0% found this document useful (0 votes)
14 views

Unit-02 Networking Assignment - CRDS - Final

Uploaded by

ChampR De Silva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Unit-02 Networking Assignment - CRDS - Final

Uploaded by

ChampR De Silva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 84

INTERNAL VERIFICATION – ASSIGNMENT BRIEF

Programme Title: HND in Computing

Assessor Name: Ms. Haseena

Internal Verifier Name:

Unit or Component Number and


Unit 02 - Networking
Title:

Assignment title: LAN Design & Implementation for Alliance Health

Assessment criteria targeted by


LO1, LO2, LO3, LO4
this assignment brief:

Is this an Authorised N/A


Assignment Brief published by
Pearson? If so, has it been
amended by the Assessor in any
way? Please give details.
(If using the Authorised
Assignment Brief ‘off the shelf’
with no amendments, please
answer the question marked * in
the checklist only)

Has this assignment been Yes No


submitted to the Assignment
Checking Service? √
(If Yes, please keep a copy of the
ACS feedback with this form)

INTERNAL VERIFIER CHECKLIST Y/N

Are the programme and unit details accurate? Y

*Are clear deadlines for assessment given? TBC

Is the time frame of an appropriate duration? Y


Is there a suitable vocational scenario or context? Y

Are the assessment criteria to be addressed stated accurately? Y

Does each task show which criteria are being addressed? Y

Do the tasks meet the assessment requirements of the unit/s? Y

Is it clear what evidence the learner needs to generate? Y

Is it likely to generate evidence that is valid and sufficient? Y

Overall, is the Assignment fit for purpose? Yes √ No

*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to be
addressed. The Assessor and the Internal Verifier must then confirm that the action has been
undertaken and that the Assignment Brief is authorised for use before being issued to learners.
Action required: Target Date for Date Action
(If none then please state n/a) Completion Completed

General Comments (if appropriate)

Assignment Brief Authorised for Use:

Internal Verifier signature Date

Assessor signature
Date

Lead Internal Verifier signature


Date 2022/06/13
(if appropriate)
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)

INTERNAL VERIFICATION – ASSESSMENT DECISIONS


Programme title BTEC Higher National Diploma in Computing
Ms. Haseena
Assessor Internal
Verifier
Unit 02: Networking
Unit(s)
LAN Design & Implementation for Alliance Health
Assignment title
M S Chamara Rasanjana De Silva
Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST
Do the assessment criteria awarded
match those shown in the assignment Y/N
brief?
Is the Pass/Merit/Distinction grade
awarded justified by the assessor’s Y/N
comments on the student work?
Has the work been assessed Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment Y/N
criteria? Y/N
• Identifying opportunities for
improved performance? Y/N
• Agreeing actions?
Does the assessment decision need Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if
required) Date
Confirm action completed
Remedial action taken
Give details:

Assessor signature Date


Internal
Verifier Date
signature
Programme Leader
signature (if Date
required)

Higher Nationals - Summative Assignment Feedback Form

Student Name/ID M S Chamara Rasanjana De Silva / 00209338

Unit Title Unit 02: Networking

Assignment Number 02 Assessor Ms. Haseena


23 Jan 2024 Date
Submission Date Received 1st
submission
Date Received 2nd
Re-submission Date submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & P1 P2 M1 D1
Distinction Descripts
LO2 Explain networking devices and operations.
Pass, Merit & P3 P4 M2
Distinction Descripts

LO3 Design efficient networked systems.


Pass, Merit & P5 P6 M3 D2
Distinction Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & P7 P8 M4
Distinction Descripts

Grade: Assessor Signature: Date:


Resubmission Feedback:

Grade: Assessor Signature: Date:


Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and
external moderation has taken place and grades decisions have been agreed at the assessment
board.

Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor


Assessor Date
signature
[email protected]
Student Date
signature

General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment.
Use previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No,
and Page Number on each page. This is useful if individual sheets become detached for
any reason.
5. Use word processing application spell check and grammar check function to help editing
your assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the
body except for the before mentioned compulsory information will result in rejection of
your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as
illness, you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL.
You will then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text
citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade
could be reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to
present it as my own without attributing the sources in the correct form. I further understand
what it means to copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be
my own, and where I have made use of another’s work, I will attribute the source in the
correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is
not attached to the assignment.

Student’s Signature: [email protected] Date: 25 Jan 2024


(Provide E-mail ID) (Provide Submission Date)

Higher National Diploma in Computing


Assignment Brief
Student Name /ID Number M S Chamara Rasanjana De Silva / 00209338

Unit Number and Title Unit 2: Networking


Academic Year 2022/23
Unit Tutor
Assignment Title LAN Design & Implementation for Alliance Health
Issue Date 04 Nov 2023
Submission Date 25 Jan 2024
IV Name & Date

Submission format

The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although you
will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

Assignment Brief and Guidance:


Scenario

Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the US
healthcare industry where its global delivery center is located in Colombo. The company is planning to
expand their business operations with their latest branch at Matara and wants it to be one of the state-
of-the-art companies in Matara with the latest facilities.

Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
 Reception area
 Sales & Marketing Department (10 employees)
 Customer Services Area – with Wi-Fi facilities

Floor 2:
 Administration Department (30 Employees)
 HR Department (20 employees)
 Accounting & Finance Department (15 employees)
 Audit Department (5 employees)
 Business Development Department (5 employees)

Floor 3
 Video conferencing room
 IT Department (60 employees)
 The Server Room
The floor plan of the branch in Matara is as follows:
Floor 1:
 Reception area
 Customer Services Area– with Wi-Fi facilities

Floor 2:
 Administration Department (10 Employees)
 HR Department (7 employees)
 Accounting & Finance Department (8 employees)
 IT Department (50 employees)

Following requirements are given by the Management.


 All the departments must be separated with unique subnet.

 The conferencing room of the head office and Customer Services Areas of each
branch are to be equipped with Wi-Fi connections.

 Connectivity between two branches (Head Office and Matara) would allow the
intra branch connectivity between departments. (Use of VPN is not
compulsory)

 The necessary IP address classes and ranges must be decided by the network
designer and should be used for all the departments except the server room.

 Number of servers required for the Server room need to be decided by the
Network designer and should be assigned with 10.254.10.0/24 subnet. (Uses
static IPs)

 Sales and Marketing Team also needs to access Network resources using WIFI
connectivity.

(Note: Clearly state your assumptions. You are allowed to design the network
according to your assumptions, but main requirements should not be violated)
Activity 01
 Discuss the benefits and constraints of different network system types that can
be implemented in the Matara branch and the main IEEE Ethernet standards
that can be used in above LAN and WLAN design.

 Discuss the importance and impact of network topologies and assess the main
network protocol suites that are used in network design using examples.
Recommend suitable network topology and network protocols for above
scenario and evaluate with valid points how the recommended topology
demonstrates the efficient utilization of the networking system of Matara
branch.

Activity 02
 Discuss the operating principles of network devices (Ex: Router, Switch, Etc.)
and server types that can be used for above scenario while exploring different
servers that are available in today’s market with their specifications.
Recommend server/servers for the above scenario and justify your selection
with valid points.

 Discuss the inter-dependence of workstation hardware and networking software


and provide examples for networking software that can be used in above
network design.

Activity 03
 Prepare a written network design plan to meet the above-mentioned user
requirements including a blueprint drawn using a modeling tool (Ex: Microsoft
Visio, EdrawMax) .Test and evaluate the proposed design by analyzing user
feedback with the aim of optimizing your design and improving efficiency.

(Support your answer by providing the VLAN and IP subnetting scheme for the
above scenario and the list of devices, network components and software used to
design the network for above scenario and while justifying your selections.)

 Install and configure Network services, devices and applications (Ex:


VLAN,WiFi, DNS,Proxy, Web, Etc.) according to the proposed design to
accomplish the user requirements and design a detailed Maintenance schedule
for above Network.

*Note: - Screen shots of Configuration scripts should be presented.

Activity 04
 Implement a networked system based on your prepared design with valid
evidences.

 Develop test cases and conduct verification (Ex: Ping, extended ping, trace
route, telnet, SSH, etc.) to test the above Network and analyse the test results
against the expected results. Recommend potential future enhancements for the
networked system with valid justifications and critically reflect on the
implemented network, including the plan, design, configurations, tests and the
decisions made to enhance the system.
Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types and
standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols enable the
effectiveness of networked systems.

LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and server
types.
P4
Discuss the interdependence of workstation hardware and relevant
networking software
M2
Explore a range of server types and justify the selection of a server for
a given scenario, regarding cost and performance optimisation

LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilisation of a networking system.
LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networked system.

