0% found this document useful (0 votes)
16 views

Assignment Networking Sajeevan

i am student sir i don't have money
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Assignment Networking Sajeevan

i am student sir i don't have money
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 48

Assignment Brief (RQF)

Higher National Diploma in Computing

Course Tittle Pearson BTEC Level 5 Higher National Diploma in Computing

Unit Number and Title: Unit 2- networking

Assignment Title A Windows Application for MadZoo Digital

Name of the Learner

Ref. No. of the Learner Pearson Regd. No.

Assignment Number Batch No & Semester

Issue Date Submission Date

Date Received 1st


Re-submission Date
submission

Unit Assessor: Academic Year 2023 - 2024

Assessor Summative Feedback

i
Grade: Assessor Signature: Date:

Resubmission Feedback - Formative

Date
Grade: Assessor Signature:

Internal Verifier’s Comments

Signature of the IV Date

ii
Student Agreement: Student Signature

I understand the feedback given to me and agree to carry out the actions in
Date
future works as required and indicated.

Please note that grade decisions are provisional. They are only confirmed once internal and external
moderation has taken place and grades decisions have been agreed at the assessment board.

STUDENT ASSESSMENT SUBMISSION AND DECLARATION

Student name: Assessor name:

Issue date: Submission date: Submitted on:

Programme:

Unit:

Assignment number and title:

Plagiarism

iii
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and students
who break the rules, however innocently, may be penalised. It is your responsibility to ensure
that you understand correct referencing practices. As a university level student, you are
expected to use appropriate references throughout and keep carefully detailed notes of all your
sources of materials for material you have used in your work, including any material
downloaded from the Internet. Please consult the relevant unit lecturer or your course tutor if
you need any further advice.

Student Declaration

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the consequences
of plagiarism. I understand that making a false declaration is a form of malpractice.

Student signature: Date:

iv
Table of Contents
Assignment Brief (RQF)............................................................................................................i

Higher National Diploma in Computing......................................................................................i

1. Importance implementing a Network in Madzoo Digital........................................................1

1.1. What is a Network?.........................................................................................................1

2. Implementable network types to Madzoo digital....................................................................4

2.1. Local Area Networks (LAN)...........................................................................................4

2.2. Metropolitan Area Network (MAN)................................................................................4

2.3. Wide Area Network (WAN)............................................................................................5

3. Network Standards applied Madzoo Digital............................................................................6

3.1. IEEE-Institute of electric and electronic engineers.........................................................6

3.2. OSI MODEL....................................................................................................................8

3.3. TCP MODEL.................................................................................................................10

4. Introduction to Network topologies.......................................................................................11

4.1. Bus Topology.................................................................................................................11

5. Ring Topology...................................................................................................................12

5.1. Star Topology................................................................................................................12

5.2. Mesh Topology..............................................................................................................13

5.3. Peer based network........................................................................................................14

6. Networking communication and its rules..............................................................................15

6.1. Half duplex mode..........................................................................................................15

6.2. Full duplex mode...........................................................................................................15

6.3. Data Transmission Media..............................................................................................16

6.3.1. Guided Medium.....................................................................................................16

6.3.2. Unguided medium.................................................................................................17

v
7. Bandwidth requirements and its importance.........................................................................18

8. Pros and cons of Network principals.....................................................................................19

8.1. Practical situations that are used for switching principles.............................................19

8.1.1. Circuit Switching.......................................................................................................19

8.1.2. Message Switching....................................................................................................19

8.1.3. Packet Switching.......................................................................................................19

10. Common Types of Servers And use of each Server Type.................................................20

10.1. Web Server....................................................................................................................20

10.2. File Server......................................................................................................................20

10.3. Database Server.............................................................................................................20

10.4. Virtualization Server......................................................................................................21

10.5. Terminal Services Server...............................................................................................21

10.6. Mail Server....................................................................................................................21

11. Networking Software.........................................................................................................21

11.1. Client Software..............................................................................................................21

11.2. Server Software.............................................................................................................21

11.3. Client Operating System................................................................................................22

11.4. Server Operating System...............................................................................................22

12. Interdependence of Workstation Hardware with Relevant Networking Software............23

13. Justification of Selected mediums for the MadZoo Digitals Network..............................24

13.1. Selected Topology.........................................................................................................24

13.1.1. Other hardware and software selected...........................................................................24

13.2. Server Selection.............................................................................................................25

14. Design of the Network.......................................................................................................26

14.1. Connect Devices with Cables................................................................................26

vi
14.2. Configure Devices.................................................................................................27

14.2.1. Set Up Routing......................................................................................................27

14.3. DHCP configuration..............................................................................................28

14.4. Configure Switches................................................................................................29

15. Testing the Network..........................................................................................................31

15.1. Ping from R&D lab to other Labs..........................................................................31

15.1.1. Ping from R&D lab to Project Management lab...................................................31

15.1.2. Ping from R&D lab to Information Security lab...................................................32

15.2. Extended Ping........................................................................................................33

16. Functionalities that allows the system to support device growth and the addition of
communication devices.........................................................................................................36

16.1. Security..................................................................................................................36

