0% found this document useful (0 votes)
32 views65 pages

Networking

This document provides an overview and activities for designing a network for BKACAD company. It includes: - An introduction describing BKACAD's need for a new network design with their business growth. - An activity outlining key network principles, protocols, devices, topologies, and services to consider in the design. - A second activity proposing tasks to design the network including a LAN blueprint, security, IP allocation, and testing. - A third activity to implement the network design with verification testing and analyzing results.

Uploaded by

Duy Nguyen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views65 pages

Networking

This document provides an overview and activities for designing a network for BKACAD company. It includes: - An introduction describing BKACAD's need for a new network design with their business growth. - An activity outlining key network principles, protocols, devices, topologies, and services to consider in the design. - A second activity proposing tasks to design the network including a LAN blueprint, security, IP allocation, and testing. - A third activity to implement the network design with verification testing and analyzing results.

Uploaded by

Duy Nguyen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 65

PROGRAM TITLE: BTEC in Computing ( Software Engineering )

UNIT TITLE: Networking


ASSIGNMENT NUMBER: Assignment 1
ASSIGNMENT NAME: Consulting and implementing network design of BKACAD
company
SUBMISSION DATE: 15/08/2022
DATE RECEIVED: 23/11/2022
TUTORIAL LECTURER: Mr. TRAN HOANG BACH
WORD COUNT:

STUDENT NAME: NGUYEN HUU DUY


STUDENT ID: BKC13144
MOBILE NUMBER: 0918398233
Summative Feedback:

Internal verification:
CONTENTS
INTRODUCTION
ACTIVITY 1
I. Overview of your report
II. Explanation of
1. Network Principles
2. Networking Protocols
3. Networking Devices
4. Network Structure
5. Network Services
6. Network software, network hardware, and the relationship between them.
7. Network Topology
8. 802.3, 802.11 Standards
9. Bandwidth

ACTIVITY 2
1. Prepare a written plan of how you will design the Local Area Network including your
LAN blueprint.
2. Demonstrate the security and quality of service requirements required for the accessory
selection
3. Design a networked system to meet a certain specification
4. Provide an IP address allocation table for the network. (Separate IP reasonably)
5. Install and configure the network services and applications of your choice (Web, DNS,
mail, ...)
6. Conduct design testing and evaluation to meet requirements and analyze user feedback.
7. Recommend maintenance schedule to support networked system.

ACTIVITY 3
1. Implement a networked system based on your prepared design.
2. Conduct verification with example Ping, extended ping, traceroute, telnet, SSH, etc.
3. Record test results and analyze these against expected results.
4. Investigate what functions will allow the system to support device growth and the addition
of communication devices.
INTRODUCTION
- The internet has taken on a significant role in society today, becoming all-pervasive and
practically necessary. It makes it easier for people to interact with one another, work, play,
learn, receive and send mail, search for information quickly and easily, and engage in
economic activity. People will benefit much from the advancement of the internet and many
technical tools when working and managing information, but it is also simple to stop the
transmission process. and receive information, a lack of privacy protection due to the
carelessness with which the information system between devices is operated. Therefore,
effective administration of the information system is essential for ensuring smooth operation
and the ability to adapt to changing security needs. a crucial and increasingly vital role. It is
vital to have an extremely ideal network system design to fulfill a range of requirements for
individuals, departments, and systems inside the organization while preserving costs and
efficiency, and having a high working capacity. And in this project, the basic principles of
creating network systems are addressed, including computer networks, network protocols,
network devices, network designs, and network services. To offer consistency and security
while managing and operating information within the organization, apply to a network design
issue for the BKACAD company from there.

ACTIVITY 01
I. Overview of your report
- BKACAD is a company specializing in providing information technology services. In the
process of development, the company is growing stronger and has a new branch.
- The head office is in building A and the servers are located in the same building and most
of the administration, sales, human resources, and management functions are supported in
building A. The branch is located in building B and has a limited number of employees. Both
buildings are located in the same facility.
- The company's branch network has grown without proper planning. The LAN cabling in
both offices is Cat5e Ethernet. The office complex provides an Ethernet link between the two
buildings.
- The current network is a flat network design with minimal redundancy. A small wireless
LAN is occasionally used by several project managers with laptops and guests at Building B.
a) Building A - general office and managers, including administration, human resources, and
sales departments. It includes 30 PCs, 2 Servers, and 02 printers. (Admin: 5 PCs, HR: 5 PCs,
SALE: 20 PCs)
b) Building B: including 10 PCs, and 2 printers.
- As a member of a consulting company and deploying network systems for businesses, you
are appointed as a design consultant for BKACAD company, write a detailed guide that
outlines the principles, models, and network equipment for network training purposes and
outlines the sections of the manual that are relevant to BKACAD.

II. Explanation of
1. Network Principles
- Principles of Effective Networking:
+ Win/Win Situations Produce Strong Connections. Having a strong network is extremely
valuable because of the long-term impact it can have on your business. ...
+ Give More Than You Get. ...
+ Activity Beats Inactivity. ...
+ Quality Over Quantity. ...
+ People Do Business With People They Like.

2. Networking Protocols
- A Network Protocol is a group of rules accompanied by the network. Network protocols
will be formalized requirements and plans composed of rules, procedures, and types that
describe communication among a couple of devices over the network. The protocol can be
described as an approach to practices that enable a couple of entities of a communication
program to transfer information through various physical mediums. The protocol identifies
the rules, syntax, semantics, and synchronization of communication and feasible error-
managing methods. In this article, we will discuss the different types of networking protocols.
2.1 HTTP or HTTPS
- This stands for Hypertext Transfer Protocol or Hypertext Transfer Protocol (secure). The
secure version is encrypted, meaning that we will encrypt all the data as we send it from the
client to the server.

- Now client and server here become very important with application layer protocol. Nearly
all application-layer protocols use this model, using one device on the client’s network and
the other on the server.
- Now when we are using HTTP or HTTPS or transferring a file. Transferring a file in the
format of the hypertext. Hypertext is readable by a web browser. The client software you are
likely very familiar with. This is either Google Chrome or Firefox, which may be Microsoft
Edge or Ale’s Safari browser. Thall web cliehat support the use of HTTP or HTTPS.
- The server side also runs some software. It is a running server software. For the website, we
usually use Apache, an open-source software web server that can run on either Linux or
Windows. We have Nginx, which is used in large website deployments and can run on
UNIX. We have Microsoft’s Internet Information Services or IIS, which can be run on
Microsoft systems. There are several web server options that a server administrator can install
to host a website on the internet. So the whole purpose of the client-server here is to have
client software like a web browser and the web server like Apache work in conjunction with
each other and transfer these hypertext documents to get the website from the server to the
client.
- The Port number uniquely identifies the layer-7 protocol being used at layer 4. We can use
these port numbers to identify traffic at layer 4 quickly, The HTTP by default, we have port
80, and for HTTPS by default, we have port 443 as the transport layer protocols.
2.2 FTP (File Transfer Protocol)
- The FTP allows us to transfer files from a client to a server or from a server to a client.

- We can do it in both directions here, and this protocol is either going to be FTP, sFTP, or
TFTP.

- FTP is a File Transfer Protocol, SFTP is a Secure File Transfer Protocol, and TFTP is a
Trivial File Transfer Protocol.
- FTP and SFTP are pretty similar to one another. These protocols will transfer files from one
device to the other, and client and server software is specifically designed to do this.
- TFTP works a little bit differently. It’s meant for sending tiny files between two devices or
having simple setups where you can transfer a file quickly without worrying about
authentication or firewall issues causing your traffic to be knocked down.
- FTP and SFTP typically require a username and password to transfer these files. TFTP does
not require this. SFTP, specifically here, is going to encrypt the traffic.
- FTP will use ports 20 and 21; one is used for authentication, and the other for transferring
information. Port 22 is used for SFTP, and the reason for that port 22 is the port number for
another protocol we are going to look at called Secure Shell or SSH, and what happens here
is we take the FTP protocol. We put it inside an SSH session, which allows us to encrypt
traffic, which is why the port numbers are the same for both SFTP and SSH. TFTP uses port
number 69.