M3
Analyse user feedback on your designs with the aim of optimising your
design and improving efficiency.
D2
Critically reflect on the implemented network, including the design and
decisions made to enhance the system.
LO4 : Implement and diagnose networked systems
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked systems.
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
Pearson Higher Nationals in
Computing

Unit 02: Networking


Assignment 01

0|Page
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Contents
1 ACTIVITY 01....................................................................................................................4
1.1 Network Integration in Matara Branch......................................................................4
1.1.1 Computer Networking........................................................................................4
1.2 Features of Computer Network..................................................................................5
1.2.1 Network Types...................................................................................................6
1.2.2 Difference Between LAN, MAN, WAN, WIRELESS & INTERNET............14
1.2.3 Which Network Types are ideal for the Alliance health Matara Branch?........15
1.3 The IEEE Standards.................................................................................................16
1.4 Ethernet Protocol (IEEE Standard 802.3)................................................................16
1.5 Wi-Fi Protocol (IEEE Standard 802.11)..................................................................16
1.6 Wireless Short Networks (IEEE standard 802.15)...................................................17
1.7 NETWORK TOPOLOGIES....................................................................................17
1.8 Implications of Network Architectures, Communication........................................18
1.8.1 The consequences of a network's topology......................................................18
1.8.2 Exchange of Topology Information in a Network...........................................18
1.8.3 Network Topology bandwidth demands..........................................................18
1.9 Evaluating the Most Popular Networking Standards...............................................21
1.10 The Protocols of Network Architecture...................................................................21
1.10.1 The Open Systems Interconnection (OSI) model............................................22
1.10.2 TCP/IP reference model...................................................................................22
1.11 Analysing h Protocols Improve Networked System Performance...........................23
1.11.1 Research into the optimal network topology for the Alliance health...............23
1.11.2 Protocol Suitability Analyses in Network Health Alliances............................23
2 ACTIVITY 2....................................................................................................................24
2.1 Operating Principles of Networking Devices..........................................................24
2.1.1 What are networking devices?.........................................................................24
2.2 Types of Networking devices...................................................................................24
2.2.1 NIC...................................................................................................................24
2.2.2 Switch...............................................................................................................25
2.2.3 Hubs.................................................................................................................25
2.2.4 Routers.............................................................................................................25
2.2.5 Gateway............................................................................................................26
2.2.6 Repeater............................................................................................................26

1|Page
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
2.2.7 Firewalls...........................................................................................................26
2.2.8 Access points....................................................................................................26
2.3 Examining the Basic Functions of the above-mentioned Networking Equipment. .27
2.4 Determining Server Types........................................................................................28
2.4.1 What is a server?..............................................................................................28
2.5 Discussion of various server types...........................................................................28
2.6 Exploring a range of server types.............................................................................30
2.6.1 Software Servers..............................................................................................30
2.6.2 Hardware Servers.............................................................................................31
2.7 The suitable servers for Alliance health...................................................................35
2.7.1 Hardware Servers.............................................................................................36
2.8 Discussing about the independence of workstation hardware in a network............36
2.9 Relevant Network Software.....................................................................................36
2.9.1 Network Designing Software...........................................................................36
2.10 Evaluation of the topology in alliance health...........................................................37
3 ACTIVITY 03..................................................................................................................39
3.1 Network Design Plan...............................................................................................39
3.2 Blueprint of the Colombo Branch network..............................................................39
3.2.1 Blueprint of the Matara Branch Network.........................................................39
3.2.2 User Feedback Questions from Client.............................................................40
3.2.3 Future Improvements.......................................................................................41
3.2.4 Colombo Branch..............................................................................................41
3.2.5 Matara Branch..................................................................................................42
3.2.6 Device Configuration.......................................................................................43
3.3 Network Maintenance Schedule..............................................................................46
3.3.1 Everyday Routine.............................................................................................46
3.3.2 Weekly Schedule..............................................................................................46
3.3.3 Monthly Schedule............................................................................................46
3.3.4 Quarterly Routine (four times a year)..............................................................46
3.3.5 Annual Schedule..............................................................................................47
4 ACTIVITY 04..................................................................................................................47
4.1 Network Design.......................................................................................................47
4.1.1 Colombo Network............................................................................................47
4.1.2 Matara Network...............................................................................................48
4.2 Test Cases.................................................................................................................48
2|Page
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
4.2.1 Developing Test Cases.....................................................................................48
4.2.2 Future Improvement Opportunities:.................................................................49
4.2.3 Test Cases Analysis with Expected Results.....................................................51
5 References........................................................................................................................54

Figure 1 “Peer-to-Peer” vs “Client-Server”...............................................................................4


Figure 2 Features of Computer Network...................................................................................6
Figure 3 Network Types.............................................................................................................7
Figure 4 Wireless local Area Network.......................................................................................8
Figure 5 Wide Area Network (WAN).........................................................................................8
Figure 6 Metropolitan Area Network (MAN)............................................................................8
Figure 7 Campus Area Network (CAN).....................................................................................9
Figure 8 Wired PAN & Wireless PAN.....................................................................................10
Figure 9 Network Topologies...................................................................................................17
Figure 10 Bus Topology...........................................................................................................19
Figure 11 Ring Topology.........................................................................................................20
Figure 12 Star Topology...........................................................................................................20
Figure 13 Tree Topology..........................................................................................................20
Figure 14 Mesh Topology........................................................................................................21
Figure 15 Network Interface Card...........................................................................................24
Figure 16 A Switch...................................................................................................................25
Figure 17 A HUB.....................................................................................................................25
Figure 18 A Router...................................................................................................................25
Figure 19 A Repeater................................................................................................................26
Figure 20 Blueprint Colombo..................................................................................................39
Figure 21 Blueprint Matara......................................................................................................40
Figure 22 end-point configuration...........................................................................................43
Figure 23 Router Configuration...............................................................................................44
Figure 24 Server Configuration...............................................................................................45
Figure 25 Colombo Network...................................................................................................47
Figure 26 Matara Network.......................................................................................................48

3|Page
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
4|Page
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
1 ACTIVITY 01
1.1 Network Integration in Matara Branch

1.1.1 Computer Networking

A computer network is described as the connection of at least two computer systems, either
by a cable or a wireless connection. The simplest network is a combination of two computers
connected by a cable. This type of network is called a peer-to-peer network. There is no
hierarchy in this network; both participants have equal privileges. Each computer has access
to the data of the other device and can share resources such as disk space, applications, or
peripheral devices (printers, etc.).

Figure 1 “Peer-to-Peer” vs “Client-Server”

Today’s networks tend to be a bit more complex and don’t just consist of two computers.
Systems with more than ten participants usually use client-server networks. In these
networks, a central computer (server) provides resources to the other participants in the
network (clients).

Definition: Network

(IONOS Digital Guide) A network is a group of two or more computers or other electronic
devices that are interconnected for the purpose of exchanging data and sharing resources.

5|Page
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
1.2 Features of Computer Network

1. Communication speed

The network allows us to communicate over the network in


a fast and efficient manner. For example, we can do video
conferencing, email messaging, etc. over the Internet.
Therefore, the computer network is a great way to share our
knowledge and ideas.

2. File sharing

File sharing is one of the major advantages of the computer


network. Computer networks allow us to share files.

3. Backup and Rollback are


Figure 2 Features of Computer Network easy.

Since the files are stored in the main server which is


centrally located. Therefore, it is easy to take the backup
from the main server.

4. Software and Hardware sharing

We can install the applications on the main server; therefore, the user can access the
applications centrally. So, we do not need to install the software on every machine. Similarly,
hardware can also be shared.

5. Security

The network allows security by ensuring that the user has the right to access certain files and
applications.

6. Scalability

Scalability means that we can add new components to the network. A network must be
scalable so that we can extend the network by adding new devices. But this decreases the
speed of the connection and data of the transmission speed also decreases, this increases the

6|Page
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
chances of error occurring. This problem can be overcome by using routing or switching
devices.

7. Reliability

Computer networks can use an alternative source for the data communication in case of any
hardware failure.

1.2.1 Network Types

Figure 3 Network Types

There are five primary categories of computer networks.

 LAN (Local Area Network)


 WAN (Wide Area Network)
 MAN (Metropolitan Area Network)
 CAN (Campus Area Network)
 PAN (Personal Area Network)

1.2.1.1 Local Area Network (LAN)

A local area network (LAN) can be as small as a single-user home network or as large as a
business or educational institution with thousands of users and devices.

