for networking monitoring and troubleshooting need to be established.

• All possible network security mechanisms should be implemented.

Assume you have been appointed as the new network consultant of SYNTAX SOLUTIONS. Prepare a network
architectural design and implement it with your suggestions and recommendations to meet the company
requirements.

(Note: Clearly state your assumptions. You are allowed to design the network according to your assumptions,
but main requirements should not be violated)

Activity 01

• Discuss the benefits and constraints of different network system types that can be implemented
in the Matara branch and the main IEEE Ethernet standards that can be used in above LAN and
WLAN design.

• Discuss the importance and impact of network topologies and network protocol
suites while comparing the main network topologies and network protocol suites that are used in
network design using examples. Recommend suitable network topologies and network protocol suites
for above scenario and justify your answer with valid points.
Activity 02

• Discuss the operating principles of network devices (Ex: Router, Switch, Etc.) and server types that can be
used for above scenario while exploring different servers that are available in today’s market with their
specifications. Recommend server/servers for the above scenario and justify your selection with valid
points .

• Discuss the inter-dependence of workstation hardware with networking software and provide examples
for networking software that can be used in above network design.

Activity 03
• Prepare a written network design plan to meet the above-mentioned user requirements including a blueprint drawn using a
modeling tool. (Ex: Microsoft Visio, EdrawMax).
Support your answer by providing the VLAN and IP subnetting scheme for the above scenario and the list of devices, network
components and software used t o design the network for above scenario and while justifying your selections.

• Test and evaluate the proposed design to meet the requirements and analyze user feedback by using a user feedback form.

• Install and configure Network services, devices and applications (Ex: VLAN, DHCP, DNS, Proxy, Web, Etc.)
according to the proposed design to accomplish the user requirements and design a detailed Maintenance
schedule for above Network.

*Note: - Screen shots of Configuration scripts should be presented.

Activity 04

• Implement a networked system based on your prepared design with valid evidence s and recommend
potential future enhancements for the networked system with valid justifications to your
recommendations. Use critical reflection to critically evaluate the design, plan, configuration, and testing
of your network while justifying with valid conclusions.
• Develop test cases and conduct verification (Ex: Ping, extended ping, trace route, telnet, SSH, etc.) to test
the above Network and analyse the test results against the expected results.
Grading Rubric

Grading Criteria Achieved Feedback

LO1: Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.

P2
Explain the impact of network topology, communication and
bandwidth requirements.

M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.

LO2: Explain networking devices and operations

P3
Discuss the operating principles of networking devices and
server types.

P4
Discuss the inter-dependence of workstation hardware with
relevant networking software.

M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.

LO 1 & LO2
D1 Critically evaluate the topology protocol selected for a given
scenario to demonstrate the efficient utilization of a networking
system.
LO3: Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
Install and configure network services and applications on your
choice.

D2
Design a maintenance schedule to support the networked
system.

LO4: Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.

D3
Use critical reflection to evaluate own work and justify valid
conclusions.
Table of Contents

LO1 Examine networking principles and their protocols...............................................................1


Network types (virtualized)............................................................................................................1
PAN (Personal Area Network).....................................................................................................2
LAN (Local Area Network)...........................................................................................................4
MAN (Metropolitan Area Network)............................................................................................7
WAN (Wide Area Network)......................................................................................................11
VPN (Virtual Private Network)..................................................................................................14
SAN (Storage Area Network)....................................................................................................18
System types.................................................................................................................................22
Client-Server network...............................................................................................................22
Peer-to-Peer Network...............................................................................................................25
Network Standards.......................................................................................................................27
IEEE (Institute of Electronical Electronic Engineers).................................................................28
List of IEEE standards................................................................................................................28
IEEE 802.11 Wireless LAN Standards........................................................................................29
IEEE 802.11...............................................................................................................................30
IEEE 802.11a..............................................................................................................................30
IEEE 802.11b.............................................................................................................................30
IEEE 802.11g..............................................................................................................................30
IEEE 802.11n.............................................................................................................................31
IEEE 802.11p.............................................................................................................................31
Network topologies......................................................................................................................32
Physical Topologies...................................................................................................................32
Mesh Topology.....................................................................................................................33
Star topology.........................................................................................................................35
Ring topology........................................................................................................................36
Bus topology.........................................................................................................................38
Logical Topologies.....................................................................................................................39
Ethernet................................................................................................................................39
VLANs (Virtual LANs).............................................................................................................40
Token Ring............................................................................................................................41
Evaluation of topology protocol...............................................................................................42
Communication;...........................................................................................................................43
Bandwidth requirements for the Topologies...............................................................................45
Network Models...........................................................................................................................46
ISO OSI Model...........................................................................................................................47
TCP/IP MODEL...........................................................................................................................53
Protocols suites of TCP/IP Model.............................................................................................55
LO2 Explain networking devices and operations..........................................................................58
Networking Devices......................................................................................................................58
Hardware Devices.....................................................................................................................58
End-User Devices......................................................................................................................61
Cables........................................................................................................................................63
Server Types..................................................................................................................................67
Explore a range of server types and justify the selection of a server..........................................70
HP ProLiant DL380....................................................................................................................70
Dell PowerEdge R415 1U Rack Server......................................................................................73
Justification of the most appropriate server............................................................................76
interdependence of workstation hardware with relevant networking software........................77
Example networking software that can be used in Syntax solutions LAN network.................80
LO3: Design efficient networked systems....................................................................................82
Implementation of the Network Design.......................................................................................82
IP Allocation Table........................................................................................................................84
Feedback forms.............................................................................................................................85
Analysis of Feedback forms..........................................................................................................88
Network Services and Application................................................................................................89
Installation of VMware Workstation........................................................................................89
Maintenance schedule.................................................................................................................93
LO4 Implement and diagnose networked systems......................................................................96
Implement a networked system based on a prepared design.....................................................96
PC Configurations.....................................................................................................................97
Router configuration...............................................................................................................104
Switch configuration...............................................................................................................109
Testcase......................................................................................................................................130
Future Enhancements.................................................................................................................140
Self-Criticism...............................................................................................................................142
Summary.....................................................................................................................................143
Conclusion...................................................................................................................................144
References..................................................................................................................................145
Figure 1-PAN ..................................................................................................................................
2
Figure 2-LAN ..................................................................................................................................
4
Figure 3-MAN .................................................................................................................................
7
Figure 4-WAN ..............................................................................................................................
11
Figure 5-VPN ................................................................................................................................
14
Figure 6-SAN ................................................................................................................................
18
Figure 7-CLIEN SERVER NETWORK .......................................................................................
22
Figure 8-PEER TO PEER .............................................................................................................
25
Figure 9-WLAN IEEE ..................................................................................................................
29
Figure 10-MESH TOPOLOGY ....................................................................................................
33
Figure 11-STAR TOPOLOGY .....................................................................................................
35
Figure 12-RING TOPOLOGY ......................................................................................................
36
Figure 13-BUS TOPOLOGY ........................................................................................................
38
Figure 14-ETHERNET .................................................................................................................
39
Figure 15-VLAN ...........................................................................................................................
40
Figure 16-TOKEN RING ..............................................................................................................
41
Figure 17-SIMPLEX .....................................................................................................................
43
Figure 18-HALF DUPLEX ...........................................................................................................
43
Figure 19-FULL DUPLEX ...........................................................................................................
44
Figure 20-NETWORK MODELS ................................................................................................
46
Figure 21-OSI MODEL ................................................................................................................
48
Figure 22-ARCHITECTURE OF OSI ..........................................................................................
49
Figure 23-HUB .............................................................................................................................
58
Figure 24-BRIDGE .......................................................................................................................
59
Figure 25-SWITCH .......................................................................................................................
59
Figure 26-ROUTER ......................................................................................................................
60
Figure 27-LAPTOP .......................................................................................................................
61
Figure 28-PC .................................................................................................................................
62
Figure 29-PRINTER .....................................................................................................................
63
Figure 30-TWISTED PAIR ..........................................................................................................
63
Figure 31-FIBER OPTIC ..............................................................................................................
64
Figure 32-COPPER STRAIGHT ..................................................................................................
65
Figure 33-COPPER CROSS OVER .............................................................................................
66
Figure 34-SERVER .......................................................................................................................
67
Figure 35-ANTI VIRUS ...............................................................................................................
80
Figure 36-FIREWALL ..................................................................................................................
81
Figure 37-BLUE PRINT ...............................................................................................................
82
Figure 38-FEEDBACK ANALYSIS GRAPH .............................................................................
88
Figure 39-VMware SETUP ..........................................................................................................
89
Figure 40-VMware LICENSE AGREEMENT .............................................................................
90
Figure 41-CUSTOM SETUP ........................................................................................................
91
Figure 42-VMware INSTALLATION ..........................................................................................
92
Figure 43VLAN10 PC CONF .......................................................................................................
97
Figure 44-VLAN20 PC CONF .....................................................................................................
98 Figure 45-VLAN 30 PC
CONF .................................................................................................... 99
Figure 46-VLAN 40 PC CONF ..................................................................................................
100
Figure 47-VLAN 50 PC CONF ..................................................................................................
101
Figure 48-VLAN 60 PC CONF ..................................................................................................
102
Figure 49-VLAN 70 PC CONF ..................................................................................................
103
Figure 50-ROUTER CONF ........................................................................................................
104
Figure 51-PHYSICAL INTERFACE UP ...................................................................................
105
Figure 52-ROUTER SUB INTERFACE CONF ........................................................................
106
Figure 53-ROUTER DHCP CONF .............................................................................................
107
Figure 54-ROUTER SAVING CONF ........................................................................................
108
Figure 55-VLAN 10 SW1 ...........................................................................................................
109
Figure 56-VLAN 20 SW2 ...........................................................................................................
110
Figure 57-VLAN 30 SW3 ...........................................................................................................
111
Figure 58-VLAN 40 SW4 ...........................................................................................................
112
Figure 59-VLAN 50 SW5 ...........................................................................................................
113
Figure 60-VLAN 60 SW6 ...........................................................................................................
114
Figure 61-VLAN 70 SW7 ...........................................................................................................
115
Figure 62-SW1 VLAN NAMING ..............................................................................................
116
Figure 63-SW2 VLAN NAMING ..............................................................................................
117
Figure 64-SW3 VLAN NAMING ..............................................................................................
118
Figure 65-SW4 VLAN NAMING ..............................................................................................
119
Figure 66-SW5 VLAN NAMING ..............................................................................................
120
Figure 67-SW6 VLAN NAMING ..............................................................................................
121
Figure 68-SW7 VLAN NAMING ..............................................................................................
122
Figure 69-Assigning Switch ports to VLAN10 ..........................................................................
123
Figure 70-Assigning Switch ports to VLAN 20 .........................................................................
124
Figure 71-Assigning Switch ports to VLAN 30 .........................................................................
125
Figure 72-Assigning Switch ports to VLAN 40 .........................................................................
126
Figure 73-Assigning Switch ports to VLAN 50 .........................................................................
127
Figure 74-Assigning Switch ports to VLAN 60 .........................................................................
128
Figure 75-Assigning Switch ports to VLAN 70 .........................................................................
129
Figure 76-PING TO THE GATEWAY ......................................................................................
130
Figure 77-PING TO THE GATEWAY ......................................................................................
131
Figure 78-PING WHITH IN THE LAN .....................................................................................
132
Figure 79-PING AMONG VLAN ..............................................................................................
133
Figure 80-PING AMONG VLAN ..............................................................................................
134
Figure 81-TELNET .....................................................................................................................
135
Figure 82-TRACERT ..................................................................................................................
136
Figure 83-SHOW VLAN ............................................................................................................
137
Figure 84-SHOW RUNNING CONFIG .....................................................................................
138
Figure 85-SHOW IP INT BR ......................................................................................................
139 Table 1-Differences between PAN, LAN, MAN and
WAN ........................................................ 21
Table 2-Difference between Client-Server and Peer-to-Peer Network ........................................
27
Table 3-Difference between TCP/IP and OSI Model ...................................................................
54
Table 4-DIFFERENCES BETWEEN HUB AND SWITCH .......................................................
60
Table 5-Differences between a Router and a Bridge ....................................................................
61
Table 6-System Specifications ......................................................................................................
70
Table 7-Smart Array P400 Controller ...........................................................................................
71
Table 8 ...........................................................................................................................................
72
Table 9 ...........................................................................................................................................
73
Table 10 .........................................................................................................................................
74
Table 11 .........................................................................................................................................
75
Table 12-Hardware required in a workstation ..............................................................................
77
Table 13-IP ALLOCATION .........................................................................................................
84
Table 14-FEEDBACK FORM 1 ...................................................................................................
85
Table 15-FEEDBACK FORM 2 ...................................................................................................
86
Table 16-FEEDBACK FORM 3 ...................................................................................................
87
Table 17-Maintenance schedule ....................................................................................................
95
LO1 Examine networking principles and their protocols.

Network types (virtualized)


The Network enables PCs to connect and communication with various PCs by means of any
medium. LAN, MAN and WAN are the three main types of the systems made to work over the
area they cover. There are a couple of similarities and dissimilarities between them. One of the
genuine complexities is the geographical area they spread.

