E121707-1662831818256-180949-Abdullah Networking
E121707-1662831818256-180949-Abdullah Networking
E121707-1662831818256-180949-Abdullah Networking
Assessor Internal
Verifier
Unit 02: Networking
Unit(s)
LAN Design & Implementation for SYNTAX SOLUTIONS
Assignment title
M.N.ABDULLAH
Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST
• Agreeing actions?
Y/N
Does the assessment decision need
amending? Y/N
signature
Programme Leader
signature (if Date
required)
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID M.N.ABDULLAH COL00098095
Unit Title Unit 02: Networking
Assessor Feedback:
LO1 Examine networking principles and their
protocols.
Pass, Merit & Distinction P1 P2
Descripts M1
D3
LO4 Implement and diagnose networked systems.
Pass, Merit & Distinction P7 P8 M4
Descripts
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Assessor Date
signature
Student Date
signature
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page.
1. The font size should be 12 points, and should be in the style of Time New Roman.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my
own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.
Student’s Signature:
(Provide E-mail ID) (Provide Submission Date)
Unit Tutor
Issue Date
Submission Date
Submission format
The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although
you will not be penalised for exceeding the total word limit.
SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The
Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They are
planning to make it one of the state-of-the-art companies in Matara with the latest facilities.
Customer Care 10
Finance 25
Legal 5
HR 10
Developers 55
Network Team 5
• All the departments must be separated with unique subnet and should not communicate with each
other unless there is a special requirement.
• 192.168.10.0/24 is given and should be used for all the departments except the server room. IPs
should assign using DHCP.
• ERP and CRM Systems need to be implemented in Matara branch in local servers.
• Number of servers required for the Server room need to be decided by the Network designer and
should be assigned with 10.254.1.0/24 subnet. (Uses static IPs)
• High level of redundancy is expected in network design to eliminate single point of failures and
traffic bottle necks.
• Sales and Marketing Team need to access Network resources using WIFI connectivity.
Assume you have been appointed as the new network consultant of SYNTAX SOLUTIONS. Prepare a network
architectural design and implement it with your suggestions and recommendations to meet the company
requirements.
(Note: Clearly state your assumptions. You are allowed to design the network according to your assumptions,
but main requirements should not be violated)
Activity 01
• Discuss the benefits and constraints of different network system types that can be implemented
in the Matara branch and the main IEEE Ethernet standards that can be used in above LAN and
WLAN design.
• Discuss the importance and impact of network topologies and network protocol
suites while comparing the main network topologies and network protocol suites that are used in
network design using examples. Recommend suitable network topologies and network protocol suites
for above scenario and justify your answer with valid points.
Activity 02
• Discuss the operating principles of network devices (Ex: Router, Switch, Etc.) and server types that can be
used for above scenario while exploring different servers that are available in today’s market with their
specifications. Recommend server/servers for the above scenario and justify your selection with valid
points .
• Discuss the inter-dependence of workstation hardware with networking software and provide examples
for networking software that can be used in above network design.
Activity 03
• Prepare a written network design plan to meet the above-mentioned user requirements including a blueprint drawn using a
modeling tool. (Ex: Microsoft Visio, EdrawMax).
Support your answer by providing the VLAN and IP subnetting scheme for the above scenario and the list of devices, network
components and software used t o design the network for above scenario and while justifying your selections.
• Test and evaluate the proposed design to meet the requirements and analyze user feedback by using a user feedback form.
• Install and configure Network services, devices and applications (Ex: VLAN, DHCP, DNS, Proxy, Web, Etc.)
according to the proposed design to accomplish the user requirements and design a detailed Maintenance
schedule for above Network.
Activity 04
• Implement a networked system based on your prepared design with valid evidence s and recommend
potential future enhancements for the networked system with valid justifications to your
recommendations. Use critical reflection to critically evaluate the design, plan, configuration, and testing
of your network while justifying with valid conclusions.
• Develop test cases and conduct verification (Ex: Ping, extended ping, trace route, telnet, SSH, etc.) to test
the above Network and analyse the test results against the expected results.
Grading Rubric
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.
P3
Discuss the operating principles of networking devices and
server types.
P4
Discuss the inter-dependence of workstation hardware with
relevant networking software.
M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.
LO 1 & LO2
D1 Critically evaluate the topology protocol selected for a given
scenario to demonstrate the efficient utilization of a networking
system.
LO3: Design efficient networked systems
P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
Install and configure network services and applications on your
choice.
D2
Design a maintenance schedule to support the networked
system.
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.
Table of Contents
There are different kinds of network types too they are as follows:
• PAN (Personal Area Network)
Figure 1-PAN
Range of PAN
Wireless personal area network covers a few centimeters up to 10 meters. These networks are
specific types (or sub-subsets) of local networks that support one person instead of a group.
Additional devices in the PAN can connect and run data on the main engine. With Bluetooth,
such a layout could be as large as 100 meters (330 feet) (computer network technology , n.d.).
Figure 2-LAN
Size of LANs
LANs are restricted in size, a local network can contain anywhere from one or two devices up
to a thousand devices. Some devices like printers, scanners, and other servers stay permanently
with the LAN while mobile devices like computers, laptops, and phones may connect and
disconnect from the network at various times.
LAN size depends on the transmission
technology used in a network. For example, The size of Wi-fi LAN can
be the actual coverage area of the wireless broadband routers whereas the size of an Ethernet
LAN can be up to the size of the cable
In both cases, though, Local Area Networks can be extended to cover much larger distances if
required, by connecting together multiple access points or cables through a switch or hub. The
size of Local area networks is smaller than the Metropolitan Area Network (MAN) and Wide
Area Networks (WAN) (computer network technology , n.d.).
Advantages of LAN
• LAN provides resource sharing such as computer resources like printers, scanners,
modems, DVD-ROM drives, and hard disks can be shared within the connected devices.
This reduces cost and hardware purchases.
• Software Applications Sharing: In a Local Area Network, it is easy to use the same
software in a number of computers connected to a network instead of purchasing the
separately licensed software for each client a network.
• Data and messages can easily be shared with the other computer connected to the network.
Disadvantages of LAN
• High Setup Cost: The initial setup costs of installing Local Area Networks is high
because there is special software required to make a server. Also, communication devices
like an ethernet cable, switches, hubs, routers, cables are costly.
• Privacy Violations: The LAN administrator can see and check personal data files of each
and every LAN user. Moreover, he can view the computer and internet history of the
LAN user.
• Data Security Threat: Unauthorized users can access important data of an office or
campus if a server hard disk is not properly secured by the LAN administrator.
• LAN Maintenance Job: Local Area Network requires a LAN Administrator because there
are problems such as software installations, program faults or hardware failures or cable
disturbances in Local Area Network. A LAN Administrator is required to maintain these
issues.
• Covers Limited Area: LANs are restricted in size they cover a small area like a single
office, single building or a group of nearby buildings (computer network technology ,
n.d.).
A metropolitan area network (MAN) is a large computer network that usually spans a city or a
large campus. A MAN Network is optimized for a larger geographical area than a LAN,
ranging from several blocks of buildings to entire cities.
MAN, Networks are formed by connecting
multiple LANs. Thus, MAN Networks are larger than LANs but smaller
than wide-area networks (WAN).
The purpose of MAN (Metropolitan Area Network) is to provide the link to the internet in the
long run. MAN, Network provides Internet connectivity for LANs in a metropolitan region, and
connect them to wider area networks like the Internet.” It can also be used in cable television.