LAN Characteristics (Boland & Mousavi, 2004)

7|Page
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
 It has a faster data transfer speed, but is restricted to a single building or a small
geographical area.
 It saves money by not contracting with an outside internet provider.
 Information is encrypted and safe.
 The data can be easily organised.

1.2.1.2 Wireless Local Area Network (WLAN)

This is a network of computers or other devices


that communicate with one another via radio
waves (a wireless medium). WLAN describes
networks like Wi-Fi.

Figure 4 Wireless local Area Network

1.2.1.3 Wide Area Network (WAN)

To put it simply, this is a group of


interconnected local area networks. It's a
network that connects to other networks.

WAN Characteristics

 Allows for simultaneous connections


Figure 5 Wide Area Network (WAN)
across a large geographic area and
provides enough bandwidth to link a large number of computers over a wide area.
 When compared to LAN's speed, WAN's data transfer rates are slow.

1.2.1.4 Metropolitan Area Network (MAN)

This network allows us to link computers within


a geographical region, such as a city, a collection
of cities, or a campus. Compared to a wide area
network (WAN), it is a step down in size.
8|Page
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
MAN Characteristics.

 Networking is made up of a number of LANs, and it can be surrounded by a single


building or an entire city. Its range is between 5 and 50 kilometres.
 Modest to high data rates will be used.

1.2.1.5 Campus Area Network (CAN)

Figure 7 Campus Area Network (CAN)

The Campus Area Network (CAN) is a limited-geographic-area computer network. It can


connect multiple local area networks within a building. (Teare & Paquet, 2005)

CAN Characteristics

 Supports a relatively small geographical area, such as a university, campus, or large


office complex.
 Designed to accommodate many users and devices.
 Wireline and wireless connections are combined.

9|Page
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
1.2.1.6 PAN is a Personal Area Network.

Figure 8 Wired PAN & Wireless PAN

This is the network connecting devices within the intermediate area of a user.

Ranges differ from few metres.

PAN Specifications

 Has a very limited geographical scope


 Is used to connect personal devices.
 Is primarily wireless.

1.2.1.7 Discussing the Benefits and Constraints of Different Network Types.

Local Area Network (LAN)

BENEFITS

 simple - A local area network is simple to set up and flexible.

10 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
 Affordable - Can be set up for a relatively low cost.
 Accessibility - It is also possible to share applications or programmes. A
single licenced programme may be utilised by all network devices.
 Rapid Communication – Devices within a LAN network can communicate
directly with one another. They operate at 1 Gbps, 100 Gbps, and 10 Gbps.
Gigabit Ethernet technologies are rapidly evolving.
 Data Protection - Only authorised users can access files on a local area
network.

CONSTRAINTS

 Weak if improperly programmed - Unauthorised users can access the files


if the server is improperly programmed.
 Damage-causing - If a single network device fails, it affects the entire
network.
 Malware attacks - An attack may corrupt the entire network and destroy
data if encountered.
 Installation fee is expensive - Even though the network is inexpensive to
implement, it requires a specialised server and expensive equipment to
install, which incurs a high cost.
 Space - The LAN software necessitates a memory for each mainframe on
the network.

Wireless local Area Network (WLAN)

BENEFITS

• Mobility and Adaptability – It is simple to connect to the network from any


location within the coverage area. They are simple and quick to implement.
• Cost-Effectiveness - The cost of installing and maintaining a typical LAN
network can be high, but WLANs are inexpensive to maintain. In addition,

11 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
this network type does not necessitate costly equipment such as switches,
hubs, and routers.
• Scalability - These networks are easily expandable.
• Enhanced Productivity – WLAN is productive because it can be used to
connect devices such as laptops, tablets, and smartphones, allowing users to
access the network from anywhere within the coverage area.

CONSTRAINTS

• Security Issues – This network is susceptible to intrusion. To manage this


issue, the network should implement security measures such as firewalls.
• Users can only connect to the network if they are within the network's
coverage area.
• Interference – WLANs are susceptible to interference from other wireless
devices, such as codeless phones and microwaves, which can lead to
connectivity loss or sluggish performance.
• Limited Bandwidth – This network can only simultaneously support a limited
number of devices.

Wide Area Network (WAN)

BENIFITES

• Enhances Productivity - It can utilise all available bandwidth and storage


space.
• Simplified Communication - WAN makes it easier to communicate with
someone in a different country. A message can be sent immediately and easily.
• Extensive Network Coverage - Enables users to communicate with anyone on
the planet via computer or mobile phone.
• Distribute information over a large geographical area – Users can share and
exchange information with anyone, anywhere in the world.
• Accessibility - The user can upload and download large files and data from
anywhere and at any time.

12 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
• Connectivity – This is the largest network; consequently, it can connect
multiple nations for the exchange of valuable resources and data.

CONSTRAINTS

• Security concerns – As more technologies are interconnected, this network


may create a security vulnerability.
• Security Options Are Required – Hackers can easily gain access; therefore, a
firewall must be installed on every PC.
• Expensive Installation – Installing a WAN is extremely difficult and
expensive.
• Connectivity issues – Due to remote locations and the digital divide, this
problem is prevalent in many regions.

Metropolitan Area Network (MAN)

BENEFITS

• Security – Greater security than WAN.


• Distance coverage – This network is capable of covering greater distances than
a local area network. Therefore, it is appropriate for networks with two or
three branches.
• Less costly – This is less costly than implementing a WAN for a larger
network than a LAN.
• High speed - compared to WAN, this network's implementation of fibre optics
makes it faster.
• Centralised Management – Management is easier.

CONSTRAINTS

• Less security – Due to the vast area, securing the network against hackers may
be a difficult task.

13 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
• Wiring Necessary – A MAN typically requires cables to connect locations.
• Technical Support - Highly qualified technicians are required for network
implementation.

Campus Area Network (CAN)

BENEFITS

• Affordability – This network is constructed with common hardware devices,


so it is affordable.
• Accessibility – Various departments within the network can easily access the
data.
• Wireless Connection – Using a wireless connection, offices in different
buildings can be linked easily.
• Greater speed – In a CAN, large files can be transferred at a relatively rapid
rate.

CONSTRAINTS

• Limit - No maximum number of nodes is supported.


• Electrical Loading - Due to electrical loading, it can only connect up to 64
nodes.
• Costliness - Maintenance is expensive.

Personal Area Network (PAN)

BENEFITS

 No wires are required; only Bluetooth or Wi-Fi are required for


connection.
 Dependable and Secure – Connection stability within its range.
 Simple data synchronisation – It is simple to upload, share, and download
data between nearby devices.
 Transportable - Wireless and simple to implement anywhere.
14 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
CONSTRAINTS

• Network range is limited to about 10 metres at most.


• Transfer rates are subpar compared to other networks, making it difficult to
transfer large amounts of data.
• Interference with signals.
• Smartphones and laptops, two of the most common devices used to
implement a PAN, can be quite pricey.

1.2.2 Difference Between LAN, MAN, WAN, WIRELESS & INTERNET

15 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
1.2.3 Which Network Types are ideal for the Alliance health Matara Branch?

16 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
The ideal network type for the Metropolitan Area Network (MAN) of Alliance Health.

1.2.3.1 Why is a Metropolitan Area Network necessary?

When implementing a network in a building like Alliance Health, which houses many
different departments under one roof, a MAN is the best option. Making a network that is
both more extensive than a local area network (LAN) and less expensive to implement than a
wide area network (WAN) is helpful.

Point-to-point connections, VPNs, and wireless bridges are just some of the common ways to
link a MAN to an external network.

A large, adaptable network can rely on MAN as a solid foundation. (Biedron, 1995)

1.3 The IEEE Standards

Standards for the electronics industry and computers are developed by the Institute of
Electrical and Electronics Engineers. To ensure that all networking devices can communicate
and work together without any hiccups, the IEEE has established a set of guidelines and
practises known as the IEEE standards in computer networks. (Mollenauer, 1988)

1.4 Ethernet Protocol (IEEE Standard 802.3)

This is a technology that enables network-connected devices to send data to one another
without conflict. Ethernet's primary purpose is to prevent packet collisions.

They assist wired Local Area Networks (LANs) through the provision of various
specifications.

1.5 Wi-Fi Protocol (IEEE Standard 802.11)

17 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
IEEE standard 802.11 defines the communication rules for wireless local area networks
(WLANs, or wireless local area networks).

Wi-Fi is the current consumer’s name for the 802.11-based technology.

