Networking Final Assaignment HND
Networking Final Assaignment HND
Networking simple mean 2 or more computers , servers connected to each other or multiple computers
connected to each other working as a sender and reciver simultaneous is referd to as a
network .Networking is used to communicate and share resources between devices
Networking referred to the practice of computers transporting data between nodes in a common
medium in a information system which they work with is considered to be Networking also know as
Computer networking
Importance of networking
The rise networking engineers demand continue to increase around the globe
Networking is important by considering some of thee key reason networking helps us to build strong
and lasting long connection between different computers and servers. Newtworlimh also increase and
help the overall business to grow stronger by creating strong support backbone network.
Components of networking
Computer networking uses different types of physical hardware infrsstructure which is primarily
designated for networking use these hardware include swtches , Routers and wirelss access points
Networking also rely heavily on Protocoles to perform different fucntions within networking guildlines
Some of the protocols include (VOLP) Which is a protocole that can be used transfer and send ip
telephonic traffic to targeted enpoint that supports the prortocole
Advantages of Networking
Computer networking can be efficient and highly benfitius in sharing information and different types of
resources with the business and to grow the business these networking can be utilized.
Networking helps in expanding the storage arsenal of the company or the business by providing the
abilty to stre data such image , music and toher files remotely stored on other computers and can be
accessed .
Pros Of Networking
All the files and data can be stored on a central server and can be access through different nodes
connected to that central server where the files ahs bee stored
Computer networking makes it for every uses to easily connec to the network and explore the data
Computer networking is reliable which makes it a safer for the data which is stored in the server
Now we will be looking into some of the cons involved in computer networking
Security is still an issue shoul be looked into frequenlt virus and malware if it infecs even 1 node which is
connected to the main server it can spred to other nodes as well
Cos t is also a issue and a con of computer networking it can be quit expensive depending what type of
network you are trying to design
Current Trend in networking
Technology platforms are quickly taking the lead in setting you apart from the industry.
Cisco target cloud computing and to increase the effect use cloud computing and application experience
to the general public by 50% increase app compatibility and extened support service in next 2 years
With the rsie of netowkr trend especially at 2022 the rise of 5g netowrks has increased in 5g networks
are well know as the succser to the 4g network and also by providing interent speeds ranging from
500mps to 1 gbps respectively depends on the location where you are using this network
5g network helps and boosts the organizations workforces by supporting new application
implementation with increased network capacity and high data rates etc.
5g networks also has the nefit of using th open roaming feature which basically works removing wifi
login process and automatically connecting to identified network providd by the ISP themelf
Augmented reality and virtyual reality is the next future and a glimse of what the future of
entertainment will look like Metaverse is a recenltyintroduce trend and technology which is a complete
virtual reality environement whih was created by mEta formly known as Facebook which is a virtual
reality environemt which can be expericane using the oculus quest 2 and quest1 .
ARPANET is one of the earlies known computer networks which was inveneted and introduced by
leanard kleinrock in 1961 . The network was a network for the telephone and that early satge the
telephone network was considers as the most complicated network . It works by sending data form the
sender to the receivers using the techolgy known as circuit switching
Later as time went by learnard kleinrock introcdes the first work of a packet switcher . Leanard kleinrch
iluustarted and explained the importance of packet swithing and effeicny of packet switching
https://networkinterview.com/top-10-networking-technology-trends/
In 1969 was important pahse in the evolution of networking as it impacted the modern network like the
internet The first true packed switched computer network was introduced which was known as the
ARPANET. The network was the ver first network to implement and work with TCP/IP protocole which
later evolved to be the modern internet that we are using in the present world
A person called Roy Tomiloson serveral years later at 1971 inveneted the email
At 1973 official volp protocol was introduced voive over internet protocole allowed uses to send voice
over the internet using email . . this protocole later was used in a software which was developed in 1995
which allowed uses to make a call using the internet
Routers were firstly introduced in and showcased at xero in 1974 . But these routers did not have real
working IP . The Gateway equipment and the Interface Message Processor utilized in the ARPANET
enabled significant advancement in computer networking. Throughout the 1980s, a professor at
Stanford University named Bill Yeager created the multi - protocol router.
Leonard Bosack and Sandy Lerner, two Stanford IT employees, saw the commercial potential of this
router invention. Yeager's router was upgraded by Leonard and Sandy, and as a result, Cisco Systems
was founded in 1984.
The Ethernet cable and Ethernet port first prortype wwas inveneted by Robert metcafe and david boggs
in 1973
Later in 1973 after many rIn 1973, further investigation led Xerox to patent Ethernet in 1975. The IEEE
formed a standards committee in 1979 only with intention of promoting technology acceptance. The
idea of a virtual LAN, or VLAN, was created mostly in late 1980s and early 1990s to solve the issue of
increasing traffic on LANs with a sizable amount of connected devices. To regulate VLANs and multi-
VLAN trunking over network uplinks, the IEEE 802.1Q standard was developed.
1974 Telenet was considerd as the first ever commercial ARPANET implementation of networking. The
isp that we use to browse the internet or connect to the internet was firstly introduced in this phase .
https://www.scaler.com/topics/computer-network/history-of-computer-network/
Importance of introducing Networking to Academic Institutions
As we all know the prevailing situation in the country and how covid 19 completely changed the
educational sector of srilanka creating new exepraince for everyone including the students due to the
lockdown curfew beaccuse of the covid 19 pndemic schools and colleges ahd to shift their approach to
teach using the online this is when online larning became a thing and spreaed all over the world
Schools started using Online video confering software like zoom , MS Teams etc these type o sepcializd
software mainly depend on networking technology to work for example when we take a look at zoom it
uses zoom lint is main goal is to establish a proprer stable working connection for exhangng of media
such as video and audio and other form content which is shared and echanchanged using these . So
zoom actually uses its own networking protocol which is connected via UDP on port 8801
Alos or storage many students started using google drive which is a cloud based storage solution which
can be used to store data in the cloud and acces that data where evry you are using any device using the
power of the internet
Cloud is a trend in netowrking and and it working in networking structure where the cloud service
providers organizational network resource is hosted in a public or private in what evr the cloud platform
they come up with
https://www.vmware.com/topics/glossary/content/cloud-networking.html#:~:text=Cloud
%20networking%20is%20a%20type,provider%2C%20and%20available%20on%20demand.