The primary use of metropolitan area networks is the customer that has high-capacity needs in a
metropolitan area. A MAN is intended to provide the required capacity at a lower cost and
greater efficiency than obtaining an equivalent service from the local telephone company
Figure 3-MAN
• In general, a MAN is either owned by a user group or by a network provider who sells
service to users, rather than a single organization as in LAN.
• They provide uplinks for connecting LANs to WANs and the Internet.
• High Security:
MANs has a high-security level than WAN.
• Hackers Attack:
In this network, there is a high risk of attacking hackers as compared to LAN. So, data
may be a leak. Highly security staff is the need in MAN.
A Wide Area Network (WAN) is a computer network that connects computers within a large
geographical area comprising a region, a country, a continent or even the whole world. Wide
area networks, generally called WANs, are mostly public, leased or privately-owned
networks. They provide a useful way of sharing resources between the end users such as the
long-distance transmission of data, voice, image, and information over large geographical
areas. The best example of a Wide Area
Network is the Internet which connects many smaller LANs and MANs
through Internet service providers.
Figure 4-WAN
• Covers large geographical area: Wide area network covers a large geographical area of
more than 1000km. If your office is in different cities or countries then you can connect
your office branches through Wide Area Network.
• Centralized data: Wide area networks also provide you the facility of sharing the data to
all of your connected devices in a network. For example, through WAN connection all
office branches can share the data through the head office server. You can get back up,
support, and other useful data from the head office and all data are synchronized with all
other office branches.
• Get updated files and data: Wide Area Networks provide you the facility of getting
updated files and data from the server. If a server is updated with new data, then all
connecting devices receive that updated data within seconds.
• Sharing of software and resources: Like LANs, we can share software applications and
other resources with other users on the internet.
• High bandwidth: WANs covers a large geographical area of more than 1000km.
therefore WANs have high bandwidth compared to LANs and MANs.
• Security problems: Wide Area Networks faces more security problem as compare to
LANs and MANs. One of the key disadvantages of WANs is a security issue when many
different people have the ability to use
information from other computers.
• Needs firewall and antivirus software: As it faces security issue, therefore it is a basic
need of WANs to use firewalls and antivirus software to protect data transfer on the
internet which can be accessed and changed by hackers. Also, some people can inject a
virus into the computers so antivirus software is also needed to install.
• The setup cost is high: A WAN network covers a large geographical area; it is very
expensive to setup in the initial stage. It may involve purchasing different networking
devices, routers, switches, and extra security software.
• Maintenance Issues: Once set up, maintaining a WAN network is a full-time job which
requires high tech skills of network supervisors and technicians.
VPN stands for "Virtual Private Network" and describes the opportunity to establish a protected
network connection when using public networks. VPNs encrypt your internet traffic and
disguise your online identity. This makes it more difficult for third parties to track your
activities online and steal data. The encryption takes place in real time.
A VPN hides your IP address by letting the
network redirect it through a specially configured remote server run by a
VPN host. This means that if you surf online with a VPN, the VPN server becomes the source
of your data. This means your Internet Service Provider (ISP) and other third parties cannot see
which websites you visit or what data you send and receive online. A VPN works like a filter
that turns all your data into "gibberish". Even if someone were to get their hands on your data,
it would be useless.
Figure 5-VPN
Advantages of a VPN
Provide Safety Through Anonymity; The two most important reasons for VPN use are
privacy and anonymity. VPN services secure public internet connections via encryption. They
also hide online activity from bad actors such as hackers and other cybercriminals.
Apps and websites want to track users and
record their online activity by collecting personal data. VPNs can prevent
that by blocking access to the user’s connection. When all bits of internet traffic leaving and
coming to the user’s device are encrypted, the user is automatically anonymized. Most good
VPN services provide customers with AES 256-bit encryption which is considered the top-of-
the-line military-grade security option.
Secure Connection for Remote Work; VPNs help these people remotely create a secure
connection with their office network to access files and other resources required for their job.
Prior to the COVID-19 pandemic, most employees working in an office environment were able
to connect to the internet through an Ethernet connection. Now more and more people have
shifted to remote work. Since the data traveling through the VPN connection is encrypted, there
is no way for the data to be intercepted by hackers.
Bypass Geo-Locked Content; Another major advantage of using a VPN is that it grants the
ability to unblock various websites and streaming services. Good VPNs manage to circumvent
any web filter reliably every time the user needs to access content that is not available in their
region.
Any website or service that wants to track users has to track their IP address to confirm their
location and then serve users targeted content. VPNs can stop that from happening by
circumventing geolocation blocks. This feature comes in handy when users are trying to access
movies and TV series on streaming services.
There is also the problem of companies producing content for specific regions for various
reasons. One of the reliable ways to access that content is via a VPN service. Since it violates
their agreements, streaming services and content providers actively fight against VPNs that
attempt to circumvent geo-restrictions. This is why it is important to use a high-quality VPN
because they regularly update their anonymity tools and servers to unblock content.
Cost-Effective Security; VPNs can help users stay safe, private and anonymous online at a
very reasonable price. Most of the top VPNs in the world cost between $2 and $11 per month
depending on the length of the user’s subscription period. In exchange, users get top-tier
encryption, broad server networks, advanced
security features and the ability to change their IP address location.
Most modern VPN services now offer free trials and money-back guarantees, making them
even more cost-effective and giving users the opportunity to test the service before committing
to it. VPNs also regularly offer seasonal discounts and lifetime subscription packages that
further lower the cost. There are even free VPNs on the market, but most of them are
ineffective or do not provide anywhere near the level of security provided by paid VPNs.
A VPN Can Prevent Bandwidth Throttling; VPNs are very effective against bandwidth
throttling where users may experience buffering or long load times on specific websites
especially during the end of the month. Internet service providers along with network
administrators usually throttle bandwidth to keep certain users within their download limits.
Hence, they limit the amount of data users can transfer in a certain period.
VPNs can stop ISPs and administrators from bandwidth throttling by encrypting the traffic that
a user’s device generates. Since ISPs and administrators cannot see the content of the user’s
traffic, the filters in place are unable to throttle it. This is a favorable situation for streamers and
torrenters who use up a lot of bandwidth during the month.
Disadvantages of a VPN
Dropped Connections; Due to the inherently
chaotic nature of the internet, VPN services drop secure connections from
time to time. Dropped connections can lead to data leaks which can compromise the security,
privacy and anonymity of the user. Most elite VPNs have a kill switch feature to combat this
problem, but the real IP address of the user can be exposed if this feature is not present or does
not function properly.
Using the Wrong VPN Can Put Your Privacy in Danger; Choosing the wrong VPN can
mean disaster for the user’s privacy and anonymity. If a VPN service does not have a good
reputation on various forums and review sites then it is likely not good for privacy or online
security.
Moreover, different VPNs are available to users for different purposes. A user that only wants
to watch Netflix or Amazon Prime Video may be able to get away with a VPN that does not
focus on privacy or security but on unblocking ability. However, if a user is concerned about
privacy, security and anonymity and ends up signing up for a VPN for streaming then that is
bad news.
Not All Devices Natively Support VPNs; Some lesser-known VPNs do not support all
platforms. That can become a problem for users who do not use a mainstream device or
operating system. For the vast majority of users lack of compatibility won’t be a problem, but
for those with older operating systems or even older hardware, it will be difficult to configure
most VPNs. More specifically, operating systems like macOS, Windows, Android and iOS are
fine, but older versions of Windows, Android, iOS and Linux may not be.
Figure 6-SAN
Advantages of a SAN
Speed; As SAN includes fiber optics
technology, it offers tremendous amount of speed transfer rates. It is
possible of achieve a speed of over 5Gbps using SAN. Even if your storage device or the
network tends to perform slow, the speed can be easily increased with the use of SAN.