This standard specifies how the Media Access Control (MAC) Service is supported by:

 The operational principles of networks


 The functionality of MAC Bridges and VLAN Bridges

By incorporating administration, protocols, and algorithms. (Younis, et al., 2012)

1.6 Wireless Short Networks (IEEE standard 802.15)

These standards aid wireless specialty networks (WSNs) such as Bluetooth, Internet of
Things (IoT) networks, Mesh networks, Body area networks, and wearables, among others.
(Anon., )

1.7 NETWORK TOPOLOGIES

Figure 9 Network Topologies

A network topology is a method that defines the structure and interconnections of a network's
components.

18 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Today, various types of topologies exist. Listed below are some primary categories.

 Bus Topology
 Ring Topology
 Star Topology
 Mesh Topology
 Hybrid Topology

1.8 Implications of Network Architectures, Communication


1.8.1 The consequences of a network's topology

A well-designed topology improves a network's efficiency and effectiveness. Each network


topology—such as bus, ring, star, mesh, and hybrid—has its own set of strengths and
weaknesses.

Different network topologies have different capacities for handling devices, different ways of
dealing with problems that may arise within the network, and different approaches to
managing the devices within the network.

Therefore, picking the best network structure is crucial for ensuring that the network is
effective, reliable, and satisfying to users' needs. (Mitchell, )

1.8.2 Exchange of Topology Information in a Network

Communication in a network topology depends on its structure and type.

• Bus topology—devices share a channel to communicate.


• Ring Topology—Data moves circularly between devices. Two devices connect
each node.
• Star Topology—All devices communicate directly through a hub or switch.
• Mesh Topology—Network devices have multiple connections for officiant
communication and backup paths.

Thus, network topology completely affects how devices interact and communicate.

19 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
1.8.3 Network Topology bandwidth demands.
The bandwidth requirements of network topologies vary by type.

 Bus topology—All devices are connected to one communication channel, so


bandwidth is low. Devices share bandwidth. This network works well with few
devices and little data.
 Ring topology: Moderate bandwidth. This topology's circularly connected devices
share bandwidth equally because they pass data between them. Like the Bus topology,
more devices slow communication.
 Star topology requires high bandwidth. Each device in this network is connected to a
central switch or hub, so bandwidth is not shared. This topology is good for fast data
transfer.
 Mesh Topology – The bandwidth requirement in a mesh topology depends on the
network setup and number of nodes. This network allows devices to simultaneously
communicate because they are directly connected. High data and traffic speed up data
transfer. As this network's devices grow, so does this device's bandwidth need.

1.8.3.1 BUS TOPOLOGY

The first LAN vendors, such as IBM and


ARCNET, developed this type of topology,
which is the most common.

It is the most straightforward network


topology for connecting devices linearly.
This is the optimal solution for small
networks. Bus topology requires
significantly less cable length and is simple Figure 10 Bus Topology to comprehend.

Large networks are not suitable for the bus topology. Individually troubleshooting a device is
difficult.

1.8.3.2 RING TOPOLOGY

20 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
This configuration of a network creates a circular data path. Each device is linked to two
adjacent devices to create a ring-like structure.

The data flows in only one direction, reducing the likelihood of packet collisions. This
configuration is inexpensive to install and expand. The transmission of data occurs at a high
rate.

Ring topology provides total reliance on a single cable.

1.8.3.3 STAR TOPOLOGY

This is a network topology in which devices are connected


individually to a central point, which may be a hub or a
switch.

This is a trustworthy topology. Because it works even if


one medium or device fails to function.

This topology necessitates additional cables and is


dependent on the hub or switch. Figure 12 Star Topology

1.8.3.4 TREE TOPOLOGY

This is a topology that is a combination of bus and star


topologies. When a combined hierarchical or scalability
setup between two or more networks is required, tree
topology is advantageous. The structure of a tree topology
differs from others because of its tree-like appearance.

Figure 13 Tree Topology

1.8.3.5 MESH TOPOLOGY

21 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
In a network with this topology, every node has a connection to every other node. These links
can be hardwired or wireless.

Both full and partial mesh topologies exist for Mesh. In a full Mesh topology, every node is
linked to every other node, but in a partial mesh, only the essential links are made.

Figure 14 Mesh Topology

1.8.3.6 HYBRID TOPOLOGY

This hybrid structure draws from


several different topologies. They
combine several network architectures
into a single, complex design.
Intolerant devices could benefit from a
Mesh topology, while low-traffic
networks would be better served by a
bus topology.

1.9 Evaluating the Most Popular Networking Standards

The implementation of a network should follow a predetermined set of guidelines to ensure


its dependability, efficiency, and security. The term "networking protocols" is used to describe
these sets of rules and guidelines.

1.10 The Protocols of Network Architecture


Protocols in a network are a shared language or set of guidelines for how devices should
interact with one another.

1.10.1 The Open Systems Interconnection


(OSI) model

22 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
The International Organisation for Standardisation developed this conceptual reference model
to facilitate the efficient and effective exchange of information between various
communication systems making use of established protocols.

Figure 15 OSI Model

The seven main layers of this model. The layers are explained in detail below.

1. Physical Layer: Network operation. This layer converts binary format to transport
medium.
2. Data Link Layer—Transmits data to LAN computers. LLC and MAC are its
sublayers.
3. Network Layer: Logical network implementation. This layer includes ICMP, IGMP,
and IPsec.
4. Transport Layer—This layer breaks down data packets and sends them over the
network. TCP/UDP are here.
5. Session Layer – Maintains computer-to-computer communication. The session layer
establishes, maintains, and terminates network connection communications.
6. Presentation Layer—Data is coded here. Formats and characters are included.
Encryption happens here.
7. Application layer – This layer handles client/user interaction. HTTP and SMTP
belong here.

1.10.2 TCP/IP reference model


Figure 16 TCP/IP Protocol Suite

These protocols are organised in a four-


tiered reference model for
communication networks. The place got
its names from the two primary
protocols implemented here. Protocol for
Transfer Control Transmission over IP
(TCP/IP)

These four levels are as follows:

23 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
• Host—Network Layer/Physical or Network Access Layer. The bottom layer
supports all protocols.
• Internet Layer—Routes network packets.
• ICMP, IGMP, RARP, and ARP are protocols.
• Transport Layer/Host-to-Host Layer—This layer delivers end-to-end.
Segmenting and adding a checksum validate the data.
• Application Layer – The topmost layer interfaces host programmes with
transport layer services. This layer uses HTTP, DNS, FTP, and SMTP.

1.11 Analysing h Protocols Improve Networked System Performance

Networking protocols govern device communication.

These protocols make networks efficient. Network protocols help networked systems work.

• Network protocols establish fair and effective communication rules for all
devices.
• They detect, correct, and control network flow to improve reliability.
• Network protocols efficiently manage network resources.
• Network protocols provide encryption and authentication to improve network
security.
• They support networks and allow them to grow.
• Network protocols help devices exchange data by defining data formats,
message structures, and encoding schemes.

1.11.1 Research into the optimal network topology for the Alliance health

 A Tree Topology will be the most beneficial to the well-being of an Alliance.

When the time comes, new devices can be easily integrated into the network and connected to
the existing infrastructure.

1.11.2 Protocol Suitability Analyses in Network Health Alliances

24 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
The TCP/IP protocol suite is the most applicable network protocol reference model to use
here. This is the protocol stack that can quickly and easily connect to the internet and other
networks. TCP/IP supports a large variety of network devices, software, and operating
systems and is easier to implement than the OSI model. Alliance Health precisely requires
this, and nothing more involved or costly.

2 ACTIVITY 2

2.1 Operating Principles of Networking Devices

2.1.1 What are networking devices?

Networking hardware consists of any physical devices necessary for a network's hardware to
communicate and interact with one another. (Anon., )

2.2 Types of Networking devices


The following is a list of the typical network devices found in today's networks.

 NIC
 Switch
 Hub
 Router
 Firewall
 Access Point
 Repeater
 Gateway

2.2.1 NIC

NIC stands for "Network Interface Card". It is also


called "Network Interface Controller". It is indeed a
25 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Figure 17 Network Interface Card
circuit board or a card that is installed on a computer so that it can be connected to a network.
The NIC provides the computer with full-time network connection. Computers on a LAN
contain NIC specifically designed for LAN transmission technology. Also, there is a WLAN
(Wireless Local Area Network) card for wireless transmission.

2.2.2 Switch

Figure 18 A Switch

This gadget allows for the connection of various other gadgets. This gadget allows networked
devices to communicate with one another via packet switching. The MAC address of a device
is used to determine where an incoming data packet should be sent by a switch.

2.2.3 Hubs

This is another device used to link computers


together in a network. Typically, LANs use them to
connect to one another. They take in data packets
from one gadget and send them out to the rest. A
hub does not have the same level of intelligence as
a switch. As a result, they are rarely used in today's Figure 19 A HUB

networks.