16.4. User Reliability......................................................................................................36

Bibliography..................................................................................................................................37

vii
Figure 1 Illustration of servers and client computers....................................................................20
Figure 2 design of the MadZoo digital network............................................................................26
Figure 3 Router IP Configuration..................................................................................................27
Figure 4 DHCP configuration........................................................................................................28
Figure 5 Core switch coding..........................................................................................................29
Figure 6 Ping test case 01..............................................................................................................31
Figure 7 Ping test case 2................................................................................................................32
Figure 8 Ping test case 3................................................................................................................32
Figure 9 Extended Ping from Router to Customer Service...........................................................33
Figure 10 Extended Ping from Router to Information Security....................................................33
Figure 11 Extended Ping from Router to Information Security....................................................34
Figure 12 Extended Ping from Router to R&D.............................................................................35

viii
Abstract
This project is an initiative in the networking development of MadZoo Digital, a software
development and networking solutions start up. The objective is to assess the organization's
networking requirements and to develop a detailed plan for implementation that fulfills the needs
of different departments. The assignment highlights the role of network implementation that
enables the communication, data sharing and collaboration to be smooth. Moreover, it explains
various network types, their pros and cons and their standards for interoperability and security.

Network topologies are reviewed with their effect on network performance addressed. The issue
of data transfer effectiveness and problem resolution is underlined and the bandwidth
considerations are justified in order to control bandwidth and support enterprise needs. This
comparison covers the advantages and disadvantages of common network concepts, and
importance of protocols in enabling networked systems to run efficiently is expounded.

The second part discusses the network devices and their functions in the network, including the
different types of servers, the interdependence in networking, and types of servers. The server
type to be selected is dependent on cost and performance optimization, suggesting the ability to
fit the organizations needs.

The project comes to the end by identifying ways of building the LAN, justifying the choice of
devices, developing the assessment test plan, selecting and configuring the network services, and
mapping out a maintenance schedule. The assignment has a range of elements including
networked system implementation, results verification, scalability analysis, and suggestions for
upgrades and security improvement. In conclusion, this is a complete roadmap for MadZoo
Digital, suggesting the networking solutions that are suitable to their development and needs.

ix
1. Importance implementing a Network in Madzoo Digital
An organization without a network is like an airplane without its wings. A network enables
proper communication flow and ensures the security of the data handled in an organization.
Before identifying the importance of implementing a network, let's examine what a network is
and what it brings to an organization.

1.1.What is a Network?
Every organization uses computers and laptops. When an employee works from home, they are
given the flexibility to use office laptops with limited access to social media and other non-work-
related platforms. The question is how these devices are connected to the organization. Simply,
these devices such as, office laptops, computers, servers etc. are connected to each other by
wired and wireless means. This connectivity of each device is known as the network.

The definition of a network is,

“A network is a collection of two or more computers that are joined together for the sharing of
resources, file exchange, and electronic communication. these computers can be connected using
different techniques such as cables, telephone lines, radio waves.” (The Florida Center for
Instructional Technology, 2020)

There are several types of networks, and they can be categorized based on their size, scope, and
purpose. Here are some common types of networks.

 Local Area Network (LAN)


 Wide Area Network (WAN)
 Metropolitan Area Network (MAN)
 Internet
 Intranet
 Wireless Networks
 Client-Server Network
 Peer-to-Peer Network

1
Implementing a computer network is of utmost importance in today's digital landscape. Let's
explore some key reasons why,

1. Communication and Collaboration

Networks facilitate efficient communication and seamless collaboration, enabling individuals


and organizations to easily share information, resources, and ideas.

2. Resource Sharing

Networks allow for the sharing of valuable resources such as printers, files, and applications,
resulting in cost reduction and the avoidance of unnecessary duplication.

3. Data Access and Storage

Networks provide centralized data storage and convenient access to information, ensuring that
authorized users can retrieve data whenever required.

4. Remote Access

Networks enable users to access resources and information remotely, which is particularly
valuable in our globalized and mobile work environment.

5. Cost Efficiency

Networks promote cost savings by allowing for the sharing of hardware resources, minimizing
the need for duplicate equipment, and streamlining maintenance and management processes.

6. Scalability

Networks can easily accommodate growth by facilitating the addition of devices and users
without causing significant disruption, thereby adapting to changing needs.

7. Security

Implementing secure network protocols and technologies is crucial for safeguarding sensitive
information. Networks provide the infrastructure necessary for implementing measures like
firewalls, encryption, and access controls.

2
8. Centralized Management

Networks enable centralized management of resources, user accounts, and security settings,
simplifying administration tasks and ensuring consistency.

9. Automation and Efficiency

Networks facilitate the automation of tasks such as backups, updates, and monitoring, reducing
manual effort and improving overall efficiency.

10. Innovation and Integration

Networks provide a solid foundation for innovation and integration, allowing for the seamless
integration of new technologies and fostering a culture of innovation.

3
2. Implementable network types to Madzoo digital
Few network types were pointed out when discussing about a network in under the heading 1.1.
In this section, the network types will be discussed in detail to understand its use in different
scenarios.