2.3. Email Protocols (POP3, IMAP, SMTP)

- Email is specifically designed for transferring files. We are transferring files in the format of
these email documents. A client operates two to retrieve mail from a server. POP and IMAP
are explicitly used to take email messages that live on a server, Gmail, or your company’s
email server, and they use it to transfer those emails over to your client.
- SMTP, however, is a Simple Mail Transfer Protocol. This protocol takes a message you
create on a client email application and sends that email to an SMTP server. SMTP is used to
forward the email to the server; the server then figures out how to get messages to the
recipient you intended.
- POP stands for Post Office Protocol; we are using version 3 there.
- IMAP is the Internet Message Access Protocol, and then like SMTP, is the Simple Mail
Transfer Protocol. All these protocols work either in unencrypted or encrypted modes.
- So here, with POP3, for unencrypted traffic, we will use port 110; for encrypted traffic, we
will use port 995. IMAP, we will use port 143 for the unencrypted traffic, port 993 for
encrypted traffic, and SMTP, port 25 for unencrypted and 465 for encrypted traffic.

3. Networking Devices

3.1. Router
a. Concept
- Router (router or router) is a network device used to deliver data packets to end devices. It
is a device to share the Internet with many other devices in the same network layer.
b. Functions
- To create segments: Segment the internet into an intranet, transmitting all packets from the
intranet to the Internet. helps specific external web traffic to the internet as a safety concern
and avoids data damage caused by a data packet being routed to the wrong network.
- To assign IP addresses: Dynamic Host Configuration Protocol (DHCP) allows the transfer
of IP addresses to each computer associated with the network. Most routers that are enabled
with the DHCP protocol over the internet are used for small types of home and office
networks.
- As a Firewall: Helps protect from intruders and malicious users over internal networks.
Allows blocking of unauthorized or unwanted traffic. A firewall is a software that is installed
on each computer over a network, but routers are identified over the internet along with the
firewall software and software.
- Resource Sharing: The router also helps multiple users to share resources such as faxes,
scanners, printers, and file folders on drives located remotely, so it saves extra money and
space for setting the printer. All files and folders stored on the user's hard drive can be shared
across the entire network without printing or copying.

c. Working principle
- A router selects routes and forwards packets. Upon receiving a packet, a router selects a
proper path, which may have one or multiple hops, to send the packet to the next router
according to the destination address in the packet. The last router is responsible for sending
the packet to the destination host.

d. Some types of routers


- Broadband Routers
- Wireless Routers
- Edge Router
- Subscriber Edge Router
- Inter-provider Border Router
- Core Router
- Wired and Wireless Routers.

e. Advantages and disadvantages


- The advantages of the router:
+ It provides connections between different network architectures such as Ethernet & token
ring etc.
+ It can choose the best path across the internetwork using dynamic routing algorithms.
+ It can reduce network traffic by creating collision domains and also by creating broadcast
domains.
+ It provides sophisticated routing, flow control, and traffic isolation.
+ They are configurable which allows the network managers to make policies based on
routing decisions.
- The disadvantages of the router:
+ They operate based on routable network protocols.
+ They are expensive compared to other network devices.
+ Dynamic router communications can cause additional network overhead. This results in
less bandwidth for user data.
+ They are slower as they need to analyze data from layer 1 through layer 3.
+ They require a considerable amount of initial configurations.
f. Applications
- There are many applications for routers:
+ Routers are used to connect hardware equipment with remote location networks like BSC,
MGW, IN, SGSN, and other servers.
+ It provides support for a fast rate of data transmission because it uses high STM links for
connectivity;
+ Internet service providers widely use routers to send data from source to destination in the
form of e-mail, a web page, image, voice, or video file.
+ Routers offer access restrictions. It can be configured in a way that allows for few users to
access the overall data and allows others to access the few data only, which is defined for
them.
+ Routers are also used by software testers for WAN communications.
+ In wireless networks, configuring VPN in routers can be used in the client-server model,
which allows sharing of the internet, video, data, voice, and hardware resources.
+ External storage devices can be used with routers to store and share data.
+ Routers are used to set up the operation and maintenance center of an organization, which
is known as the NOC center. All equipment at a distant location is connected by routers on
optical cable at a central location.

3.2. Switch
a. Concept
- Switch is an important switching device in the network, used to connect network segments
in a star model.
b. Function
- Looping Avoidance: Where switches can be used to prevent looping when receiving data
for unknown purposes. Then the data received will be forwarded to the destination IP
Address through blocking on one of the ports connected to other devices.
- Forward Data Frames: Switches are also used to filter and forward data frames to the
address being addressed. In addition to sending data to the destination address, the
forwarding of data frames will also continue to a specific MAC address and port. This can
reduce the occurrence of collision events during the data transmission process.
- Address Learning: Address learning on the switch functions to record MAC addresses
between network devices that are currently connected. When the switch is in the process of
receiving data, the switch also records the MAC address of the sender and learns where the
data will be sent.

c. Working principles
- Where the ability of the switch is better and more efficient when exchanging data,
processing, and sending data than the HUB. In its application, the switch will receive data
sent by other devices that are already connected. Then the switch will detect and match the
MAC address of the destination device with the table data it has.
- The next stage, the switch will make a logical connection using the port that is already
connected to the destination device. Thus the data to be sent can only be received by the
destination port. As for the other ports can not receive the data. The way this switch works
can reduce the potential for data collisions.

d. Types of switches
- Unmanaged Switch
- Managed Switch
- Smart Switch
- Enterprise-Managed Switch

e. Advantages and disadvantages


- The advantages of switch:
+ They increment the accessible data transfer capacity of the organization.
+They help in lessening the outstanding burden on individual host PCs.
+ They increment the presentation of the organization.
+ Less casing Impacts: Networks that use switches will have fewer casing impacts. This is
because of the way that switches make impact areas for every association.
+Switches can be associated straightforwardly with workstations.
+ It increases the available bandwidth of the network.
+ Networks that use switches will have fewer frame collisions
+ More secure since the switch is isolated, data will go only to the destination.
- The disadvantages of switch:
+ They are more costly in contrast with network spans.
+ Network availability issues are hard to be followed through the organization switch.
+ Broadcast traffic might be problematic.
+ Switches are in the indiscriminate mode, they are defenseless against security assaults for
example caricaturing IP addresses or catching Ethernet outlines.
+ Proper planning and arrangement are required to deal with multicast parcels.
+ The switch’s mechanical component can wear out with time.
+ Must have physical contact with the object to be actuated.

f. Applications
- Connect multiple hosts: Normally, a switch provides a large number of ports for cable
connections, allowing for star topology routing. It is usually used to connect multiple PCs to
the network.
- Forwards a message to a specific host: Like a bridge, a switch uses the same forwarding or
filtering logic on each port.
- Manage traffic: A switch in networking can manage traffic either coming into or exiting the
network and can connect devices like computers and access points with ease.
- Keep electrical signal undistorted: When a switch forwards a frame, it regenerates an
undistorted square electrical signal.
- Increase LAN bandwidth: A switch divides a LAN into multiple collision domains with
independent broadband, thus greatly increasing the bandwidth of the LAN.