2.2.4 Routers

A router is a piece of equipment used to join two or more


autonomous networks so that data can be transferred

26 | P a g e Figure 20 A Router
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
between them. Incoming data packets' Internet Protocol addresses are checked against an
internal routing table, and the packets are then sent to their final destinations. Routers in a
network communicate with one another using a standardised set of rules called routing
protocols to determine the most efficient path for sending data packets.

2.2.5 Gateway

A gateway is a piece of hardware that establishes a connection between two or more networks
using a translation service. A gateway connects two separate networks or protocols.

2.2.6 Repeater

This component amplifies a received signal before


retransmitting it, allowing a network to extend
across greater physical or logical distances. The
capacity of the initial signal is thus expanded.

Figure 21 A Repeater

2.2.7 Firewalls

A firewall is a critical component in network security, creating a barrier between secure


internal networks and external entities such as the internet. Its primary function is to monitor
and control network traffic based on predetermined security rules, thereby safeguarding
sensitive data and thwarting unauthorized access and cyber threats.

2.2.8 Access points

Access points (APs) serve as essential components in wireless networking, acting as the
bridge between wireless devices and wired networks. They facilitate the connection of
wireless devices, such as laptops, smartphones, and tablets, to a wired network infrastructure,
enabling seamless data transmission and access to resources.

27 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Access points play a pivotal role in extending the reach of wireless networks by providing a
wireless signal coverage area, commonly referred to as a hotspot. These devices are equipped
with radio transmitters and receivers that communicate with wireless-enabled devices,
allowing data to travel between the wireless and wired segments of the network.
(Frangiadakis, et al., 2008)

2.3 Examining the Basic Functions of the above-mentioned Networking Equipment

The preceding section introduced common networking devices. The operation of these
devices is described in detail below.

 Switch – A switch is responsible for delivering or forwarding data packets received


from one network device to another network device.
 The data are received by a port, and it is the responsibility of the switch to send the
data to the specified device using the MAC address. For this purpose, the switch
maintains a table of the network's MAC addresses. Using the Quality of Service
(QoS) procedure, a switch can also prioritise network traffic. It also supports security
features such as controlling network device access through ports. Administrators can
restrict access by allowing only authorised MAC addresses, and they can limit the
number of MAC addresses allowed on a port of a device.
• Hub – A hub receives data from one network port and broadcasts it to all other
network ports. Therefore, this device serves the same purpose as the switch
but is not as intelligent. In a network with a hub, if one node transmits data, all
other network devices will simultaneously receive the data via a broadcast
from the hub. This resulted in possible collisions.
• Routers - Routers also forward data packets between two or more networks. It
evaluates the IP address of the received data packets and uses routing tables to
deliver them to the desired network. Various routing protocols including RIP,
OSPF, and BGP are utilised to generate the routing tables. Routers are

28 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
essential devices for facilitating communication between networks and
subnetworks.
• Gateway – The network gateway resembles a bridge that connects two or more
networks. It provides Network Address Translation (NAT), which enables
devices in a network with private IP addresses to connect to the internet using
a single public IP address. With its IP address ranges, a gateway can be used to
divide a network into multiple or smaller subnetworks. This increases the
network's security and efficiency.
• Repeater – When a network device is distant, a repeater is used to amplify and
then regenerate the received data signals. A point-to-point configuration is
utilised by the repeater. These devices are straightforward and lack
intelligence. They collect and receive the data they receive and then transmit it
at a faster rate without modification.
• Firewalls – A firewall is a barrier installed between networks or the network
and the internet. They enforce access control to maintain network traffic
satisfaction. They aid in protecting the network against unauthorised access
and other malicious attacks.
• Access Points – An access point is comparable to a wireless central hub. It
connects wireless devices to a wired network as a bridge. To ensure
communication, they employ wireless security protocols such as WPA and
WPA2. They operate on distinct wireless channels within the spectrum of
unlicensed radio frequencies.

2.4 Determining Server Types

2.4.1 What is a server?


A server is a large storage and processing device that may exist in the Internet as
either a physical or virtual data centre. They have the option of storing and processing
information within their own system or requesting it from another. For large-scale data
29 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
centres such as cloud computing data centres, storage centres, and virtualization offering
centres, servers provide a variety of services, including file sharing and printing.

As servers grew and complexity, they were able to perform increasingly complex tasks.

Currently, cloud computing systems that are hosted online contain virtual servers.

2.5 Discussion of various server types

2.5.1.1 Software server


This programme makes a personal computer serve as a server. Sharing of files,
printers, and other network resources is made possible thanks to software servers that control
the network's hardware and software components. (Canonical, 2016)

Several distinct categories of server software exist, each of which performs a unique function
for the benefit of other networked computers.

The most common kinds of software servers found in networks today are described below.

 File server
 Application server
 Web server
 Database server
 Email server
 Virtualization server
 DNS server
 Proxy server
 DHCP server

2.5.1.2 Hardware Server


Hardware servers are the actual machines where data and programs are kept and
processed. They are commonly used by large corporations with extensive data storage needs.
Hosting websites and applications, managing databases, storing large files, etc., all require the
use of hardware servers. Considerations like processor speed, memory size, storage medium,
and network features like stable protocols and fast ethernet ports should all be considered
when choosing a server for a network. Hardware servers can be broken down into three
categories.

30 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
 Tower Servers - These less expensive servers are great for SMEs and data centres due
to their small footprint and ease of access. These servers come in a wide range of sizes
and shapes.

 These expensive and space-saving blade servers are all the rage. The blade server is a
good option for the business network because of its small footprint, low price, and
efficient cooling. They are commonly used in large corporations and data centres.

 Rack servers can be stored in any cabinet that is at least 19 inches deep. Most found in
large data and computing centres. Websites, databases, and virtualization are all
managed by rack servers.

2.6 Exploring a range of server types

2.6.1 Software Servers

31 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
2.6.1.1 File server
In a computer network, the files are stored and managed by a
central server known as a file server. Users can now safely
and securely transfer data between each other over a network,
thanks to this server.

2.6.1.2 Application Server


The application server is a type of software server that is used to deploy, manage, and
host software programmes and their associated services for external customers. High-
end consumer or business apps can be hosted and delivered to multiple users in
different locations at once with the help of this server.

This server needs a robust CPU, lightning-quick network connectivity, and plenty of

RAM.

2.6.1.3 Web Server


A web server processes requests from clients over the World
Wide Web (WWW) using a variety of protocols, the most
common of which is the Hypertext Transfer Protocol (HTTP).

The primary function of this server is to store, process, and


transmit web pages to users.

2.6.1.4 Database server


Database services, along with the applications and data that
support them, are housed and managed on this server. This
server can accommodate popular database management
systems like Oracle, MySQL, and Microsoft SQL Server.

2.6.1.5 Email Server


An email server is a computer system that is dedicated to
relaying and receiving electronic mail over a network. This
server stores, controls, and manages all incoming and outgoing
email.

32 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
2.6.1.6 Virtualization Server
These servers facilitate the management of virtual machines (VMs), which allow for
the installation and operation of multiple operating systems (OS) and versions of
software on a single physical server. Virtualization server software like Oracle,
VMware ESXi, and Microsoft Hyper V are all widely used.

2.6.1.7 DNS server


The DNS server is responsible for translating domain names
into their corresponding numerical IP addresses. The IP
address is no longer required when connecting to the network
or accessing online resources thanks to this server.

By enforcing security policies and identifying malicious domain names, this server
can prevent access to harmful websites.

2.6.1.8 Proxy Server


In order to access the wider world wide web, users must first pass through a server
known as a proxy server. It's a useful tool for warding off hacker intrusions on the
network. As a result, the proxy server's primary purpose is to strengthen the safety of
the network. Proxy servers also aid in load balancing, which is important for keeping
the internet stable and error-free. (Anon., )

2.6.1.9 DHCP server


Obtaining an IP address and other network settings, like the
host's subnet mask and default gateway, is a breeze thanks to
the Dynamic Host Configuration Protocol (DHCP) Server.
(Johnson, et al., 2008)

2.6.2 Hardware Servers

2.6.2.1 Tower Servers

33 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Think System ST250 V2 Tower Server

The Think System ST250 V2 is a compact standalone tower that packs enterprise-
grade processing power for businesses on the go. It has a lot of room for
customization and is made with the expansion of your business in mind. It can quickly
adjust to new needs thanks to its flexible storage options, graphic processing unit
support, and multiple PCIe expansion slots.