As covid 19 storms the worl and turns everything upsidedown the workforce and IT companies has to
come up with networking solution to adopt to new type of working where al the employees can start
working from home So the company first will come up with Netowrking system where the employees
can login and work from their home and also for every employee the company should provide their
private cloud storage so they can store all ther work related files and access them whn its needed
https://enterprisersproject.com/article/2020/6/how-network-during-covid-pandemic
By
Todd Pittman
une 20, 2020 |
Importance of Networking Systems
peer to peer network which was invented by jeff Madar and designed by Shinichi Ogasawara is a type
of netowking structure which unlike the standard way of uplodng resources to designated server and
downloadin from that satnalone server peer to peer network orks by many computer connectd each
other acts ans the sender and the receiver the computer devices woks as the servers and the reciver. A
Computer can share and resources to B computer so technically the A computer will wrk as a server and
B computer which ned th rsouce to be download will work as the receriver this is how Peer to peer
network works
Files and other types of data resources can be easily shared using the peer to peer network and the siles
also can be access anytime using the power of the internet
One of the best benefit and advanatge of using peer to peer network is that you don’t have to buy or
invest on a dedicated server to host your fies so that other users can download that file using peer to
peer netowrk u don’t need to have a server to work.
Peer to peer netowkr is also prety reliablle comparet o the the to standard aproch of having a dedicated
server sometimes in this standard way of distributing data resouces the dediactd servr might
mulfuvntion and have issues but when we compare it to the peer to peer network it is more relaiable
that a dedicated server
Peer to peer network also offer hgh perforrmne . The best thing about thing about peer to peer netowrk
is that the moe the client oins the better it gets .
Setting up a dediated server and maintaingjg and managing the server will is a duanting task and takes a
lot of time with pateints and also most importanlt it will get quiet costly and expensive process but per
to peer network solution is much cheper or sometimes complelty frree and easy to seup .
Virus and malware is a big concern when setting up peer to peer netowk . When a proper peer to peer
etowk has been set it should be a top prioity of the users to ensure that they prevent and monitor again
any virus and malaware threths which can be infectd to all the users if one user accidenly get it
Peer to peer netowkrs lacks the secuity that the standar dedicated servr pocess
A another disadvantage of using a peer to peer network is that the data is not organized in a particular
location instead when the user has to download lets say a data from a peer he has to search for the file
in the peers computer cuz th fill he is looking for is stored in the pper s computer and if the pper didn’t
impplement logical filing system it will be hard to locate the exact location of the fil which is stored
By using the peer to peer netowrk you are publicly exposing your devices ip address to the internet so
you should be vgilant and concius about this happening and to prevent this to make sure to use a vpn
service to ncrypt your connection thougyh different tunnel
https://www.cyberagentsinc.com/2018/09/14/peer-to-peer-networks/
cyberagentsDigital Forensics
Now lest look at the th standard procedure the classic way of distributing data resources in the internet
to lients by using a dedicated server as the base which contain all the resources hoster by the
organixzation the cline t can request the main server to acces and download thee file the client want tto
download the clients ar basiccally the users . An architecture in which the user's PC (the client) serves as
the seeking computer and the server serves as the supplying machine, both of which are connected via a
LAN or WAN, such as the Internet.
The primary distinction between peer-to-peer and client servers is that the former is the standard
system we employ and makes use of a dedicated server to share the resources made available to us for
official download by the publishers, whereas peer-to-peer doesn't.
Centaralization is key to be one of the best benfit of using a client server netowkr clint sever centralizes
all the data stored in a single ddicated server whee you can access thsat data downlaod the resource
that you wanna downlad and it makes things much eaire. It
Client server module implements a acces contol system where it makes only authorized sers to access
the main servr and it improves data security and safegurds it with guildlines
Client server can also be easily managed this is because the clint and the server doenst necessarly have
to be in close contcat to access the data effectivley which makes it musch easire to handl files which s
stored in the main server
Disadvantages of a Client-Server Network?
Due to its centralization, it also has a single point of failure, wherein if a system is hacked, the entire
network would be impacted, posing issues for the network's clients. The cost of an organization will
increase since an administrator will be needed to keep the server running. The need for server software
would only make it more difficult to determine whichever software is appropriate for the server and
may even raise costs.
https://www.serverwatch.com/guides/client-server-model/
BYSAM INGALLS
Networking
15
When multiple users attempt to reach a server simultaneously, network congestion results, that simply
slows down the network while attempting to connect to the server.
Figure 1.3s
http://panitiaictsmktp.blogspot.com/2012/04/basic-concepts-of-computer-networks_13.html
Wi-Fi is a type of wireless networking technology which was developed to connect devices to the
internete wirelessly without using a cable etc
As we all in thoday era buinses to run in succful way it is highly dependand in the power of the internet
for many startgies which the business works on to gorwo the organizatons. By having an wifi netowkr for
the busines inside the organizationsl work space the busiiness can increse the productivity within the
empoyees working in the business etc.
A wifi connecton is amandtry need for succful conitiuation of the business in the future it . By having a
wif in th office it helps in team and incresed collabration of the employees in the business. Usin th power
of the internet the employees can be located in any location within the office pemises and wheere ever
the employees are they can eaily access the data using th ewifi interent connection and cloud stoarge
where they stred thr fil which they trying to acesss. Uisn g a wifi network on the company gives access
to the internet usng the power of the internet the business can imrpov its marketing via the interent to
target audience and traffic towards the busness to grow the revenu of the busness.