There are different kinds of network types too they are as follows:
• PAN (Personal Area Network)

• LAN (Local Area Network)

• MAN (Metropolitan Area Network)

• WAN (Wide Area Network)

• VPN (Virtual Private Network)

• SAN (Storage Area Network)


PAN (Personal Area Network)
A PAN is system of associated gadgets utilized
by one individual. It permits gadgets, for example, PCs, tablets, cell phones, and smartwatches
to speak with one another. A PAN may fuse various associations, including Ethernet, Wi-Fi,
and Bluetooth. For instance, a work station may interface with an individual switch by means of
Ethernet and a tablet may associate by means of Wi-Fi. A cell phone may speak with a PC
through Wi-Fi and a smartwatch by means of Bluetooth (wikipedia, n.d.).

Figure 1-PAN

Range of PAN
Wireless personal area network covers a few centimeters up to 10 meters. These networks are
specific types (or sub-subsets) of local networks that support one person instead of a group.
Additional devices in the PAN can connect and run data on the main engine. With Bluetooth,
such a layout could be as large as 100 meters (330 feet) (computer network technology , n.d.).

Characteristics of a Personal Area Network

• It is mostly a personal device’s network equipped within a small area.


• It allows you to deal with information devices interconnected with a single user
environment.
• PAN includes mobile phones, tablets, and laptops.
• It is possible to connect wirelessly to the Internet called WPAN.
• Devices used for PAN: wireless mice, keyboards, and Bluetooth systems.
Advantages of personal area network

• In PAN no extra space requires.


• No need of extra cable and wire.
• Used in office, conference, and meetings
• It is used in TV remotes, AC remotes, etc.
• Data can Synchronize between different devices.
• Connect to many devices at a time
• No extra space requires.
• Affordable Cost.
• Portable.
• Easy to use.
• Reliable.
• Secure.

Disadvantages of personal area network

• PAN can be operated in less range of areas.


• Can only be used for personal area
• Slow data transfer
• Interfere with radio signals:
• Infrared signals travel only in a straight line
LAN (Local Area Network)
Local area network is the computer network
that connects computers within the limited area such as schools, colleges or universities.
Local area networks, generally called LANs, are privately-owned networks. They provide a
useful way of sharing resources between end users. The resources such as printers, file servers,
scanners, and internet are easily sharable among other connected computers in a network
(wikipedia, n.d.).

Figure 2-LAN

Size of LANs

LANs are restricted in size, a local network can contain anywhere from one or two devices up
to a thousand devices. Some devices like printers, scanners, and other servers stay permanently
with the LAN while mobile devices like computers, laptops, and phones may connect and
disconnect from the network at various times.
LAN size depends on the transmission
technology used in a network. For example, The size of Wi-fi LAN can
be the actual coverage area of the wireless broadband routers whereas the size of an Ethernet
LAN can be up to the size of the cable

In both cases, though, Local Area Networks can be extended to cover much larger distances if
required, by connecting together multiple access points or cables through a switch or hub. The
size of Local area networks is smaller than the Metropolitan Area Network (MAN) and Wide
Area Networks (WAN) (computer network technology , n.d.).

Characteristics of Local Area Network

• LANs are private owned-network, can be extended up to a few kilometers.


• LANs operate at relatively high speed as compared to the typical WAN
• It connects computers within a single office, building, block or campus, they work in a
relatively small geographical area.

Advantages of LAN

• LAN provides resource sharing such as computer resources like printers, scanners,
modems, DVD-ROM drives, and hard disks can be shared within the connected devices.
This reduces cost and hardware purchases.
• Software Applications Sharing: In a Local Area Network, it is easy to use the same
software in a number of computers connected to a network instead of purchasing the
separately licensed software for each client a network.

• Data and messages can easily be shared with the other computer connected to the network.
Disadvantages of LAN

• High Setup Cost: The initial setup costs of installing Local Area Networks is high
because there is special software required to make a server. Also, communication devices
like an ethernet cable, switches, hubs, routers, cables are costly.
• Privacy Violations: The LAN administrator can see and check personal data files of each
and every LAN user. Moreover, he can view the computer and internet history of the
LAN user.

• Data Security Threat: Unauthorized users can access important data of an office or
campus if a server hard disk is not properly secured by the LAN administrator.

• LAN Maintenance Job: Local Area Network requires a LAN Administrator because there
are problems such as software installations, program faults or hardware failures or cable
disturbances in Local Area Network. A LAN Administrator is required to maintain these
issues.

• Covers Limited Area: LANs are restricted in size they cover a small area like a single
office, single building or a group of nearby buildings (computer network technology ,
n.d.).

MAN (Metropolitan Area Network)

A metropolitan area network (MAN) is a large computer network that usually spans a city or a
large campus. A MAN Network is optimized for a larger geographical area than a LAN,
ranging from several blocks of buildings to entire cities.
MAN, Networks are formed by connecting
multiple LANs. Thus, MAN Networks are larger than LANs but smaller
than wide-area networks (WAN).
The purpose of MAN (Metropolitan Area Network) is to provide the link to the internet in the
long run. MAN, Network provides Internet connectivity for LANs in a metropolitan region, and
connect them to wider area networks like the Internet.” It can also be used in cable television.
The primary use of metropolitan area networks is the customer that has high-capacity needs in a
metropolitan area. A MAN is intended to provide the required capacity at a lower cost and
greater efficiency than obtaining an equivalent service from the local telephone company

Figure 3-MAN

How Does a Metropolitan Area Network Work?


Metropolitan Area Network is larger than LAN and smaller than WAN. It is generally applied
to connect geographically dispersed LANs. Therefore, the goal of MAN is to develop a
communication link between two independent LAN nodes.
A MAN Network is usually established using optical fiber. The network is established using
routers and switches. A switch is a port which is active in handling the filtration of data usually
coming in the form of frames. Any switch acts as a dual-port, at one end it is handling filtration
of data and at the other end managing connections.
The router is another device for facilitating the
network connection. A router helps the data packets to identify the path to
be taken. Hence, in other words, it keeps an eye on the data transfer. MAN (Metropolitan Area
Network) is usually operated over an area of up to 5 to 50kms (computer network technology ,
n.d.).

Characteristics of Metropolitan Area Network


• Network size generally ranges from 5 to 50 km. It may be as small as a group of
buildings on campus to as large as covering the whole city.

• In general, a MAN is either owned by a user group or by a network provider who sells
service to users, rather than a single organization as in LAN.

• Data rates are moderate to high.

• It facilitates the sharing of regional resources.

• They provide uplinks for connecting LANs to WANs and the Internet.

Advantages of a MAN Network


• Less Expensive:
It is less expensive to attach MAN with WAN Network. MAN gives you good efficiency
of data. All data on MAN is easily manageable in a centralized way.

• Sending Local Emails:


You can send local emails fast and free on MAN.

• High Speed than WAN:


The speed of data can easily reach 1000
Mbps, as MAN uses fiber optics. Files and database transfer rates
are fast.

• Sharing of the Internet:


With the installation of MANs, users can share their internet connection. In this way,
multiple users can get the same high-speed internet.

• Conversion of LAN to MAN is Easy:


MAN is a combination of two or more LAN network. So, it is a faster way to connect two
LAN networks together. It is possible by the fast configuration of links.

• High Security:
MANs has a high-security level than WAN.

Disadvantages of MAN Network


• Difficult To Manage:
It is very difficult to manage if the size
and number of LANs network increase. This is due to security and
extra configuration problems.

• Internet Speed Difference:


As it cannot work on phone copper wires. Copper wires affect the speed of MAN.So high
cost is needed for fiber optics.

• Hackers Attack:
In this network, there is a high risk of attacking hackers as compared to LAN. So, data
may be a leak. Highly security staff is the need in MAN.

WAN (Wide Area Network)

A Wide Area Network (WAN) is a computer network that connects computers within a large
geographical area comprising a region, a country, a continent or even the whole world. Wide
area networks, generally called WANs, are mostly public, leased or privately-owned
networks. They provide a useful way of sharing resources between the end users such as the
long-distance transmission of data, voice, image, and information over large geographical
areas. The best example of a Wide Area
Network is the Internet which connects many smaller LANs and MANs
through Internet service providers.

Figure 4-WAN

Advantages of a WAN Network

• Covers large geographical area: Wide area network covers a large geographical area of
more than 1000km. If your office is in different cities or countries then you can connect
your office branches through Wide Area Network.
• Centralized data: Wide area networks also provide you the facility of sharing the data to
all of your connected devices in a network. For example, through WAN connection all
office branches can share the data through the head office server. You can get back up,
support, and other useful data from the head office and all data are synchronized with all
other office branches.

• Get updated files and data: Wide Area Networks provide you the facility of getting
updated files and data from the server. If a server is updated with new data, then all
connecting devices receive that updated data within seconds.

• Sharing of software and resources: Like LANs, we can share software applications and
other resources with other users on the internet.

• High bandwidth: WANs covers a large geographical area of more than 1000km.
therefore WANs have high bandwidth compared to LANs and MANs.

Disadvantages of WAN Network

• Security problems: Wide Area Networks faces more security problem as compare to
LANs and MANs. One of the key disadvantages of WANs is a security issue when many
different people have the ability to use
information from other computers.

• Needs firewall and antivirus software: As it faces security issue, therefore it is a basic
need of WANs to use firewalls and antivirus software to protect data transfer on the
internet which can be accessed and changed by hackers. Also, some people can inject a
virus into the computers so antivirus software is also needed to install.

• The setup cost is high: A WAN network covers a large geographical area; it is very
expensive to setup in the initial stage. It may involve purchasing different networking
devices, routers, switches, and extra security software.

• Troubleshooting problems: A WAN network covers large geographical areas, so fixing


the problem in a network is a very difficult job. Most of WAN’s wires go into the sea and
if those wires get broken. It involves a lot of hard work to fix those lines under the sea.

• Maintenance Issues: Once set up, maintaining a WAN network is a full-time job which
requires high tech skills of network supervisors and technicians.

VPN (Virtual Private Network)

VPN stands for "Virtual Private Network" and describes the opportunity to establish a protected
network connection when using public networks. VPNs encrypt your internet traffic and
disguise your online identity. This makes it more difficult for third parties to track your
activities online and steal data. The encryption takes place in real time.
A VPN hides your IP address by letting the
network redirect it through a specially configured remote server run by a
VPN host. This means that if you surf online with a VPN, the VPN server becomes the source
of your data. This means your Internet Service Provider (ISP) and other third parties cannot see
which websites you visit or what data you send and receive online. A VPN works like a filter
that turns all your data into "gibberish". Even if someone were to get their hands on your data,
it would be useless.

Figure 5-VPN

Advantages of a VPN
Provide Safety Through Anonymity; The two most important reasons for VPN use are
privacy and anonymity. VPN services secure public internet connections via encryption. They
also hide online activity from bad actors such as hackers and other cybercriminals.
Apps and websites want to track users and
record their online activity by collecting personal data. VPNs can prevent
that by blocking access to the user’s connection. When all bits of internet traffic leaving and
coming to the user’s device are encrypted, the user is automatically anonymized. Most good
VPN services provide customers with AES 256-bit encryption which is considered the top-of-
the-line military-grade security option.
Secure Connection for Remote Work; VPNs help these people remotely create a secure
connection with their office network to access files and other resources required for their job.
Prior to the COVID-19 pandemic, most employees working in an office environment were able
to connect to the internet through an Ethernet connection. Now more and more people have
shifted to remote work. Since the data traveling through the VPN connection is encrypted, there
is no way for the data to be intercepted by hackers.
Bypass Geo-Locked Content; Another major advantage of using a VPN is that it grants the
ability to unblock various websites and streaming services. Good VPNs manage to circumvent
any web filter reliably every time the user needs to access content that is not available in their
region.
Any website or service that wants to track users has to track their IP address to confirm their
location and then serve users targeted content. VPNs can stop that from happening by
circumventing geolocation blocks. This feature comes in handy when users are trying to access
movies and TV series on streaming services.
There is also the problem of companies producing content for specific regions for various
reasons. One of the reliable ways to access that content is via a VPN service. Since it violates
their agreements, streaming services and content providers actively fight against VPNs that
attempt to circumvent geo-restrictions. This is why it is important to use a high-quality VPN
because they regularly update their anonymity tools and servers to unblock content.

Cost-Effective Security; VPNs can help users stay safe, private and anonymous online at a
very reasonable price. Most of the top VPNs in the world cost between $2 and $11 per month
depending on the length of the user’s subscription period. In exchange, users get top-tier
encryption, broad server networks, advanced
security features and the ability to change their IP address location.
Most modern VPN services now offer free trials and money-back guarantees, making them
even more cost-effective and giving users the opportunity to test the service before committing
to it. VPNs also regularly offer seasonal discounts and lifetime subscription packages that
further lower the cost. There are even free VPNs on the market, but most of them are
ineffective or do not provide anywhere near the level of security provided by paid VPNs.