3.3. Firewall
a. Concept
- Firewalls are one of the most effective security tools available for protecting users from
external threats.

b. Function
- Controlling and Monitoring Data Packet Flow: The firewall function on the first
computer network is useful in controlling and monitoring the flow of data packets flowing on
the network. The firewall function also includes modification of incoming data packets and
can hide an IP address.
- Become a Network Security Post: Furthermore, the firewall function on a computer network
can control data traffic when accessing a protected private network. All traffic either coming
out or entering the network must pass through the firewall to be checked, either by filtering,
limiting, or even rejecting.
- Log User Activity: When a computer user accesses data, the firewall will record it as
documentation (log files). The existence of these data records will be used to develop a
computer security system. Then, the function of the firewall is to authenticate access to the
network.
- Prevent Information Leakage: Firewalls are also able to prevent the leakage of valuable
information. Simply put, a firewall that will prevent users from sending valuable files that are
confidential or secret to other parties without realizing it.

c. Working principle
- When your computer has firewall protection everything entering and leaving the computer
will be monitored. The firewall monitors all information traffic to allow ‘good data’ to enter,
and blocks ‘bad data’ from entering the computer.
- Firewalls use one or more of the three methods below to control traffic flowing into and out
of the network:
+ Packet filtering
+ Proxy service
+ State inspection

d. Types of firewalls
- Personal Firewall
- Network Firewall

e. Advantages and disadvantages


- The advantages of a firewall:
+ Traffic monitoring
+ Protection against Trojans
+ Prevent hackers
+ Access control
+ Better security
- The disadvantages of firewalls:
+ Cost
+ User Restriction
+ Performance
+ Malware Attacks
+ Complex Operations

f. Application
- A firewall sits between a computer (or local area network) and another network (such as the
Internet), controlling incoming and outgoing network traffic.
- Having a firewall to help limit the situation that computers are directly connected to the
Internet has caused many Windows XP computers to become infected with viruses within
minutes of being directly connected to the Internet.
- Instead of accepting all incoming connections, a firewalled system discards all incoming
connections unless it is specifically configured to allow these incoming connections.
- Control access to network services from other computers on the local network

3.4. Gateway
a. Concept
- Gateway is a network node used in telecommunications to connect two networks with
different communication protocols that can communicate with each other.
The gateway handles the network's input and output because all data must pass through or
communicate with the gateway before it can be routed.

b. Function
- The gateway functions allow data exchange between all available communication
technologies. This is accomplished by using “connections” which connect data points of
different technologies
- The gateway converts information, data, or other communications from one protocol or
format to another. A router may perform some of the functions of a gateway. An Internet
gateway can transfer communications between an enterprise network and the Internet.

c. Working principle
- It can be linked to the router since a router accurately knows about the routing path of data
packets that appears at the gateway then a switch decides the suitable in and out path of the
gateway for the designated packet. The gateway is a mandatory attribute of routes even
though the other devices can act well as a gateway. But the operating system used here with
internet sharing behaves like a gateway and establishes the connection with internal
networks.

d. Types of gateways
- There are two main types of gateways: unidirectional gateways and bidirectional gateways.

e. Advantages and disadvantages


- The advantages of gateway:
+ A gateway can expand the network by connecting computers with different systems
together
+ Gateways are known to possess improved security since they allow user authentication.
+ Gateway performs the filtering process by inspecting each data packet that passed through
the gateway.
+ A networking gateway can control collision as well as broadcast domains.
+ A gateway can also convert data packets according to the destination needs
- The disadvantages of gateway:
+ Gateways by default are installed on the routers themselves. This makes it more difficult
for the network administrators to install or configure them
+ Configuration of devices through a gateway is made even more difficult or impossible
+ Gateway networks always cause time delays since information must be translated.
+ If there are possibilities of failure occurring at the gateway, it can lead to communication
loss.
+ Computers on a network are with different protocols. Therefore, if there is any problem,
each of these computers needed to be troubleshot individually. This makes the process more
complicated since different tools must be present.

f. Application
- Gateways are mainly used in personal or business situations that want to simplify internet
connectivity for a single device. In the enterprise, a gateway can also act as a proxy server
and firewall.

3.5. Server
a. Concept
- A server is a system (appropriate computer hardware and software) that responds to a
request on a computer network to provide, or support, the delivery of a network service.

b. Function
- Providing Requests to Client System
- Keeping Store Data
- Provides a database to store and process data.
- The server is also capable to keep managing the communication and transfer of data or
information to the client.
- The final function of the server is to provide security for your computer system or website
from cyber-attack.

c. Working principle
- The client computer will request data or services on the server. Then after the request is
received, the server will process it and the results are sent back to the client’s computer.

d. Types of servers
- Web Server
- Mail Server
- DNS Server
- Application Server
- Database Server
- FTP Server
- DHCP Server 
- File Server 
- Proxy Server 
- Streaming Server 
- Game Server 

e. Advantages and disadvantages


- The advantages of server:
+ The ability to centralize
+ When all the necessary information is located in a single location, problem-solving can
happen in only one place.
+ The data is well protected due to its centralized architecture.
+ Client-server networks are highly scalable. Thus, increasing the size of the without many
interruptions.
+ All the files are stored in the central server, so it is rather easy to manage files.
+ Regardless of location or background, every customer has the opportunity to log into the
system.
- The disadvantages of servers:
+ Traffic Congestion If too many clients request the same server, it will result in crashes or a
slowdown of the connection.
+ In case the main server happens to undergo failure or interference, then the whole network
will be disrupted.
+ The cost involved in setting up and maintaining the server is usually high in the client-
server networks as it does in the network operations.
+ When the servers are implemented, it is going to work non-stop. If there are any problems,
they must be resolved immediately without any delay.
+ Not all the resources that are present on the server are acquirable.

f. Application
- There are many types of server developed today, so it is used in many different situations.
The main job of a server is actually "serving" the users (clients) who are connecting to the
system.
- Mail server: helps businesses communicate via e-mail quickly, securely, and more easily if
businesses know how to manage the server.
- Web server: Web server will help businesses build and operate websites for Internet users
around the world, making it easy to manage, extremely easy to access internal information,
and manage directly. connection line.
- Active Directory server: Their data will be stored in a central server, and the server manager
will easily grant permission to view, share, etc. the data of each user.

g. Server selection
- Should choose a CPU with multiple cores for the server:
+ One of the most important factors when it comes to the server configuration is the CPU
core. The more CPU cores, the better for the user. Because it helps the data processing
process take place many times faster.
+ A CPU with few cores but with a high clock speed will not be as good as a CPU with many
cores with a lower clock speed (according to the latest research from NASA). So always
prioritize CPU with multiple cores
- Invest maximum RAM for server configuration:
+ Configure the server with high RAM to help process a lot of data at the same time,
avoiding the "sluggish" computer situation. Meanwhile, the RAM slot on the machine is
limited, so install good RAM from the beginning.
+ If you only choose 2GB RAM sticks, you will surely have to pay more for it later on
because the performance is not as expected. So choose 4GB or 8GB RAM sticks at first use.
- How to choose HDD/SSD hard drive for the server:
+ Currently, there are two types of hard drives for servers: HDD (Hard Disk Drive) and SSD
(Solid-State Drive). If buying HDD, hard drives with SCSI or SAS interface should be
selected. Because these types have high bandwidth and a higher rotational speed than hard
drives using other interface standards. They help to increase the speed of reading and writing
data. But if you buy an SSD-type hard drive, you should give preference to those with good
performance. There are many types, and although the capacity is only about 120 GB to 140
GB, they have very good operating speeds. Depending on your budget, you can buy larger-
capacity drives.
+ However, today SSD hard drive is almost common and superior to HDDs because it has
many advantages such as reading and writing speed being much times faster than HDDs, and
SSD is considered to be more reliable because it does not. data fragmentation, SSDs are
much more durable than HDDs because they do not have a spinning disc motor, are not afraid
of vibrations, SSDs consume less power than HDDs, and do not emit noise...
- Select RAID for server configuration:
+ Raid is a hard drive system that is assembled from many physical hard drives together. It
has the role of increasing the speed of reading and writing data or helping to increase the
safety of the data contained in the disk system. This is also an important component when
considering server configuration. Because it helps ensure the safety of your data thanks to its
backup, restore, and error-proof functions.
+ Currently, there are quite a few types of Raid such as Raid 0, 1, 2, and 3, ... making users
confused as to which type to choose. It depends on your needs and financial capabilities. If
you need to access large volumes of data and need high data rates, you should choose RAID
0, but it is less secure. RAID 1 is for people who need to store and manage really important
documents, but its speed is not high. If you want the best possible Raid, then Raid 10 is the
choice for you, but you need to have a small condition that is a lot of money...
- Note about the network system with server configuration: No matter how high your server
configuration is, it depends on the network system. If the network system is unstable, it will
reduce the ability to operate smoothly and smoothly of the whole system. Physical servers
always need high bandwidth for an internet connection to avoid congestion. So you also need
to invest in the network system as well as regularly check the connection speed to ensure the
whole system is operating most effectively.

