Assignment Networking Sajeevan
Assignment Networking Sajeevan
i
Grade: Assessor Signature: Date:
Date
Grade: Assessor Signature:
ii
Student Agreement: Student Signature
I understand the feedback given to me and agree to carry out the actions in
Date
future works as required and indicated.
Please note that grade decisions are provisional. They are only confirmed once internal and external
moderation has taken place and grades decisions have been agreed at the assessment board.
Programme:
Unit:
Plagiarism
iii
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and students
who break the rules, however innocently, may be penalised. It is your responsibility to ensure
that you understand correct referencing practices. As a university level student, you are
expected to use appropriate references throughout and keep carefully detailed notes of all your
sources of materials for material you have used in your work, including any material
downloaded from the Internet. Please consult the relevant unit lecturer or your course tutor if
you need any further advice.
Student Declaration
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences
of plagiarism. I understand that making a false declaration is a form of malpractice.
iv
Table of Contents
Assignment Brief (RQF)............................................................................................................i
5. Ring Topology...................................................................................................................12
v
7. Bandwidth requirements and its importance.........................................................................18
vi
14.2. Configure Devices.................................................................................................27
16. Functionalities that allows the system to support device growth and the addition of
communication devices.........................................................................................................36
16.1. Security..................................................................................................................36
Bibliography..................................................................................................................................37
vii
Figure 1 Illustration of servers and client computers....................................................................20
Figure 2 design of the MadZoo digital network............................................................................26
Figure 3 Router IP Configuration..................................................................................................27
Figure 4 DHCP configuration........................................................................................................28
Figure 5 Core switch coding..........................................................................................................29
Figure 6 Ping test case 01..............................................................................................................31
Figure 7 Ping test case 2................................................................................................................32
Figure 8 Ping test case 3................................................................................................................32
Figure 9 Extended Ping from Router to Customer Service...........................................................33
Figure 10 Extended Ping from Router to Information Security....................................................33
Figure 11 Extended Ping from Router to Information Security....................................................34
Figure 12 Extended Ping from Router to R&D.............................................................................35
viii
Abstract
This project is an initiative in the networking development of MadZoo Digital, a software
development and networking solutions start up. The objective is to assess the organization's
networking requirements and to develop a detailed plan for implementation that fulfills the needs
of different departments. The assignment highlights the role of network implementation that
enables the communication, data sharing and collaboration to be smooth. Moreover, it explains
various network types, their pros and cons and their standards for interoperability and security.
Network topologies are reviewed with their effect on network performance addressed. The issue
of data transfer effectiveness and problem resolution is underlined and the bandwidth
considerations are justified in order to control bandwidth and support enterprise needs. This
comparison covers the advantages and disadvantages of common network concepts, and
importance of protocols in enabling networked systems to run efficiently is expounded.
The second part discusses the network devices and their functions in the network, including the
different types of servers, the interdependence in networking, and types of servers. The server
type to be selected is dependent on cost and performance optimization, suggesting the ability to
fit the organizations needs.
The project comes to the end by identifying ways of building the LAN, justifying the choice of
devices, developing the assessment test plan, selecting and configuring the network services, and
mapping out a maintenance schedule. The assignment has a range of elements including
networked system implementation, results verification, scalability analysis, and suggestions for
upgrades and security improvement. In conclusion, this is a complete roadmap for MadZoo
Digital, suggesting the networking solutions that are suitable to their development and needs.
ix
1. Importance implementing a Network in Madzoo Digital
An organization without a network is like an airplane without its wings. A network enables
proper communication flow and ensures the security of the data handled in an organization.
Before identifying the importance of implementing a network, let's examine what a network is
and what it brings to an organization.
1.1.What is a Network?
Every organization uses computers and laptops. When an employee works from home, they are
given the flexibility to use office laptops with limited access to social media and other non-work-
related platforms. The question is how these devices are connected to the organization. Simply,
these devices such as, office laptops, computers, servers etc. are connected to each other by
wired and wireless means. This connectivity of each device is known as the network.