A VPN Can Prevent Bandwidth Throttling; VPNs are very effective against bandwidth
throttling where users may experience buffering or long load times on specific websites
especially during the end of the month. Internet service providers along with network
administrators usually throttle bandwidth to keep certain users within their download limits.
Hence, they limit the amount of data users can transfer in a certain period.
VPNs can stop ISPs and administrators from bandwidth throttling by encrypting the traffic that
a user’s device generates. Since ISPs and administrators cannot see the content of the user’s
traffic, the filters in place are unable to throttle it. This is a favorable situation for streamers and
torrenters who use up a lot of bandwidth during the month.

Disadvantages of a VPN
Dropped Connections; Due to the inherently
chaotic nature of the internet, VPN services drop secure connections from
time to time. Dropped connections can lead to data leaks which can compromise the security,
privacy and anonymity of the user. Most elite VPNs have a kill switch feature to combat this
problem, but the real IP address of the user can be exposed if this feature is not present or does
not function properly.

Using the Wrong VPN Can Put Your Privacy in Danger; Choosing the wrong VPN can
mean disaster for the user’s privacy and anonymity. If a VPN service does not have a good
reputation on various forums and review sites then it is likely not good for privacy or online
security.
Moreover, different VPNs are available to users for different purposes. A user that only wants
to watch Netflix or Amazon Prime Video may be able to get away with a VPN that does not
focus on privacy or security but on unblocking ability. However, if a user is concerned about
privacy, security and anonymity and ends up signing up for a VPN for streaming then that is
bad news.

Not All Devices Natively Support VPNs; Some lesser-known VPNs do not support all
platforms. That can become a problem for users who do not use a mainstream device or
operating system. For the vast majority of users lack of compatibility won’t be a problem, but
for those with older operating systems or even older hardware, it will be difficult to configure
most VPNs. More specifically, operating systems like macOS, Windows, Android and iOS are
fine, but older versions of Windows, Android, iOS and Linux may not be.

SAN (Storage Area Network)


A Storage Area Network (SAN) is a specialized, high-speed network that provides block-level
network access to storage. SANs are typically composed of hosts, switches, storage elements,
and storage devices that are interconnected
using a variety of technologies, topologies, and protocols. SANs may also
span multiple sites.
A SAN presents storage devices to a host such that the storage appears to be locally attached.
This simplified presentation of storage to a host is accomplished through the use of different
types of virtualizations.

Figure 6-SAN

Advantages of a SAN
Speed; As SAN includes fiber optics
technology, it offers tremendous amount of speed transfer rates. It is
possible of achieve a speed of over 5Gbps using SAN. Even if your storage device or the
network tends to perform slow, the speed can be easily increased with the use of SAN.

Security; Various types of security measures are available on SAN which ensures that your
data is secure. On default, the algorithms of SAN are written in a way to protect every piece of
data stored in it. For an example, certain restrictions can be placed on storage such that only
authorized users will be able to access it. There is very less chance of data theft happening in
SAN.

Reliability; SAN comes with built in redundancy that makes sure of continuous network
operations. Even in case a server or a switch fails, the traffic will be rerouted to avoid failures.
Once the server starts functioning again, the operations will be continued immediately.

Scalability; SAN also offers much greater scalability according to the business needs. If there
are more storage needs, the users can increase the drives accordingly. Even though there is a
limit on the number of drives, SAN normally will be able to accommodate more than 1000 of
drives. This means that SAN allows upgrading their infrastructure whenever necessary without
interruptions.

Data Backup; For the process of backing up data, SAN follows a centralized approach. As a
result, it requires very less time for backing up. Using this type of approach, users can easily
backup data automatically as well as instantly. And even if there is a need to backup data from
multiple locations it is made possible using a single server.
Disadvantages of SAN

Cost; Purchasing and maintaining a Storage Area Network requires significant amount of cost.
This is mainly due to the fact that fiber technology is being used. Hence, it is especially
preferred by organizations of large scale. And SAN takes some time to show their impact.
Therefore, organizations must be willing to accept the initial cost.

Maintenance; Not all the time SAN will be a beneficial option. SAN is designed to manage
large number of expensive servers. Maintaining few servers with the use of SAN is an
unnecessary expense. In this case, the users could consider other software solutions. Or else,
simply manage the servers themselves.

Privacy; Although SAN implements right security measures, still there is a possibility of data
leakage. A Storage Area Network is used in a shared environment. Meaning, a common storage
device and servers are used by the connected computers. If a data happens to leak from one of
the computers, it could impact the others.

Effectiveness; Even if organizations are ready to accept the high initial costs of SAN, still it
takes some time to show its effectiveness. It takes longer period of time to impact a business.
Particularly, for services such as downtime and disaster recovery. Therefore, SAN is a poor
choice, if your business needs to experience immediate results.

Complexity; SAN is complex in nature for various reasons. One such is the usage of
sophisticated storage devices. Hence, it needs maintenance and support to be done by the IT
professionals which could further increase the expenditure of Storage Area Network. This is
one of the reasons why organizations refrain to use SAN.
Differences between PAN, LAN, MAN and
WAN
PAN LAN MAN WAN
Connects nodes Covers a small area Connects nodes Covers a wide area
found in a very small (local area) found in same Metro
area
area
Wireless PAN – Whether wired or Wireless MAN- Wired WAN - fiber
Bluetooth Wired Wireless LANs are Microwave optic Wireless WAN
- Infrared/ microwave
PAN - USB Based on Ethernet Transmission
Technology Wired –
fiber optic cables

Cheap and easy to Easy to setup and Quite expensive Expensive when it
connect affordable Comes to wiring of
Fiber optic cables for
a wired WAN

Table 1-Differences between PAN, LAN, MAN and WAN


System types

Client-Server network
Client-server networks are computer networks that use a dedicated computer (server) to store
data, manage/provide resources and control user access.
The server acts as a central point on the network upon which the other computers connect to. A
computer that connects to the server is called a client

Figure 7-CLIEN SERVER NETWORK

A client-server network is usually preferred over a peer-to-peer network that doesn’t have a
central server to manage the network.
Network server functions
A client-server network may have more than one server, each dedicated to handling a specific
function.

Functions may include:


• Data storage

• Handling security

• Hosting shared applications

• Managing an internet connection

• Scheduling and running backups

• Email services

• Print jobs

• Domain name services

• Storing usernames and passwords to control access

• Assigning levels of access to resources

• Monitoring network traffic

Advantages of a client server network


• Generally, more secure than peer-to-peer networks

• One client computer crashing does not affect the other computers
• Easier to recover files as backups can be
controlled centrally by the network administrator

• Files and resources are easier to share and control from server

• Improved levels of security as files are centralized

• It’s easier to administrate the whole network using a server

• Faster performance as each computer is only fulfilling one role

• Security is potentially cheaper and easier when done centrally

• Individual users do not have to worry about backups or security

• Larger networks can be created

Disadvantages of a server network


• Servers can be expensive to buy and maintain

• A network technician will often be required

• Trickier to set up with specialist knowledge needed

• Over-all set up cost is more expensive than a peer-to-peer network

• Server failure will probably disrupt all computers on the network

Peer-to-Peer Network

Peer-to-peer networks are computer networks that do not have a central server controlling the
network.
Each computer is called a peer, and these peers are connected to one another.
No computer has control over another.
Figure 8-PEER TO PEER

This type of network is not suitable for a large network where a client-server structure would be
preferable.
Advantages of a peer-to-peer network

• Each computer can communicate and share its data and resources with all others (files or
even a printer)
• Users can control which files they wish to share or keep private
• No cost in buying a server
• No need to pay a network technician (each user manages own file sharing permissions)
• Easier to set up with less specialist knowledge needed
• Over-all set up cost is cheaper
• Computer failure will only disrupt the files being shared from that computer (unlike a
server failure on a client-server network)

Disadvantages of a peer-to-peer network

• Difficult to recover files as they are not backed up centrally


• Each computer needs its own backup system
• Files and resources are more difficult to share
• Files are potentially less secure when not centralized
• Difficult to administrate the whole network as the system is not centralized
• Performance may be slower due to each computer fulfilling more than one role and being
accessed by others
• Security can be more expensive as each computer needs its own anti-virus software
• It is up to the user of each computer to ensure viruses are not introduced to the network
• Having lots of users/computers on the network becomes problematic
Difference between Client-Server and Peer-to-Peer Network
Client-Server Peer-to-Peer Network
In Client-Server Network, Clients and server In Peer-to-Peer Network, Clients and server
are differentiated, Specific server and clients are not differentiated.
are present
Client-Server Network focuses on While Peer-to-Peer Network focuses on
information sharing connectivity
In Client-Server Network, Centralized server While in Peer-to-Peer Network, each peer has
is used to store the data its own data.
In Client-Server Network, Server respond the While in Peer-to-Peer Network, Each and
services which is request by Client. every node can do both request and respond
for the services
Client-Server Network are costlier than While Peer-to-Peer Network are less costly
Peerto-Peer Network. than Client-Server Network
Client-Server Network are more stable than While Peer-to-Peer Network are less stable if
Peer-to-Peer Network. number of peers is increase
Client-Server Network is used for both small While Peer-to-Peer Network is generally
and large networks. suited for small networks with fewer than 10
computers.
Table 2-Difference between Client-Server and Peer-to-Peer Network

Network Standards
• ANSI (American National Standard Institute)
• IEEE (Institute of Electronical Electronic Engineers)
• ISO (International Organization for Standardization)
• IETF (Internet Engineering Task Force)
• W3C (World Wide Web Consortium)
IEEE (Institute of Electronical Electronic
Engineers)
IEEE is an organization composed of engineers, scientists, and students. The IEEE is best
known for developing standards for the computer and electronics industry

List of IEEE standards

IEEE 802 LAN/MAN Overview and architecture


IEEE 802.1 LAN/MAN Bridging and management
IEEE 802.1s Multiple spanning tree
IEEE 802.1 w Rapid reconfiguration of spanning tree
IEEE 802.1x Port-based network access control
IEEE 802.2 Logical Link Control (LLC)
IEEE 802.3 CSMA/CD access method (Ethernet)
IEEE 802.3ae 10 Gigabit Ethernet
IEEE 802.4 Token passing bus access method and Physical layer specifications
IEEE 802.5 Token Ring access method and Physical layer specifications
IEEE 802.6 Distributed Queue Dual Bus (DQDB) access method and Physical layer
IEEE 802.7 Broadband LAN
IEEE 802.8 Fiber Optic
IEEE 802.9 Isochronous LANs (standard withdrawn)
IEEE 802.10 Interoperable LAN/MAN Security
IEEE 802.11 Wireless LAN MAC and Physical layer specifications
IEEE 802.12 Demand-priority access method, physical layer and repeater specifications
IEEE 802.13 Not used
IEEE 802.14 Cable modems (proposed standard was withdrawn)
IEEE 802.15 Wireless Personal Area Network (WPAN)
IEEE 802.16 Wireless Metropolitan Area Network (Wireless MAN)
IEEE 802.17 Resilient Packet Ring (RPR) Access

The most widely used IEEE 802 standards are for Ethernet, Bridging and Virtual Bridged
LANs Wireless LAN, Wireless PAN, Wireless
MAN, Wireless Coexistence, Media
Independent Handover Services, and Wireless RAN with a dedicated Working Group providing
focus for each area (electronisnotes, n.d.).

IEEE 802.11 Wireless LAN Standards


IEEE 802.11 standard, popularly known as Wi-Fi, lays down the architecture and specifications
of wireless LANs (WLANs). Wi-Fi or WLAN uses high frequency radio waves for connecting
the nodes.
There are several standards of IEEE 802.11 WLANs. The prominent among them are 802.11,
802.11a, 802.11b, 802.11g, 802.11n and 802.11p. All the standards use carrier-sense multiple
access with collision avoidance (CSMA/CA). Also, they have support for both centralized base
stations based as well as ad hoc networks.

Figure 9-WLAN IEEE


IEEE 802.11
IEEE 802.11 was the original version released
in 1997. It provided 1 Mbps or 2 Mbps data rate in the 2.4 GHz band and used either frequency-
hopping spread spectrum (FHSS) or directsequence spread spectrum (DSSS). It is obsolete
now.

IEEE 802.11a
802.11a was published in 1999 as a modification to 802.11, with orthogonal frequency division
multiplexing (OFDM) based air interface in physical layer instead of FHSS or DSSS of 802.11.
It provides a maximum data rate of 54 Mbps operating in the 5 GHz band. Besides it provides
error correcting code. As 2.4 GHz band is crowded, relatively sparsely used 5 GHz imparts
additional advantage to 802.11a.

IEEE 802.11b
802.11b is a direct extension of the original 802.11 standard that appeared in early 2000. It uses
the same modulation technique as 802.11, DSSS and operates in the 2.4 GHz band. It has a
higher data rate of 11 Mbps as compared to 2 Mbps of 802.11, due to which it was rapidly
adopted in wireless LANs. However, since 2.4 GHz band is pretty crowded, 802.11b devices
faces interference from other devices.