4. NETWORK STRUCTURE
4.1. WAN
4.1.1 . Point to point
- Concept
+ Permanent link between two endpoints.
b. Benefits and limits
- Benefits:
+ Ensure information transmission between 2 devices, easily detect and fix errors, and do not
appear traffic problems due to mainly using cable or radio connections.
+ It can connect two locations far apart to create a wireless connection that allows large
enterprises to share data and applications between headquarters and branches/offices due to
terrain conditions that do not allow to create of a wired network connection
+ Limitations:
+ Efficiency is not high

4.1.2 Hub & spoke


a. Concept
- A central site interconnects branch sites using point-to-point links.
b. Benefits and limits
- Benefits:
+The efficient connection system helps to increase the delivery frequency within the working
day.
+ several large vehicles will pass through concentrated in the central area and businesses only
need to focus on equipping this point to increase efficiency.
- Limitations:
+ Reduced direct connection between points can lead to stagnation and possibly
overcrowding due to having only a handful of major hubs.
+ Lack of flexibility when everything is centralized in a central hub and all connections in the
network must be linked together.

4.1.3. Mesh
a. Concept
- Provides high availability, but requires that every end system be interconnected to every
other system. Administrative and physical costs can be significant.
b. Benefits and limits
- Benefits:
+ Using a dedicated point-to-point connection, there is no circulation problem, along with the
advantages of point-to-point connections such as information security and error correction!
+ Very stable, when a connection is disconnected, it does not affect the entire network.
- Limitations:
+ The number of I/O ports on each device is quite a lot, so the cost will be high!
+ Expanding the network is quite difficult.
+ Is a form of topology with limited use.
4.2 LAN
4.2.1Star
a. Concept
- End devices are connected to a central intermediate device. Use Ethernet switches.

b. Benefits and limits


- Benefits:
+ 1 port per device should save cost!
+ High sustainability.
+ Error detection is easy.
- Limitations:
+ Cost increases due to the need for an additional central control device.
+Low security.
+Equipment expansion is limited.
+ Distance between devices is also limited

4.2.2 Extended star


a. Concept
- Additional Ethernet switches interconnect other star topologies.

b. Benefits and limits


- Benefits:
+ The performance is better. As there is no unnecessary transmission of messages in the
network.
+ Ease of adding devices as network expansion happens
+ One node failure does not bring down the entire network
+ The new equipment can be added to the network and connected to the central hub. The
nodes can be easily removed from the network
+ It is easy to find device and cable issues
+ It can be upgraded to a faster speed
+ This topology helps to control multiple nodes at the same time
+ The data transmission can be done across the network and there is very less chance of
network failure as compared to its counterparts like bus topology
+ Mostly widely used so support is easily available
- Limitations:
+ As all nodes are connected to the central hub it requires more wire at each node to connect
to the central hub which increases its setup cost hence it requires more cable than a bus or
ring network
+As all nodes are connected to the central hub and if the central hub goes down it will lead to
a whole network failure and bring down the entire network
+ Increase in the number of connected nodes will decrease the performance of the central hub
or switch and will cause network congestion
+ Comparatively higher costs than bus networks (Installation and equipment)
4.2.3 Bus
a. Concept
- Used in legacy networks. All end systems are chained to each other and terminated in some
form on each end. Switches are not required to interconnect the end devices. Bus topologies
using coax cables were used in legacy Ethernet networks because it was inexpensive and easy
to set up.

b. Benefits and limits


- Benefits:
+ High connection performance.
+ Easy to install as well as reposition the devices together.
- Limitations:
+ Difficult to detect and prevent failures.
+ Difficult to add new equipment.
+ The connection points generate reflected signal causing signal loss. We can fix it by
reducing the number of connected devices.
+ Poor sustainability.

4.2.4. Ring
a. Concept
- End systems are connected to their respective neighbor forming a ring. Unlike the bus
topology, the ring does not need to be terminated. Ring topologies were used in legacy Fiber
Distributed Data Interface (FDDI) and Token Ring networks.
b. Benefits and limits
- Benefits:
+ Relatively easy to set up the structure.
+ Fast and simple error detection.
- Limitations:
+ Due to the ring structure, the signal moves in one direction, resulting in a slow transmission
rate.
+ Low sustainability.

5. NETWORK SERVICES
5.1.DHCP
a. Concept
- Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to
automate the process of configuring devices on IP networks, thus allowing them to use
network services such as DNS, NTP, and any communication protocol based on UDP or
TCP.
b. Function
- Manage and Distribute IP Addresses
- Prevent IP Conflict
- Update IP Address Automatically
- Supports IP Address Reuse.
c. Working principle
- When a user turns on a computer and connects it to a server with this service, the computer
will automatically request an IP address to the server. Then the server answers the request
until finally the computer gets the IP address and connects to the network.
d. Advantages and disadvantages
- The advantages of DHCP:
+ The time for manual configuration of IP addresses can be reduced.
+ There is no cost to make requests
+ There is no possibility of conflicts in IP addresses due to duplication and invalidation
prevention.
+ Simplify network administration.
+ Support multiple ranges
+ Valid configuration parameters are automatically taken from the new network for the
benefit of users
- The disadvantages of DHCP:
+ DHCP cannot travel through the router, so a forwarding agent is needed for the DHCP
server to process all leases on both network segments.
+ DHCP does not have a security mechanism to authenticate clients, it can gain unauthorized
access to IP addresses by presenting credentials such as client identifiers that belong to other
DHCP clients.
+ The hostname does not change when a new IP address is assigned.
+ The client cannot access the network without a DHCP server.

5.2.DNS
a. Concept
- The Domain Name System (DNS) turns domain names into IP addresses, which browsers
use to load internet pages. Every device connected to the internet has its IP address, which is
used by other devices to locate the device.
b. Function
- The main DNS function is to translate IP addresses into domain addresses, however, the
DNS has some additional functions:
- It can be used as a mechanism for validating trustable mail servers using the TXT records
- It can be used as a switch mechanism
- Website ownership validation
- Domain contact information, DNS system has a record of the different contacts
c.Working principle
- A user enters a domain name in the web browser. For example north.xyz.com. However, for
them to receive corresponding data for that domain name, the domain name must be
converted into a machine-readable IP address. This means that the IP address of the tIP
address will be requested from the data center before you can be able to access your site.
d. Advantages and disadvantages
- Internet Dependency
- It can offer high-speed connections.
- Some DNS servers are specifically designed for security purposes
- DNS allows users to categorize and archive search terms without needing to remember IP
addresses.
- DNS system constantly updates IP address so that users can avoid important efforts.

5.3.WEB
a. Concept
- A web service is a software system that supports interoperable machine-to-machine
interaction over a network. It has an interface described in a machine-processable format
(specifically, web Service Definition Language, or WSDL).
b. Function
- Process and deliver information to customers through personal computers on the Internet
over the HTTP protocol.
- Any computer can be a server if it has a server software program installed and has an
internet connection.
- Allows users to install and operate on any computer that meets the memory requirements.
- Store data in the form of renting small servers, VPS servers, or hosting.
c. Working principle
- A page on the internet can be viewed when the browser requests it from the web server and
the web server responds with that page.
- Simple process consists of 4 steps, they are:
+Obtaining the IP Address from the domain name
+ Browser requests the full URL
+ Web server responds to request
+ Browser displays the web page
d. Advantages and disadvantages
- The advantages of WEB:
+ A web server always provides the opportunity to interact with the hosting provider.
+ The log files present in a web server are made easy to configure.
+ Hosting through a web server is far more flexible compared to clustered web hosting.
+ A website using a web server experiences less number of bandwidth restrictions.
+ Whenever there are new requests, a web server does not allow sharing of resources such as
processor, hard drive, or bandwidth with others since it is not a shared host. Even under the
condition of obtaining virtual internet hosting.
- The disadvantages of WEB:
+ The expenses involved in a web server are far greater compared to an electronic web
hosting method.
+ Using web servers also brings many security concerns.
+ The convenience of web servers depends on the type of website you are using.
+ The contents on the web are edited frequently. As a result, it becomes impossible for the
web servers to work without an internet access
+ There may be a hardware failure, software failure, update, or maintenance in the web server
causing part of its availability so all the rest of the web servers to be congested with traffic.
This means that the web server receives more traffic than usual.