This server is flexible enough to meet the storage expansion needs of growing
businesses, as well as the performance and functionality enhancements offered by
graphics processing units (GPUs) and the addition of expansion cards. With the
ThinkSystem ST250 V2's adaptability options, businesses can meet their unique needs
with minimal disruption and maximum efficiency.

SPECIFICATIONS

 Price = USD 2923.00 = LKR 894547.32


 Max memory = Up to 128 TB
 Processor = 1xIntel Xeon E-2314 4C 2.8GHz 65W
 Number or processors = 1/1
 Storage
 Flexible enterprise storage options up to 16x 2.5-inch hot-swap
 8x 3.5-inch hot-swap and simple-swap drive bays

HPE ProLiant ML350 Gen10

The HPE ProLiant ML350 Gen10 server is the best option for growing small and
medium-sized businesses (SMBs), branch offices of large companies, and enterprise data
centres because it is a secure dual-socket tower server with performance, expandability, and
proven reliability.

SPECIFICATIONS

 Processors: Intel® Xeon® Scalable processors, 1st or 2nd generation


 Processor cores: 28/ 26 /24 / 22/ 20 /18/ 16/ 14 / 1/2 10/ 6/ 8/ 4 depending on the
model to be implemented on the network.

34 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
 Processor speed: Max 3.6 GHz
 Maximum memory :3.0 TB with 128 GB DDR4 DIMM
 Number of Memory slots: 24 DIMM slots
 Memory type: HPE DDR4 Smart Memory
 Price: USD 2836.00 = LKR 867922.07

(HPE, 2023)

Dell PowerEdge T350 Tower Server

An intuitive tower server design. Developed for companies that need powerful, yet
cost-effective, enterprise capabilities to meet their ever-changing computing needs.

SPECIFICATIONS

 Processors: One Intel Xeon E-2300 Series processor with up to 8 cores / Intel Pentium
processors with up to 2 cores
 Memory: 4 DDR4 DIMM slots which supports maximum UDIMM 128 GB
 price $3,384.86=LKR 1100303.24

2.6.2.2 Blade Servers

Dell PowerEdge M640

35 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
This server's 2-socket, half-height modular blade design makes it well-suited for high-
performance computing (HPC), platform-as-a-service (PaaS), and virtualization. (Wright,
2005)

SPECIFICATIONS

 Processor: Two Intel® 2nd Generation Xeon® Scalable processors. Maximum 28


cores per processor.
 Memory: 16 DDR4 DIMMs in total.
 Storage controllers:: Software RAID S140, PERC9 H330, H730P I
 Price – USD 2957.00 = LKR 904952.59

Cisco UCS B200 M6

A server that never skimps on performance, adaptability, or density is the cisco UCS
B200 M6. The Cisco UCS B200 M6 Blade Server supports a wide variety of applications,
from web and IT infrastructure to distributed databases.

SPECIFICATIONS

 3rd Gen Intel® Xeon® Scalable Processors


 Up to 128 GB 3200-MHz DDR4 memory DIMMs
 Up to 4 TB total memory (for 2 CPUs) / 16 x 128 GB DDR4 DIMMs and 16 x 512
GB PMem.
 Up to 2 TB of RAM per CPU or up to 5 TB per CPU
 Price = USD 6030 = LKR 1,863,270.00

(Cisco, 2023)

2.6.2.3 Rack Servers

Fujitsu PRIMERGY RX2540 M5

FEATURES
36 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
 2U dual-socket rack server for high usability, scalability, and cost-efficiency
 Ideal for running enterprise applications, collaboration workloads as well as
traditional databases.
 Modular design offers excellent expandability of up to 28 disk drives.
 Up to 7.5TB memory for highest performance demands
 GPGPU support for VDI and graphic-intensive computing

PRICE = EURO 2,551.00 = LKR 853980.60

(FUJITSU, 2023)

Dell EMC PowerEdge R940

The server's This four-socket server offers greater compute, local storage, and
memory footprint. Designed for maximum enterprise application performance.

FEATURES

 In-memory and large, complex databases


 Unix to Linux migration
 ERP, CRM
 Dense virtualization
 Maximize storage performance with up to 12 NVMe drives and ensure application
performance scales easily.

PRICE = USD 12,141.00 = LKR 3723218.55

(DELL, 2023)

2.7 The suitable servers for Alliance health

 File server - The Accounting and Finance departments of the network can utilise this
server to store company file data. This server can also be used by the administrative

37 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
department to store administrative files and documents pertaining to Software
Servers.
 Email Server – As this server is used to manage employee and customer email
communication. Therefore, Alliance Health's Human Resources and Customer Service
departments can utilise this server.
 Web Server - This server can support the Alliance Health Sales & Marketing
department's websites. The web server can also host the web-based applications of the
Business Development department of Alliance health.
 Virtualization Server – This server can be utilised by any Alliance health department
based on their business requirements and the applications they wish to run in virtual
machines.
 Proxy Server - The proxy server can be used in any Alliance health department to
increase security. The installations depend on the company's required level of security
and content filtering.
 DNS server – This server will be used in the network to communicate over the
internet by facilitating user access to resources via domain names as opposed to IP
addresses.
 DHCP server - This server assigns IP addresses, subnet masks, default gateways, and
other network configurations. Considering its network size, device types, and other
requirements, Alliance health can use this server in multiple departments.

2.7.1 Hardware Servers

The following Hardware servers may be used to power the Alliance health network.

 Cisco UCS B200 M6 Blade Server


 DELL EMC PowerEdge R940
 Think System ST250 V2 Tower Server

2.8 Discussing about the independence of workstation hardware in a network

Independence of workstation hardware in a network refers to the network's ability to rely


solely on its hardware without the need for additional support or external resources. This

38 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
improves performance, reduces reliance on the network, enhances security, and enables
trouble-free local processing. Workstations can operate independently, perform tasks without
relying too heavily on the network, and be effectively customised. This facilitates the
efficient and secure operation of the network.

Therefore, when creating or designing a network similar to Alliance Health, it is essential to


choose hardware that the network can rely on and operate without any additional
requirements.

2.9 Relevant Network Software

Software packages that help with networking tasks like designing, deploying, managing, and
troubleshooting are known as "networking software."

The following are examples of popular programmes used in modern networks.

2.9.1 Network Designing Software

2.9.1.1 Cisco Packet tracer

Cisco Systems has made available this tool for network visualisation and simulation. The
software provides a simulated setting in which networks can be built and configured,
activities in those networks can be simulated, and users' grasp of networking principles can
be enhanced. If you want to learn about and practise managing and designing networks, this
is one of the best programmes to do so.

Routers, switches, and personal computers (PCs) can all be virtually placed on a desk in
Cisco packet tracer's user-friendly interface. They can link and configure these gadgets to
create intricate networks that mimic real-world situations.

Alliance health's network can be planned with the help of this programme. (Anon., )

39 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
2.9.1.2 GNS3

The GNS3 Network Simulator is a tool for simulating, testing, and developing real-world
networks. This is a free and public resource. (Welsh, 2013)

2.9.1.3 SolarWinds Network Configuration Manager

Network configuration tasks are made easier and more efficient with the help of SolarWinds
Network Configuration Manager, a piece of network software. All network devices can be
managed and monitored from a single location, configuration changes can be tracked, and
policy adherence can be verified with this helpful tool for network administrators.

2.10 Evaluation of the topology in alliance health.

Alliance Health is a business that will have multiple locations and a number of different
divisions. Due to the network's potential growth in the future, a tree topology will be used for
both of its forks. Alliance Health may choose to implement any number of potential topology
protocols across its network.

• STP – The Spanning Tree Protocol (STP) is a protocol used to prevent the looping or
redundancy of data within a network topology. IEEE's standard for this protocol, IEEE
802.1D, is now in effect. This protocol ensures network stability, and with the STP protocol,
the network can avoid broadcast storms and ensure network traffic flows smoothly without
becoming entangled in endless loops.

• MSTP – The Multiple spanning tree protocol (MSTP) is a more advanced version of the
STP that is used to manage multiple VLANs. IEEE 802.1s is a synonym for MSTP. As the
Alliance health network is a Metropolitan Area network (MAN), this protocol permits the
creation of multiple spanning trees within the network to increase network efficiency and
scalability.

40 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
• IP - The internet protocol (IP) is a required protocol that is essential to the network because
it enables nodes and devices to communicate with one another. The internet protocol assigns
unique identifiers (IP addresses) to each device and ensures that the data transmitted by these
devices are successfully delivered to their destinations.

• TCP – Transmission Control Protocol (TCP) is a mandatory protocol used to ensure that
data is transmitted and received between devices accurately and in the proper order. This is a
protocol that must be implemented within the network in order to facilitate the efficient
transfer of data.