Wi-Fi Standards
Wifi which braoded as wiffreless fidelity and wfihas com p with working organization which is kown as
the institue of lectrical and eletroncs engneers
1 , Speed : The speed is aimportant aspect in assuring th standarda and how good th wifi network is the
speed of the internt coonection is typically measured as mbps , kbps and gbps
2. Frequency of the wifi networki is deined in 2.4ghz and 5ghz frequncy . This is frequency of the radio
wave tht caries th einternet wireleslly using the wifi router
IEEE 802.11
the speed were ranging upto around 2MBPS (2 MEGABITS PER SECOND
802.11a was used in a commercia purpose and also in industrial purposes also it was used
IEEE 802.Lb
The difference bettwen this standard the IEEE 802.llb to IEEE 802.11a is that this stanard only uses
2.4ghhz frequence
IEEE 802.11g
This standard is mix between and has some of th propertis and fucntionality of the 802.lla and 802.llb
IEEE 802.11N
802.lln Has th version one version can handle 2.4ghz frequency and the other can handle 5gh and both
of the frequency
IEEE 802.11ac
This standard is the most uptodat recently introsuced wifi standard which comes in stocked in lsome of
the flagship and lastes devices
This standard is capables of handling both the frequency it can transition form 2.4ghz to 5ghz radio wave
transmition
The speed can range upto a whoping 10GBPS thats roughly around 40% increse from the prevoius
standard
Comparison
https://www.geeksforgeeks.org/wi-fi-standards-explained/
W will be lloking into some of th adavanatges and disadvanates of using wireless netowrking such as
using WIFI network
By Uising a wifi network it improves data communciation it makes data communication much fster by
using a Wfif netwok This will definelty bebefit the organization or the business to to transfer important
information and data between partnesr and employees. For example sales peaople can emotly chck the
stock levels how its functioning while on sales call etc.
Wifi is also provides cessibilty where ever you are this makes wirele networking network such as wifii
highly available
Wireles network such as wifi is not that expensive in fac its actually easire and cheaper t install
Wireless employees who operate in offices can connect without using specialized pcs and keep working
when they're still away from the office. New working practices, like working from home or having direct
access to corporate data while on client sites, may result from this. Find out more about those who work
from home.
Disadvantages of Wi-Fi
Nothing is perfect ther ill always a good side and a bad side when we llook at some of the
disadvanatages of using a WIFI Network e can see that the security is a Con Wireless networks may need
to use a variety of encryption algorithms, a few of which are prevalent and likely to have vulnerabilities
that could be hacked if a person is serious enough. This presents a security issue. Whereas the typical
802.11g network range with ordinary equipment is roughly 10 meters, large enterprises may need
higher ranges and must acquire repeaters or more access points to achieve them, that could increase
costs. The network administrator has little control over the complex propagation effects and significant
disruption that wireless networking signals can have.
Transimition media
Transmition media is atype of comnnucating protocol used to tranmit data from a sender toa receiver
the data is typically trmited through electromagnetic signals .
A good example of a transmition media is LAN which can be used to tramit data in form of bits LAN
(LOCLA AREA NETWORK)
Guided media
It is described as the actual conduit for the transmission of signals. It also goes by the name Bounded
media.
Twisted media types is a physicial media type which is simply made out of different cables twisted each
other . A twsisted cable when we compare it to some of the other guided media cables its cheap . A
twisted cable basically has a insulatd copere wires in spiral shape
Unsheiled twisted pair cable is the mostly used twisted cables which is ypically can be found in
telecommunication
Category 1 is the msot coomon cable used in telephone lines these tpes of cables generally have a low
speed ratio
Category 2 : The cateogory 2 of unsheild twaisted cables can reach speed reaching ypto around 4MBPS
Category 4: s It can
This cable also be isstalled to work well with high speed LAN connection
Disadvantages
Sheiled Twisted pair cables
The difference between a Unsheiled twiste pair cable and a Sheiled twisted par cable has a mesh
surrounding thee wire which maks this cable transmit higher rate of data.
Tthe cost of intsalling a sheiled twsisted pair cables is average meaning its not expensind or cheap its in
the middle
The installation of the cables are pretty easy and straight forward
This cables wheen we compae to the unsheiled twisted pair cables these cables are high capacity and
high quality
Sheeiled twistd pair cables are expensive compared to purchasing a UTP and Coaxial cable.
Coaxial Cable
Coaxiale cabel is coomon type of transmition media used most tlevision use a coaxialee cable for the
antenna etc. Coxaiale cable has 2 conductors which ar parell to each other this is why its known as the
coaxial cable
Coaxiale cables also transmits and have a high frequncy compared to the twisted pair cable
Coxiale cables are more expensive compared to the twisted pair cables
sOne of th biggst concern of disaproval of this cable is that if any issue o faults occur to the cbale the
entire netowks breaks down by using this cable
Fibre Optic
Fibre optic cables are a recently introduced super fast tranfer rate data cable which uses eletrical signal
for communication of data . It has optical fibres which are coated plastic that can be used to send data
by plses of lights speed this is whys its considerd to e one of the fasted guided media cables for dtat
transmition
Undirected Media
It is also known as wireless transmission when electromagnetic waves are conveyed as a transmission
without the use of a physical media. Air is a sort of media because electromagnetism may travel across it
without difficulty. Because the signals are broadcast in all directions and are utilized primarily for
communication in the telecom domain, the electromagnetic frequencies are transferred as radio waves
in an omnidirectional manner.