Security; Various types of security measures are available on SAN which ensures that your
data is secure. On default, the algorithms of SAN are written in a way to protect every piece of
data stored in it. For an example, certain restrictions can be placed on storage such that only
authorized users will be able to access it. There is very less chance of data theft happening in
SAN.
Reliability; SAN comes with built in redundancy that makes sure of continuous network
operations. Even in case a server or a switch fails, the traffic will be rerouted to avoid failures.
Once the server starts functioning again, the operations will be continued immediately.
Scalability; SAN also offers much greater scalability according to the business needs. If there
are more storage needs, the users can increase the drives accordingly. Even though there is a
limit on the number of drives, SAN normally will be able to accommodate more than 1000 of
drives. This means that SAN allows upgrading their infrastructure whenever necessary without
interruptions.
Data Backup; For the process of backing up data, SAN follows a centralized approach. As a
result, it requires very less time for backing up. Using this type of approach, users can easily
backup data automatically as well as instantly. And even if there is a need to backup data from
multiple locations it is made possible using a single server.
Disadvantages of SAN
Cost; Purchasing and maintaining a Storage Area Network requires significant amount of cost.
This is mainly due to the fact that fiber technology is being used. Hence, it is especially
preferred by organizations of large scale. And SAN takes some time to show their impact.
Therefore, organizations must be willing to accept the initial cost.
Maintenance; Not all the time SAN will be a beneficial option. SAN is designed to manage
large number of expensive servers. Maintaining few servers with the use of SAN is an
unnecessary expense. In this case, the users could consider other software solutions. Or else,
simply manage the servers themselves.
Privacy; Although SAN implements right security measures, still there is a possibility of data
leakage. A Storage Area Network is used in a shared environment. Meaning, a common storage
device and servers are used by the connected computers. If a data happens to leak from one of
the computers, it could impact the others.
Effectiveness; Even if organizations are ready to accept the high initial costs of SAN, still it
takes some time to show its effectiveness. It takes longer period of time to impact a business.
Particularly, for services such as downtime and disaster recovery. Therefore, SAN is a poor
choice, if your business needs to experience immediate results.
Complexity; SAN is complex in nature for various reasons. One such is the usage of
sophisticated storage devices. Hence, it needs maintenance and support to be done by the IT
professionals which could further increase the expenditure of Storage Area Network. This is
one of the reasons why organizations refrain to use SAN.
Differences between PAN, LAN, MAN and
WAN
PAN LAN MAN WAN
Connects nodes Covers a small area Connects nodes Covers a wide area
found in a very small (local area) found in same Metro
area
area
Wireless PAN – Whether wired or Wireless MAN- Wired WAN - fiber
Bluetooth Wired Wireless LANs are Microwave optic Wireless WAN
- Infrared/ microwave
PAN - USB Based on Ethernet Transmission
Technology Wired –
fiber optic cables
Cheap and easy to Easy to setup and Quite expensive Expensive when it
connect affordable Comes to wiring of
Fiber optic cables for
a wired WAN
Client-Server network
Client-server networks are computer networks that use a dedicated computer (server) to store
data, manage/provide resources and control user access.
The server acts as a central point on the network upon which the other computers connect to. A
computer that connects to the server is called a client
A client-server network is usually preferred over a peer-to-peer network that doesn’t have a
central server to manage the network.
Network server functions
A client-server network may have more than one server, each dedicated to handling a specific
function.
• Handling security
• Email services
• Print jobs
• One client computer crashing does not affect the other computers
• Easier to recover files as backups can be
controlled centrally by the network administrator
• Files and resources are easier to share and control from server
Peer-to-Peer Network
Peer-to-peer networks are computer networks that do not have a central server controlling the
network.
Each computer is called a peer, and these peers are connected to one another.
No computer has control over another.
Figure 8-PEER TO PEER
This type of network is not suitable for a large network where a client-server structure would be
preferable.
Advantages of a peer-to-peer network
• Each computer can communicate and share its data and resources with all others (files or
even a printer)
• Users can control which files they wish to share or keep private
• No cost in buying a server
• No need to pay a network technician (each user manages own file sharing permissions)
• Easier to set up with less specialist knowledge needed
• Over-all set up cost is cheaper
• Computer failure will only disrupt the files being shared from that computer (unlike a
server failure on a client-server network)
Network Standards
• ANSI (American National Standard Institute)
• IEEE (Institute of Electronical Electronic Engineers)
• ISO (International Organization for Standardization)
• IETF (Internet Engineering Task Force)
• W3C (World Wide Web Consortium)
IEEE (Institute of Electronical Electronic
Engineers)
IEEE is an organization composed of engineers, scientists, and students. The IEEE is best
known for developing standards for the computer and electronics industry
The most widely used IEEE 802 standards are for Ethernet, Bridging and Virtual Bridged
LANs Wireless LAN, Wireless PAN, Wireless
MAN, Wireless Coexistence, Media
Independent Handover Services, and Wireless RAN with a dedicated Working Group providing
focus for each area (electronisnotes, n.d.).
IEEE 802.11a
802.11a was published in 1999 as a modification to 802.11, with orthogonal frequency division
multiplexing (OFDM) based air interface in physical layer instead of FHSS or DSSS of 802.11.
It provides a maximum data rate of 54 Mbps operating in the 5 GHz band. Besides it provides
error correcting code. As 2.4 GHz band is crowded, relatively sparsely used 5 GHz imparts
additional advantage to 802.11a.
IEEE 802.11b
802.11b is a direct extension of the original 802.11 standard that appeared in early 2000. It uses
the same modulation technique as 802.11, DSSS and operates in the 2.4 GHz band. It has a
higher data rate of 11 Mbps as compared to 2 Mbps of 802.11, due to which it was rapidly
adopted in wireless LANs. However, since 2.4 GHz band is pretty crowded, 802.11b devices
faces interference from other devices.
IEEE 802.11g
802.11g was indorsed in 2003. It operates in the 2.4 GHz band (as in 802.11b) and provides an
average throughput of 22 Mbps. It uses OFDM technique (as in 802.11a). It is fully backward
compatible with 802.11b. 802.11g devices also faces interference from other devices operating
in 2.4 GHz band (futurenetwork, n.d.).
IEEE 802.11n
802.11n was approved and published in 2009 that operates on both the 2.4 GHz and the 5 GHz
bands. It has variable data rate ranging from 54 Mbps to 600 Mbps. It provides a marked
improvement over previous standards 802.11 by incorporating multiple-input multiple-output
antennas (MIMO antennas).
IEEE 802.11p
802.11 is an amendment for including wireless access in vehicular environments (WAVE) to
support Intelligent Transportation Systems (ITS). They include network communications
between vehicles moving at high speed and the environment. They have a data rate of 27 Mbps
and operate in 5.9 GHz band. (futurenetwork, n.d.)
Network topologies
What is Network Topology; Network topology refers to the manner in which the links and
nodes of a network are arranged to relate to each other. Topologies are categorized as either
physical network topology, which is the physical signal transmission medium, or logical
network topology, which refers to the manner in which data travels through the network
between devices, independent of physical connection of the devices. Logical network topology
examples include twisted pair Ethernet, which is categorized as a logical bus topology, and
token ring, which is categorized as a logical ring topology.
Physical network topology examples include star, mesh, tree, ring, point-to-point, circular,
hybrid, and bus topology networks, each consisting of different configurations of nodes and
links. The ideal network topology depends on each business’s size, scale, goals, and budget. A
network topology diagram helps visualize the communicating devices, which are modeled as
nodes, and the connections between the devices, which are modeled as links between the nodes.