IEEE 802.11g
802.11g was indorsed in 2003. It operates in the 2.4 GHz band (as in 802.11b) and provides an
average throughput of 22 Mbps. It uses OFDM technique (as in 802.11a). It is fully backward
compatible with 802.11b. 802.11g devices also faces interference from other devices operating
in 2.4 GHz band (futurenetwork, n.d.).
IEEE 802.11n
802.11n was approved and published in 2009 that operates on both the 2.4 GHz and the 5 GHz
bands. It has variable data rate ranging from 54 Mbps to 600 Mbps. It provides a marked
improvement over previous standards 802.11 by incorporating multiple-input multiple-output
antennas (MIMO antennas).

IEEE 802.11p
802.11 is an amendment for including wireless access in vehicular environments (WAVE) to
support Intelligent Transportation Systems (ITS). They include network communications
between vehicles moving at high speed and the environment. They have a data rate of 27 Mbps
and operate in 5.9 GHz band. (futurenetwork, n.d.)
Network topologies
What is Network Topology; Network topology refers to the manner in which the links and
nodes of a network are arranged to relate to each other. Topologies are categorized as either
physical network topology, which is the physical signal transmission medium, or logical
network topology, which refers to the manner in which data travels through the network
between devices, independent of physical connection of the devices. Logical network topology
examples include twisted pair Ethernet, which is categorized as a logical bus topology, and
token ring, which is categorized as a logical ring topology.
Physical network topology examples include star, mesh, tree, ring, point-to-point, circular,
hybrid, and bus topology networks, each consisting of different configurations of nodes and
links. The ideal network topology depends on each business’s size, scale, goals, and budget. A
network topology diagram helps visualize the communicating devices, which are modeled as
nodes, and the connections between the devices, which are modeled as links between the nodes.
A network topology describes the physical connections and communication pathways between
objects in a network. The term is used to describe a variety of networking concepts. Topologies
are used to describe connections between computers (or hosts) in a network, between routers in
a network, or even between wide area network connections.
Topologies come in two varieties:
• Physical Topology
• Logical Topology

Physical Topologies
The physical topology defines the physical connections between the devices and the shape that
these connections form. In most cases, it is easy to see this shape. There are four main basic
types of physical topologies, they are:

• Mesh Topology
• Star Topology
• Ring Topology
• Bus Topology (esoft, 2021) Mesh Topology
A mesh topology is a network setup where each computer and network device are
interconnected with one another. This topology setup allows for most transmissions to be
distributed even if one of the connections goes down. It is a topology commonly used for
wireless networks. Below is a visual example of a simple computer setup on a network using a
mesh topology.

Figure 10-MESH TOPOLOGY

There are two forms of this topology: full mesh and a partially-connected mesh.

In a full mesh topology, every computer in the network has a connection to each of the other
computers in that network. The number of connections in this network can be calculated using
the following formula (n is the number of
computers in the network): n(n-1)/2

In a partially-connected mesh topology, at least two of the computers in the network have
connections to multiple other computers in that network. It is an inexpensive way to implement
redundancy in a network. If one of the primary computers or connections in the network fails,
the rest of the network continues to operate normally.

Advantages of a mesh topology


• Manages high amounts of traffic, because multiple devices can transmit data
simultaneously.

• A failure of one device does not cause a break in the network or transmission of data.

• Adding additional devices does not disrupt data transmission between other devices.

Disadvantages of a mesh topology


• The cost to implement is higher than other network topologies, making it a less desirable
option.

• Building and maintaining the topology is difficult and time consuming.

• The chance of redundant connections is high, which adds to the high costs and potential
for reduced efficiency.
Star topology
Alternatively referred to as a star network, star topology is one of the most common network
setups. In this configuration, every node connects to a central network device, like a hub,
switch, or computer. The central network device acts as a server and the peripheral devices act
as clients. In a star topology setup, either a coaxial or RJ-45 network cable is used, depending
on the type of network card installed in each computer. The image shows how this network
setup gets its name, as it is shaped like a star.

Figure 11-STAR TOPOLOGY

Advantages of star topology


• Centralized management of the network, through the use of the central computer, hub, or
switch.

• Easy to add another computer to the network.

• If one computer on the network fails, the rest of the network continues to function
normally.
Disadvantages of star topology
• May have a higher cost to implement, especially when using a switch or router as the
central network device.

• The central network device determines the performance and number of nodes the network
can handle.

Ring topology
A ring topology is a network configuration where device connections create a circular data
path. Each networked device is connected to two others, like points on a circle. Together,
devices in a ring topology are referred to as a ring network.
In a ring network, packets of data travel from one device to the next until they reach their
destination. Most ring topologies allow packets to travel only in one direction, called a
unidirectional ring network. Others permit data to move in either direction, called bidirectional.

Figure 12-RING TOPOLOGY

Ring topologies may be used in either LANs (local area networks) or WANs (wide area
networks). Depending on the network card used in each computer of the ring topology, a
coaxial cable or an RJ-45 network cable is
used to connect computers together.

In the past, the ring topology was most commonly used in schools, offices, and smaller
buildings where networks were smaller. However, today, the ring topology is seldom used,
having been switched to another type of network topology for improved performance, stability,
or support.

Advantages of a ring topology

• All data flows in one direction, reducing the chance of packet collisions.

• A network server is not needed to control network connectivity between each


workstation.

• Data can transfer between workstations at high speeds.

• Additional workstations can be added without impacting performance of the network.

Disadvantages of a ring topology

*The major disadvantage of a ring topology is that if any individual connection in the ring is
broken, the entire network is affected.

• All data being transferred over the network must pass through each workstation on the
network, which can make it slower than a star topology.

• The entire network will be impacted if one workstation shuts down.

• The hardware needed to connect each workstation to the network is more expensive than
Ethernet cards and hubs/switches.
Bus topology
Alternatively referred to as line topology, bus topology is a network setup where each computer
and network device is connected to a single cable or backbone. Depending on the type of
computer network card, a coaxial cable or an RJ-45 network cable is used to connect them
together.

Figure 13-BUS TOPOLOGY

Advantages of bus topology


• It works well when you have a small network.

• It's the easiest network topology for connecting computers or peripherals in a linear
fashion.

• It requires less cable length than a star topology.

Disadvantages of bus topology


• It can be difficult to identify the problems if the whole network goes down.
• Bus topology is not great for large networks.
• Terminators are required for both ends of the main cable.
• Additional devices slow the network
down.
• If a main cable is damaged, the network fails or splits into two.
Logical Topologies
A logical topology is a concept in networking that defines the architecture of the
communication mechanism for all nodes in a network. Using network equipment such as
routers and switches, the logical topology of a network can be dynamically maintained and
reconfigured.

Logical topologies contrasts with physical topologies, which refer to the physical
interconnections of all devices in the network, they are:
• Ethernet
• VLANs (Virtual LANs)

• Token Ring

Ethernet
Ethernet is a widely-deployed LAN technology. Ethernet shares media. A network which uses
shared media has high probability of data collision. Ethernet uses CSMA/CD technology to
detect collisions. When a collision occurs in Ethernet, all its hosts roll back, wait for some
random amount of time, and then re-transmit the data (esoft, 2021).

Figure 14-ETHERNET
VLANs (Virtual LANs)
Virtual LAN is a solution to divide a single broadcast domain into multiple broadcast domains.
Host in one VLAN cannot speak to a host in another. By default, all hosts are placed into the
same VLAN. Data communication between VLAN is done using routers.

Figure 15-VLAN

VLAN advantages

• Because workstations can only be transferred to another VLAN through a change in


switch setup, it is effortless to position these workstations.

• Users can exchange files and services more quickly if they have a single VLAN for all
people working together on a given project.

• If a user switches their desks after connecting to the network, their computer is still in the
same VLAN, provided the VLANs are mounted correctly.

• If the network administrator wants to block connections to servers or other computers,


they may be put off in their VLAN. Users can then be provided control selectively in
other VLANs (esoft, 2021).
Token Ring
Token Ring was a networking technology
created by IBM in 1985. It operates at the network access layer of the TCP/IP model. It is
physically a star topology, with the devices all connected to a central device called a Media
Access unit (MAU). In formation passes successively between hubs on the system until the
point when it comes back to the source station. To avoid traffic and collision, a token ring
topology utilizes a token to make sure that just a single hub/station on hold is utilized at once,
in this manner effectively signifying media clients of its action (esoft, 2021).

Figure 16-TOKEN RING

Evaluation of topology protocol


For the association inside the SYNTAX SOLUTIONS, I utilized fast Ethernet connection since
its information move rate is quite acceptable contrasted with the ordinary Ethernet standard.
Likewise, for the design of the hosts in every division I isolated those utilizing VLANs by
naming every division with a name and utilized routers as the principal hotspot for information
correspondence.
I have chosen Star Topology for this specific
case study known as Syntax solutions The star and extended star are the
most popular topologies for Ethernet networks. This type network is easy to setup, relatively
inexpensive, and provides more redundancy than other topologies. The star topology is
configured by connecting all of the nodes on the network to central device. The central
connection allows the network to continue functioning even if a single node or cable fails. The
major drawback to this topology is that if the central device fails, then the network will become
unstable or cease to function. The star topology is most suitable for small, centralized networks.
The extended star topology adds sub-central devices that are connect to the central device. This
type of topology is advantageous for large networks and provides functionality for the
organization and subnetting of the IP address allocation within the network. The extended star
topology is most suitable for large networks that may span an entire building.
The important reasons why I choose star topology is Simplicity The topology is easy to
understand, establish, and navigate. The simple topology obviates the need for complex routing
or message passing protocols.
Another major advantage of this topology is You can easily add new computers or devices to
the network without interrupting other nodes. New devices or nodes can easily be added to the
Star Network by just extending a cable from the switch. If the switch adds a device for example
a printer or a fax machine, all the other computers on the network can access the new device by
simply accessing the switch. The device need not be installed on all the computers in the
network. The central function is cost effective and easier to maintain.

Communication;
Transmitting data from one point to another Point
Simplex
• In simplex mode the communication can take place in one direction. The receiver
receives the signal from the transmitting device. In this mode the flow of information is
Uni-directional. Hence it is rarely used for data communication.
Figure 17-SIMPLEX

Half-duplex
• In half-duplex mode the communication channel is used in both directions, but only in
one direction at a time. Thus, a half-duplex line can alternately send and receive data.

Figure 18-HALF DUPLEX

Full-duplex
• In full duplex the communication channel is used in both directions at the same time. Use
of full-duplex line improves the efficiency as the line turnaround time required in half
duplex arrangement is eliminated.
Example of this mode of transmission is the telephone line (esoft,
2021).

Figure 19-FULL DUPLEX

Bandwidth requirements for the Topologies

Star Topology –also a LAN design in which all the stations are connected through point-
topoint links to a central server. 10BaseT Ethernet is used in this topology. This is a slower
bandwidth.
Ring Topology –a LAN infrastructure where the nodes are connected to each other in a loop
form. Uses token rings/EEE 802.5 and FDDI networks for better bandwidth.
Bus Topology –standard Ethernet/EEE 802.3
network actualizes a Bus Topology where all the wires are linked to the
backbone cable. The bandwidth is high compared to the star topology’s bandwidth.
Mesh Topology – data transmission rate is likely to be high since every device is connected to
each other through point-to-point dedicated links.

Network Models

For data communication to take place and two or more users can transmit data from one to
other, a systematic approach is required. This approach enables users to communicate and
transmit data through efficient and ordered path. It is implemented using models in computer
networks and are known as computer network models.
Computer network models are responsible for establishing a connection among the sender and
receiver and transmitting the data in a smooth manner respectively.
There are two computer network models (geeks for geeks, n.d.)
• ISO OSI Model

• TCP/IP Model

Figure 20-NETWORK MODELS

*Models are reasonable (coherent) models used to clarify the information correspondence
inside a PC organize.

ISO OSI Model

The OSI Model is one of the general-purpose networking or communication model among
computer network models, which is responsible for establishing connection in an open manner
between all the communicable devices present across the globe.
ISO stands for international organization of Standardization. This is called a model for
Open System Interconnection (OSI) and is commonly known as OSI model.
The ISO-OSI model is a seven-layer architecture. It defines seven layers or levels in a complete
communication system. They are:
• Application Layer
• Presentation Layer
• Session Layer
• Transport Layer
• Network Layer
• Datalink Layer
• Physical Layer

Figure 21-OSI MODEL

*Also, these layers are sequenced in fixed manner and this sequence cannot be changed. It
means, any alterations in the positions of the layers are not accepted (geeks for geeks, n.d.).
Architecture of OSI model

Figure 22-ARCHITECTURE OF OSI


Application Layer
An application layer is an abstraction layer that specifies the shared communications protocols
and interface methods used by hosts in a communications network. An application layer
abstraction is specified in both the Internet Protocol Suite (TCP/IP) and the OSI model.

Presentation Layer
This layer is also known as Translation layer, as this layer serves as a data translator for the
network. The data which this layer receives from the Application Layer is extracted and
manipulated here as pert the required format to transmit over the network. The main
responsibility of this layer is to provide or define the data format and encryption. The
presentation layer is also called as Syntax layer since it is responsible for maintaining the
proper syntax of the data which it either receives or transmits to other layer(s).