2.1.Local Area Networks (LAN)


Local Area Networks (LANs) are designed to connect multiple network devices and systems
within a limited geographical distance. These devices are connected using various protocols to
efficiently exchange data and services.

A LAN is essentially a collection of computers and other technology that share a common
communication line or wireless network. In most cases, there is a central server or processor
within a specific geographic region. This server typically houses shared data storage and
applications for multiple computer users.

LANs offer several features and advantages. Firstly, the data transmission speed within a LAN is
relatively higher compared to other network types such as MAN and WAN. Additionally, LANs
utilize private network addresses for secure data and service exchange. The use of dedicated
cables for network connections helps minimize errors and maintain data security.

There are also a few disadvantages to consider. LANs require constant administration by
experienced engineers to ensure proper functioning. Furthermore, there is a potential risk of
sensitive data leakage if not managed properly by the LAN administration. (Kapoor, 2023)

2.2.Metropolitan Area Network (MAN)


A Metropolitan Area Network (MAN) is a type of network that covers an entire city or a specific
area within a city. It connects multiple local area networks (LANs) using wired cable connection
such as data cables and fiber optics. One of the key advantages of MAN is its ability to provide
high-speed data transmission, thanks to the use of optical cables and wired connections.

There are several advantages using MAN. It offers full-duplex data transmission, which means
devices can send and receive data simultaneously. Additionally, MAN has the capability to cover
a wide area, whether it's an entire city or just a portion of it. This makes it a valuable network
type for connecting different areas within a metropolitan region.
4
On the other side, there are also some drawbacks. Given the large scale of the MAN networks,
there is more likelihood of attacks by hackers and cybercriminals. It is essential to deploy strong
security measures to defend the network and the data transmitted through it. Another limitation is
the high expenditure involved in the installation and maintenance of the hardware required for
MAN. (Kapoor, 2023)

2.3.Wide Area Network (WAN)


A Wide Area Network (WAN) is the type of network that ensures large geographical coverage.
In contrast to Local Area Networks (LAN) and Metropolitan Area Networks (MAN), WANs
have a lower data transfer speed because of the longer distance they have to pass the data over.

WAN networks are made up of satellites and radio towers that connect different locations and
channels available for users. They provide services that make connections between devices and
telephone lines using traditional dial-up or modem lines. Point-to-point service offers are
provided by local mobile phone providers and long-distance operators.

The benefits of using WAN are manifold. It is particularly good to use for long-distance calls
and can cover a large area of the country. Moreover, WANs are made up of radio towers and
user channels.

Additionally, there are some drawbacks that need to be addressed. It is costly to deploy a WAN
network, and only the expertise of experienced technicians guarantees efficient maintenance.
Moreover, because of the size of WANs, it is not so easy to prevent hacking attempts and to
debug potential errors.

5
3. Network Standards applied Madzoo Digital
When creating a network, multiple devices are used in order to build communication between all
these devices. Therefore, different means of hardware must be incorporated to link these devices
together. Apart from that, the devices also must be working following some standards. All these
hardware components follow a list of standards therefore the network will work systemically.
This defends the network from interoperability between the devices. Few of these standards that
are standardized by the below mentioned organizations,

 International Standards Organization (ISO)


 Institute of Electronics and Electrical Engineers (IEEE)

In simple terms, Network standard is the set of rules which ensures the data transfer between the
devices connected to a network. There are different standards for different purposes. for example
Telecommunication has different standards and networks have different a standard.

3.1.IEEE-Institute of electric and electronic engineers.


Institution of electric and Electronic Engineers (IEEE) is a non-profitable organization that
authorizes different standards for a vast section of fields. The different IEEE standards for
networking specifically through local area network (LAN) is named IEEE 802.X. the X will be
the number which denotes the standard used for.

Few IEEE 802.X

IEEE 802.1- This the standard given for LANs, it cover routing bridging etc..

IEEE 802.2- The logical link control.

IEEE 802.3-Ethernet LAN

 Networks are connected through Ethernet cables.


 This standard has few divisions that are authorized for different transmission bandwidths.
o Ex- 10BASE-T (for twisted pair)

6
o 10BASE-F (for optical fiber)

IEEE 802.4-Token Bus (LAN)moreover we can say it as for Bus topology.

IEEE 802.5-Token ring (LAN) specifically for ring topology.

IEEE 802.6- specifically standard given for MAN network.

IEEE 802.7-For broadband advisory group.

IEEE 802.8- fiber optics advisory.

 Tried to use fiber optics for token passing networks.


 They have been disbanded themselves from the standard.

IEEE 802.11- Wireless medium

 Now networks also use wireless medium to connect client computers and devices.
 Worlds mostly used network standard.
 Specially this standard is given for WLAN.

7
3.2.OSI MODEL
OSI model is the way which shows applications communicate throughout a network. It has seven
layers where each layer plays a role when transmitting data.

These layers are,

Layer 7(Application layer)

 Let the user to interact with the application, allows to transfer files, read messages etc...

Layer 6(presentation layer)

 Allows the application to format or translate data based on the syntax that application
accepts. This even handles the encryption and decryption of application.