A network topology describes the physical connections and communication pathways between
objects in a network. The term is used to describe a variety of networking concepts. Topologies
are used to describe connections between computers (or hosts) in a network, between routers in
a network, or even between wide area network connections.
Topologies come in two varieties:
• Physical Topology
• Logical Topology
Physical Topologies
The physical topology defines the physical connections between the devices and the shape that
these connections form. In most cases, it is easy to see this shape. There are four main basic
types of physical topologies, they are:
• Mesh Topology
• Star Topology
• Ring Topology
• Bus Topology (esoft, 2021) Mesh Topology
A mesh topology is a network setup where each computer and network device are
interconnected with one another. This topology setup allows for most transmissions to be
distributed even if one of the connections goes down. It is a topology commonly used for
wireless networks. Below is a visual example of a simple computer setup on a network using a
mesh topology.
There are two forms of this topology: full mesh and a partially-connected mesh.
In a full mesh topology, every computer in the network has a connection to each of the other
computers in that network. The number of connections in this network can be calculated using
the following formula (n is the number of
computers in the network): n(n-1)/2
In a partially-connected mesh topology, at least two of the computers in the network have
connections to multiple other computers in that network. It is an inexpensive way to implement
redundancy in a network. If one of the primary computers or connections in the network fails,
the rest of the network continues to operate normally.
• A failure of one device does not cause a break in the network or transmission of data.
• Adding additional devices does not disrupt data transmission between other devices.
• The chance of redundant connections is high, which adds to the high costs and potential
for reduced efficiency.
Star topology
Alternatively referred to as a star network, star topology is one of the most common network
setups. In this configuration, every node connects to a central network device, like a hub,
switch, or computer. The central network device acts as a server and the peripheral devices act
as clients. In a star topology setup, either a coaxial or RJ-45 network cable is used, depending
on the type of network card installed in each computer. The image shows how this network
setup gets its name, as it is shaped like a star.
• If one computer on the network fails, the rest of the network continues to function
normally.
Disadvantages of star topology
• May have a higher cost to implement, especially when using a switch or router as the
central network device.
• The central network device determines the performance and number of nodes the network
can handle.
Ring topology
A ring topology is a network configuration where device connections create a circular data
path. Each networked device is connected to two others, like points on a circle. Together,
devices in a ring topology are referred to as a ring network.
In a ring network, packets of data travel from one device to the next until they reach their
destination. Most ring topologies allow packets to travel only in one direction, called a
unidirectional ring network. Others permit data to move in either direction, called bidirectional.
Ring topologies may be used in either LANs (local area networks) or WANs (wide area
networks). Depending on the network card used in each computer of the ring topology, a
coaxial cable or an RJ-45 network cable is
used to connect computers together.
In the past, the ring topology was most commonly used in schools, offices, and smaller
buildings where networks were smaller. However, today, the ring topology is seldom used,
having been switched to another type of network topology for improved performance, stability,
or support.
• All data flows in one direction, reducing the chance of packet collisions.
*The major disadvantage of a ring topology is that if any individual connection in the ring is
broken, the entire network is affected.
• All data being transferred over the network must pass through each workstation on the
network, which can make it slower than a star topology.
• The hardware needed to connect each workstation to the network is more expensive than
Ethernet cards and hubs/switches.
Bus topology
Alternatively referred to as line topology, bus topology is a network setup where each computer
and network device is connected to a single cable or backbone. Depending on the type of
computer network card, a coaxial cable or an RJ-45 network cable is used to connect them
together.
• It's the easiest network topology for connecting computers or peripherals in a linear
fashion.
Logical topologies contrasts with physical topologies, which refer to the physical
interconnections of all devices in the network, they are:
• Ethernet
• VLANs (Virtual LANs)
• Token Ring
Ethernet
Ethernet is a widely-deployed LAN technology. Ethernet shares media. A network which uses
shared media has high probability of data collision. Ethernet uses CSMA/CD technology to
detect collisions. When a collision occurs in Ethernet, all its hosts roll back, wait for some
random amount of time, and then re-transmit the data (esoft, 2021).
Figure 14-ETHERNET
VLANs (Virtual LANs)
Virtual LAN is a solution to divide a single broadcast domain into multiple broadcast domains.
Host in one VLAN cannot speak to a host in another. By default, all hosts are placed into the
same VLAN. Data communication between VLAN is done using routers.
Figure 15-VLAN
VLAN advantages
• Users can exchange files and services more quickly if they have a single VLAN for all
people working together on a given project.
• If a user switches their desks after connecting to the network, their computer is still in the
same VLAN, provided the VLANs are mounted correctly.
Communication;
Transmitting data from one point to another Point
Simplex
• In simplex mode the communication can take place in one direction. The receiver
receives the signal from the transmitting device. In this mode the flow of information is
Uni-directional. Hence it is rarely used for data communication.
Figure 17-SIMPLEX
Half-duplex
• In half-duplex mode the communication channel is used in both directions, but only in
one direction at a time. Thus, a half-duplex line can alternately send and receive data.
Full-duplex
• In full duplex the communication channel is used in both directions at the same time. Use
of full-duplex line improves the efficiency as the line turnaround time required in half
duplex arrangement is eliminated.
Example of this mode of transmission is the telephone line (esoft,
2021).
Star Topology –also a LAN design in which all the stations are connected through point-
topoint links to a central server. 10BaseT Ethernet is used in this topology. This is a slower
bandwidth.
Ring Topology –a LAN infrastructure where the nodes are connected to each other in a loop
form. Uses token rings/EEE 802.5 and FDDI networks for better bandwidth.
Bus Topology –standard Ethernet/EEE 802.3
network actualizes a Bus Topology where all the wires are linked to the
backbone cable. The bandwidth is high compared to the star topology’s bandwidth.
Mesh Topology – data transmission rate is likely to be high since every device is connected to
each other through point-to-point dedicated links.
Network Models
For data communication to take place and two or more users can transmit data from one to
other, a systematic approach is required. This approach enables users to communicate and
transmit data through efficient and ordered path. It is implemented using models in computer
networks and are known as computer network models.
Computer network models are responsible for establishing a connection among the sender and
receiver and transmitting the data in a smooth manner respectively.
There are two computer network models (geeks for geeks, n.d.)
• ISO OSI Model
• TCP/IP Model
*Models are reasonable (coherent) models used to clarify the information correspondence
inside a PC organize.
The OSI Model is one of the general-purpose networking or communication model among
computer network models, which is responsible for establishing connection in an open manner
between all the communicable devices present across the globe.
ISO stands for international organization of Standardization. This is called a model for
Open System Interconnection (OSI) and is commonly known as OSI model.
The ISO-OSI model is a seven-layer architecture. It defines seven layers or levels in a complete
communication system. They are:
• Application Layer
• Presentation Layer
• Session Layer
• Transport Layer
• Network Layer
• Datalink Layer
• Physical Layer
*Also, these layers are sequenced in fixed manner and this sequence cannot be changed. It
means, any alterations in the positions of the layers are not accepted (geeks for geeks, n.d.).
Architecture of OSI model
Presentation Layer
This layer is also known as Translation layer, as this layer serves as a data translator for the
network. The data which this layer receives from the Application Layer is extracted and
manipulated here as pert the required format to transmit over the network. The main
responsibility of this layer is to provide or define the data format and encryption. The
presentation layer is also called as Syntax layer since it is responsible for maintaining the
proper syntax of the data which it either receives or transmits to other layer(s).
Session Layer
Session layer oversees and synchronize the discussion between two distinct applications. Move
of information from source to goal session layer surges of information are stamped and are
resynchronized appropriately, with the goal that the parts of the bargains are not cut rashly and
information misfortune is maintained a strategic distance from.