Session Layer
Session layer oversees and synchronize the discussion between two distinct applications. Move
of information from source to goal session layer surges of information are stamped and are
resynchronized appropriately, with the goal that the parts of the bargains are not cut rashly and
information misfortune is maintained a strategic distance from.

Transport Layer
Transport Layer provides transparent transfer of data between end users, providing reliable data
transfer services to the upper layers. The transport layer controls the reliability of a given link
through flow control, segmentation and desegmentation, and error control. Some protocols are
state- and connection-oriented. This means that the transport layer can keep track of the
segments and retransmit those that fail.

Network Layer
The network layer has two main functions. One is breaking up segments into network packets,
and reassembling the packets on the receiving end. The other is routing packets by discovering
the best path across a physical network. The
network layer uses network addresses (typically Internet Protocol
addresses) to route packets to a destination node.

Datalink Layer
The data link layer establishes and terminates a connection between two physically-connected
nodes on a network. It breaks up packets into frames and sends them from source to destination.
This layer is composed of two parts—Logical Link Control (LLC), which identifies network
protocols, performs error checking and synchronizes frames, and Media Access Control (MAC)
which uses MAC addresses to connect devices and define permissions to transmit and receive
data.

Physical Layer
The physical layer is responsible for the physical cable or wireless connection between network
nodes. It defines the connector, the electrical cable or wireless technology connecting the
devices, and is responsible for transmission of the raw data, which is simply a series of 0s and
1s, while taking care of bit rate control (esoft, 2021).

Advantages Of OSI Model


The OSI Model being one of the most widely used computer network models does possess
some major advantages which makes it so popular. These are:
1. Each layer has its definite structure and functionality which makes OSI model simple and
easy to use.

2. It is a general-purpose reference model that can be used for data communication.


3. Connection oriented and connection-less
services are supported.

4. Connection between any type of devices or host or hardware or software is possible.

Disadvantages Of OSI Model

1. Because of its inability to fit protocols, this model was replaced by TCP/IP Internet
Model.

2. Session and Presentation layers does not provide high end functionalities and are not of
much use as compared to other layers.

3. Connection oriented and connection-less services are supported.

4. Connection between any type of devices or host or hardware or software is possible.

TCP/IP MODEL

The TCP/IP model, was designed and developed by Department of Defense (DoD) in 1960s
and is based on standard protocols. It stands for Transmission Control Protocol/Internet
Protocol. The TCP/IP model is a concise version of the OSI model. It contains four layers:

• Process/Application Layer
• Host-to-Host/Transport Layer
• Internet Layer
• Network Access/Link Layer

Process/Application Layer
This layer plays out the elements of top three layers of the OSI model: Application,
Presentation and Session Layer. It is answerable for hub to-hub correspondence and controls UI
particulars. A portion of the conventions present in this layer are: HTTP, HTTPS, FTP, TFTP,
Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS, X Window, LPD.

Host-to-Host/Transport Layer
This layer is closely resembling the vehicle layer of the OSI model. It is answerable for start to
finish correspondence and mistake free conveyance of information. It shields the upper-layer
applications from the complexities of information. The two primary conventions present in this
layer are, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).

Internet Layer
This layer parallels the functions of OSI’s Network layer. It defines the protocols which are
responsible for logical transmission of data over the entire network. The main protocols
residing at this layer are, IP (Internet Protocol), ICMP (Internet Control Message Protocol), and
ARP (Address Resolution Protocol) (geeks for geeks, n.d.).

Network Access/Link Layer


This layer relates to the mix of Data Link Layer and Physical Layer of the OSI model. It pays
special mind to equipment tending to and the conventions present in this layer takes into
consideration the physical transmission of information. We just discussed ARP being a
convention of Internet layer, yet there is a contention about pronouncing it as a convention of
Internet Layer or Network get to layer. It is depicted as living in layer 3, being embodied by
layer 2 conventions.
Difference between TCP/IP and OSI Model: (geeks for geeks, n.d.) TCP/IP OSI
TCP refers to Transmission Control Protocol. OSI refers to Open Systems Interconnection.
TCP/IP has 4 layers. OSI has 7 layers.
TCP/IP is more reliable OSI is less reliable
TCP/IP does not have very strict boundaries. OSI has strict boundaries
TCP/IP follow a horizontal approach. OSI follows a vertical approach.
TCP/IP uses both session and presentation OSI uses different session and presentation
layer in the application layer itself. layers.

TCP/IP developed protocols then model. OSI developed model then protocol.
Transport layer in TCP/IP does not provide In OSI model, transport layer provides
assurance delivery of packets. assurance delivery of packets.

Protocols cannot be replaced easily in TCP/IP While in OSI model, Protocols are better
model. covered and is easy to replace with the change
in technology.

TCP/IP model network layer only provides Connection less and connection oriented both
connection less services. services are provided by network layer in OSI
model.

Table 3-Difference between TCP/IP and OSI Model

Protocols suites of TCP/IP Model

Application Layer

FTP (File Transfer Protocol) -transfers files to and from a remote network. The Enclave
Films Company could share motion picture related records over the system with the Vivid Zone
organization site without burden. Port No.- Control Connnection:21, Information Connection:
20
Telnet - The Telnet protocol enables terminals
and terminal-oriented processes to communicate on a network running
TCP/IP. Since the passwords that are entered are visible while typing, someone might gain
control over the system. Thus, I would recommend Enclave films to not use this protocol since
it has less security.

TFTP (Trivial File Transfer Protocol) -gives capacities like ftp, yet it doesn't build up ftp's
intuitive association. Subsequently, clients can't list the substance of a registry or change
catalogs. Thus, proving to be unreliable. I would recommend FTP. Port No.-69.

SMTP (Simple Mail Transfer Protocol) –used for sending electronic mails across the internet
effectively and safely. This protocol can be used by the managers or clients of the business to
efficiently pass emails through their net regarding issues n so on. In other words,
communicating via mails. Port NO. -25.

DNS (Domain Name System) –this is used to change the hostname into IP addresses and vice
versa. Thus, Enclave Films could use the DNS protocol for mailing purposes. Port No. -53.

SNMP (Simple Network Management Protocol) –this is used to monitor the network devices
and its functions within the LAN between two buildings. The new version of SNMP is version
3 which provides better protection and security. Port No. -161.

Transport Layer

TCP (Transmission Control Protocol) –known as connection-oriented protocol. This protocol


is reliable. Thus, communication is guaranteed if the sales department of building A needs to
send a file to the other managing departments. However, this is costly.
UDP (User Datagram Protocol) –known as connection less protocol. This protocol is not quite
reliable but data will reach its destination node. Has different data flow control. Less expensive
that TCP.
Internet Layer
ICMP (Internet Message Control Protocol) –used by IP to fulfill
various services. Used for sending messages. Messages are taken along as IP datagrams.
Although ICMPs are used to report errors, they r still unreliable since datagrams may still be
undelivered.

IP (Internet Protocol) -Suppose, the management of the Enclave films wants to remove a
machine within the network. They can easily identify the machine using the IP address of that
particular network (esoft, 2021).

Some other popular protocols act as co-functioning protocols associated with these primary
protocols for core functioning. These are:

• ARP (Address Resolution Protocol)

• DHCP (Dynamic Host Configuration Protocol)

• IMAP4 (Internet Message Access Protocol)

• RTP (Real-Time Transport Protocol)

ARP (Address Resolution Protocol)- The Address Resolution Protocol (ARP) is a


communication protocol used for discovering the link layer address, such as a MAC address,
associated with a given internet layer address, typically an IPv4 address. This mapping is a
critical function in the Internet protocol suite. ARP was defined in 1982 by RFC 826, which is
Internet Standard STD 37.

DHCP (Dynamic Host Configuration Protocol)- The Dynamic Host Configuration Protocol
(DHCP) is a network management protocol used on Internet Protocol (IP) networks for
automatically assigning IP addresses and other communication parameters to devices connected
to the network using a client–server architecture.
IMAP4 (Internet Message Access Protocol)-
In computing, the Internet Message Access Protocol (IMAP) is an
Internet standard protocol used by email clients to retrieve email messages from a mail server
over a TCP/IP connection. IMAP is defined by RFC 9051.

RTP (Real-Time Transport Protocol)- The Real-time Transport Protocol (RTP) is a network
protocol for delivering audio and video over IP networks. RTP is used in communication and
entertainment systems that involve streaming media, such as telephony, video teleconference
applications including WebRTC, television services and web-based push-to-talk features.

LO2 Explain networking devices and operations

Networking Devices
Computer networking devices are units that mediate data in a computer network and are also
called network equipment. Units which are the last receiver or generate data are called hosts or
data terminal equipment (netwrix, n.d.).

Hardware Devices
A hardware device is any physical or tangible device of the computer system which plays a
major role in the running of the system.
Hub
A hub is a small, simple, inexpensive electronic device that joins multiple computers together.
There two main types of hubs:

Passive Hub –do not amplify the electrical signal of incoming packets before broadcasting
them out to the network.

Active Hub –on the other hand, do perform this amplification, as does a different type of
dedicated network device called a repeater. Some people use the terms concentrator when
referring to a passive hub and multiport repeater when referring to an active hub (netwrix, n.d.).

Figure 23-HUB

Bridge

A bridge is a device that connects two networks so that they act as if they are one network.
Bridges are used to partition one large network into two small networks for performance
reasons. Repeaters listen to signals coming down one network cable, amplifying them, and send
them down the other cable. They do this blindly, paying no attention to the content of the
messages that they repeat. In contrast, a bridge is a little smaller about the messages that come
down the pike (netwrix, n.d.).
Figure 24-BRIDGE

Switches
A network switch is a small hardware device that centralizes communications among multiple
connection devices within one LAN. Standalone Ethernet switch devices were commonly used
on home networks many years before home broadband routers became popular.
Highperformance network switches are still widely used in corporate networks and data centers
(netwrix, n.d.).

Figure 25-SWITCH

Router
A router is a switching device for networks, which is able to route network packets, based on
their addresses, to other networks or devices. Among other things, they are used for Internet
access, for coupling networks or for connecting branch offices to a central office via VPN
(Virtual Private Network) (netwrix, n.d.).
Figure 26-ROUTER

Differences between a Hub and a Switch (geeks for geeks, n.d.)


Hub Switch
Hubs operate in Physical layer as layer 1 Switches operate in Data link layer as layer 2
devices in the OSI Model devices in the OSI Model

4/12 Ports 28/48 Ports


Electrical signals or bits Frames and Packets
Half duplex – crashes happen normally in Full duplex – No collisions occur in a full
arrangements utilizing centers duplex switch
Table 4-DIFFERENCES BETWEEN HUB AND SWITCH

Differences between a Router and a Bridge (geeks for geeks , n.d.)


Router Bridge
Operates in the Network Layer in the OSI Operates in the Data Link Layer in the OSI
Model Model
Used to connect LAN and WAN Connects two different LAN segments
Transmits data in the form of packets Transmits data in the form of frames
Reads the IP address of a device Reads the MAC address of a device
Has more ports compared to a bridge A bridge has only two ports
Table 5-Differences between a Router and a Bridge

End-User Devices
End-user devices are other devices that provide services directly to the user. End-user devices
that provide users with a connection to the network are also referred to as hosts. These devices
allow users to share, create and obtain information.

Laptops
Laptop computers as the name implies are small portable computers that can run on batteries as
well as main power. They use special screens rather than the traditional bulky VDUs (Visual
Display Units) which allows for long battery life as well as portability.

Figure 27-LAPTOP
Personal Computers
IBM invented PC way back in 1981. All PCs released since then are in many ways compatible
with the original design, through many extensions have been made. The term PC compatible
relates to PCs manufactured by companies other than IBM that are compatible with the
traditional PC specification.

Figure 28-PC

Printers
An output device. Most data are printed once you have created it and there are vast number of
different printers available to accomplish this. Most common are inkjet and laser printers both
of which now can produce colored output (at a cost). In most organizations, the printers are
connected to the computers via a network. This means at each person with a computer does not
require his or her own printer. Each computer connected to the network can print using a
particular shared printer.

Figure 29-PRINTER
Cables
A cable, also known as a cord, plug, or connector transmits power or data between devices or
positions, which is covered in plastic by one or more wires. A power cable and data cable are
the primary types of computer cables. ... The USB>/a>, SATA, CAT5, and IDE/EIDE cables
are other popular examples of data cables.

Twisted pair cables


One of the earliest guided transmission media is twisted pair cables. A twisted pair cable
comprises of two separate insulated copper wires, which are twisted together and run in
parallel. The copper wires are typically 1mm in diameter. One of the wires is used to transmit
data and the other is the ground reference.

Figure 30-TWISTED PAIR

Types of Twisted–Pair Cables


There are two types of twisted pair cables
• Unshielded Twisted Pair (UTP): These generally comprise of wires and insulators.

• Shielded Twisted Pair (STP): They have a braided wired mesh that encases each pair of
insulated wires.
Fiber optical cable
Optical fiber is used by telecommunications companies to transmit telephone signals, Internet
communication and cable television signals. It is also used in other industries, including
medical, defense, government, industrial and commercial.
There are two primary types of fiber – multimode and single mode. Multimode fiber can carry
multiple light rays (modes) at the same time by having varying optical properties at the core;
essentially light travelling the shortest path (down the middle) travels the slowest.