Layer 5(Session layer)

 The “session time out” is measured in this layer. It is used in ATM, when the user stays
idol for some time the application stops automatically. So the user has to re login again.

Layer 4(Transport layer)

 This layer determines where to which data at which rate it should be sent.
 Checks errors and controls data transmission.
 TCP and UDP work in this layer

Layer 3(Network layer)

 This layer finds the route to which the data should be sent. This identifies IP addresses
and finds the correct route from which network the packet should be sent.

Layer 2(Data link layer)

 Defines the data of the network.


 Link control and media access control (MAC) is detected here.
 It corrects errors of the first layer

Layer 1(Physical layer)

8
 This identifies the physical medium the data should be transported. The cables and
wireless medium are part of this layer.
 Responsible to pass computer bits on device to the other.

9
3.3.TCP MODEL
TCP model is a compressed version of the OSI model. The layer of the OSI model has been
condensed to 4 layers in TCP model.

Application layer

 This is the layer which provides application exchange which includes protocols. For an
example. HTTP, FTTP, POP3 etc…

Transport layer

 This layer provides paths for transportation data segments through the internet layer. This
layer is similar to the session layer and the transport layer in the OSI model. This layer
uses the both UDP and TCP protocols.

INTERNET LAYER

 The internet layer provides connection for network to network. Responsibilities of this
layer is to packetize, address and routing the data for the corresponding network.

LINK LAYER

 This layer handles the hard drives of the network and the corresponding NIC card of the
computer.

10
4. Introduction to Network topologies
Network topologies decides the structure of arranging the computers in a network. There are 4
major types of topologies such as,
 Bus topology
 Ring topology
 Star topology
 Mesh topology

There are two types of layouts in topology,


 Physical topology- the layout that the arrangement order of the network can be actually
seen.
 Logical topology- describes the logical pathway.

4.1.Bus Topology
The bus topology has its backbone where the data is flowed through it. So the data is flowed it
every computer until it arrives to the desired IP address. Wires used were thick and thinnet in 80s
to block the data from bouncing out of the network, a T terminator is attached in the both ends
of the backbone cable.

Advantages of bus topology

 Easy to connect
 Need less cables
 Easy to start and extend the network.

Disadvantages of bus topology

 Breakdown of a single cable harms the whole network.


 At a time only one resources can be shared.
 Hard to troubleshoot problems
 Rarely can be used in a large building.
 More computers, less efficiency and accuracy.

11
5. Ring Topology
A single computer in the ring topology is connected nearest two computers. So at the end the
network arranges a circle. In this topology the data flows only to one direction. The information
to be sent from one node to another is sent the next computer and that computer too passes it to
the next computer. This continues until the information arrives to the desired node. This method
is known as token passing.

Advantages of ring topology

 Network collision is less in ring topology.


 Token passing makes the performance better during network traffic.
 Equal access to the resources available
 Server isn’t a must to control in this topology.

Disadvantages of ring topology

 The data passes through all the nodes. So it slowdowns the network.
 If a node gets infected, it easily spreads to the whole network.
 The hardware requirements are expensive.

5.1.Star Topology
This is a type of topology whereas all the client computers are connected through a central node
which can be a switch or a hub. This central node connects the clients and the server. Before
people used the hub but nowadays switches are in use as it is better than the hub. Star topology is
the most used topology now.

Characteristics of star topology

 In the star topology the switch works as a peripheral between the server and the client
computers.
 The data isn’t sent to all the computers connected in the network like bus and ring
topology because the switch sends the data to the desired computer.
 RJ45 cables, coaxial cables or wireless medium is used for connecting computers
 Number of data can be sent at a time for different nodes.
12
Advantages of Star topology.

 Number of data can be transferred at a time


 No interruptions to the network when removing or disabling a client.
 Easy to expand the network without interrupting the network.
 Easy to identify problems because the nodes are connected individually to the switch.
 High speed data transfer.
 Cable failure won’t be a big problem.

Disadvantages of star topology.

 Whole network depends on the switch.


 Entire network stop work if the switch breaks down.
 Requires more wires than bus and ring topology.

5.2.Mesh Topology
The devices in the mesh topology are connected to each and every devices of the network
through cables. This is simple topology logical wise but very complex physically. If there are X
number of devices in a mesh topology the calculation of cables goes like this,

Cables = X*(X-1)/2

Cables=2*(2-1)/2= 10

Characteristics of Mesh topology.

 Needs more cables.


 Every device are connected.
 If a breakdown happens in a cable, it finds another route from the cables to take the data.
 Rarely used as it is expensive and the strength needed to connect all the devices directly to all the
other devices of the network.

Advantages of Mesh topology

13
 Less network traffic because the network can transport data of devices simultaneously.
 Failure of a single device doesn’t affect the network.
 Provides high security.
 Easy to find out faults.

Disadvantages of Mesh topology.

 Requires large number of cables to connect node to node.


 Requires many input output ports.
 Installation is very hard as it is very complex.
 Very costly.

The structure of the physical and logical design of the protocols, hardware components, software
of a network is known as network architecture.