Transport Layer
Transport Layer provides transparent transfer of data between end users, providing reliable data
transfer services to the upper layers. The transport layer controls the reliability of a given link
through flow control, segmentation and desegmentation, and error control. Some protocols are
state- and connection-oriented. This means that the transport layer can keep track of the
segments and retransmit those that fail.
Network Layer
The network layer has two main functions. One is breaking up segments into network packets,
and reassembling the packets on the receiving end. The other is routing packets by discovering
the best path across a physical network. The
network layer uses network addresses (typically Internet Protocol
addresses) to route packets to a destination node.
Datalink Layer
The data link layer establishes and terminates a connection between two physically-connected
nodes on a network. It breaks up packets into frames and sends them from source to destination.
This layer is composed of two parts—Logical Link Control (LLC), which identifies network
protocols, performs error checking and synchronizes frames, and Media Access Control (MAC)
which uses MAC addresses to connect devices and define permissions to transmit and receive
data.
Physical Layer
The physical layer is responsible for the physical cable or wireless connection between network
nodes. It defines the connector, the electrical cable or wireless technology connecting the
devices, and is responsible for transmission of the raw data, which is simply a series of 0s and
1s, while taking care of bit rate control (esoft, 2021).
1. Because of its inability to fit protocols, this model was replaced by TCP/IP Internet
Model.
2. Session and Presentation layers does not provide high end functionalities and are not of
much use as compared to other layers.
TCP/IP MODEL
The TCP/IP model, was designed and developed by Department of Defense (DoD) in 1960s
and is based on standard protocols. It stands for Transmission Control Protocol/Internet
Protocol. The TCP/IP model is a concise version of the OSI model. It contains four layers:
• Process/Application Layer
• Host-to-Host/Transport Layer
• Internet Layer
• Network Access/Link Layer
Process/Application Layer
This layer plays out the elements of top three layers of the OSI model: Application,
Presentation and Session Layer. It is answerable for hub to-hub correspondence and controls UI
particulars. A portion of the conventions present in this layer are: HTTP, HTTPS, FTP, TFTP,
Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS, X Window, LPD.
Host-to-Host/Transport Layer
This layer is closely resembling the vehicle layer of the OSI model. It is answerable for start to
finish correspondence and mistake free conveyance of information. It shields the upper-layer
applications from the complexities of information. The two primary conventions present in this
layer are, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).
Internet Layer
This layer parallels the functions of OSI’s Network layer. It defines the protocols which are
responsible for logical transmission of data over the entire network. The main protocols
residing at this layer are, IP (Internet Protocol), ICMP (Internet Control Message Protocol), and
ARP (Address Resolution Protocol) (geeks for geeks, n.d.).
TCP/IP developed protocols then model. OSI developed model then protocol.
Transport layer in TCP/IP does not provide In OSI model, transport layer provides
assurance delivery of packets. assurance delivery of packets.
Protocols cannot be replaced easily in TCP/IP While in OSI model, Protocols are better
model. covered and is easy to replace with the change
in technology.
TCP/IP model network layer only provides Connection less and connection oriented both
connection less services. services are provided by network layer in OSI
model.
Application Layer
FTP (File Transfer Protocol) -transfers files to and from a remote network. The Enclave
Films Company could share motion picture related records over the system with the Vivid Zone
organization site without burden. Port No.- Control Connnection:21, Information Connection:
20
Telnet - The Telnet protocol enables terminals
and terminal-oriented processes to communicate on a network running
TCP/IP. Since the passwords that are entered are visible while typing, someone might gain
control over the system. Thus, I would recommend Enclave films to not use this protocol since
it has less security.
TFTP (Trivial File Transfer Protocol) -gives capacities like ftp, yet it doesn't build up ftp's
intuitive association. Subsequently, clients can't list the substance of a registry or change
catalogs. Thus, proving to be unreliable. I would recommend FTP. Port No.-69.
SMTP (Simple Mail Transfer Protocol) –used for sending electronic mails across the internet
effectively and safely. This protocol can be used by the managers or clients of the business to
efficiently pass emails through their net regarding issues n so on. In other words,
communicating via mails. Port NO. -25.
DNS (Domain Name System) –this is used to change the hostname into IP addresses and vice
versa. Thus, Enclave Films could use the DNS protocol for mailing purposes. Port No. -53.
SNMP (Simple Network Management Protocol) –this is used to monitor the network devices
and its functions within the LAN between two buildings. The new version of SNMP is version
3 which provides better protection and security. Port No. -161.
Transport Layer
IP (Internet Protocol) -Suppose, the management of the Enclave films wants to remove a
machine within the network. They can easily identify the machine using the IP address of that
particular network (esoft, 2021).
Some other popular protocols act as co-functioning protocols associated with these primary
protocols for core functioning. These are:
DHCP (Dynamic Host Configuration Protocol)- The Dynamic Host Configuration Protocol
(DHCP) is a network management protocol used on Internet Protocol (IP) networks for
automatically assigning IP addresses and other communication parameters to devices connected
to the network using a client–server architecture.
IMAP4 (Internet Message Access Protocol)-
In computing, the Internet Message Access Protocol (IMAP) is an
Internet standard protocol used by email clients to retrieve email messages from a mail server
over a TCP/IP connection. IMAP is defined by RFC 9051.
RTP (Real-Time Transport Protocol)- The Real-time Transport Protocol (RTP) is a network
protocol for delivering audio and video over IP networks. RTP is used in communication and
entertainment systems that involve streaming media, such as telephony, video teleconference
applications including WebRTC, television services and web-based push-to-talk features.
Networking Devices
Computer networking devices are units that mediate data in a computer network and are also
called network equipment. Units which are the last receiver or generate data are called hosts or
data terminal equipment (netwrix, n.d.).
Hardware Devices
A hardware device is any physical or tangible device of the computer system which plays a
major role in the running of the system.
Hub
A hub is a small, simple, inexpensive electronic device that joins multiple computers together.
There two main types of hubs:
Passive Hub –do not amplify the electrical signal of incoming packets before broadcasting
them out to the network.
Active Hub –on the other hand, do perform this amplification, as does a different type of
dedicated network device called a repeater. Some people use the terms concentrator when
referring to a passive hub and multiport repeater when referring to an active hub (netwrix, n.d.).
Figure 23-HUB
Bridge
A bridge is a device that connects two networks so that they act as if they are one network.
Bridges are used to partition one large network into two small networks for performance
reasons. Repeaters listen to signals coming down one network cable, amplifying them, and send
them down the other cable. They do this blindly, paying no attention to the content of the
messages that they repeat. In contrast, a bridge is a little smaller about the messages that come
down the pike (netwrix, n.d.).
Figure 24-BRIDGE
Switches
A network switch is a small hardware device that centralizes communications among multiple
connection devices within one LAN. Standalone Ethernet switch devices were commonly used
on home networks many years before home broadband routers became popular.
Highperformance network switches are still widely used in corporate networks and data centers
(netwrix, n.d.).
Figure 25-SWITCH
Router
A router is a switching device for networks, which is able to route network packets, based on
their addresses, to other networks or devices. Among other things, they are used for Internet
access, for coupling networks or for connecting branch offices to a central office via VPN
(Virtual Private Network) (netwrix, n.d.).
Figure 26-ROUTER
End-User Devices
End-user devices are other devices that provide services directly to the user. End-user devices
that provide users with a connection to the network are also referred to as hosts. These devices
allow users to share, create and obtain information.