Figure 31-FIBER OPTIC

One of the major disadvantages of fiber optical cable is


The optical fibers are difficult to splice, and there is loss of the light in the fiber due to
scattering. They have limited physical arc of cables. If you bend them too much, they will break.

Copper Straight-through cable

Straight-through cable is a type of twisted pair copper wire cable for local area network (LAN)
use for which the RJ-45 connectors at each end have the same pinout (i.e., arrangement of
conductors).
Straight through cables provide a connection that only allows one end to communicate at any
given moment. These cables are the most common. They are best when connecting two
different types of networking equipment. For
instance, they are appropriate for connecting a computer to a switch,
router or printer.

Figure 32-COPPER STRAIGHT

Copper cross over cable

A crossover cable is a type of twisted pair copper wire cable for LANs (local area network) in
which the wires on the cable are crossed over so that the receive signal pins on the RJ-45
connector on one end are connected to the transmit signal pins on the RJ-45 connector on the
other end.
These are used to connect two computers or similar devices directly together, such as
computers or hubs. To create a crossover cable is to rearrange the wires on one end of a
standard Ethernet cable, so that they are in the following order (starting at pin 1)
Figure 33-COPPER CROSS OVER

• It can use a computer to a computer with no switch or hub.


• Network devise to the network device. For example, the route to the router.
• Crossover cable enables one to establish a direct connection between two computing
devices using Ethernet ports.
• It Connects two computers directly.
• You can connect two hubs/switches by using the normal port in both switches and hubs.

Difference between Crossover and Straight-through cable

• Crossover cable, Pin 1 is crossed with Pin 3, and Pin 2 is crossed with Pin 6 while in
Straight-through cable Pin connection is one to one.
• Straight-through cables are mainly used for connecting non-similar devices while
crossover cables are mostly used for connecting similar devices.
• Straight through cable connects a computer with a DSL modem while Crossover cable
connects Router to Router and Computer to Computer.

Server Types
A server is a computer or system that provides
resources, data, services, or programs to other computers, known as
clients, over a network. In theory, whenever computers share resources with client machines,
they are considered servers. There are many types of servers, including web servers, mail
servers, and virtual servers.
An individual system can provide resources and use them from another system at the same
time. This means that a device could be both a server and a client at the same time.

How a server works-To function as a server, a device must be configured to listen to requests
from clients on a network connection. This functionality can exist as part of the operating
system as an installed application, role, or a combination of the two. For example, Microsoft’s
Windows Server operating system provides the functionality to listen to and respond to client
requests. Additionally installed roles or services increase which kinds of client requests the
server can respond to. In another example, an Apache web server responds to Internet browser
requests via an additional application, Apache, installed on top of an operating system.

Figure 34-SERVER

Types of servers
There are many types of servers that all
perform different functions. Many networks contain one or more of the
common server types:

File servers
File servers store and distribute files. Multiple clients or users may share files stored on a
server. In addition, centrally storing files offers easier backup or fault tolerance solutions than
attempting to provide security and integrity for files on every device in an organization. File
server hardware can be designed to maximize read and write speeds to improve performance.

Application servers
Application servers run applications in lieu of client computers running applications locally.
Application servers often run resource-intensive applications that are shared by a large number
of users. Doing so removes the need for each client to have sufficient resources to run the
applications. It also removes the need to install and maintain software on many machines as
opposed to only one.

Web servers
One of the most abundant types of servers in today’s market is a web server. A web server is a
special kind of application server that hosts programs and data requested by users across the
Internet or an intranet. Web servers respond to requests from browsers running on client
computers for web pages, or other web-based services. Common web servers include Apache
web servers, Microsoft Internet Information Services (IIS) servers and Nginx servers.
Database servers
The amount of data used by companies, users,
and other services is staggering. Much of that data is stored in databases. Databases need to be
accessible to multiple clients at any given time and can require extraordinary amounts of disk
space. Both of these needs lend themselves well to locating such databases on servers. Database
servers run database applications and respond to numerous requests from clients. Common
database server applications include Oracle, Microsoft SQL Server, DB2, and Informix.

Proxy servers
A proxy server acts as an intermediary between a client and a server. Often used to isolate
either the clients or servers for security purposes, a proxy server takes the request from the
client. Instead of responding to the client, it passes the request on to another server or process.
The proxy server receives the response from the second server and then replies to the original
client as if it were replying on its own. In this way, neither the client nor the responding server
needs to directly connect to each other (esoft , 2021).
Explore a range of server types and justify
the selection of a server

HP ProLiant DL380

System Specifications

Rack Height 2U

Number of Configured Processors 1

Processor Capacity 2

Maximum Memory 32 GB

Memory Protection Advanced ECC

Memory Note PC2-5300


Power Supply Dual hot-plug power supply

Redundant Power Supply Standard

Redundant Fans Standard

Configured Storage Capacity N/A

Optical Drive DVD+R/RW 8X Slim

Number of Users (Starting) 200

Number of Users (Maximum 400

Warranty (Parts-Labor-Onsite) 3-3-3


Table 6-System Specifications
Smart Array P400 Controller

Sub-Component Description

Disk Drive and 3G SAS (Serial Attached SCSI)


Enclosure

Interface 1.5 G SATA (Serial Advanced Technology Attachment)

SAS Connectors 2 internal (SFF8484) x4 wide port connectors


Cache Memory Speed DDR2-533 MHz with 40 or 72-bit wide bus provides up to
4.2 GB/s maximum bandwidth.

Server Interface x8 2.5G PCIe provides 2 GB/s maximum bandwidth.

SAS Speed x8 3G SAS provides 2.4 GB/s maximum bandwidth.


Cache Memory 40-bit 256 MB cache (72-bit 512 MB module upgrades
available); ECC protection, battery-backed, and
transportable

Logical Drives Up to 32 logical drives


Supported
Maximum Logical 3 TB (6 x 500 GB)
Drive Capacity
Host Memory 64-bit, supporting greater than 4 GB server memory space
Addressing

RAID Support RAID 6 with ADG (Advanced Data Guarding) requires


Battery Backed Write

Cache Upgrade

RAID 5 (Distributed Data Guarding)

RAID 1+0 (Striping & Mirroring)

RAID 0 (Striping)

Table 7-Smart Array P400 Controller


Two Embedded NC373i Multifunction
Server Adapters

Sub-Component Description

Network Interface 10 Base-T/100 Base-TX/1000 Base-TX

Compatibility IEEE 802.3 10 Base-T

IEEE 802.3ab 1000 Base-T

IEEE 802.3u 100 Base-TX


Data Transfer PCI Express, four lanes (x4)
Method

Network Transfer 10 Base-T (HalfDuplex) 10 Mb/s


Rate
10 Base-T (FullDuplex) 20 Mb/s

100 Base-TX 100 Mb/s


(HalfDuplex)

100 Base-TX 200 Mb/s


(FullDuplex)

1000 Base-TX (Half and 2000 Mb/s


Full-Duplex)
Connector Two RJ-45

Cable Support 10 Base-T Categories 3, 4 or 5 UTP; up to


328 feet (100 meters)

100 Base-TX Category 5 or higher UTP; up to


328 feet (100 meters)

1000 Base-TX Category 5 or higher UTP; up to


328 feet (100 meters)

Table 8
(HP, n.d.)

Dell PowerEdge R415 1U Rack Server

Feature Technical Specifications


Processor Up to two 3rd Generation Intel Xeon Scalable processors, with up to 24 cores per
processor
Memory Memory 16 DDR4 DIMM slots, supports RDIMM max 1 TB, speeds up to 2933
MT/s
Storage controllers • Internal controllers (RAID): PERC H345, PERC H745, PERC H755, S150
• Internal Boot: Internal Dual SD Module or Boot Optimized Storage Subsystem
(BOSS-S2): HWRAID 2x M.2 SSDs or USB
• External PERC (RAID): PERC H840
• 12 Gbps SAS HBAs (non-RAID): internal-HBA355i, external-HBA355e
Drive Bays Front bays:
• Up to 4 x 3.5-inch SAS/SATA (HDD/SSD) max 64 TB
• Up to 8 x 2.5-inch SAS/SATA (HDD/SSD) max 61.4 TB
Power Supplies • 1100 W DC / -48– (-60) V
• 800 W Platinum AC / 240 V HVDC
• 600 W Platinum AC / 240 V HVDC
Cooling options Air cooling
Fans • Standard (STD) fans or High performance SLVR fans

• Up to seven cold swap fans


Dimensions • Height – 42.8 mm (1.7 inches)
• Width – 482 mm (18.97 inches)
• Depth – 734.95 mm (28.92 inches) – without bezel
748.79 mm (29.47 inches) – with bezel
Table 9
Form Factor 1U rack server
Embedded • iDRAC9

Management • iDRAC Service Module


• iDRAC Direct
• Quick Sync 2 wireless module
Bezel Optional LCD bezel or security bezel
Open Manage • Open Manage Enterprise

Software • Open Manage Power Manager plugin


• Open Manage Support Assist plugin
• Open Manage Update Manager plugin
Mobility Open Manage Mobile
Integrations and Open Manage Integrations Open Manage Connections
Connections • BMC True sight • IBM Tivoli Netcool/OMNIbus
• Microsoft System Center • IBM Tivoli Network Manager IP
• Red Hat Ansible Modules Edition
• VMware vCenter and vRealize • Micro Focus Operations Manager
Operations Manager • Nagios Core
• Nagios XI
Table 10
Security • Cryptographically signed firmware
• Secure Boot
• Secure Erase
• Silicon Root of Trust
• System Lockdown (requires iDRAC9 Enterprise or Datacenter)
• TPM 1.2/2.0 FIPS, CC-TCG certified, TCM 2.0 optional
Embedded NIC 2 x 1 GbE LOM
Network Options 1 x OCP 3.0
GPU Options NA
Ports Front Ports Rear Ports
• 1 x Dedicated iDRAC Direct • 1 x USB 2.0

microUSB • 1 x Serial (optional)

• 1 x USB 3.0 • 1 x USB 3.0

• 2 x Ethernet
• 1 x VGA
• 1 x VGA

Internal Ports
•1 x USB 3.0 (optional)
PCIe 2 x PCIe Gen4 slots
Operating System and • Canonical Ubuntu Server LTS
Hypervisors • Citrix Hypervisor

• Microsoft Windows Server with Hyper-V


• Red Hat Enterprise Linux
• SUSE Linux Enterprise Server
• VMware ESXi
Table 11

(DELL, n.d.)
Justification of the most appropriate server

Through our case study known as Syntax solutions for different types of clients. As a network
engineer I have to understand what type of server is suitable for this LAN. I have chosen the
Dell server known as Edge R415 1U Rack Server. Compared to other servers this specific
server is considered to be the most affordable cost ranged server. As I mention about the
specifications of this server, they are certain propositions to consider
Finally, it is small in size, therefore the size and weight of this server is certainly a great help to
the server room architecture based on its eco-friendliness. As we look through the
specifications of the other servers. Dell servers are been considered as the best server due to its
ultimate performance. Although some features of the Dell server might be efficient than the HP
server. What could possibly be the best server for Syntax solutions? The answer is the Dell
Server
As I mentioned before about the other servers. All I need to specify is that the Dell servers are
been renowned for their ultimate performance. The Dell server’s that has been used for the
Syntax solution has a higher memory allocation compared to other servers. As I compare with
the cost of this server, it has a profitable gain in investment. The processors known as AMD
processors are considered for a cooler environment, yet these types of processors exhume less
heat. The use of servers and necessary network equipment are pretty destructive to the network
administrators and employees who have used the server room

Cost comparison
HP ProLiant DL380 - (1,521,760.48 LKR)
Dell PowerEdge R415 1U Rack Server -
(117,598.90 LKR)
When compared with the other servers the server that I have chosen has lower power
consumption. Compared to the total amount of servers that I have purchased is similarly
compared to the cost of the HP server. Therefore, the Dell server is the ultimate choice for
Syntax solutions.

interdependence of workstation hardware with relevant networking software


The computer system consists of two main elements: hardware and software. In order for any
computer system to function smoothly, a vital role is played by both hardware and software
components. If the necessary hardware and software are not available, the system does not
work correctly. Typically, hardware is a collection of physical elements that you can touch,
which are also known as computer hardware. Similarly, the software is a program consisting of
a set of instructions for the computer to perform certain operations. They are in many ways
interdependent with each other. In order for a computer to work efficiently, manipulate data,
and produce a useful conclusion. It is necessary that the hardware and software work together.
Computer software controls computer equipment. These two components complement each
other and cannot act independently of each other. Without software, computer equipment is
useless. Similarly, computer software cannot be used without hardware support. Therefore,
hardware and software components must interact with each other to make the system on the
network.
Hardware required in a workstation
Inter Core i5-64-bit 830GHZ or AMD FX 4100
Processor
and above

Motherboard Dual processor. Intel SE7501BR2 server kit

RAM/Memory Requirement 4 GB DDR 3

Router Wired or wireless according to the network

Hard disk 1.5 TB

Switches Manageable and unmanageable


Bandwidth 150mb per second

Access pointer Wireless

Firewall Juniper

Network Interface Card 100BaseT


Table 12-Hardware required in a workstation

Software requirements
Software is a simple term for various kinds of programs used to work with computers and
computers. The need for software is required to run any devices. Because the hardware
executes software commands, it is impossible to perform hardware in the absence of software.
Terms that can be used to describe software are scripts, programs, a set of instructions and
applications. There are many network programs that have their own function and specialty. The
use of various types of software that is carried for the network between any two systems is
client software, server software, etc.