5.3.Peer based network


Peer to peer is a type of computer network which is in simple terms known as P2P network or
peer network. P2P network can be connected through internet or without internet and the special
feature it has is that it doesn’t need a central server. Every computer in the P2P network plays the
role as a client as well as a server too. This is why peer-to-peer computers don’t need central
servers.

The users of a single computer in a P2P network can see, take, and share files from the other
computers in the network. So this has led to software piracy and illegal music in some instances.
Napster was the first person to use a P2P network in 1999. It stored many movies and music
where users can download them, but Napster is illegal because the movies and films were pirated
through copyrights.

Requirements for a peer-to-peer network is,

 Internet
 P2P software

14
6. Networking communication and its rules
Transmitting data between two or more devices is known data communication. For this data
communication some kind of medium should be used to transport data. These mediums which
are used to transport data is known as communication mediums.

There are two types of data transmission modes such as half duplex and full duplex.

6.1. Half duplex mode


Half duplex can send only one data at a time to one direction.

 Ex-walky-talky

6.2. Full duplex mode


Full duplex mode can transmit data for both sides and simultaneously.

 Telephone communication.

15
6.3.Data Transmission Media
There are data transmission medium which data is transferred through cables or wireless
medium.

Types of data transmission mediums are,

 Guided medium.

 Unguided medium

6.3.1. Guided Medium


When a physically can be seen and touched medium is used data transmission is known guided
medium. e.g. cables

1. Twisted pair

The pairs of the copper wires are twisted. It is used connect devices in a network.

 UTP

Unshielded twisted pair (UTP) are a type of twisted pair and it is not shielded with aluminum foil
or any other shield.

 STP

Shielded twisted pair are the type of twisted pair which is shielded with an aluminum foil or any
other shield to save from electromagnet forces.

2. Coaxial cable

A braided copper net is available and it produces electromagnetic field. there is a tabular
insulating layer which is like a shield. Little expensive and used for TV antennas.

3. Fiber optics cable

It sends data as light so this is the fastest transmission media. Very expensive. There is a plastic
jacket to separate 2 cables in it.

16
6.3.2. Unguided medium.
This is the medium which doesn’t have any physical characteristics. This totally works from
waves.

1. Radio waves

This is a medium that uses radio waves for connection. WIFI and Bluetooth work using radio
waves.

2. Microwaves

The transmission center lies facing each other and transmits data. Satellite above 36000 km
capture data as microwaves in this medium and sends to the required tower through the satellites.

3. Infrared

It is used in TV remotes, wireless keyboards and mousses etc…it is tested through heat.

17
7. Bandwidth requirements and its importance
Bandwidth is the amount of data that a cable network can transport at a time and is known as
bandwidth. Bandwidth is measured in "Mbps" (megabits per second).

If there are three users requesting data from a server with a bandwidth of 21 Mbps, each of the
users won't receive the full 21 Mbps bandwidth rate. Instead, the bandwidth rate will be divided
among the three users, resulting in each user getting a bandwidth rate of 7 Mbps.

To achieve a faster network connection, it is advisable to have a higher amount of bandwidth,


especially when there are many users. In complex networks, fiber optic cables help to transport
data more quickly, although incorporating fiber optics can be more expensive for a network.

Things to consider when having a faster bandwidth.

 Medium: The path you use to send the signals if you are using a wired medium you can
use cables like Coaxial Cable, Twisted Pair and Fiber optic. In Wireless there are
Infrared, Radio Waves and Wi-Fi.
 Distance: Why you should consider distance is the data will drop after it reaches a certain
distance. For example, Unshielded Twisted Pair (UTP) cables maximum distance the data
can travel is 100 meters after that the data will get lost and the more the distance the more
time it takes for the data to reach its destination.
 Cost: The reason to consider cost is it is not necessary to have a fiber optic cable in a
small geographical area where there is not much to do with that much speed but when
you consider a large geographical area where there is more work to do then having a fiber
optic cable is considerable. Fiber optic cables are more expensive then any other cables.
Mostly we use UTP and STP nowadays.

18
8. Pros and cons of Network principals
8.1.Practical situations that are used for switching principles.
8.1.1. Circuit Switching
circuit switching ( an older method ) involves the setting up of a dedicated pathway between two
devices for their talk to walk through the entire duration. This path is given to them so they can
always stay connected even when they are not together. On the contrary, it also takes much time
because it stays congested even in the moments of silence (GeekforGeeks, 2024)

8.1.2. Message Switching


Packets switching, in turn, break the data into pieces of small packets. These packets travel via
the most suitable routes on the network, independently from each other in order to reach their
destination. This also brings in flexibility of use and proper resource utilization. Multi
conversations can occur in parallel by this technique. (GeekforGeeks, 2024)

8.1.3. Packet Switching


Eventually, we have the message switching that takes care of sending whole messages through
the network. At every one of the stops the whole message is being stored and is then forwarded.
Although this minimizes the risk of losing data this does not as effective as packet switching
since the entire message needs to be stored and forwarded. (GeekforGeeks, 2024)

19
10. Common Types of Servers And use of each Server Type

Figure 1 Illustration of servers and client computers

10.1. Web Server


Web Servers are computers which use HTTP protocol to deliver web pages to the users. Every
web server has an IP address and possibly a domain name. A web server consists of a physical
server, server operating system (OS) and software to support http communication.