Laptops
Laptop computers as the name implies are small portable computers that can run on batteries as
well as main power. They use special screens rather than the traditional bulky VDUs (Visual
Display Units) which allows for long battery life as well as portability.
Figure 27-LAPTOP
Personal Computers
IBM invented PC way back in 1981. All PCs released since then are in many ways compatible
with the original design, through many extensions have been made. The term PC compatible
relates to PCs manufactured by companies other than IBM that are compatible with the
traditional PC specification.
Figure 28-PC
Printers
An output device. Most data are printed once you have created it and there are vast number of
different printers available to accomplish this. Most common are inkjet and laser printers both
of which now can produce colored output (at a cost). In most organizations, the printers are
connected to the computers via a network. This means at each person with a computer does not
require his or her own printer. Each computer connected to the network can print using a
particular shared printer.
Figure 29-PRINTER
Cables
A cable, also known as a cord, plug, or connector transmits power or data between devices or
positions, which is covered in plastic by one or more wires. A power cable and data cable are
the primary types of computer cables. ... The USB>/a>, SATA, CAT5, and IDE/EIDE cables
are other popular examples of data cables.
• Shielded Twisted Pair (STP): They have a braided wired mesh that encases each pair of
insulated wires.
Fiber optical cable
Optical fiber is used by telecommunications companies to transmit telephone signals, Internet
communication and cable television signals. It is also used in other industries, including
medical, defense, government, industrial and commercial.
There are two primary types of fiber – multimode and single mode. Multimode fiber can carry
multiple light rays (modes) at the same time by having varying optical properties at the core;
essentially light travelling the shortest path (down the middle) travels the slowest.
Straight-through cable is a type of twisted pair copper wire cable for local area network (LAN)
use for which the RJ-45 connectors at each end have the same pinout (i.e., arrangement of
conductors).
Straight through cables provide a connection that only allows one end to communicate at any
given moment. These cables are the most common. They are best when connecting two
different types of networking equipment. For
instance, they are appropriate for connecting a computer to a switch,
router or printer.
A crossover cable is a type of twisted pair copper wire cable for LANs (local area network) in
which the wires on the cable are crossed over so that the receive signal pins on the RJ-45
connector on one end are connected to the transmit signal pins on the RJ-45 connector on the
other end.
These are used to connect two computers or similar devices directly together, such as
computers or hubs. To create a crossover cable is to rearrange the wires on one end of a
standard Ethernet cable, so that they are in the following order (starting at pin 1)
Figure 33-COPPER CROSS OVER
• Crossover cable, Pin 1 is crossed with Pin 3, and Pin 2 is crossed with Pin 6 while in
Straight-through cable Pin connection is one to one.
• Straight-through cables are mainly used for connecting non-similar devices while
crossover cables are mostly used for connecting similar devices.
• Straight through cable connects a computer with a DSL modem while Crossover cable
connects Router to Router and Computer to Computer.
Server Types
A server is a computer or system that provides
resources, data, services, or programs to other computers, known as
clients, over a network. In theory, whenever computers share resources with client machines,
they are considered servers. There are many types of servers, including web servers, mail
servers, and virtual servers.
An individual system can provide resources and use them from another system at the same
time. This means that a device could be both a server and a client at the same time.
How a server works-To function as a server, a device must be configured to listen to requests
from clients on a network connection. This functionality can exist as part of the operating
system as an installed application, role, or a combination of the two. For example, Microsoft’s
Windows Server operating system provides the functionality to listen to and respond to client
requests. Additionally installed roles or services increase which kinds of client requests the
server can respond to. In another example, an Apache web server responds to Internet browser
requests via an additional application, Apache, installed on top of an operating system.
Figure 34-SERVER
Types of servers
There are many types of servers that all
perform different functions. Many networks contain one or more of the
common server types:
File servers
File servers store and distribute files. Multiple clients or users may share files stored on a
server. In addition, centrally storing files offers easier backup or fault tolerance solutions than
attempting to provide security and integrity for files on every device in an organization. File
server hardware can be designed to maximize read and write speeds to improve performance.
Application servers
Application servers run applications in lieu of client computers running applications locally.
Application servers often run resource-intensive applications that are shared by a large number
of users. Doing so removes the need for each client to have sufficient resources to run the
applications. It also removes the need to install and maintain software on many machines as
opposed to only one.
Web servers
One of the most abundant types of servers in today’s market is a web server. A web server is a
special kind of application server that hosts programs and data requested by users across the
Internet or an intranet. Web servers respond to requests from browsers running on client
computers for web pages, or other web-based services. Common web servers include Apache
web servers, Microsoft Internet Information Services (IIS) servers and Nginx servers.
Database servers
The amount of data used by companies, users,
and other services is staggering. Much of that data is stored in databases. Databases need to be
accessible to multiple clients at any given time and can require extraordinary amounts of disk
space. Both of these needs lend themselves well to locating such databases on servers. Database
servers run database applications and respond to numerous requests from clients. Common
database server applications include Oracle, Microsoft SQL Server, DB2, and Informix.
Proxy servers
A proxy server acts as an intermediary between a client and a server. Often used to isolate
either the clients or servers for security purposes, a proxy server takes the request from the
client. Instead of responding to the client, it passes the request on to another server or process.
The proxy server receives the response from the second server and then replies to the original
client as if it were replying on its own. In this way, neither the client nor the responding server
needs to directly connect to each other (esoft , 2021).
Explore a range of server types and justify
the selection of a server
HP ProLiant DL380
System Specifications
Rack Height 2U
Processor Capacity 2
Maximum Memory 32 GB
Sub-Component Description
Cache Upgrade
RAID 0 (Striping)
Sub-Component Description
Table 8
(HP, n.d.)
• 2 x Ethernet
• 1 x VGA
• 1 x VGA
Internal Ports
•1 x USB 3.0 (optional)
PCIe 2 x PCIe Gen4 slots
Operating System and • Canonical Ubuntu Server LTS
Hypervisors • Citrix Hypervisor
(DELL, n.d.)
Justification of the most appropriate server
Through our case study known as Syntax solutions for different types of clients. As a network
engineer I have to understand what type of server is suitable for this LAN. I have chosen the
Dell server known as Edge R415 1U Rack Server. Compared to other servers this specific
server is considered to be the most affordable cost ranged server. As I mention about the
specifications of this server, they are certain propositions to consider
Finally, it is small in size, therefore the size and weight of this server is certainly a great help to
the server room architecture based on its eco-friendliness. As we look through the
specifications of the other servers. Dell servers are been considered as the best server due to its
ultimate performance. Although some features of the Dell server might be efficient than the HP
server. What could possibly be the best server for Syntax solutions? The answer is the Dell
Server
As I mentioned before about the other servers. All I need to specify is that the Dell servers are
been renowned for their ultimate performance. The Dell server’s that has been used for the
Syntax solution has a higher memory allocation compared to other servers. As I compare with
the cost of this server, it has a profitable gain in investment. The processors known as AMD
processors are considered for a cooler environment, yet these types of processors exhume less
heat. The use of servers and necessary network equipment are pretty destructive to the network
administrators and employees who have used the server room
Cost comparison
HP ProLiant DL380 - (1,521,760.48 LKR)
Dell PowerEdge R415 1U Rack Server -
(117,598.90 LKR)
When compared with the other servers the server that I have chosen has lower power
consumption. Compared to the total amount of servers that I have purchased is similarly
compared to the cost of the HP server. Therefore, the Dell server is the ultimate choice for
Syntax solutions.
Firewall Juniper
Software requirements
Software is a simple term for various kinds of programs used to work with computers and
computers. The need for software is required to run any devices. Because the hardware
executes software commands, it is impossible to perform hardware in the absence of software.