To execute the process, the client needs a server. The client connects to the services through the
network server. Switches and routers are needed to support the network. Client software refers
to the software that acts as a link between client and server computers. An OS that can run on
only one computer is called a client operating system that is used by individual users. Server
software is usually designed to connect to the server hardware, as well as to the processor,
memory, memory and other communication ports. Different types of servers are a web server,
an application server, a file server, etc. However, the server software also needed to install
some operating system for the proper functioning of the functions. The OS that was created to
install and warn the server is called a server operating system. The firewall is installed on
separate servers to manage incoming and outgoing signals.
Inter dependency of workstation hardware with software
Hardware and software, they are both very interdependent with each other. To output the
computer, they must work together. Without hardware support, the software cannot be used,
and if there is no correct indication of the hardware provided, it is useless. To perform the
work, a suitable software package must be installed in the hardware. As various software,
various tasks can be performed in the hardware. Hardware and software are like the body and
soul of a computer system. The software acts as a connection between the user and,
consequently, the hardware. Therefore, it is necessary that both of them are connected to each
other to run any systems.

Conclusion
I discussed the hardware requirements, the servers with the appropriate software, their
interdependence and how they perform their work. Hardware with the perfect software will
help you to manage all organizations smoothly and efficiently.
Example networking software that can be used in Syntax solutions LAN network

Anti-Virus
Antivirus software is a type of program designed and developed to protect computers from
malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such.
Antivirus programs function to scan, detect and remove viruses from your computer. There are
many versions and types of anti-virus programs that are on the market. However, the prime
objective of any antivirus program is to protect computers and remove viruses once detected.

Figure 35-ANTI VIRUS

Antivirus software begins operating by checking your computer programs and files against a
database of known types of malwares. Since new viruses are constantly created and distributed
by hackers, it will also scan computers for the possibility of new or unknown type of malware
threats.
Some of the most prominent advantages are:
• Protection from viruses and their transmission.
• Block spam and ads.
• Defense against hackers and data thieves.
• Ensures protection from removable devices.

Firewalls in computing, a firewall is a network security system that monitors and controls
incoming and
outgoing network traffic based on predetermined security rules. A firewall typically establishes
a barrier between a trusted network and an untrusted network, such as the Internet
Firewalls are categorized as a network-based or a host-based system. Network-based firewalls
can be positioned anywhere within a LAN or WAN. They are either a software appliance
running on general-purpose hardware, a hardware appliance running on special-purpose
hardware, or a virtual appliance running on a virtual host controlled by a hypervisor. Firewall
appliances may also offer non firewall functionality, such as DHCP or VPN services.
Hostbased firewalls are deployed directly on the host itself to control network traffic or other
computing resources. This can be a daemon or service as a part of the operating system or an
agent application for protection.

Figure 36-FIREWALL
LO3: Design efficient networked systems

Implementation of the Network Design


In this task, I'm going to talk about the network system that is prepared by the Visio tool. A
server is a type of network that has organized network resources for other computer programs
(and its users). Separation of functions into several different parts of the application is known as
server technology.

Figure 37-BLUE PRINT

The following figure shows the use of various types of Visio tools used to create a network
system. It contains various departments, such as a server station, workstations and substations.
The above plan of the Syntax solutions has 8 switches. One for server station there are 2 servers
in the network and other 7 switches for each department in the network. every one of the offices
PCs and different gadgets can't be associated
with one switch alone as it would make it increasingly perplexing

The Matara router is connected to first switch which has developers


I used Bus topology to develop the Syntax solutions LAN network
In this network the developers consist of one switch and 2 end user devices which has 1 pc and
1 laptop and the developers department have 55 users. The finance department consist of one
switch and 2 end user devices and the finance have 25 users. Likewise, every department
consist of one switch and 2 end user devices which has 1 pc and 1 laptop
The use of the switch in a network situation it is considered as a device that connects other
devices through a computer network. By the help of these switches, we are able to receive
process as well as forward the necessary data to the required destination
This certain branch has used Wireless routers as well, so that each and every department has
access to internet connectivity
Through this we realize that every switch that is used is been connected to each other. They
have used a router which helps to provide internet facility to each and every department
All the 7 switches use VLANs so as to improve the system execution by expanding the quantity
of communicate spaces and reduction its size.
IP Allocation Table

Depart No Blo Network First Last usable Ip. Broadcast Subne


ment . of ck address usable Ip. Ip. mask
use size
rs
Develo 55 64
pers
Finance 25 32

Sales & 20 32 192.168.10. 192.168.10. 192.168.10.126 192.168.10 255.2


marketi 96 97 .127 5.224
ng
Custom 10 16 192.168.10 192.168.10 192.168.10.142 192.168.10 255.2
er care .128 .129 .143 5.240
HR 16

Legal 8

Networ 5 8 192.168.10 192.168.10 192.168.10.174 192.168.10 255.2


k team .168 .169 .175 5.248
Table 13-IP ALLOCATION

The above table is an IP designation table for Syntax solutions LAN network. In light of the
quantity of hosts I utilized the Class C IP address class run. Didn't utilize Class A or B since
they have bigger IP ranges and utilizing them would leave numerous unused IP ranges. I
utilized a one-of-a-kind range 192.168.10.0/24 so as to give a personality to my system. This
structure utilizes the VLSM (Variable Length Subnet Mask) so as to decrease the wastage of
IPs by allocating an assortment of square sizes dependent on the quantity of clients.

Feedback forms
Form 01 Responder; Amanda

1. Are you satisfied with the system? YES

2. Does it take a long time to login to the domain? NO

3. Is the layout of the user in clear and understandable? YES

4. Has the system been authorized with shortcuts and other tools? YES

5. Have you created any user profiles in the system? YES

6. Was there any difficulty in installing systems to the network? NO

7. Is a dynamic system development method necessary? YES

8. The current system that has been created is it system based? YES
9. Is it Administrator that you have

used in most profiles? YES 10. Is it user friendly? YES

Responder; Amanda
Company; Syntax solutions
Location; Colombo HEAD OFFICE
Excellent Very Good Good Weak
User friendly
User satisfaction
Interpretation
User interface
Security
Table 14-FEEDBACK FORM 1

Form 02 Responder; Mohamed Aman


1. Are you satisfied with the system? YES

2. Does it take a long time to login to the domain? NO

3. Is the layout of the user in clear and understandable? YES

4. Has the system been authorized with shortcuts and other tools? YES

5. Have you created any user profiles in the system? YES

6. Was there any difficulty in installing systems to the network? NO

7. Is a dynamic system development method necessary? YES

8. The current system that has been created is it system based? NO

9. Is it Administrator that you have used in most profiles? YES 10. Is it user friendly? NO

Responder; Mohamed Aman


Company; Syntax solutions
Location; Colombo HEAD OFFICE
Excellent Very Good Good Weak
User friendly
User satisfaction
Interpretation
User interface
Security
Table 15-FEEDBACK FORM 2

Form 03 Responder; Mohamed Abdullah


1. Are you satisfied with the system? NO

2. Does it take a long time to login to the domain? YES

3. Is the layout of the user in clear and understandable? NO

4. Has the system been authorized with shortcuts and other tools? YES

5. Have you created any user profiles in the system? YES

6. Was there any difficulty in installing systems to the network? NO

7. Is a dynamic system development method necessary? YES

8. The current system that has been created is it system based? YES

9. Is it Administrator that you have used in most profiles? YES 10. Is it user friendly? NO

Responder; Mohamed Abdullah


Company; Syntax solutions
Location; Colombo HEAD OFFICE
Excellent Very Good Good Weak
User friendly
User satisfaction
Interpretation
User interface
Security
Table 16-FEEDBACK FORM 3

Analysis of Feedback forms

The security framework, every one of them have consented to the choice "Excellent" since they
were happy with the security framework. 90% of the individuals picked "Excellent".
When coming to examine the general reaction to the poll, it plainly shows that most of the
example size are happy with the system.
Network Services and Application
For the implementation of the network design, certain service applications need to be utilized.
Such as, A Client Server or a Server Operating system should be used. System configurations
should be done for that certain application to work.

Installation of VMware Workstation


For the installation of the windows, I used VMware virtualization workstation. VMware works
with Windows, Linux etc... The following are the steps taken for the installation of VMware
Workstation
VMware Workstation Pro Setup

Figure 39-VMware SETUP


VMware End User License Agreement

Figure 40-VMware LICENSE AGREEMENT


Custom Setup

Figure 41-CUSTOM SETUP

Installation of VMware Workstation Pro


Figure 42-VMware INSTALLATION

VMware Installation Complete

Maintenance schedule

Server Maintenance
• Hard drive cleanup
• Domain controller checkup

Network Maintenance
• Server and storage infrastructure
• Desktop infrastructure
• Network equipment
• Backup and security systems

Software Maintenance
• Pc Tune up
• User Data Cleaning
• Resetting Operating Systems
• System Format

Hardware Maintenance
• Server maintenance
• Workstation maintenance
• Router maintenance
• Switch maintenance
• Firewall maintenance
• Network cable performance

Task Phases Procedure plan Duration


Removal of all network cables
Instruction to go to windows server services windows
Stopping all services
Run the term regedit
Clearing of unwanted registry entries
Go to the Defragment registry Start all the services
Server Server Hard drive End of every
Then you should run disk cleanup
Maintenance Cleanup Month
Server hard drives should be defragmented
Switch off the server
Plug in all the cables
Restarting of the server

Domain controller Checking each and every domain controller in each department End of every
Checkup Changing of passwords if necessary Month

Server and storage • Ease of use where all servers are based on a familiar interface Every week
infrastructure • High performance where servers and storage are interconnected during
maintenance
Desktop infrastructure • Storage in particular can make VDI cost prohibitive. Includes Every week
• the ability to easily support remote and mobile workers. during
maintenance
Network Network equipment • Is used to combine, split, switch, boost, or direct packets of Every year
maintenance information along a computer or telecommunications network. during
interconnects devices so that data can be shared between them maintenance

Backup and security • Verify your backups to make sure files are retrievable. Encrypt Whenever
systems • backups that contain sensitive data possible at
any time of
the day

Pc Tune up • Using AVG Pc Tune up to perform one click maintenance Every week during
Extends the battery life maintenance

Software User Data Cleaning • Increasement of data reliability Ensure Every week during
consistency maintenance
maintenance •
Resetting Operating Every year during
maintenance
Systems
System Format • This is done to prevent viruses and other forms of attack Whenever
from becoming a threat to the organization possible at any
time of the day

Server maintenance • Unplugging the device


• Cooling the device

• Removing network cables

• Using the air out duct to suck out unnecessary air from

the server room. This is preventing germs from entering Every 6 months
in.
• Servers that are been kept in rack units are been removed.
Those who are strong enough are needed to lift servers
since they weigh a lot
Workstation • • Unplugging the device Every 4 months
maintenance • Cooling down the heat
• Removing Network and Other cables
Using a vacuum to get rid of dust
Router maintenance • • Unplugging the device Every 4 months
• Cooling down the heat
Removing Network and Other cables Using a vacuum to
Hardware get rid of dust
Switch maintenance • • Unplugging the device Every 4 months
maintenance
• Cooling down the heat
Removing Network and Other cables Using a vacuum to
get rid of dust
Firewall maintenance • • Unplugging the device Every 4 months
• Cooling down the heat
Removing Network and Other cables Using a vacuum to
get rid of dust
Table 17-Maintenance schedule
LO4 Implement and diagnose networked systems

Implement a networked system based on a prepared design


The screen captures and the experiment tables beneath show how I structured my system. I
initially isolated the plan to Syntax solutions Matara branch. The PC and Router Configurations
for all the department in Matara branch. At that point I included the IP course directions and
caused the physical interfaces to up Screenshots following with sub-interface setups.
The switch setups were finished by naming the VLANs, allocating ports to the VLANs. VLAN
trucking was accomplished for all the switches of the two gadgets.
The IP Configurations were given to all divisions. Screen captures have been offered beneath
to demonstrate that the PCs could be pinged from inside the VLAN, among the VLANs and
among the systems. Show directions test was given to show all the running setups.
At last, follow directing was done to show what number of bounces were transmitted from one
department to the next.
PC Configurations
PC configuration (Developers) VLAN 10