Wireless Transmission: This includes electromagnetic waves with a roughly wide frequency range (1-
300GHz). The propagation of electromagnetic waves is typically undetectable because they are
unidirectional. As once transmission medium is facing one and other, the line of sight and
communication between two ends must be reduced in order to make any connection. An antenna at the
destination, also defined as the receiving end, receives the final transmission from the wave that is
produced from above the two sites and is called as the source point. The two types of microwave
emissions are as follows. While using grounded type microwave transmission can communicate over the
air, both the receiving and transmitting sides have fixed antennas for signal transmission. Transmission
of microwaves via satellite
Infared transmition
Infared transmition is mainly cab be senn of its usage in short term ranges its tpe of wireless technolgy
which was developd for communcation . Infared transmition can support upto around 300GHZ to 400TH
Infared transmition can be seen in implemnation of usage for shor range data transmition and
communication . A vey good example of a hardware petty much most of us use which has this
technology of infared and we can see it in action is non other that the tv remote which has infared
transmition. Also infard transmition devices includes ccomputer and cell phon can communcate using
the nfared signal etc. Infared transmition will cupport hgh bandwith due to thisyou can expect high data
rate and speed
An Isp can be contextualized as the Internet service provider which povides the internet connection to
the users . It basically a cmpony and the buisness that they do is to distribut interent connection in
diffeent packages for busness customers who want to acess the internet
Now we will discussing and looing some of th Internet service providing companies in srilanka
andidentifying the bst Isp
Dialog
Dialog Axiata group The Leading Quad-Play Connectivity Provider in Sri Lanka is run by Dialog Axiata
Group, a division of Axiata Group Berhad (Axiata). Throughout its subsidiary companies, Dialog
Broadband Networks (Private) Limited (DBN), Dialog Television (Private) Limited (DTV), Digital Holdings
Lanka (Private) Limited, Dialo, Dialog Axiata PLC, which is listed on the Colombo Stock Exchange,
complements its market-leading position in the mobile telecommunications sector with a strong
footprint and market presence in Sri Lanka's fixed telecommunications, digital pay television, digital
services, financial services, and IT services markets With investments of USD 3 billion, Dialog Axiata
Group is Sri Lanka's largest Foreign Direct Investor (FDI).
https://dlg.dialog.lk/our-business#:~:text=Dialog%20Mobile&text=the%20developed%20world.-,The
%20Company%20delivers%20advanced%20mobile%20telephony%20and%20high%20speed
%20mobile,and%204G%2F4.5G%20networks.
The official provider of information and communications technology (ICT) solutions in Sri Lanka is called
Sri Lanka Telecom (SLT). They are also the nation's top provider of core infrastructure services and
broadband. They have been functioning on fixed, mobile, as well as other operational segments for
around 163 years, assisting the nation with connectivity. Their high speed fiber, copper, and wireless
access networks meet the needs of their reportedly over 9 million clients on the island. In addition to
moving beyond telecommunications services, its transformation into a digital service provider has
allowed them to provide a number of solutions suited to a digital lifestyle. Through international trade,
they play a crucial role in bridging Sri Lanka with the rest of the globe.
https://www.slt.lk/en/about/profile
Lankabell
Lankabll is another telecommiunication company based in srilanka which offers diffeent types of services
which we will be loking they offere services like braodband services using th 4g lte technolofy etc. Lanka
Bell offers a variety of telecommunications services to both businesses and individuals in the country. It
was founded in 1997 as the country's single largest BOI firm, with an investment of more than USD 150
million. Milford Holdings, a privately held business, purchased it in 2005.
https://www.lankabell.com/about_introduction.html#:~:text=Lanka%20Bell%20is%20a%20world,of
%20over%20US%20%24%20150%20Million.
Part 4
Network Topologies
W e will be lloking into some networking topologies used and its functionality. A networking topolog is
considered to be a structure to cnnect terminals in networking their dfferent types of structures that are
used in netwok topologies these topologies are as follows
Bus Topology
Ring topology
Star toplogy
Tree Topology
Mesh Topology
Hybid topology
Bus Toplogy
Startign with th list we will be looking into the bsu topology which is typically used and the most
common type of networking betwenn terminals/computers where it works by unsng a single
communation cable connecting to th terminals
unaid Rehmanr
https://www.itrelease.com/2019/06/what-is-bus-topology-with-example/
Bus topology is easy to set up making it a idal choice for terminals which is powerd by a appropriate
good connecion mechanism which is used .
Bus topolgy is relativels not that expnsive in fact its cheaper than other networking structures
Another relaible adavanatage which can be bnfited by using bus topology is that if in case theeir is a
breakdown or failiure in the netoking structure heother terminals wont get affected only the affected
wll be affected
sMore the devices are being used it will affect the performnace of the network the netowk will slow
downs
Security Is also a concern and a disadavanatge of using bus topolgies for netoworking . Any termnal or
computer which is connected to th backbone cabel of the terminals have acess and can acess the
information form everother terminals connected to the backbone
Mnaintance of bus networking topoogy is expensive Bus topology is easire to set up but expencive and
costly to maintan
by Prasanna
Ring topology
The ring topology is also type networking structure like the bus toplogy network structure in ring
topoogy the structure the modl of networking has been desgned to represent as a cricular neork model.
The ring topology works lets say terminal 1 has to send a data resouce to terminal 6 th data has to go
through th order by going thorught terminal 2,3,,4,5, and then finally to th 6 terminal . If aditional
addministartive previlgaes needs to be aqunted they structure wll have to have extra cable for
implemntaion
Adavanatages of using a Ring topollogy
Star topologies are very relaibles especially for long distance connections etc Ths is possble beacsue in
start topology we can see that the each nodes acts as the network repeater
By using the Ring topology it inceses the fidlity and th quality of communication and the links between
these communicatonal protocoles
Ring topolgy is unique for its adaptabliy of devices not eaffecting the perfomace or slowng down the
netowke ou can add many devices as you want
To setup a ring ttopology you will need some hardware requirements to be fullfilld tto design and
implement a succful ring networking structure and to connect terminals . You ill ned expensive working
proper data cables and netwok cards
Protection In ring topology we no that the data is passed thorugh all th computers to go to the targted
terminal so this meanns all th terminals will have the capability and accesabilty of the resource which
makes it a concern for securty
https://www.aplustopper.com/ring-topology-advantages-and-disadvantages/
Star Topology
In star topology we can see that the nodes in a network are linked via cables to a central device like a
switch or a hub. It is frequently used with LANs. When a HUB is used, data transferred from one device
to the central device is distributed to all systems connected to the HUB, whereas when a switch, data
packets are sent to the central device, which then sends it to the needed PC. The network will not be
broken when a cable or a node fails or is damaged as long as the HUB or switch is undamaged, the file
server or the cable connecting to the file server remains intact, and there are at least two operating
machines.