10.2. File Server


File Server is a computer that is used as a central storage and to manage files so the client
computers can access the files on the same network. A file server allows you to share files over
the network without using an external storage medium to transfer them. File servers use file
transfer protocol (FTP) to transfer the files.

10.3. Database Server


Database server is the term used to refer to the back-end system of a database application. The
database server performs tasks such as data analysis, storage, data manipulation, archiving and

20
other non-user specific tasks. Several databases can be kept on a single server or a group of
servers configured to protect data.

10.4. Virtualization Server


Virtualization server means partitioning a physical server into small virtual servers by using
virtualization software’s like VMware and VirtualBox. In virtualization server every server runs
multiple operating systems at the same time.

10.5. Terminal Services Server


A Terminal Server is a server that is used to help serial devices access local area networks. This
type of servers does not provide many security features. Terminal servers are seen as simple
connecting devices for integrating hardware components into a greater architecture.

10.6. Mail Server


A mail Server is a server that acts as a post office in a network. The server stores incoming
emails and sends it to the users and it can also be used to send messages outside of the network.
Mail server uses Simple Mail Transfer Protocol (SMTP).

11. Networking Software

11.1. Client Software


A client software is software that depends on another program to function. Client software works
by the instructions given by server software. The instructions given by the server will get
transferred by a medium in a Wired (UTP, STP, Fiber Optic) or Wireless (Wi-Fi) Manner.

11.2. Server Software


A server software is designed to be used in a server computer. It administrates the network, and
it also gives instructions to client software’s. The instructions are transmitted in a Wired (UTP,
STP, Fiber Optic) or Wireless (Wi-Fi) Manner

21
11.3. Client Operating System
Client Operating system is a system that only supports a single user. It does not need a network
to function properly. Client operating systems give an interface for the user to work with to
communicate with the server. A Client operating system controls the hardware components like
the NIC and all hardware related components to fulfill the user’s requirements.

11.4. Server Operating System


Server operating systems is a system that supports multiple users. They are mainly designed to
work with servers. They are used in a Client/Server architecture. They fulfill the requests of
client computers. A network is needed to for a server operating system to get the maximum use
out of it. The server operating system regulates the server’s hardware components to fulfill the
client’s request and to work efficiently.

Examples of server OS

 Windows Server
 Mac OS X Server
 Red Hat Enterprise Linux

(Beal, n.d.)

22
12. Interdependence of Workstation Hardware with Relevant Networking
Software
In the context of a network, interdependence stands for the dependency between the components
or systems It is when each part does its job to ensure that the overall network performs as it
should be.

Talking about the workstation hardware next. Workstations are personal computers where users
work on tasks such as document editing, data processing or running special programs. At the
hardware level, the components of a workstation are the CPU, RAM, storage (hard drive or
SSD), input/output devices (keyboard, mouse, monitor), and the network interface card (NIC)
used to connect to the network.

Now, onto networking software. This concerns the processes and standards that ensure messages
are transmitted and data are shared within the network. It involves the network stack of the
operating system, device drivers for networking devices, and diverse networking protocols like
TCP/IP.

The hardware and software interdependency is paramount in ensuring efficient network


operations. Similarly, workstations utilize NICs to connect to the network and thus the NIC
hardware needs to be compatible with the software and drivers of the operating system of the
workstation. The network software is usually based on specific device drivers so that it can
communicate with the NIC and other hardware parts. They bridge the gap between high-level
networking commands and the low-level set of instructions that the hardware can comprehend.
Furthermore, networking software utilizes the TCP/IP protocol for data exchange, and the
workstations should support these protocols since the NIC ensures compatibility with other
network devices.

When the data transmission process from the worksation begins, the dependence of software and
hardware becomes obvious. The network software deals with the data flow management,
whereas it is the hardware parts, particularly the NIC, that causes the packets to be physically
transferred over the network.

23
13. Justification of Selected mediums for the MadZoo Digitals Network

13.1. Selected Topology


The Suitable Topology for Madzoo Digital

 The suitable topology for the company is star topology. The reason why I chose star
topology is:
 It is easy to implement.
 It is very easy to troubleshoot.
 If the company wants to add new computers to the network, we can add new computers
without disturbing the network.

Protocols that MadZoo Digital Should Use

 SMTP : For a mail server we need to use Simple Mail Transfer Protocol (SMTP)s.
 FTP : To transfer files in the network or to download and upload on the internet we
need to use File Transfer Protocol (File Transfer Protocol).
 POP3 : Post Office Protocol (POP3) is a client protocol. It is used to access emails.