Figure 43VLAN10 PC CONF


PC configuration (Finance) VLAN 20

Figure 44-VLAN20 PC CONF

Pc configuration (Sales) VLAN 30


Figure 45-VLAN 30 PC CONF

Pc configuration (HR) VLAN 40


Figure 46-VLAN 40 PC CONF

Pc configuration (customer care) VLAN 50


Figure 47-VLAN 50 PC CONF

Pc configuration (Network team) VLAN 60


Figure 48-VLAN 60 PC CONF

Pc configuration (Legal) VLAN 70


Figure 49-VLAN 70 PC CONF

Router configuration

Hostname
Banner
Clock set
Figure 50-ROUTER CONF

Physical Interface UP
Figure 51-PHYSICAL INTERFACE UP

Router sub interface configuration for all the VLAN (10-70)


Figure 52-ROUTER SUB INTERFACE CONF

Router DHCP configuration for all the VLAN (10-70)


Figure 53-ROUTER DHCP CONF

Router saving configuration


Figure 54-ROUTER SAVING CONF

Switch configuration
Hostname
Banner
Clock set
VLAN 10 SW1 basic configurations
Figure 55-VLAN 10 SW1

VLAN 20 SW2 basic configuration


Figure 56-VLAN 20 SW2

VLAN 30 SW3 basic configuration


Figure 57-VLAN 30 SW3

VLAN 40 SW4 basic configuration


Figure 58-VLAN 40 SW4

VLAN 50 SW5 basic configuration


Figure 59-VLAN 50 SW5

VLAN 60 SW6 basic configuration


Figure 60-VLAN 60 SW6

VLAN 70 SW7 basic configuration


Figure 61-VLAN 70 SW7

Naming VLAN in switch


SW1 VLAN NAMING
Figure 62-SW1 VLAN NAMING

SW2 VLAN NAMING


Figure 63-SW2 VLAN NAMING

SW3 VLAN NAMING


Figure 64-SW3 VLAN NAMING

SW4 VLAN NAMING


Figure 65-SW4 VLAN NAMING

SW5 VLAN NAMING


Figure 66-SW5 VLAN NAMING

SW6 VLAN NAMING


Figure 67-SW6 VLAN NAMING

SW7 VLAN NAMING


Figure 68-SW7 VLAN NAMING

Assigning Switch ports to VLAN


VLAN 10 (Developers)
Figure 69-Assigning Switch ports to VLAN10

VLAN 20 (Finance)
Figure 70-Assigning Switch ports to VLAN 20

VLAN 30 (Sales)
Figure 71-Assigning Switch ports to VLAN 30

VLAN 40 (HR)
Figure 72-Assigning Switch ports to VLAN 40

VLAN 50 (Customer care)


Figure 73-Assigning Switch ports to VLAN 50

VLAN 60 (Network team)


Figure 74-Assigning Switch ports to VLAN 60

VLAN 70 (Legal)
Figure 75-Assigning Switch ports to VLAN 70

Testcase
Test; ping to the Executed by; Execute Execute time;12.00am
gateway M.N.ABDULLAH date;2022/09/01
Description Expected output Received output Pass/fail
Pinging from pc 1 to Reply from Reply from Pass
192.168.10.122 192.168.10.122 192.168.10.122
Figure 76-PING TO THE GATEWAY

Test; ping to the Executed by; Execute Execute time;12.00am


gateway M.N.ABDULLAH date;2022/09/01
Description Expected output Received output Pass/fail
Pinging from pc 3 to Reply from Reply from pass
192.168.10.139 192.168.10.139 192.168.10.139
Figure 77-PING TO THE GATEWAY

Test; ping within the Executed by; Execute Execute time;12.00am


LAN M.N.ABDULLAH date;2022/09/01
Description Expected output Received output Pass/fail
Pinging from pc 6 to Reply from Reply from pass
19.168.10.161 192.168.10.161 192.168.10.161
Figure 78-PING WHITH IN THE LAN

Test; ping among Executed by; Execute date;2022/09/01 Execute time;12.00am


VLAN M.N.ABDULLAH
Description Expected output Received output Pass/fail
Pinging from VLAN 20 Reply from VLAN 30 Reply from VLAN 30 pass
to VLAN 30

Figure 79-PING AMONG VLAN

Test; ping among Executed by; Execute Execute time;12.00am


VLAN M.NABDULLAH date;2022/09/01
Description Expected output Received output Pass/fail
Pinging from VLAN Reply from VLAN 10 Reply from VLAN 10 pass
70 to VLAN 10
Figure 80-PING AMONG VLAN

Test; Telnet Executed by; Execute Execute time;12.00am


M.N.ABDULLAH date;2022/09/01
Description Expected output Received output Pass/fail
Pinging from laptop 1 to Reply from Reply from pass
192.168.10.122 192.168.10.122 192.168.10.122
Figure 81-TELNET

Test; Tracert Executed by; Execute Execute time;12.00am


M.N.ABDULLAH date;2022/09/01
Description Expected output Received output Pass/fail
Pinging from laptop 0 Reply from Reply from pass
to 192.168.10.56 192.168.10.56 192.168.10.56
Figure 82-TRACERT

Test; show VLAN Executed by; Execute date;2022/09/01 Execute time;12.00am


M.N.ABDULLAH
Description Expected output Received output Pass/fail
Switch showing Display all the 7 Displayed all the 7 pass
running VLANS VLAN VLAN
Figure 83-SHOW VLAN

Test; show running Executed by; Execute Execute time;12.00am


config M.N.ABDULLAH date;2022/09/01
Description Expected output Received output Pass/fail
Show running Display all the Displayed all pass
configuration in router configuration configuration
Figure 84-SHOW RUNNING CONFIG
Test; show Ip int br Executed by; Execute date;2022/09/01 Execute time;12.00am
M.N.ABDULLAH
Description Expected output Received output Pass/fail
Showing assigned Ip in Display all Ip Displayed all Ip pass
router addresses addresses
Figure 85-SHOW IP INT BR

Future Enhancements
Every problem is in need of special assistance in order to be perfect when it comes to the
increasement of the market, thus the problem that Syntax solutions faces should be provided
with specific recommendations that could lead the way to improvement and make the necessary
changes to the system. This projected system is
been implemented for a period of 3 to 5 years which helps to keep this
network as it is needed to help the organization in order to gain the results that were
implemented on the first day. As each day passes by, the industry is undertaken to carry huge
revenues in the networking world. Thus, they are able to consider several revenues that are
made to change accordingly
Later on, cabling should be possible with 5 optics and remote associations can be given where
conceivable. The present workstations might be supplanted with incredible ones. It is constantly
important to have the best in the framework for everything to run easily with no burden. In this
manner, I prescribe Syntax solutions to utilize marked equipment gadgets with regards to
Routers and switches. So as to verify the framework, a firewall could be actualized so as to
square traffic and other superfluous difficulties.
Having biometric verification strategies, for example, Finger print validation and Facial
filtering is quite suggested. To additionally verify the framework, CCTVs might be introduced
in every division. They can likewise include physical security like security monitors. We can
likewise introduce Wireshark for the observing of the framework

Educate personnel about user behavior


Employees need down time, and many choose to spend that time on their computers. If you
notice a slowdown during lunchtime every day, it could be because a couple coworkers have
taken the opportunity to boot up a video game or stream a show on Netflix. (Yes, it’s been
known to happen!) They probably aren’t even aware of the network resources they’re draining
during work hours, and are just trying to enjoy their lunch. Most will be happy to choose a
different lunch pastime if you take a moment to talk to them about network performance.

Other personnel behavior that might be causing a slowdown could involve poor file sharing
practices, such as emailing large PPT files to multiple contacts rather than editing them via a
shared cloud file. If you have employees frequently (and needlessly) sharing extra-large files,
teaching them how to compress the files or
how to use cloud drives can cut the strain they’re placing on the network.

Self-Criticism
From this Assignment it comes to my mind that this is considered as the most essential and
most reliable subject. This therefore increases the knowledge that I have recognized in
Networking. Therefore, this is certainly a great privilege to learn all these things based on this
subject, which makes it interesting to be influenced with networking.
From my point of view all these specifications on networking are rather useful which helps us
to work in a networking field. While doing this assignment I have researched through a lot of
information that is based on networking and
received a great knowledge on this subject. Unlike other subjects this is
mostly practical based and great for the mind.
While working on this assignment, I was certainly a great privilege to experience different
kinds of aspects that are based on networking. Doing this project is of great assistance to me
since I’m interested in this kind of field. This obviously takes me through various phases in
networking. It gives me an immense amount of joyfulness of working hard, and being involved
in the tackling of various problems and by the help of these certain challenges that I have to
face helps me become part of the networking industry
I’m glad to say that I put my uttermost effort in completing this assignment, it basically gives
me an idea on what Networking is and what certain features are collaborated with this certain
field

Summary
This Assignment consists of eleven tasks. The first and foremost task is all about the different
types of network systems and various types of topologies. From this assignment the main
purpose is to decide what the best topology is suited for Syntax solutions. The second task is all
about network technologies and how these standards are required to fulfill the necessary
requirements that are required for Syntax solutions. These somehow proves how they can be a
great impact to the solution that is mostly needed for this case study. The next task which is the
third, implements the usage of different types of protocols that are necessary for data
communication, this is where we describe the
certain roles of these protocols that are necessary for this case study and
through this it provides us the immediate utilities for our network system.
The fourth task is mainly concerned about how to design a comprehended network for Syntax
solutions. Through these diagrams we should explain how this certain organization meets the
necessary requirements. As we look at the fifth task it is all about knowing about the roles of
software and hardware components that you would implement in our solution and how you
would use them to create your new network solution. The next task provides all the information
of various types of servers that are needed for this solution. They are been compared and
analyzed to check if they are freely available in the market based on their costs making the best
selection. The seventh task successfully discusses how workstation depends on other network
components to view their performance. As we move on, the eighth task is to prove how we can
achieve the respectable feedback from its users and somehow analyze the causes for the
developing solution in which they are able to make necessary recommendations that are been
implemented to promote improvement based on the given feedbacks
The ninth task is all about the test plan, we have been told to install network application and
implement the following solution in order to achieve the following output. The tenth task
includes all the different types of recommendations that you should implement after a period of
time. The last and final task is all about designing a maintenance plan which includes all the
details on the maintenance of the server, the workstations as well as hardware, software and
networking maintenance.

Conclusion
To conclude this assignment, it comes to my mind that this assignment is of great importance. It
has a lot of tasks that helps us to perform in various ways. As I conclude this assignment is
basically about all networking requirements and procedures, that are needed to fulfill the user’s
requirements, the uses of protocols in which it helps to implement an effective solution to the
network The use of Networking is very essential, it is basically fun learning about new things
that we haven’t experienced. Learning about routers, servers, switches and so on. It’s of great
experience to us. Learning about Networking Technologies. Based on these requirements they
have a chance of outgrowing their network, therefore in need of an upgrade. To help ensure a
smooth transition, they should be careful with
the previous network as well as the current network to meet its
requirements. This will help determine what new equipment and configurations. They are
necessary to ensure that the new network fully supports both the current and future needs of the
company or organization.

References
Anon., 2022. Logical topology. In: networking. s.l.:s.n., pp. 38-42.
Anon., n.d. tutorialspoint. [Online] Available
at:
https://www.tutorialspoint.com/data_communication_computer_network/computer_networ
k_models.htm
computer network technology , n.d. network types. [Online]
Available at: https://computernetworktopology.com/local-area-network/ [Accessed
12 08 2022].
DELL, n.d. DELL support. [Online]
Available at:
https://www.dell.com/ae/business/p/poweredge-r415/pd [Accessed
15 august 2022]. electronisnotes, n.d. electronisnotes. [Online]
Available at: https://www.electronics-notes.com/articles/connectivity/ethernet-ieee-802-
3/standards.php
[Accessed 23 august 2022]. esoft , 202. types
of servers. s.l.:s.n. esoft, 2022. In: Networking.
s.l.:s.n., pp. 3-12. esoft, 2022. In: Networking.
s.l.:s.n., pp. 38-42. esoft, 2022. protocols.
s.l.:esoft metro campus. futurenetwork, n.d.
futurenetwork. [Online]
Available at: https://futurenetworks.ieee.org/standards [Accessed
11 august 2022].
geeks for geeks , n.d. difference between router and bridge. [Online]
Available at: https://www.geeksforgeeks.org/difference-between-bridge-and-router/ [Accessed
14 august 2022].
geeks for geeks, n.d. computer network fundamentals. [Online]
Available at: https://www.geeksforgeeks.org/tcp-ip-model/
[Accessed 12 august 2022]. geeks for geeks, n.d. difference
between hub and switch. [Online]
Available at: https://www.geeksforgeeks.org/difference-between-hub-and-switch/ [Accessed
14 august 2022].
HP, n.d. HP support document. [Online]
Available at: https://cs.uwaterloo.ca/~brecht/servers/docs/HP-DL-380-G5/Specs.html
[Accessed 15 august 2022].

netwrix, n.d. network device explain. [Online] Available


at:
https://blog.netwrix.com/2019/01/08/network-devices-explained/
[Accessed 13 august 2022]. wikipedia, n.d. talks. [Online]
Available at: https://en.wikipedia.org/wiki/Personal_area_network [Accessed
12 august 2022].

You might also like