Comparison Table for Advantages & Disadvantages of Star Topology
Advantages Disadvantages
No point-to-point connections Wires or cables used in the network get damaged easily
Highly reliable Wireless star topology systems have low data transfer rates
https://www.aplustopper.com/star-topology-advantages-and-disadvantages/
Mesh topology
Mesh topology is also another networing structure that we will b lookng into this structure is designed in a way
where computer and the ntwwok adapter and netwok cablees are linked to one another and internconnected to
each other . Mesh topoogy can be gof data relaiblity as inmesha topolgy even if one of the connction did not
esponf o not fucntion poprly the dat will be safely distributed . This is possible du to this topologies
comonality in being used for wirless netowkrs
https://www.computerhope.com/jargon/m/mesh.htm
Advantages Disadvantages
It can manage a high level of traffic when the the cost for implementing Mesh Topology is
setup is complete comparatively higher
Adding new devices does not affect the network the risk of redundant connections
https://www.aplustopper.com/mesh-topology-advantages-and-disadvantages/
Tree topology
In tree topologies the networking structures is desgned and implemntd by combinin both bus topology and start
topology . In the bus topology the cental node is responsibl to connect other nodes where as in star topology
every node is onncted through hubs
Advantages Disadvantages
The cable length of a tree topology is minimal, and hence when expanding
Tree topology does not
the topology, the excess cable is required, which results in increasing
require any cables.
overall expense.
Thge topolgy that we will b implemnting on the acedemy is gong to be start topology because of its
structure where each oksation terminals is diredtely connected to the server sepeartely . This makes
start toplogy one of the if not the most relaible networking struture / topology to implmentin a acdemic
school environement.
Thge topolgy which we will be implemnting or thee netwpking structure of tech based companies will be
the tree topolgy due to its unique structure which is structurred like an actual tree with branches . Tree
topolgies hav root nodes root uses which is connected to another node hierachy . Ths hierachy is the
parent and the child hierachy where they will only be one working connection between tow connected
nodes trminals in the networking structure
Just like prrogrammin for computer software whre we give set up instruction to solve a problerm or to
develop a sfowatware nin networking the protocole are the instructions for newtorking to communicate
with other networkrs porortocle allows this to hapenn ccommunication betwoen different networks is
stablished using dfferetn types of protocols . A protocole can be furthur be elabrated and understadd as
A standalazied langguage used to communicate between different networks . For EXAMPLE LETS TAKE A
REAL TIME SCENARIO WHERE A two peoplee from different pars of the work communicate with each
other using a standalziaded third languagewhich they can undertsand for example a person from china
and a person from srilanka can use english as the this standalazied language which both the peson
understand to communicate o each other prototocles can also be seen as standalized language used for
coommuniacation betwween diffeent networks etc.
The Osi model is a structural model which talks about the different stages that has to go thrrough
process to make the internet to work so basically OSI model is a abstract repesentation and deatil of th
proodure for the internet to work
The PGYSICAL LAYERS IS STARTING LAYER OF the OSI model ots onsiderd to be the lowest layers out of
the other 7 layers which makes the OSI layer . This a phyical layers which tansmits electrical signalas to
the network usng cables and radio frequency to tranmit electrical impluses. Basically physical layer in
the osi layer transmitraw electricl bits over thee physial mediaum of the network.
To send or share resources over the network to communicate between networks thaeir shud be a bridge
or a link to share data data link connected noded tonoded which allwas data transferin. The Data is
transdormed into frames for transmition and also the data link layers corrects and checks for any
mistakes and errors in the physcial layer
The data link layer is divided into two sub-layers. The first one is the media access control (MAC), controls
and multiplexes device transmissions across the network. The next, logical link control (LLC), controls traffic
and errors on the physical network and defines lines protocols.
The next layer the thrird layer is the network layer which is resonsible in reciving the frames which trasnimited
from the data link layer the network layer will receive the data frames from the data link layers and deliver
those frames to the inteded desitination based on the network adresses imprinted in the frame which was
received Uisng logical addreses like the internet protocole the network layer will be able to find the destination
of the frames to be delieverd
The transport layeris the layer which transports the data packets after error xhexking has bee completed. It
regalated compatble sizes to be shared accrding the deafult size of the data apckets that needs to be transpoted.
After all these validiation has been succefully complted the data will be tranfporrted from the system to the
host . A good example for the Transport layer si the TCP protocole which is contextualized as the Trasnmition
control Prototocol
Session Layer
The session layers is the monsitor of the networking process of computed connected . A session is coomnly
referd to as the connection between the devices conncted the session layr will manage the connection between
these devices it contorls the conversation between different devices having a succeful connection and also
manage the connection without getting interupted.
The presentation layer actually converts the readable syntaxt of the data in the ntworking process to the
application layer
Application layer is the final laeyr in the OSI Model This layer is final layers of the networking proces where
the en use the actual user will intereact with the application connected as a fucnionalty in the software
application
This layer provides network services to end-user programs like a web browser or Office 365. The
application layer determines communication partners, resource availability, and communication
synchronization.