13.1.1. Other hardware and software selected.


Server OS: Windows Server 2019

 Processor
o Minimum: 1.4 GHz 64-bit processor
o Recommended: 2.0 GHz 64-bit processor

 RAM
o Minimum: 512 Mb
o Recommended: 2 GB

 Hard Disk
o Minimum: 32 Gb

Client OS: Windows 10

 Processor
o Minimum: 1GHz

24
 RAM
o Minimum: 1 GB for 32- bit or 2 GB for 64-bit

 Hard Disk Space


o Minimum: 16 GB for 32-bit or 20 GB for 64-bit

 Graphics Card
o Minimum: DirectX 9

13.2. Server Selection


Justifying the relevant servers for the scenario according to the purpose.

Mail Server

 A mail server can send and receive mail for the users. All the users can get email facility
from a mail server.

Web Server/Internet server

 A web server responds to HTTP requests. It allows you to browse websites from the
internet.

File Server

 A file server allows a user to store and transfer files throughout the network. This server
accomplishes two of the requested resources of the scenario (file transferring and media).

25
14. Design of the Network

Figure 2 design of the MadZoo digital network

The above diagram demonstrates the whole design of the Network created for MadZoo digitals.
Each bubble shows each lab containing the computers and printers that it contains.

 Research and Development – 5 PCs & 1 Printer


 Project management office – 3 PCs
 Information Security – 3 PCs
 Customer Service – 2 PCs & 1 Printer

Here are the step-by-step evaluation of the Network configuration.

Grab components and drop them onto the workspace area. These may range from routers,
switches, PCs, laptops, servers and others.

14.1. Connect Devices with Cables


Using the right kind of cables to connect the devices. Ethernet cables were used to link PCs to
switches, andserial cables for connecting routers.

26
14.2. Configure Devices
Specify IP addresses, gateway addresses, and other attributes as needed.
14.2.1. Set Up Routing

Figure 3 Router IP Configuration

The above CLI command demonstrates the codes inserted to configure the IP address of the
router via the CLI.

Configuring the IP address of the router on Cisco Packet Tracer is a basic process for ensuring
that network communication is feasible. This is achievable by logging in to the router and then
entering the command line interface to configure the router.

Write the interface using the “interface" command, followed by the type and number such as
FastEthernet0/0. Apply the "IP address" command and choose the desired IP address. It is very
important to make sure that the interface is running on executing the 'no shutdown' command.
Following the configuring of interface type, the interface configuration mode should be exited

27
and the global configuration mode should be previous. (The commands followed in these steps
can be referred in the figure 3)

To ensure these alterations are maintained, use the "write memory" command. The process of
obtaining IP address of the router's interface not only simplifies the communication within the
network but also enables it to function smoothly.

After configuring the IP address of the IP address, The DHCP service is configured to provide IP
address.

14.3. DHCP configuration

Figure 4 DHCP configuration.

Configuration of DHCP in Cisco Packet Tracer's Command Line Interface (CLI) can be done
using the mentioned steps.

Firstly, access CLI of the router. Enter the global configuration mode and configure the interface
that is connected to the switch by assigning an IP address and then enabling it.

28
Then, configure a DHCP pool in which you define the network, the gateway, and the DNS
(Optional). (The commands followed in these steps can be referred in the figure 4)

After the configuration of the DHCP pool is done, the exit the configuration mode of DHCP pool
and the global configuration mode respectively. Commit the config so that the changes are saved
permanently. (The commands followed in these steps can be referred in the figure 4)

MadZoo DHCP configuration is set so that the devices connected to the switch can get IP
addresses automatically making sure that the switch port connected to the router interface is in
order.

14.4. Configure Switches

Figure 5 Core switch coding

Configuration of VLANs, switch ports and other necessary configurations for switches.
Configuration of a VLAN and switch ports in Cisco Packet Tracer involves several steps.

29
Firstly, you should go to Command Line Interface (CLI) and then enter Global Configuration
Mode. With this configuration mode you can create VLANs using the "vlan" commands and give
them IP addresses using the "interface vlan" command. (The commands followed in these steps
can be referred in the figure 5)

Next, use the "switchport" commands to configure the switch ports. It is vital to maintain your
configurations in a consistent way to promote the smooth interaction. (The commands followed
in these steps can be referred in the figure 5)

As the last step, you should save the configuration to ensure durability. Please always
personalize the VLANs, IP addresses, and port settings of switches to meet the needs of your
network.

30
15. Testing the Network
Below mentioned are few scenarios used to test workability of the network. Pinging is used to
check is the network works properly. All the pinging commands were successful with 0 packets
failure. The screenshots are added below.

15.1. Ping from R&D lab to other Labs


15.1.1. Ping from R&D lab to Project Management lab

Figure 6 Ping test case 01

31
15.1.2. Ping from R&D lab to Information Security lab

Figure 7 Ping test case 2

15.1.3. Pinging from R&D Lab to Customer Service Lab

Figure 8 Ping test case 3

32
15.2. Extended Ping
In this section, All the router connectivity is tested by pinging the routers to each lab. All the
pings were successful. The screenshots are added below.