5.4.MAIL
a. Concept
An email server, also called a mail server, is essentially a computer system that sends and
receives emails.
b. Function
- Mail Server allows users to send or receive Email over the Internet with the domain name of
each organization.
- Ensure confidentiality of internal information.
- Helps minimize messages containing viruses or spam.
- Manage all email content of all members in the system.
- The user can set the maximum capacity.
- On the other hand, you can also set up automatic data backup function. This helps to ensure
that the necessary information and data are always present.
c. Working principle
- The sender uses a computer to sign into their email account and write a message. As well as
the message, they must include the recipient’s email address before they hit send. The email
is first sent to SMTP or outgoing email servers. Here, the server does a DNS record check to
translate domain names in email addresses into IP addresses that servers can use to route the
email.
- If the email goes to a domain within the same network, the first server can simply route the
email to the correct IMAP server. However, if the mail is addressed to a domain on an IMAP
server in a different network, the initial SMTP server will rely on unrelated SMTP servers to
route the mail. Finally, the incoming mail server uses a protocol like IMAP or POP to send
all messages to the recipient’s computer. The recipient can then find the message in the inbox
of their account.
d. Advantages and notes on using a mail server
- Advantages of mail:
+ Email with the company's domain name shows professionalism in operation.
+ High speed, and security, with many utilities.
+ Check mail anywhere: at the office (via mail browser) and at any place (when traveling on
business), on all types of mail browsers (Outlook…)
+ Can customize parameters and functions for each User.
+ Extremely effective spam and virus blocking.
+ There is a separate, impregnable storage space.
+ High security thanks to SSL protocol.
+ Using a private IP will prevent you from being blacklisted for no reason.
+ Support Email Forwarder feature to set up Email Offline.
- Notes on using the mail server:
+ The IP address is not sent to the spam box
+ Need to pay more attention to outgoing mail
+ Mail server is not allowed Open Relay Access
+ Do not use too many languages or capital letters in the mail

5.5. CLOUD
a. Concept
- A cloud server is a pooled, centralized server resource that is hosted and delivered over a
network typically the Internet, and accessed on demand by multiple users.
b. Function
- Cloud servers can perform all the same functions of a traditional physical server, delivering
processing power, storage, and applications
c. Working principle
- Cloud servers work by virtualizing physical servers to make them accessible to users from
remote locations. The computing resources of the physical servers are then used to create and
power virtual servers, also known as cloud servers. Cloud servers are provisioned and
managed through cloud-based APIs.

d. Advantages and disadvantages


- Advantages of Cloud Server:
+It is easier to get back up and restore that data using the cloud.
+ Improved collaboration
+ Excellent accessibility
+ Low maintenance cost
+ Cloud computing allows us to easily access all cloud data via mobile.
+ Unlimited storage capacity
+ Cloud offers many advanced features related to security and ensures that data is securely
stored and handled.
- Disadvantages of Cloud Server:
+ Cloud data cannot be accessed without the internet
+ As different vendors provide different platforms, that can cause difficulty moving from one
cloud to another.
+ Cloud infrastructure is completely owned, manage,d and monitored by the service provider,
so cloud users have less control over the functionality and execution of services
+ When you use cloud technology, you send all of your organization's sensitive information
to third parties. While sending data to the cloud, there is a chance that your organization’s
information is hacked by Hackers.

5.6.FTP
a. Concept
- An FTP Server is a software application that enables the transfer of files from one computer
to another. FTP (which stands for “File Transfer Protocol”) is a way to transfer files to any
computer in the world that is connected to the Internet.
b.Function
- FTP can be used by backup services or individual users to back up data from a location to a
secure backup server running FTP services.
- Replication involves copying data from one system to another but takes a more holistic
approach to provide greater availability and resiliency.
- FTP is also commonly used to access shared cloud and web hosting as a mechanism for
uploading data to a remote system.
c. Working principle
- FTP is a client-server protocol and it is based on two communication channels between the
client and server.
- Control connection: It is used to send and receive commands and responses. Normally,
users need to log in to an FTP server to establish a connection, but some servers provide all
their content without logging in. These servers are called anonymous FTP.
Data Connection: For transfer, n the files and folder we use a separate connection called data
connection:
+ Active Mode: In this mode, the user connects from a random port(random port 1) on the
FTP client to port 21 of the server. It sends the PORT command which tells the server what
port of the client it should connect to i.e.(random port 2). The server connects from port 20 to
the port that the client has designated i.e. Random Port 2. Once the connection is established
the data transfer takes place through the client and server ports.
+ Passive Mode: In the situation, where the client can not accept a connection like when
blocked by a firewall, the passive mode has to be used. This is the most common mode
because nowadays the client is behind the firewall(e.g. built-in Windows Firewall). In this
mode, the user connects from a random port(random port 1) on the FTP client to port 21 of
the server. It sends the PASV command which tells the client what port of the server it should
connect to i.e.(random port 3) for establishing the connection. The client connects from
Random port 2 to the port that the server has designated i.e. Random Port 3. Once the
connection is established the data transfers take place through the client and server ports.
d. Advantages and disadvantages
- Advantages of FTP:
+ FTP is used to allow you to transfer multiple files as well as directories
+ Faster transferthann HTTP
+ Quick file transfer speed
+ Supported in almost all host
+ Most clients have a synchronizing utility
+ Many more FTP clients also can schedule a transfer
+ No size limitation on single transfers
+ Many clients have scripting capabilities through a command line
+ The ability to add items to a queue to be uploaded as well as downloaded
+The ability to resume a transfer if the connection I lost
+ FTP can also include an automatic backup facility
- Disadvantages of FTP:
+ Usernames, passwords, and files are sent in clear text
+ Hard to script jobs
+ All providers aren't created equal
+ Encryption is not inherently offered or enforced by every provider
+ Servers can be spoofed to send data to a random port on an unintended computer side
+ Filtering active FTP connection is difficult on your local machine
+vEasy for an inexperienced user to wipe out work
+TLS 1.2is not always supported over HTTPS
6. NETWORK SOFTWARE, NETWORK HARDWARE, AND THE RELATIONSHIP
BETWEEN THEM.
6.1 Network Software
- Network software is an umbrella term used to describe a wide range of software that
streamlines the operations, design, monitoring, and implementation of computer networks.
- Network software is a fundamental element for any networking system. It helps
administrators and security personnel reduce network complexities, and manage, monitor,
and better control network traffic. Network software plays a crucial role in managing a
network infrastructure and simplifying IT operations by facilitating communication, security,
content, and data sharing.
- Functions of network software:
+ User management allows administrators to add or remove users from the network. This is
particularly useful when hiring or relieving
+ File management lets administrators decide the location of data storage and control user
access to that data.
+ Access enables users to enjoy uninterrupted access to network resources.
+ Network security systems assist administrators in looking after security and preventing data
breaches.
- Key Components of Network Software:
+ Application layer: The first component is the application layer or the application plane,
which refers to the applications and services running on the network. It is a program that
conveys network information, the status of the network, and the network requirements for
particular resource availability and application. This is done through the control layer via
application programming interfaces (APIs). The application layer also consists of the
application logic and one or more API drivers.
+ Control layer: The control layer lies at the center of the architecture and is one of the most
important components of the three layers. You could call it the brain of the whole system.
Also called the controller or the control plane, this layer also includes the network control
software and the network operating system within it. It is the entity in charge of receiving
requirements from the applications and translating the same to the network components. The
control of the infrastructure layer or the data plane devices is also done via the controller. In
simple terms, the control layer is the intermediary that facilitates communication between the
top and bottom layers through API interfaces.
+ Infrastructure layer: The infrastructure layer, also called the data plane, consists of the
actual network devices (both physical and virtual) that reside in this layer. They are primarily
responsible for moving or forwarding the data packets after receiving due instructions from
the control layer. In simple terms, the data plane in the network architecture components
physically handles user traffic based on the commands received by the controller.
Infrastructure has 2 APIs: Northbound API and Southbound API
- Types of Network Software:

+ Network storage software


+ Data archiving software
+ Patch management software
+ Security surveillance software
+ Asset management software
+ Deployment and migration software
+ Printer and fax software
+ Printer and fax software

6.2. Network Hardware


- Network hardware is a set of physical or network devices that are essential for interaction
and communication between hardware units operational on a computer network. These are
dedicated hardware components that connect and enable a network to function effectively and
efficiently.
- Network hardware plays a key role as industries grow as it supports scalability. It integrates
any number of components depending on the enterprise’s needs. Network hardware helps
establish an effective mode of communication, thereby improving business standards. It also
promotes multiprocessing and enables sharing of resources, information, and software with
ease.
- Network equipment is part of advancements in the Ethernet network protocol and utilizes a
twisted pair of fiber cables as a connection medium. Routers, hubs, switches, and bridges are
some examples of network hardware.
+ Modems
+ Routers
+ Hubs, bridges, and switches
+ Network interface cards
+ Network cables
+ Firewall
- Network Architecture: Network architecture defines the structural and logical design of a
network. It constitutes hardware devices, physical connections, software, wireless networks,
protocols, and transmission media. It gives a detailed overview of the whole network, which
organizations use to create LAN, WAN, and other specific communication tunnels.
- Network architecture design is more about optimizing its fundamental building blocks.
These include four key components:
+ Hardware: Hardware refers to network devices that form the core of any network. These
include user devices (laptops, PDAs, mobile phones), routers, servers, and gateways. The
basic objective of any network architecture is to establish an efficient mechanism to transfer
data from one hardware device to another
.+ Transmission media: Transmission media encompasses all physical connections between
network (hardware) devices. The properties of different transmission media determine the
speed of data transfer from one endpoint to another. These can be wired and wireless. Wired
media include physical wires or cables used for connections within a network, such as coaxial
or fiber optics. On the other hand, wireless media operates on properties of microwave or
radio signals, such as Wi-Fi or cellular.
+ Protocols: Protocols refer to the rules that govern data movement between network devices.
Various machines on a network communicate with each other using this common protocol
language. Without these protocols in place, it would be difficult for your iPhone to access a
web page that is essentially stored on a Linux server.
+ Topology: Network topology defines how the network is wired together and highlights the
network’s structure. This is important because variables such as distance between
communicating devices can impact its data transfer speed, thereby affecting overall network
performance.

6.3. The relationship between network hardware and network software


- Hardware and software both are interdependent. Each of them should work along to form a
computer to produce a helpful output.
- The software can not be used if there is no support for any hardware device.
- When there are no proper instructions given, the hardware cannot be used and is useless.
- To get a selected job done on the pc, the relevant software package has to be loaded into the
hardware.
- Hardware could be a former expense.
- Software development is incredibly pricey and could be a continued expense.
- The different software packages can be loaded on hardware to run different jobs.
- The software acts as an associate interface between the user and therefore the hardware.
- We can say the hardware and software are the heart and soul of a digital computer.

7. Network Topology
7.1. What is network topology?
- Network topology refers to how various nodes, devices, and connections on your network
are physically or logically arranged to each other. Think of your network as a city, and the
topology as the road map. Just as there are many ways to arrange and maintain a city—such
as making sure the avenues and boulevards can facilitate passage between the parts of town
getting the most traffic—there are several ways to arrange a network. Each has advantages
and disadvantages and depending on the needs of your company, certain arrangements can
give you a greater degree of connectivity and security.
- There are two approaches to network topology: physical and logical. Physical network
topology, as the name suggests, refers to the physical connections and interconnections
between nodes and the network—the wires, cables, and so forth. Logical network topology is
a little more abstract and strategic, referring to the conceptual understanding of how and why
the network is arranged the way it is, and how data moves through it.

7.2. Why is network topology important?


- The layout of your network is important for several reasons. Above all, it is essential to how
and how well your network functions. Choosing the right topology for your company’s
operational model can increase performance while making it easier to locate faults,
troubleshoot errors, and more effectively allocate resources across the network to ensure
optimal network health. A streamlined and properly managed network topology can increase
energy and data efficiency, which can in turn help to reduce operational and maintenance
costs.
- The design and structure of a network are usually shown and manipulated in a software-
created network topology diagram. These diagrams are essential for a few reasons, but
especially for how they can provide visual representations of both physical and logical
layouts, allowing administrators to see the connections between devices when
troubleshooting.
- The way a network is arranged can make or break network functionality, connectivity, and
protection from downtime. The question, “What is network topology?” can be answered with
an explanation of the two categories in the network topology.
+ Physical – The physical network topology refers to the actual connections (wires, cables,
etc.) of how the network is arranged. Setup, maintenance, and provisioning tasks require
insight into the physical network.
+ Logical – The logical network topology is a higher-level idea of how the network is set up,
including which nodes connect and in which ways, as well as how data is transmitted through
the network. Logical network topology includes any virtual and cloud resources.
- Effective network management and monitoring require a strong grasp of both the physical
and logical topology of a network to ensure your network is efficient and healthy.

7.3. Type of network topology.


7.3.1. Star topology:
- A star topology, the most common network topology, is laid out so every node in the
network is directly connected to one central hub via coaxial, twisted-pair, or fiber-optic cable.
Acting as a server, this central node manages data transmission—as information sent from
any node on the network has to pass through the central one to reach its destination—and
functions as a repeater, which helps prevent data loss.

- Advantages of star topology:


+ Star topologies are common since they allow you to conveniently manage your entire
network from a single location. Because each of the nodes is independently connected to the
central hub, should one go down, the rest of the network will continue functioning
unaffected, making the star topology a stable and secure network layout.
+ Additionally, devices can be added, removed, and modified without taking the entire
network offline.
+ On the physical side of things, the structure of the star topology uses relatively little cabling
to fully connect the network, which allows for both straightforward setup and management
over time as the network expands or contracts. The simplicity of the network design makes
life easier for administrators, too, because it’s easy to identify where errors or performance
issues are occurring.
- Disadvantages of star topology:
+ On the flip side, if the central hub goes down, the rest of the network can’t function. But if
the central hub is properly managed and kept in good health, administrators shouldn’t have
too many issues.
+ The overall bandwidth and performance of the network are also limited by the central
node’s configurations and technical specifications, making star topologies expensive to set up
and operate.