TCP Protocol
The TCP prototocole is he trans layer prorotocol which is used for realaible data delivery of the data
packaets for the adddresses locations to be deliverd
This pprotocole s normally used in nt he internet to download resources from the intenet for example if
you want to downla softwares , games etc Typically the File transfer prortocole will be in action . Filke
TRANSFER PROROTOCOLES Allows USER AND BUINESS COMPANIES TO SHARE electronic files with
others without being in the same space where ever you are using file transfer prortocole you can share
resource to the interent an anyone can down load that resource using the File transfer protocole
Most webbrowser lik goolge chrome , Opera and mozilla firefox come installed with a ftp client nstalled
and working to be able to downlaod file right out ogf the box
As previously stated, FTP (File transfer Protocol) was originally created for the purpose of transfering
and receiving files from two physical computers. However, thanks to the technological advancement FTP
(File transfer Pro Now users have the capability to file transfers via the cloud.
Fucntions of a Network Protocol
Connection Establishment/Release
Their are two ways in hich data can be transfers using a protocole fucntionality eitheri its using a connection or
connectionless transfering of th data . One of the fucntionality of a network protocol is to provide with a
connection Oriented service to usue to transfer data
Encapsulation
One of the fucntionality of using a protocol is the functionality and capability of able to identify and analayze
how the data is encapsulated whether the data is in the form of packet or frame
Each PDU packet includes 3 fields for control information in addition to the data field. Address, Error
Control, and Protocol Control are the three control information fields.
when a end use has to send data from the application end to another user the data will have to go from
the application layer to the physical layer from the device of the same user ho wants to send the file .
The data will go through the cable oor wireles transmition to the physical layer and then succefully
tranmited to the application layer of destination. During this proces of tranmiting the data the additional
protocol in work break up data into smaller block and add extra contol information for the peer level
user. The process is know to be the segmentation.
The main fucntionaty of Data Tranfer Mnagement is to stabalaze the networking session between the
sender and receiver if the sender can have atlest a stable connection uplode speed of 10MBPS na d
recerive has a 1 mbps atlest download sped the connection will b stable and data Transfer Mnagaement
Will TAKE CARE OF THIS Sstabalaizing the network session between the sender and the receiver
Multiplexing /Demultiplexing
Muliplexing the mainfunctionality f multiplexing is the abilty to adrress the input and out connection
Addressing:
Addressing is the mechanism that specifies the location of entities when they communicate. Addressing is
typically sophisticated, encompassing addressing level, addressing scope, connection identifiers, and
addressing modes.
Ordered Delivery: - when the device which is connected has a problem attempting to communicate with the
other device and its not directly connected to a network, the machine is implicitly connected in a network
because data packets may not arrive at their destination in the same sequence in which they were sent, and the
reason for this sequence break is that data units traverse different paths.
Error Control
Using the erroc controll fcuntionality the network layer will be able to coorect the blocks in the data
communication. It checks the data integrity to see whether ts reliabl enough for transfer and corrcts the data
both in bit level and packet level in data
Flow Control
Flow control is the fucntionality is to moniro and determin the exact amount of data to be send so that excess
data will not be lost and data ill be saved . One of the mechanicism of this fucntion is that it validates th data
size before actally sending th acual size
TCP/IP Protocol
tcp/ip Protocole ARE THE GUIDLINES AND ULES AND DIFFERENT POTOCOLS WORKING
TOGETHER TO RUN THE INTERNET WITHOUT The TCP/IP protocol suits and the other protocols in this
modelt the internt will not be posssible for operation
TCP/IP is built mostly on client-server communication model, in which a different computer on the network (a
server) offers a service to a user or machine (a client), such as delivering a webpage.
https://www.dummies.com/article/technology/information-technology/networking/general-networking/
network-basics-tcpip-protocol-suite-185407/
08-01-2022
HTTP protocol is us to transfer all th resources which is accessible using the internet http is exclusively being
used in the world wide web to tranfer data resources like images, texts, sound , video etc HTTP is is
application layer based protocol which isimplemented inside the TCP/IP suit of protocols . The TCP/IP
protocol forrms the internet
https://www.techtarget.com/whatis/definition/HTTP-Hypertext-Transfer-Protocol
Types of
Transmition Modes
Simplex
Communication
This tYpe of transmition mode is know as the simplex communcation mode where the data transmitis
from the sender to the receive only in one way where it could tranmit data or only receive data in
simplx ommunciation mode.
Half Duplex Mode
In half duplec mode the transmition of data takes place in the computer networrks as the data
transmits from the sender to the receiver and the receiver to sender. The data transmition process
hapeens once at a a tim like full deplx transmition the data cannot be simulatanously be transmited
from sender to receiver and rceriver to the sender
Full Duplex
mode
In full duplex
moe which is current mode transmition in networking in the modern age where data can be tramited
from sender to receiver and receiver to sender
LO2 Part 2 – Servers
Servers
In networking server is a hardware device which hServers are heavy-duty computers that are at the
heart of the networking environment and do not require any special or unusual hardware; instead, they
work continuously for long periods of time and with enormous workloads to control the network and
also run the network operating system.
File server
The file srver in the server which is responsible in soring the data and file and other resources and it
manages these files in the server .the filee server is the main storagee medium where uerc will have
certain previlages in terms viewing these fil ome files in the filee server can be viewed by every user
andd some other confidential files can only b accessed with users who havcertain rights for acess The
file server is the main cntarl storage .
31 aug 2022
https://www.geeksforgeeks.org/what-is-file-server/
Proxy Server
A proxy server is a aplication which is intalled in the main server where it can be helpful in prrotecting
thee inforrmation and imprtant data from the main server. A proxy servers is like a advancd version of a
antivirisy wih advanced features the meain fucntionality of the proxy server is that it montors nd acts
like the baiire between the computer and the intenet Proxy server will hide our Ip adresse from getting
leaked and beeing pubilc in the internet it encrypts your ip adess
Web server
A web server is a the hardware servr hich stores the componenets to run the website for example a
website should have a web server to host the website so that people can visit the website etc.