15.2.1. Router to customer service

Figure 9 Extended Ping from Router to Customer Service

15.2.2. Router to Information security

Figure 10 Extended Ping from Router to Information Security

33
15.2.3. Router to Project management

Figure 11 Extended Ping from Router to Information Security

34
15.2.4. Router to RND

Figure 12 Extended Ping from Router to R&D

35
16. Functionalities that allows the system to support device growth and
the addition of communication devices
16.1. Security
Now in MadZoo digital the servers have been configured with restriction to the clients so that
they don’t surf in any suspicious websites because malicious data packets could enter the
network. There are also firewalls in place to protect the network from hackers from stealing data.
The server is stored in a locked room so that it is harder to access it. We also use MAC Filtering
to prevent unauthorized access to the network. We have used SSH to encrypt the network so that
third party people can’t see the data that is travelling in the network.

16.2. Design

In MadZoo digital we are using wired connections which are Unshielded Twisted Pair (UTP).
The cables have been connected to different departments within 100m. We have used subnetting
to divide the networks for each department. The main reason to use subnet is to reduce the
wastage of IP Addresses.

We have configured DHCP (Dynamic Host Configuration Protocol) for each department to
automatically provide IP addresses to the devices in the network.

16.3. Performance

In MadZoo digital they use high end PC’s to do their work. The server also uses high end
components because the server should be powerful enough to fulfill the request of the users. As
per the maintenance schedule any damaged or malfunctioning components should be replaced
because if there are any damaged or malfunctioning components the network performance would
decrease. As we are using star topology in the network the network traffic would be less.

16.4. User Reliability


The Network in MadZoo digital is very Reliable. In MadZoo digital we use star topology since
we use that we don’t have to worry about network traffic so much. As per the maintenance
schedule the network devices and cables should be checked so it will keep the performance of
the network from decreasing.

36
Bibliography
academy, c. n., 2022. Communication Principles. [Online]
Available at: https://www.ciscopress.com/articles/article.asp?p=3131360&seqNum=4

Anon., 2020. How To Design A Network Topology | Jones IT. [Online]


Available at: https://www.itjones.com/blogs/2020/11/22/a-guide-to-network-topology

Anon., 2022. An Introduction to Basic Networking Concepts and Principles | CyberITHub.


[Online]
Available at: https://www.cyberithub.com/an-introduction-to-basic-networking-concepts-and-
principles/

Anon., 2023. Fig. 1.2-Interdependence of Network Elements. [Online]


Available at: https://www.researchgate.net/figure/Interdependence-of-Network-
Elements_fig1_46150328

Anon., 2023. what is Procedural Programming. [Online]


Available at: https://hackr.io/blog/procedural-programming

Beal, V., n.d. database server. [Online]


Available at: https://www.webopedia.com/TERM/D/database_server.html

Beal, V., n.d. LAN - local-area network. [Online]


Available at: https://www.webopedia.com/TERM/L/local_area_network_LAN.html

boudreau, Emma, 2020. What Is A Programming Paradigm?. [Online]


Available at: https://towardsdatascience.com/what-is-a-programming-paradigm-1259362673c2

Donohoe, A., n.d. What Is a Client Server Network?. [Online]


Available at: https://www.techwalla.com/articles/what-is-a-client-server-network

f5, n.d. Load Balancer. [Online]


Available at: https://www.f5.com/services/resources/glossary/load-balancer

Froehlich, A., 2023. What is network bandwidth and how is it measured?. [Online]
Available at: https://www.techtarget.com/searchnetworking/definition/bandwidth

37
GeekforGeeks, 2024. Switching. [Online]
Available at: https://www.geeksforgeeks.org/message-switching-techniques/
[Accessed 2022 6 20].

Gillis, A. S., n.d. What is Object-Oriented Programming (OOP)?. [Online]


Available at: https://www.techtarget.com/searchapparchitecture/definition/object-oriented-
programming-OOP

Kapoor, A., 2023. Cloud computing. [Online]


Available at: https://www.simplilearn.com/tutorials/networking-tutorial/importance-of-types-of-
networks-lan-man-wan

Margaret Rouse, n.d. traffic shaping (packet shaping). [Online]


Available at: https://searchnetworking.techtarget.com/definition/traffic-shaping

Rouse, M., n.d. metropolitan area network (MAN). [Online]


Available at: https://searchnetworking.techtarget.com/definition/metropolitan-area-network-
MAN

techopedia, n.d. Content Filtering. [Online]


Available at: https://www.techopedia.com/definition/14314/content-filtering

techopedia, n.d. Host-Based Intrusion Detection System (HIDS). [Online]


Available at: https://www.techopedia.com/definition/12826/host-based-intrusion-detection-
system-hids

techopedia, n.d. https://www.techopedia.com/definition/688/server-virtualization. [Online]


Available at: https://www.techopedia.com/definition/688/server-virtualization

The Florida Center for Instructional Technology, 2020. Network. [Online]


Available at: https://fcit.usf.edu/network/chap1/chap1.htm

what-when-how, n.d. Network Standards (Data Communications and Networking). [Online]


Available at: https://what-when-how.com/data-communications-and-networking/network-
standards-data-communications-and-networking/

38
Williams, L., 2023. Types of Computer Network: What is LAN, MAN and WAN. [Online]
Available at: https://www.guru99.com/types-of-computer-network.html

39

You might also like