41 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
3 ACTIVITY 03

3.1 Network Design Plan

3.2 Blueprint of the Colombo Branch network

Figure 22 Blueprint Colombo

42 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
3.2.1 Blueprint of the Matara Branch Network

Figure 23 Blueprint Matara

43 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
3.2.2 Alliance Health Network Design Feedback Form

44 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
45 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
3.2.3 Future Improvements

By giving this to client company user they almost satisfied with the network design and
functionalities that we have explained to them. But some of them are recommend specially
their IT department head recommend to follow some advance security protocols inside the
network. Also, they are planning to enable VPN server in near future to automate the system
and expand using remote workers. So, in the next phase of this network implementation VPN
server and network virtual adapter it manager all the network segmentation inside the
network including VPN controls

3.2.4 Colombo Branch

Floor Department Device IP


Floor1 Reception (192.168.10.0/24) Pc0 192.168.10.2
Floor1 Reception (192.168.10.0/24) PC1 192.168.10.3
Floor1 Sales and Marketing (192.168.11.0/24) PC7 192.168.11.4

46 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Floor1 Sales and Marketing (192.168.11.0/24) Laptop4 192.168.11.5
Floor1 Sales and Marketing (192.168.11.0/24) Laptop5 192.168.11.6
Floor1 Sales and Marketing (192.168.11.0/24) Laptop1 192.168.11.7
Floor1 Sales and Marketing (192.168.11.0/24) Laptop2 192.168.11.8
Floor1 Sales and Marketing (192.168.11.0/24) Laptop3 192.168.11.9
Floor1 Customer Service (192.168.12.0/24) Laptop0 192.168.12.2
Floor1 Customer Service (192.168.12.0/24) PC6 192.168.12.13
Floor1 Customer Service (192.168.12.0/24) Wireless 192.168.12.14
Router
0
Floor2 Server Room (10.10.10.0) Server0 10.10.10.1
Floor2 Server Room (10.10.10.0) Server1 10.10.10.22
Floor2 Server Room (10.10.10.0) Server2 10.10.10.33
Floor2 IT department (192.168.13.0/24) Pc40 192.168.13.2
Floor2 IT department (192.168.13.0/24) Pc41 192.168.13.3
Floor2 IT department (192.168.13.0/24) Pc38 192.168.13.4
Floor2 IT department (192.168.13.0/24) Pc39 192.168.13.5
Floor2 IT department (192.168.13.0/24) Pc42 192.168.13.6
Floor2 IT department (192.168.13.0/24) Printer0 192.168.13.7
Floor2 Video Conferencing (192.168.15.0/24) Pc37 192.168.15.2

3.2.5 Matara Branch

Floor Department Device IP


Floor 1 Reception Pc43 172.16.20.2

47 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Floor 1 Reception Pc44 172.16.20.3
Floor 1 Reception Pc45 172.16.20.4
Floor 1 Customer service Pc46 172.16.20.5
Floor 1 Customer service Pc47 172.16.20.6
Floor 1 Customer service Laptop6 172.16.20.7
Floor 1 Customer service Wireless Router 1 172.16.20.8
Floor 2 Admin Pc48 172.16.20.9
Floor 2 Admin Pc49 172.16.20.10
Floor 2 HR Pc50 172.16.20.11
Floor 2 HR Pc51 172.16.20.12
Floor 2 Accounting and Pc52 172.16.20.13
Finance
Floor 2 Accounting and Pc53 172.16.20.14
Finance
Floor 2 IT Department Pc54 172.16.20.15
Floor 2 IT department Pc55 172.16.20.16
Floor 2 IT department Pc56 172.16.20.17
Floor 2 It department Pc57 172.16.20.18

3.2.6 Device Configuration

End-point configuration

48 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Figure 24 end-point configuration

Router Configuration

49 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Figure 25 Router Configuration

Server configuration

50 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Figure 26 Server Configuration

Router Configuration

51 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
3.3 Network Maintenance Schedule
The network of alliance health requires a maintenance schedule to maintain its efficacy,
dependability, and absence of damage and conflicts. The maintenance schedule can be
executed on a daily, weekly, monthly, quarterly, or annual basis.

3.3.1 Everyday Routine


 Verify that the network connections and Internet access are functioning correctly.
 Examine the network's network devices to determine if they are operating properly
and to identify any abnormalities that may hinder their performance.
 Examine all system logs for errors and security alerts.
 Every midnight, you must back up the network configurations and data.

3.3.2 Weekly Schedule


 Examine and revise the networking documentation, such as IP address, network
diagrams, and device inventories.
 Examine and revise network documentation containing IP addresses, inventories, and
diagrams.
 Evaluate the device's efficacy and implement enhancements.
 Examine and evaluate the network's firewalls and other intrusion detection systems.

3.3.3 Monthly Schedule


 Clean the network's hardware and devices.
 Verify that network traffic and bandwidth are operating as expected.
 Check for upgrades to the antivirus software.
 Through security reviews, you can identify network vulnerabilities and test for
security breaches.

3.3.4 Quarterly Routine (four times a year)


 Upgrade the devices' network firmware.

52 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
 Examine the network infrastructure for replacements or upgrades.
 Consider expanding or developing the network.
 Verify all backups and evaluate continuity of operations plans.

3.3.5 Annual Schedule


 Conduct a thorough evaluation of the network, including its architecture, security
policies, and performance.
 Check the network's cables and medium.
 Evaluate network service providers for contract renewals and renegotiations.
 Examine and revise network documentation.

4 ACTIVITY 04

4.1 Network Design

53 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
4.1.1 Colombo Network

Figure 27 Colombo Network

54 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
4.1.2 Matara Network

Figure 28 Matara Network

4.2 Test Cases

4.2.1 Developing Test Cases

Ping a Matara branch workstation from the main office and the other way around as a test
case.

The expected outcome involves successful pinging with low latency and no packet loss.

If the ping command is successful, the network is functioning normally and there is
communication between the two branches.

Case Study: Conduct an extended ping test from a Matara workstation to a specified IP
address in the headquarters.

55 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
The expected outcome was a successful extended ping with accurate round-trip time (RTT)
measurements and no packet loss.

The extended ping test helps determine the quality of the connection between the Matara
branch and the headquarters by monitoring RTT and ensuring reliable data transfer.

Perform a trace route from a Matara workstation to a particular IP address at the company's
headquarters.

Anticipated was a successful trace route displaying the network path and hop-by-hop latency.

The trace route test exposes the network path and latency between the two branches. It assists
in locating potential obstructions and diagnosing network issues.

Test Case: Connect a workstation in Matara to a particular server in the main office via Telnet
or SSH.

Connection established successfully; authentication prompt received.

The Telnet/SSH test validates the Matara branch's ability to remotely access servers in the
main office. It ensures secure remote management and diagnostic capabilities.

Test Outcomes and Analysis: For each test scenario, the test outcomes must be compared to
the anticipated results. The network is correctly configured and operating according to plan if
all tests pass and the results are as expected. For any deviations or failures, additional
research and troubleshooting would be required to identify and resolve any underlying issues.

4.2.2 Future Improvement Opportunities:

Introducing redundant network connections and devices would enhance the network's defect
tolerance and resilience. Virtual router redundancy protocol (VRRP) and hot standby router
protocol (HSRP) are two protocols that can be employed to configure redundant routers,
switches, and internet connections.

Increase network security by implementing additional safeguards, such as intrusion detection


and prevention systems (IDS/IPS), network segmentation using VLANs, and secure access
restrictions for remote connections.

56 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Implement Quality of Service (QoS) policies to give essential network traffic, such as phone
and video conferencing, precedence over unimportant network traffic. This guarantees
optimal efficacy for critical applications.

Implement dependable network monitoring and management solutions to monitor the


network proactively, identify potential issues, and improve performance. Using network
monitoring tools such as SolarWinds or Nagios may fall within this category.

Enhanced Wireless Connection: Consider strategically placing wireless access points to boost
Wi-Fi performance and coverage throughout the entire structure. To maintain secure wireless
connections, use authentication and encryption methods such as WPA2-Enterprise.

A Critical Analysis of the Implemented Network

The network's strategy and architecture took into consideration the organization's needs and
included separate subnets for each department, Wi-Fi access in customer service areas, and
branch-to-branch communication. The network architecture utilised a star topology and
consisted of routers, switches, and servers, among other essential networking equipment.

The configuration and execution of the network required the selection of appropriate network
protocols, IP address ranges, and hardware components. The suggested servers were chosen
to ensure centralised file storage, user administration, email communication, and application
hosting based on the specific needs of the departments.