7.3.2. Bus topology


- A bus topology orients all the devices on a network along a single cable running in a single
direction from one end of the network to the other—which is why it’s sometimes called a
“line topology” or “backbone topology.” Data flow on the network also follows the route of
the cable, moving in one direction.
- Advantages of bus topology:
+ Bus topologies are a good, cost-effective choice for smaller networks because the layout is
simple, allowing all devices to be connected via a single coaxial or RJ45 cable. If needed,
more nodes can be easily added to the network by joining additional cables.
- Disadvantages of bus topology:
+ However, because bus topologies use a single cable to transmit data, they’re somewhat
vulnerable. If the cable experiences a failure, the whole network goes down, which can be
time-consuming and expensive to restore, which can be less of an issue with smaller
networks.
+ Bus topologies are best suited for small networks because there’s only so much bandwidth,
and every additional node will slow transmission speeds.
+ Furthermore, data is “half-duplex,” which means it can’t be sent in two opposite directions
at the same time, so this layout is not the ideal choice for networks with huge amounts of
traffic.
7.3.3. Ring topology
- Ring topology is where nodes are arranged in a circle (or ring). The data can travel through
the ring network in either one direction or both directions, with each device having exactly
two neighbors.
- Advantages of ring topology:
+ Since each device is only connected to the ones on either side when data is transmitted, the
packets also travel along the circle, moving through each of the intermediate nodes until they
arrive at their destination. If a large network is arranged in a ring topology, repeaters can be
used to ensure packets arrive correctly and without data loss.
+ Only one station on the network is permitted to send data at a time, which greatly reduces
the risk of packet collisions, making ring topologies efficient at transmitting data without
errors.
+ By and large, ring topologies are cost-effective and inexpensive to install, and the intricate
point-to-point connectivity of the nodes makes it relatively easy to identify issues or
misconfigurations on the network.
- Disadvantages of ring topology:
+ Even though it’s popular, a ring topology is still vulnerable to failure without proper
network management. Since the flow of data transmission moves unidirectionally between
nodes along each ring, if one node goes down, it can take the entire network with it. That’s
why each of the nodes must be monitored and kept in good health. Nevertheless, even if
you’re vigilant and attentive to node performance, your network can still be taken down by a
transmission line failure.
+ The question of scalability should also be taken into consideration. In a ring topology, all
the devices on the network share bandwidth, so the addition of more devices can contribute to
overall communication delays. Network administrators need to be mindful of the devices
added to the topology to avoid overburdening the network’s resources and capacity.
+ Additionally, the entire network must be taken offline to reconfigure, add, or remove nodes.
And while that’s not the end of the world, scheduling downtime for the network can be
inconvenient and costly.

7.3.4. Dual-ring topology


- A network with ring topology is half-duplex, meaning data can only move in one direction
at a time. Ring topologies can be made full-duplex by adding a second connection between
network nodes, creating a dual ring topology.
- Advantages of dual-ring topology:
+ The primary advantage of dual ring topology is its efficiency: because each node has two
connections on either side, information can be sent both clockwise and counterclockwise
along the network. The secondary ring included in a dual-ring topology setup can act as a
redundant layer and backup, which helps solve many of the disadvantages of traditional ring
topology. Dual ring topologies offer a little extra security, too: if one ring fails within a node,
the other ring is still able to send data.
7.3.5. Tree topology
- The tree topology structure gets its name from how the central node functions as a sort of
trunk for the network, with nodes extending outward in a branch-like fashion. However,
where each node in a star topology is directly connected to the central hub, a tree topology
has a parent-child hierarchy to how the nodes are connected. Those connected to the central
hub are connected linearly to other nodes, so two connected nodes only share one mutual
connection. Because the tree topology structure is both extremely flexible and scalable, it’s
often used for wide-area networks to support many spread-out devices.
- Advantages of tree topology:
+ Combining elements of the star and bus topologies allows for the easy addition of nodes
and network expansion. Troubleshooting errors on the network is also a straightforward
process, as each of the branches can be individually assessed for performance issues.
- Disadvantages of tree topology:
+ As with the star topology, the entire network depends on the health of the root node in a
tree topology structure. Should the central hub fail, the various node branches will become
disconnected, though connectivity within—but not between—branch systems will remain.
+ Because of the hierarchical complexity and linear structure of the network layout, adding
more nodes to a tree topology can quickly make proper management an unwieldy, not to
mention costly, experience. Tree topologies are expensive because of the sheer amount of
cabling required to connect each device to the next within the hierarchical layout.

7.3.6. Mesh topology:


- A mesh topology is an intricate and elaborate structure of point-to-point connections where
the nodes are interconnected. Mesh networks can be full or partial mesh. Partial mesh
topologies are mostly interconnected, with a few nodes with only two or three connections,
while full-mesh topologies are—surprise!—fully interconnected.
- Advantages of mesh topology:
+ Mesh topologies are reliable and stable, and the complex degree of interconnectivity
between nodes makes the network resistant to failure. For instance, no single device going
down can bring the network offline.
- Disadvantages of mesh topology:
+ Mesh topologies are incredibly labor-intensive. Each interconnection between nodes
requires a cable and configuration once deployed, so it can also be time-consuming to set up.
As with other topology structures, the cost of cabling adds up fast, and to say mesh networks
require a lot of cabling is an understatement.

7.3.7. Hybrid topology


- Hybrid topologies combine two or more different topology structures—the tree topology is
a good example, integrating the bus and star layouts. Hybrid structures are most commonly
found in larger companies where individual departments have personalized network
topologies adapted to suit their needs and network usage.
- Advantages of hybrid topology:
+ The main advantage of hybrid structures is the degree of flexibility they provide, as there
are a few limitations on the network structure itself that a hybrid setup can’t accommodate.
- Disadvantages of hybrid topology:
+ each type of network topology comes with its disadvantages, and as a network grows in
complexity, so too does the experience and know-how required on the part of the admins to
keep everything functioning optimally. There’s also the monetary cost to consider when
creating a hybrid network topology.

7.3.8. Which Topology Is Best for Your Network?


- No network topology is perfect, or even inherently better than the others, so determining the
right structure for your business will depend on the needs and size of your network. Here are
the key elements to consider:
+ Length of cable needed
+ Cable type
+ Cost
+ Scalability
8. 802.3, 802.11, STANDARDS
8.1. 802.11 IEEE wireless LAN standards
- 802.11 and 802.11x refer to a special set of information created by the IEEE for the
development of remote local area networks (WLANs). 802.11 arbitrates over the air interface
3 between a remote client and a base station or between two remote clients. IEEE became
aware of the details in 1997.

8.2. Gigabit Ethernet – 10GbE (IEEE 802.3ae)


- 802.3ae is the IEEE name for its 10 Gigabit Ethernet standard (also called 10GE, 10GbE, or
10 Gb Ethernet). The 802.3ae standard is a supplement to the 802.3 standard that defines
Ethernet. The 10 Gigabit Ethernet version of Ethernet operates in full-duplex mode only and
supports data transfer rates of 10 gigabits per second for distances up to 300 meters on
multimode fiber optic cables and up to 40 kilometers on single-mode fiber optic cables.