Terms that can be used to describe software are scripts, programs, a set of instructions and
applications. There are many network programs that have their own function and specialty. The
use of various types of software that is carried for the network between any two systems is
client software, server software, etc.
To execute the process, the client needs a server. The client connects to the services through the
network server. Switches and routers are needed to support the network. Client software refers
to the software that acts as a link between client and server computers. An OS that can run on
only one computer is called a client operating system that is used by individual users. Server
software is usually designed to connect to the server hardware, as well as to the processor,
memory, memory and other communication ports. Different types of servers are a web server,
an application server, a file server, etc. However, the server software also needed to install
some operating system for the proper functioning of the functions. The OS that was created to
install and warn the server is called a server operating system. The firewall is installed on
separate servers to manage incoming and outgoing signals.
Inter dependency of workstation hardware with software
Hardware and software, they are both very interdependent with each other. To output the
computer, they must work together. Without hardware support, the software cannot be used,
and if there is no correct indication of the hardware provided, it is useless. To perform the
work, a suitable software package must be installed in the hardware. As various software,
various tasks can be performed in the hardware. Hardware and software are like the body and
soul of a computer system. The software acts as a connection between the user and,
consequently, the hardware. Therefore, it is necessary that both of them are connected to each
other to run any systems.
Conclusion
I discussed the hardware requirements, the servers with the appropriate software, their
interdependence and how they perform their work. Hardware with the perfect software will
help you to manage all organizations smoothly and efficiently.
Example networking software that can be used in Syntax solutions LAN network
Anti-Virus
Antivirus software is a type of program designed and developed to protect computers from
malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such.
Antivirus programs function to scan, detect and remove viruses from your computer. There are
many versions and types of anti-virus programs that are on the market. However, the prime
objective of any antivirus program is to protect computers and remove viruses once detected.
Antivirus software begins operating by checking your computer programs and files against a
database of known types of malwares. Since new viruses are constantly created and distributed
by hackers, it will also scan computers for the possibility of new or unknown type of malware
threats.
Some of the most prominent advantages are:
• Protection from viruses and their transmission.
• Block spam and ads.
• Defense against hackers and data thieves.
• Ensures protection from removable devices.
Firewalls in computing, a firewall is a network security system that monitors and controls
incoming and
outgoing network traffic based on predetermined security rules. A firewall typically establishes
a barrier between a trusted network and an untrusted network, such as the Internet
Firewalls are categorized as a network-based or a host-based system. Network-based firewalls
can be positioned anywhere within a LAN or WAN. They are either a software appliance
running on general-purpose hardware, a hardware appliance running on special-purpose
hardware, or a virtual appliance running on a virtual host controlled by a hypervisor. Firewall
appliances may also offer non firewall functionality, such as DHCP or VPN services.
Hostbased firewalls are deployed directly on the host itself to control network traffic or other
computing resources. This can be a daemon or service as a part of the operating system or an
agent application for protection.
Figure 36-FIREWALL
LO3: Design efficient networked systems
The following figure shows the use of various types of Visio tools used to create a network
system. It contains various departments, such as a server station, workstations and substations.
The above plan of the Syntax solutions has 8 switches. One for server station there are 2 servers
in the network and other 7 switches for each department in the network. every one of the offices
PCs and different gadgets can't be associated
with one switch alone as it would make it increasingly perplexing
Legal 8
The above table is an IP designation table for Syntax solutions LAN network. In light of the
quantity of hosts I utilized the Class C IP address class run. Didn't utilize Class A or B since
they have bigger IP ranges and utilizing them would leave numerous unused IP ranges. I
utilized a one-of-a-kind range 192.168.10.0/24 so as to give a personality to my system. This
structure utilizes the VLSM (Variable Length Subnet Mask) so as to decrease the wastage of
IPs by allocating an assortment of square sizes dependent on the quantity of clients.
Feedback forms
Form 01 Responder; Amanda
4. Has the system been authorized with shortcuts and other tools? YES
8. The current system that has been created is it system based? YES
9. Is it Administrator that you have
Responder; Amanda
Company; Syntax solutions
Location; Colombo HEAD OFFICE
Excellent Very Good Good Weak
User friendly
User satisfaction
Interpretation
User interface
Security
Table 14-FEEDBACK FORM 1
4. Has the system been authorized with shortcuts and other tools? YES
9. Is it Administrator that you have used in most profiles? YES 10. Is it user friendly? NO
4. Has the system been authorized with shortcuts and other tools? YES
8. The current system that has been created is it system based? YES
9. Is it Administrator that you have used in most profiles? YES 10. Is it user friendly? NO
The security framework, every one of them have consented to the choice "Excellent" since they
were happy with the security framework. 90% of the individuals picked "Excellent".
When coming to examine the general reaction to the poll, it plainly shows that most of the
example size are happy with the system.
Network Services and Application
For the implementation of the network design, certain service applications need to be utilized.
Such as, A Client Server or a Server Operating system should be used. System configurations
should be done for that certain application to work.
Maintenance schedule
Server Maintenance
• Hard drive cleanup
• Domain controller checkup
Network Maintenance
• Server and storage infrastructure
• Desktop infrastructure
• Network equipment
• Backup and security systems
Software Maintenance
• Pc Tune up
• User Data Cleaning
• Resetting Operating Systems
• System Format
Hardware Maintenance
• Server maintenance
• Workstation maintenance
• Router maintenance
• Switch maintenance
• Firewall maintenance
• Network cable performance
Domain controller Checking each and every domain controller in each department End of every
Checkup Changing of passwords if necessary Month
Server and storage • Ease of use where all servers are based on a familiar interface Every week
infrastructure • High performance where servers and storage are interconnected during
maintenance
Desktop infrastructure • Storage in particular can make VDI cost prohibitive. Includes Every week
• the ability to easily support remote and mobile workers. during
maintenance
Network Network equipment • Is used to combine, split, switch, boost, or direct packets of Every year
maintenance information along a computer or telecommunications network. during
interconnects devices so that data can be shared between them maintenance
•
Backup and security • Verify your backups to make sure files are retrievable. Encrypt Whenever
systems • backups that contain sensitive data possible at
any time of
the day
Pc Tune up • Using AVG Pc Tune up to perform one click maintenance Every week during
Extends the battery life maintenance
•
Software User Data Cleaning • Increasement of data reliability Ensure Every week during
consistency maintenance
maintenance •
Resetting Operating Every year during
maintenance
Systems
System Format • This is done to prevent viruses and other forms of attack Whenever
from becoming a threat to the organization possible at any
time of the day
• Using the air out duct to suck out unnecessary air from
the server room. This is preventing germs from entering Every 6 months
in.
• Servers that are been kept in rack units are been removed.