A web server connects to the internet and support and perfom operations such as inetcahnge data with
the connected device to the internet
Mail Server
This server is equally vital for sending/receiving and storing emails within the corporate network via
LANs, WANs, and even the internet.
Cloud Servers
Cloud server are the prortocol responsible for the succeful operation of the cloud network technology
The cloud server is hosted and mainly in use in the internet. Cloud server is the backbone cloud
computng , cloud storage, cloud software etc. Cloud s srver is capable of performing funtions simliar to a
physical server like deliveing processing power , storage etc just like a physical server .
Cloud servers are physical server which is hosted in the internet where any one can benift from that
server.
https://www.vmware.com/topics/glossary/content/cloud-server.html#:~:text=A%20cloud%20server
%20is%20a,processing%20power%2C%20storage%20and%20applications.
W are going to design a LAN network for the academic instituition we will need cettain networking
componnets to utiliz to succefuly to implement the netowrking environement
we will be implementing componenet such as a wireless/ wired router for internet connection ,
Nwtwork switches, pc wokstations , a Cnatral server for al the workstation , Netowork hub and a
netowrk interface card
we will place the 50 worktation in a order and connect the workstation to the network swithc so that it
can receive network connection from the router we will connect the network switch with the main
router uing a rj47 cble or also know as the ethernet cable for connecting the switch witht the router
All the terminala workstation also will be linked with the main centralzed srver using
ethernet cable
The workstation which set up for use will be utilizing the router's default gateway, the terminals and
server will be connected to the same network as the router; the only difference between them is the
host, which varies from device to device. The terminals' hosts range from 192.168.20.3 to
192.168.20.13, while the server's IP address is 192.168.20.100.
The default gate way that we will be configuring the route will be 192.168.20.1
The Intenet package will be around 200gb and the average speed of this connection will idel around
100mbps to 500mbps which is more than enough for any tyoe of unternet usage
Cables
We will be needing lots of cables for connection of the router the swtch and the workstation and ensure
a succueful working Locoal area connction . W ew ill be implementing ethernet cables for primary
source of connection including the intenet cnnection will be connected using these ethernet cables also
knon as a rj47 cables
W ewill also need some fibre cables for Fibe connectons etc
NeTWORK Switches
The NETWORK SWITCH WE WILL BE IMPLEMENTING WILL BE suitable for the LAN network that we are
going to set up and it support layers 3 ip addressing for a better and a smarter routing. The switch will
have an integrated firwall foor additional security which is added advanatge to stregthen ou alredy
strong secure connection
The switch which we a implementing is the NT24K-10-to-14 port DIN rail mountable network switches
which features features such as Fast ethernet transmition . Fibre ports which we will be using for intenet
connection for the workstations
https://help.business.bt.com/app/answers/detail/a_id/11093/~/what-are-the-technical-specifications-
of-the-nortel-ethernet-switch-425%3F
Workstation/Terminals
We will be suing 10 th gene I5 powerd omputers with arounf 8gb of ddr4 ram which clocks at arounf
3600mhz thspeed of the am alos for the stoarge we will be utilizing an m.2 ssd for the operating sstem
to run and for storage e will be linking the workstation to out main servr which is aounf 5tb in size
Server
We will be using the server s athe main data sevrer to stores all the data and be usied by the workstation and
als he sserver serves as the main storage for all the workstations connected the server will feature and intel
xeon gold 6238T which offece up 30.25m cpu cache memery and base speed will be around 1.90ghz . It offers
a whooping 22 cores and 44 threads which makes this proces a thread ripper in processing power and
performance all the workstation in the acedemy will be powerd by the server for advanced processing power if
needed . The storage size will be around 10tb for all data to be stored aand connected to our clound stoage
which in totaol the stoage of the server will be around 20tb for data storing and addition system processing
Test Plan
The First test which we will carry out is to see whether the network is unning without any errors . We wil chck
and test the network uptime an diagnose any minor problems which may arise and fix them
we alo be tsting and chekiing for the data packets hether data transmition are taking place as intened to for
elaible data ransmition
Confdentiality is very important fo a netowrk intrms of the overall security levell of the network we will be
testing the firewall in action and all security implnetiation that we have implemented we will test this by trying
to crete security loopholes and see hoe the fire wall responds by blocking us etc.
We also be testing the integrity of the securty of the network and the availabilty
we will also assaign Network administrators who will be incharge in constantly access and monitor every
device connected to the network, keeping an eye out for risks or anomalies, or even limiting users' access to
bandwidth, among other things.
When we will be troubleshooting the network , we'll be attempting to determine the complexity of the problem
and identify and fix issues, as well as documenting and standardizing the network and, to the greatest extent
possible, adhering to best practices.
Budget
the security we ill implement for the etwork will be we will be configuring a sturdy well structured firwall
system also we will be implementing pretty powerful encrytption sysetem encrypting certain files only
for certain users can aceess thos fles using the decrypting key to aacess these data ill mainly be files
reagrding main server etc.
Our main source of security implementation for the network like we alredy discussed will be a working
firwall system which . These netowk security firwalls will hlp the LAN network hat we setup to protect
against cybre threaths by filtering out incoming traffci and prevent malcius files from being downloaded
from the internet and also bloc attakers for senstive system files .
Having a standalon fire wall system and depending on it for totl protection from cyber threaths will not
work there are crtain typs of ayttacka that even a firewall cant block these types of attacks includes
Phishing attacks
Ddos Attacks
Unknow exploits
for these types of threths we will be utilizing a well known powerful antivirsus to ensure that the
network is almost totally protected from cyber threths along side the firewall system that we alredy
have implemented
LO3 Cabling
A straight through cabling involes using a type of ethrnet cable known as the tisted pair cable for
transmition the cabling will be usied to connect the computers and workstation to the Network switch .