9. BANDWIDTH
- A definition of bandwidth is the fastest rate at which internet information may be
transmitted in a second. Broadband terminology like USB copy speed and fiber optic speed
are occasionally used.
-Bandwidth types:
+ Committed bandwidth: This is the kind of bandwidth that the internet service provider
promises to maintain at a specific connection speed. The bandwidth will never fall below that
threshold at any moment. Typically, network providers may provide packages with capped
bandwidth, such as 128 Mbps, 256 Mbps, etc. For people, households, or small organizations,
this kind of bandwidth is extremely acceptable.
+ Shared bandwidth: This type of bandwidth enables numerous servers to share a single
bandwidth allotment. The internet data transmission speed will be poor if there are numerous
servers (phone, tablet, laptop, or desktop) accessing the network since one bandwidth must be
divided into several. In contrast, the connection speed will increase as fewer devices contact
the network. MonaMedia, a hosting company, claims that when fewer devices are accessing
but they are all still inside the package's bandwidth restriction, the connection speed will be
faster. It is seen to be quite appropriate for commercial establishments, enterprises, and
corporations. It's like you and everyone else walking down the street, to put it simply. On a
crowded day, you must travel more slowly; on the other hand, when there are fewer vehicles,
you can move more quickly while staying under the posted speed limit.
+ Dedicated bandwidth: Private bandwidth, as the name suggests, is set aside for only one
user. You are the only subscriber authorized to use this kind of bandwidth. Private bandwidth
enables you to access the internet at a constant pace without experiencing lag during "peak"
times (when many people often use the same internet). This kind of bandwidth is seen to be
appropriate for companies that rely on online networks (e-commerce, online games, online
chat, etc.) to be able to transmit data steadily, avoiding issues like transmission lines.
unreliable, and annoying to consumers Bandwidth is particularly crucial for businesses that
specialize in design, software, or Vietnamese independent web designers. High transmission
speed will make the work easier and more convenient.
ACTIVITY 2
1. Prepare a written plan of how you will design the Local Area Network including your
LAN blueprint. 
- Building A: 30 PCs, 2 Servers, and 02 printers. (Admin: 5 PCs, HR: 5 PCs, SALE: 20 PCs)
- Building B: 10 PCs, 2 printers.
- LAN blueprint:
2. Demonstrate the security and quality of service requirements
- Cisco 2911 router.
+ The system I built uses a Cisco 2911 switch to communicate between two intelligent
systems. Each switch has its wattage button that can be toggled on and off. Modules can be
combined or removed only when the force button is off. The Cisco 2911 is an Integrated
Services Router (ISR) with two Fast Ethernet ports, two Fast WAN Interface Card (HWIC)
slots, and one Advanced Integration Module (AIM) slot. The Cisco 2911 Switch is a perfect
replacement for Enclave Films Co due to its superior features and superior quality.
+ The Cisco 2911 Switch includes a firewall that blocks excessive internet traffic and
prevents further attacks. It also includes a VPN (Virtual Private Network). Being marked as a
switch, it offers great security and you can protect your system with a good password. Cisco
2960 Switch Switches allow various utilities in the system to communicate. The switch used
by the system is a workgroup switch. Ethernet switch for PC communication. It can also look
up MAC addresses to ensure confidentiality between two utilities when sharing profiles. This
switch was chosen because it is stackable and has a short uptime. These switches are fixed.
These switches are useful for medium-sized organizations. With that in mind, we chose
Enclave Films Co.
- Cisco 2960 Switch:
+ The device has 24 Gigabit Ethernet ports and 4 plugs with a mini pairing feature.
+ Line rate 10/100/1000 on the port.
+ 1 gigabit Ethernet uplink module slot. Configure rj45 and 1G USB USB console
+ Fixed memory: CPU ARMv7 800 MHz, DRAM 512 MB
+ 256 MB fast memory
- PCs (HP EliteOne 800)
+ This PC is especially intended for business purposes. Multi-center has been planned in a
manner by which it improves certain products to work. It guarantees that the records are
ensured since it has multi-faceted security. It is likewise known for its sturdiness. These are a
portion of the reasons why I picked the HP EliteOne 800.
+ A decent enemy of Virus programming could be introduced to forestall framework crashes
and records from getting defiled. You may likewise give a solid secret key to shield the PC
from unapproved clients from getting to the significant records in the PC.s
- Printers (HP LaserJet Pro Multi-Function)
+ As the name recommends, these printers are known for their multi-working capacities, for
example, printing, duplicating, and filtering; the sky is the limit from there. It can print
around 3500 pages each month for up to 10 individuals. It has Ethernet and remote systems
administration alternatives which appear to be ideal for Enclave Films as there are printers
utilized in the systems(Building A and B). This printer can print 42 pages each moment and
the expense excessively appears to be entirely sensible.
- Servers (Applications Server)
+ It is also known as AppServer. A program that controls all application activity between
users and an enterprise organization's back-end applications or databases. Typical application
services are typically used for basic transaction federation applications. To support high
demand, an application service must have internal redundancy, high-visibility control, high-
level representation, distribution of application services, and a basic access link support
database.

3. Design a networked system to meet a certain specification


4. Provide an IP address allocation table for the network. (Separate IP reasonably)
Device Port Ip Address Subnet Mark Default Gateway
R3 Se0/0/0 10.0.1.1/24 255.255.255.0 N/A
G0/1 <not set> <not set> N/A
G0/0.20 192.168.20.1/24 255.255.255.0 N/A
G0/0.30 192.168.30.1/24 255.255.255.0 N/A
G0/0.40 192.168.40.1/24 255.255.255.0 N/A
G0/0.50 192.168.50.1/24 255.255.255.0 N/A
R4 Se0/0/0 10.0.1.2/24 255.255.255.0 N/A

5. Install and configure your network services and applications (Web, DNS, mail, ...)
5.1. DHCP
5.2 DNS and Web
5.3. Email
5.3 Telnet
5.4 SSH

6. Conduct design testing and evaluation to meet requirements and analyze user feedback.
7. Recommend maintenance schedule to support networked system.
- Whether a network system is large or small, if it is not maintained regularly, it is also very
easy to encounter problems during operation. Therefore, as soon as you use the network
system, you need to prepare and plan as well as the impact factors during operation to offer
the most optimal maintenance plan.
- Things to note when maintaining the network system:
+ Backing up the system before maintenance: For every business, backing up the system's
documents is relatively important because it is not possible to guarantee that during the
maintenance process will not occur problems such as loss of data. data, configuration loss,
etc.
+ Need to find a network maintenance expert: Arbitrarily dismantling, repairing, or shutting
down a part of the equipment will seriously affect the entire network. Therefore, when you do
not have too much knowledge in the field of network maintenance, it is advisable to hire
maintenance professionals to repair instead of dismantling it yourself.
+ Check system information before performing maintenance to avoid data loss or mess after
repair.
+ After the maintenance is completed, the system should be tested one last time to determine
if the system is no longer faulty and whether the system is operating stably and normally.

- Benefits of network maintenance:


+ Increase work efficiency: When using a network system, planning maintenance is
extremely useful to ensure that the system's documents and equipment will be checked
regularly, detected quickly, and handled. timely handling.
+ Save time and costs: Regular system maintenance will save you a lot of time and money
because you have to repair the system when there is a problem, maintenance will limit the
possibility of failure. A malfunction during operation.
+ Optimization: the network is always guaranteed to be maintained, which will easily connect
and optimize documents together, helping you to access and find information quickly.
+ Ensure network security: Systems are often vulnerable to viruses and intruders when
connecting to the internet. Therefore, the regular monitoring and maintenance of the system
will help you detect the agents that harm the security holes early and take the most
appropriate and effective remedial measures.

- Items that need regular maintenance:


+ Server Maintenance
 Check network security configurations
 Install, test, and optimize anti-virus, anti-virus, and other software configurations
 Control access and network, server
 Store important documents in storage devices before performing maintenance
 Ensure browsers, and applications can operate stably
 Back up the server configuration to make sure the server is working properly and with
the specified parameters
 Specify records, maintenance time
+ Workstation maintenance
 Check the configuration, and anti-virus software of the workstation when connecting
to the server
 Backup and store important documents to devices to avoid loss or confusion during
maintenance
 Optimize software, applications, and system junk cleaning
 Make sure applications are running properly
+ Network maintenance
 Configure the network for the machines to access the system
 Check network cabling
 Schematic layout of servers and connected machines by technical standards
 Check and test the cable network system to confirm whether the connection speed is
right for the requirements
=> Maintenance schedule: it is recommended to maintain according to a fixed schedule, for
example, once every 3-6 months to achieve the best effect of the product as well as get the
best experience when users use the product.

ACTIVITY 03
1. Implement a networked system based on your prepared design.
- Name the VLANs and configure them

- Connect switches to switches, switches to routers, and PCs to switches in building A


- Connection between 2 buildings A and B:
2. Conduct verification with example Ping, extended ping, traceroute, telnet, SSH, etc.
- Ping 2 PCs in the same VLAN ( 192.168.20.2 and 192.168.20.3):
- Ping 2 PCs in the same building (192.168.20.2 and 192.168.30.3):

- Ping 2 PCs in the same building ( 192.168.40.2 and 192.168.20.2):


- Ping 2 Pcs in different buildings ( 192.168.20.2 and 192.168.60.3):
- Ping telnet:
- SSH:
3. Record test results and analyze these against expected results.
- Expected results that the system brings back are clear, easy to use and manage, and can
easily update. Besides that the connection has been guaranteed, and sending and receiving the
information are very quick. And services on the system have been configured for
management easier.

4. Investigate what functions will allow the system to support device growth and the
addition of communication devices.
- Based on user feedback, the function that the system will need
+ is a firewall to protect software and all the data.
+ Install security software
+ Upgrade anti-virus
+ Upgrade ram, hard drive
+ Using phishing to...

You might also like