Those who are strong enough are needed to lift servers
since they weigh a lot
Workstation • • Unplugging the device Every 4 months
maintenance • Cooling down the heat
• Removing Network and Other cables
Using a vacuum to get rid of dust
Router maintenance • • Unplugging the device Every 4 months
• Cooling down the heat
Removing Network and Other cables Using a vacuum to
Hardware get rid of dust
Switch maintenance • • Unplugging the device Every 4 months
maintenance
• Cooling down the heat
Removing Network and Other cables Using a vacuum to
get rid of dust
Firewall maintenance • • Unplugging the device Every 4 months
• Cooling down the heat
Removing Network and Other cables Using a vacuum to
get rid of dust
Table 17-Maintenance schedule
LO4 Implement and diagnose networked systems
Router configuration
Hostname
Banner
Clock set
Figure 50-ROUTER CONF
Physical Interface UP
Figure 51-PHYSICAL INTERFACE UP
Switch configuration
Hostname
Banner
Clock set
VLAN 10 SW1 basic configurations
Figure 55-VLAN 10 SW1
VLAN 20 (Finance)
Figure 70-Assigning Switch ports to VLAN 20
VLAN 30 (Sales)
Figure 71-Assigning Switch ports to VLAN 30
VLAN 40 (HR)
Figure 72-Assigning Switch ports to VLAN 40
VLAN 70 (Legal)
Figure 75-Assigning Switch ports to VLAN 70
Testcase
Test; ping to the Executed by; Execute Execute time;12.00am
gateway M.N.ABDULLAH date;2022/09/01
Description Expected output Received output Pass/fail
Pinging from pc 1 to Reply from Reply from Pass
192.168.10.122 192.168.10.122 192.168.10.122
Figure 76-PING TO THE GATEWAY
Future Enhancements
Every problem is in need of special assistance in order to be perfect when it comes to the
increasement of the market, thus the problem that Syntax solutions faces should be provided
with specific recommendations that could lead the way to improvement and make the necessary
changes to the system. This projected system is
been implemented for a period of 3 to 5 years which helps to keep this
network as it is needed to help the organization in order to gain the results that were
implemented on the first day. As each day passes by, the industry is undertaken to carry huge
revenues in the networking world. Thus, they are able to consider several revenues that are
made to change accordingly
Later on, cabling should be possible with 5 optics and remote associations can be given where
conceivable. The present workstations might be supplanted with incredible ones. It is constantly
important to have the best in the framework for everything to run easily with no burden. In this
manner, I prescribe Syntax solutions to utilize marked equipment gadgets with regards to
Routers and switches. So as to verify the framework, a firewall could be actualized so as to
square traffic and other superfluous difficulties.
Having biometric verification strategies, for example, Finger print validation and Facial
filtering is quite suggested. To additionally verify the framework, CCTVs might be introduced
in every division. They can likewise include physical security like security monitors. We can
likewise introduce Wireshark for the observing of the framework
Other personnel behavior that might be causing a slowdown could involve poor file sharing
practices, such as emailing large PPT files to multiple contacts rather than editing them via a
shared cloud file. If you have employees frequently (and needlessly) sharing extra-large files,
teaching them how to compress the files or
how to use cloud drives can cut the strain they’re placing on the network.
Self-Criticism
From this Assignment it comes to my mind that this is considered as the most essential and
most reliable subject. This therefore increases the knowledge that I have recognized in
Networking. Therefore, this is certainly a great privilege to learn all these things based on this
subject, which makes it interesting to be influenced with networking.
From my point of view all these specifications on networking are rather useful which helps us
to work in a networking field. While doing this assignment I have researched through a lot of
information that is based on networking and
received a great knowledge on this subject. Unlike other subjects this is
mostly practical based and great for the mind.
While working on this assignment, I was certainly a great privilege to experience different
kinds of aspects that are based on networking. Doing this project is of great assistance to me
since I’m interested in this kind of field. This obviously takes me through various phases in
networking. It gives me an immense amount of joyfulness of working hard, and being involved
in the tackling of various problems and by the help of these certain challenges that I have to
face helps me become part of the networking industry
I’m glad to say that I put my uttermost effort in completing this assignment, it basically gives
me an idea on what Networking is and what certain features are collaborated with this certain
field
Summary
This Assignment consists of eleven tasks. The first and foremost task is all about the different
types of network systems and various types of topologies. From this assignment the main
purpose is to decide what the best topology is suited for Syntax solutions. The second task is all
about network technologies and how these standards are required to fulfill the necessary
requirements that are required for Syntax solutions. These somehow proves how they can be a
great impact to the solution that is mostly needed for this case study. The next task which is the
third, implements the usage of different types of protocols that are necessary for data
communication, this is where we describe the
certain roles of these protocols that are necessary for this case study and
through this it provides us the immediate utilities for our network system.
The fourth task is mainly concerned about how to design a comprehended network for Syntax
solutions. Through these diagrams we should explain how this certain organization meets the
necessary requirements. As we look at the fifth task it is all about knowing about the roles of
software and hardware components that you would implement in our solution and how you
would use them to create your new network solution. The next task provides all the information
of various types of servers that are needed for this solution. They are been compared and
analyzed to check if they are freely available in the market based on their costs making the best
selection. The seventh task successfully discusses how workstation depends on other network
components to view their performance. As we move on, the eighth task is to prove how we can
achieve the respectable feedback from its users and somehow analyze the causes for the
developing solution in which they are able to make necessary recommendations that are been
implemented to promote improvement based on the given feedbacks
The ninth task is all about the test plan, we have been told to install network application and
implement the following solution in order to achieve the following output. The tenth task
includes all the different types of recommendations that you should implement after a period of
time. The last and final task is all about designing a maintenance plan which includes all the
details on the maintenance of the server, the workstations as well as hardware, software and
networking maintenance.
Conclusion
To conclude this assignment, it comes to my mind that this assignment is of great importance. It
has a lot of tasks that helps us to perform in various ways. As I conclude this assignment is
basically about all networking requirements and procedures, that are needed to fulfill the user’s
requirements, the uses of protocols in which it helps to implement an effective solution to the
network The use of Networking is very essential, it is basically fun learning about new things
that we haven’t experienced. Learning about routers, servers, switches and so on. It’s of great
experience to us. Learning about Networking Technologies. Based on these requirements they
have a chance of outgrowing their network, therefore in need of an upgrade. To help ensure a
smooth transition, they should be careful with
the previous network as well as the current network to meet its
requirements. This will help determine what new equipment and configurations. They are
necessary to ensure that the new network fully supports both the current and future needs of the
company or organization.
References
Anon., 2022. Logical topology. In: networking. s.l.:s.n., pp. 38-42.
Anon., n.d. tutorialspoint. [Online] Available
at:
https://www.tutorialspoint.com/data_communication_computer_network/computer_networ
k_models.htm
computer network technology , n.d. network types. [Online]
Available at: https://computernetworktopology.com/local-area-network/ [Accessed
12 08 2022].
DELL, n.d. DELL support. [Online]
Available at:
https://www.dell.com/ae/business/p/poweredge-r415/pd [Accessed
15 august 2022]. electronisnotes, n.d. electronisnotes. [Online]
Available at: https://www.electronics-notes.com/articles/connectivity/ethernet-ieee-802-
3/standards.php
[Accessed 23 august 2022]. esoft , 202. types
of servers. s.l.:s.n. esoft, 2022. In: Networking.
s.l.:s.n., pp. 3-12. esoft, 2022. In: Networking.
s.l.:s.n., pp. 38-42. esoft, 2022. protocols.
s.l.:esoft metro campus. futurenetwork, n.d.
futurenetwork. [Online]
Available at: https://futurenetworks.ieee.org/standards [Accessed
11 august 2022].
geeks for geeks , n.d. difference between router and bridge. [Online]
Available at: https://www.geeksforgeeks.org/difference-between-bridge-and-router/ [Accessed
14 august 2022].
geeks for geeks, n.d. computer network fundamentals. [Online]
Available at: https://www.geeksforgeeks.org/tcp-ip-model/
[Accessed 12 august 2022]. geeks for geeks, n.d. difference
between hub and switch. [Online]
Available at: https://www.geeksforgeeks.org/difference-between-hub-and-switch/ [Accessed
14 august 2022].
HP, n.d. HP support document. [Online]
Available at: https://cs.uwaterloo.ca/~brecht/servers/docs/HP-DL-380-G5/Specs.html
[Accessed 15 august 2022].