The execution of ping, extended ping, trace route, and Telnet/SSH tests confirmed the
network's connectivity and functionality.

4.2.3 Test Cases Analysis with Expected Results

4.2.3.1 Test Case 1

57 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Name – Ping Command

Inputs - pc01(192.168.10.3) is trying to connect with pc0(192.168.10.2)

Expected Result - pc01 successfully receive bytes from pc0 without any packet loss

Process -

Actual Result –
The above test shows the pinging from PC 1 with the IP address 192.168.10.3 to PC0 with
the IP address 192.168.10.2 to confirm whether they are successful in exchanging data
packets. The results were received as expected which is to send 4 packets successfully to PC0
with 0% loss.
Command Status - Success

4.2.3.2 Test Case 2

Name – Extended Ping Test

Inputs - pc0(192.168.10.2) is trying to connect with pc1(192.168.10.3)

Expected Result - pc0 successfully receive bytes from pc1 without any packet loss.

Process -

58 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Actual Result –
The above test shows the pinging from PC 0 with the IP address 192.168.10.2 to PC1 with
the IP address 192.168.10.3 in order to confirm whether there is a continuous response
received from PC1.

Command status – Success

4.2.3.3 Test Case 3

Name – Telnet Test

Inputs – from pc0 is trying access the remote router 2

Expected Result – pc1 successfully access the remote router2 by using password and
username

Process -

Actual Result –
Connection Timeout and remote host not working.
Command status - Not Success
59 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
4.2.3.4 Test Case 4

Name – Trace root Test

Inputs – The above test shows the trace route test from PC0 with the IP address
192.168.10.2with PC2 having the IP address 192.168.10.3

Expected Result – Tracing successfully trace the given IP address

Process -

Actual Result –
The above test shows the trace route test from PC0 with the IP address 192.168.10.3 with
PC1 having the IP address 192.168.10.3 The test completed successfully with the expected
result of tracing the route successfully.

Command status - Success

60 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
5 References
Anon., . Cisco Packet Tracer 5.3. [Online]
Available at: http://www.cisco.com/web/offer/emea/7130/docs/PT5.pdf
[Accessed 14 7 2023].
Anon., . IEEE 802.11-2012. [Online]
Available at: http://standards.ieee.org/getieee802/802.11.html
[Accessed 14 7 2023].
Anon., . Network Connectivity: Advanced Networking Services — Teaming. [Online]
Available at: http://www.intel.com/support/network/sb/CS-009747.htm
[Accessed 14 7 2023].
Anon., . Picking a Proxy Server. [Online]
Available at: http://www.slideshare.net/bryan_call/choosing-a-proxy-server-apachecon-2014
[Accessed 14 7 2023].
Biedron, W. S., 1995. Metropolitian area network services comprised of virtual local area
networks running over hybrid fiber-coax and asynchronous transfer mode technologies.
Proceedings of SPIE, , 2609(), pp. 50-57.
Boland, H. & Mousavi, H., 2004. Security issues of the IEEE 802.11b wireless LAN. [Online]
Available at: https://ieeexplore.ieee.org/document/1345023/?reload=true
[Accessed 14 7 2023].
Canonical, 2016. Ubuntu Server - for scale out workloads. [Online]
Available at: https://www.ubuntu.com/server
[Accessed 14 7 2023].
Frangiadakis, N. et al., 2008. Virtual access points for vehicular networks. [Online]
Available at: http://eurecom.fr/~camara/files/vapsmobilware08.pdf
[Accessed 14 7 2023].
Johnson, R., Kinnear, K. & Stapp, M., 2008. DHCP Server Identifier Override Suboption.
[Online]
Available at: https://tools.ietf.org/html/rfc5107
[Accessed 14 7 2023].
Mitchell, B., . Introduction to Computer Network Topology. [Online]
Available at: http://compnetworking.about.com/od/networkdesign/a/topologies.htm
[Accessed 14 7 2023].

61 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Mollenauer, J., 1988. Metropolitan area networks: where may standards meet. [Online]
Available at: https://ieeexplore.ieee.org/document/4752
[Accessed 14 7 2023].
Teare, D. & Paquet, C., 2005. Campus Network Design Fundamentals. [Online]
Available at:
https://amazon.com/campus-network-design-fundamentals-diane/dp/1587052229
[Accessed 14 7 2023].
Welsh, C., 2013. Gns3 Network Simulation Guide. [Online]
Available at: https://amazon.com/network-simulation-guide-rednectar-chris/dp/1782160809
[Accessed 14 7 2023].
Wright, J., 2005. Blades have the edge [blade servers]. IEEE Spectrum, , 42(4), pp. 24-29.
Younis, O. et al., 2012. A framework for evaluating network optimization techniques.
[Online]
Available at: https://ieeexplore.ieee.org/document/6222712
[Accessed 14 7 2023].
15 Different Types of Servers in Computing - zenarmor.com (2023). Available at:
https://www.zenarmor.com/docs/network-basics/types-of-servers (Accessed: 24 November
2023).

Claudia F. (no date) Types of Networks: LAN, WAN, WLAN, MAN, SAN, PAN, EPN &
VPN - Video & Lesson Transcript, study.com. Available at:
https://study.com/academy/lesson/types-of-networks-lan-wan-wlan-man-san-pan-epn-
vpn.html (Accessed: 21 November 2023).

Computer Network Features - javatpoint (no date) www.javatpoint.com. Available at:


https://www.javatpoint.com/computer-network-features (Accessed: 21 November 2023).

Computer Networking : Principles, Protocols and Practice, third edition — Computer


Networking : Principles, Protocols and Practice (no date). Available at: https://beta.computer-
networking.info/syllabus/default/index.html (Accessed: 19 November 2023).

‘Computer Networks | How They Work, Error Detection’ (no date). Available at:
https://teachcomputerscience.com/networks/ (Accessed: 23 November 2023).

‘Different types of networks, standards and protocols available’ (2015) AnswerKid.co.uk, 1


December. Available at: https://www.answerkid.co.uk/different-types-networks-standards-
protocols-available/ (Accessed: 23 November 2023).

62 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Explain the Impact of Network Topology, Communication and Bandwidth Requirements (no
date). Available at: https://www.ukessays.com/essays/information-systems/explain-the-
impact-of-network-topology-communication-and-bandwidth-requirements.php (Accessed:
22 November 2023).

Gateway and router: what is the difference and similarity | FS Community (2021)
Knowledge. Available at: https://community.fs.com:7003/article/router-vs-gateway-what-is-
the-similarity-and-difference.html (Accessed: 23 November 2023).

LogicMonitor (2023) The Impact of Network Topology, LogicMonitor. Available at:


https://www.logicmonitor.com/blog/the-impact-of-network-topology (Accessed: 22
November 2023).

‘Network Topology - Meaning & Type of topologies in networking’ (2019) EDUCBA, 19


June. Available at: https://www.educba.com/types-of-network-topology/ (Accessed: 22
November 2023).

Server Types: Blade Server vs. Rack Server vs. Tower Server | FS Community (2022)
Knowledge. Available at: https://community.fs.com:7003/article/server-types-rack-server-vs-
blade-server-vs-tower-server.html (Accessed: 24 November 2023).

Types of Computer Network: What is LAN, MAN and WAN (2023). Available at:
https://www.guru99.com/types-of-computer-network.html (Accessed: 21 November 2023).

‘Types of Computer Networks’ (2021) GeeksforGeeks, 1 May. Available at:


https://www.geeksforgeeks.org/types-of-computer-networks/ (Accessed: 21 November
2023).

Vatsal, S. (no date) Advantages And Disadvantages Of Computer Network // Unstop


(formerly Dare2Compete). Available at: https://unstop.com/blog/advantages-disadvantages-
of-computer-network (Accessed: 21 November 2023).

What is a network? Definition, explanation, and examples (2020) IONOS Digital Guide.
Available at: https://www.ionos.com/digitalguide/server/know-how/what-is-a-network/
(Accessed: 19 November 2023).

What is network bandwidth and how is it measured? (no date) Networking. Available at:
https://www.techtarget.com/searchnetworking/definition/bandwidth (Accessed: 22
November 2023).
63 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
‘What Is Network Software? Definition, Types, Components, and Best Practices’ (no date)
Spiceworks. Available at: https://www.spiceworks.com/tech/networking/articles/what-is-
network-software/ (Accessed: 30 November 2023).

What is the OSI Model? (no date) Cloudflare. Available at:


https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/
(Accessed: 19 November 2023).

64 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02

You might also like