On this type of cabling the wiring standard of ethernet cable will be used is t568A or t568B wring
standard
Crossover cabling
A crossover cabling is also anothr type of ethernet cabling type which can be sued connect workstation
directly together using this cable . The main difference which we can see whn we compae crossover
cabling to straight cabling is that the crovr cablinkng uses two different types of wiring standard one nd
of the cable usues the t568A wiring standard and the other end of the cable uses t568B wiring standard.
https://www.cables-solutions.com/difference-between-straight-through-and-crossover-cable.html
LO4
Ip adress
Ip adress s a unique type of address which is usnique o all device coneected to the intenet most
commonly using a wireless connection to connect to the internet . The term ip can be contextualized
and termed as intenet protocol . Basically and ip address can be considerd as the identifire of the device
whch is connected to the address . To surf the intenet we will require a unique ip address to surf the
intenet this ip address will have detalils such as current location of the device etc
There must be a means for computers, routers, and webpages to be distinguished on the internet. A
method for achieving this is provided by IP addresses, which are crucial to the operation of the internet.
What is an Ip address
Ip address contanes numbers separated by periods. A ip address will be expressed as 4 numbers for
example a ip address of 192.158.1.38. we can see that th numbers are formed in the set that ranges
from 0 to 255 . so the full ip addressing ranginging will range from 0.0.0.0 to 255.255.255.255.
Ip addresses are not random numbers assiagned by the isp these numbers a re unique and assaigned to
devices browsing the ntenet mathematically ip addresses are produced and allocated by the internet
assiagned number authority
https://www.kaspersky.com/resource-center/definitions/what-is-an-ip-address
Ipv4
Ip address version 4 is widely used and the most typical form of an IP address, which is consisting of
four numbers that is separated by dots, each of which is made up of an octet of eight bits. which can
produce a value ranging from 0-255. The address, which is 32 bits long in binary form, is even further
divided into two parts known as the network component as well as the host component. All in which
identify a specific host on the network. The subnet mask, which is also a 32-bit long address employed
exclusively with IP addresses to separate between network and host, is used to determine what the
network component and host component of an IP address are. an IP address
IPV6
The recently introduced ip version 6 uses 128bit alphanumeic which identfies the endpoint device in a intenet
potocol version 6 . Ip vesion is the succesoor to the most commonly used ipv4 . Th e prevooius ipv4
architecture had some issues the newly introduced upv6 has beed designed to overcome the issues which was
faced in ipv4
https://www.techtarget.com/iotagenda/definition/IPv6-address#:~:text=An%20IPv6%20address%20is
%20a,IPv6%20was%20designed%20to%20overcome.
Alaxender s. grillis
static Ip
For eah device susch as a computer connected to the intenrt will requre a registerd Internet service provider to
provide a unique permanent ip address this address is known as the static ip address which is provided by the
internet service provider . Compard to dymanic ip address whgich can be modified the static ip address is fixed
ip address and cnnot be changed by the user . This ip address is the same addres that wll be used to browse the
intenet this addres will be utilized by the devvice to acess the internet . Static ip address can be seen mostly
used for Esport gaming etc.. The main reson static ip address is beng used for gaming , streaming website
hosting etc is because of its relaibilty and the spped in which this address performs the connection speed is
very stable and fast transmition rate . These are some of the key benefits of using static ip address. Static ip
addrses are assagned by the Internet service
1 first we will have to clicke setting from the windows tab and give adminstarotor rights
2. then we will chooce theoption called Network and internet in the settings
3. Then
we will
need to
press the
provider to the
computer using
DHCP sever . Dhcp
server is used in
windows to assaign
the static ip address
Advantages
of using
Static Ip address
Staitc ip addresses are not expensive
https://www.techopedia.com/definition/9544/static-internet-protocol-address
Disadvanatages of Uisng Static Ip address
Hackers can more easily attack servers with static IP addresses since they are aware of their precise
position online. It may cost more because ISPs often charge more for them, regardless of whether they
are included in consumer or business ISP plans. If you are not utilizing a VPN, anyone with the
appropriate network tools will be able to determine the physical location of your computer.
Dynamic IP
Dynamic ip address is the complete opposti of static ip address in staitic ip addresses like we discuused
no that the ip address is permannent but in dynamic ip address the address is not permananet and can
be modified . Dynamic ip address are provided by the internet service provider . A dynamic ip address ill
be addigned to a unique node to be connected t the network therfeore the same node may have
different ip address everytime if the connects failes and reconnects with the network.
Using a DHCP client in wndows . Whichcomes with dhcp client alredy peinstalled the user has the
capabilty to the modify and configure the dynamic ip address .
Dynamic ip addres provides better securty compared to stati ip address. This can be achieved by usng a
vpn client which based in dynamic ip address
Dynamic IP address can be slower download speecs when compared to staitc ip address
https://www.avast.com/c-static-vs-dynamic-ip-addresses#topic-4
https://avocado89.medium.com/networking-static-ip-vs-dynamic-ip-56785ee9b1e4
may 5 2020
File shRING
File shaing is the process of sharng digital resources such as documnts files data files and multmedia
etc to other devices using the networking principles is considerd to be file shaing
Their are different ways to share certain files with the other devices fo example
File sharing can also be shared using the internet wrld wide web
Fil also can be shaed using peer tto peer services like torrntz etc
windows and othe compatible opearing systems also povides file sharing compatibility .
Fils sharing most envoled as a computer service feature where we have to use a removable storage
device to using the file sharing prrottocol also known as the ftp protocol
Peer to peer network involves using a peer to peer netowk client software where 2 dvicees can share
files and resources using the power of the internet u don’t need to have a centralized server to share file
between computerd and device ou can utilize peer to peer technology to share recources between
device connected to the peer basically the host computer who is sharing the files will act as the server
hosting the files and user who need to download the fles the host is sharing acts as the receriver and
download the file s
File sharing using the Local area network connected between computers
Step 1 first we need to ensure that th two compters are connected with the Local area network
Stp 02 Then after ensuring that the computers are conncted to each other using the LAN cable next you
will need to enable network sharing on both pcs