“A network is a collection of two or more computers that are joined together for the sharing of
resources, file exchange, and electronic communication. these computers can be connected using
different techniques such as cables, telephone lines, radio waves.” (The Florida Center for
Instructional Technology, 2020)
There are several types of networks, and they can be categorized based on their size, scope, and
purpose. Here are some common types of networks.
1
Implementing a computer network is of utmost importance in today's digital landscape. Let's
explore some key reasons why,
2. Resource Sharing
Networks allow for the sharing of valuable resources such as printers, files, and applications,
resulting in cost reduction and the avoidance of unnecessary duplication.
Networks provide centralized data storage and convenient access to information, ensuring that
authorized users can retrieve data whenever required.
4. Remote Access
Networks enable users to access resources and information remotely, which is particularly
valuable in our globalized and mobile work environment.
5. Cost Efficiency
Networks promote cost savings by allowing for the sharing of hardware resources, minimizing
the need for duplicate equipment, and streamlining maintenance and management processes.
6. Scalability
Networks can easily accommodate growth by facilitating the addition of devices and users
without causing significant disruption, thereby adapting to changing needs.
7. Security
Implementing secure network protocols and technologies is crucial for safeguarding sensitive
information. Networks provide the infrastructure necessary for implementing measures like
firewalls, encryption, and access controls.
2
8. Centralized Management
Networks enable centralized management of resources, user accounts, and security settings,
simplifying administration tasks and ensuring consistency.
Networks facilitate the automation of tasks such as backups, updates, and monitoring, reducing
manual effort and improving overall efficiency.
Networks provide a solid foundation for innovation and integration, allowing for the seamless
integration of new technologies and fostering a culture of innovation.
3
2. Implementable network types to Madzoo digital
Few network types were pointed out when discussing about a network in under the heading 1.1.
In this section, the network types will be discussed in detail to understand its use in different
scenarios.
A LAN is essentially a collection of computers and other technology that share a common
communication line or wireless network. In most cases, there is a central server or processor
within a specific geographic region. This server typically houses shared data storage and
applications for multiple computer users.
LANs offer several features and advantages. Firstly, the data transmission speed within a LAN is
relatively higher compared to other network types such as MAN and WAN. Additionally, LANs
utilize private network addresses for secure data and service exchange. The use of dedicated
cables for network connections helps minimize errors and maintain data security.
There are also a few disadvantages to consider. LANs require constant administration by
experienced engineers to ensure proper functioning. Furthermore, there is a potential risk of
sensitive data leakage if not managed properly by the LAN administration. (Kapoor, 2023)
There are several advantages using MAN. It offers full-duplex data transmission, which means
devices can send and receive data simultaneously. Additionally, MAN has the capability to cover
a wide area, whether it's an entire city or just a portion of it. This makes it a valuable network
type for connecting different areas within a metropolitan region.
4
On the other side, there are also some drawbacks. Given the large scale of the MAN networks,
there is more likelihood of attacks by hackers and cybercriminals. It is essential to deploy strong
security measures to defend the network and the data transmitted through it. Another limitation is
the high expenditure involved in the installation and maintenance of the hardware required for
MAN. (Kapoor, 2023)
WAN networks are made up of satellites and radio towers that connect different locations and
channels available for users. They provide services that make connections between devices and
telephone lines using traditional dial-up or modem lines. Point-to-point service offers are
provided by local mobile phone providers and long-distance operators.
The benefits of using WAN are manifold. It is particularly good to use for long-distance calls
and can cover a large area of the country. Moreover, WANs are made up of radio towers and
user channels.
Additionally, there are some drawbacks that need to be addressed. It is costly to deploy a WAN
network, and only the expertise of experienced technicians guarantees efficient maintenance.
Moreover, because of the size of WANs, it is not so easy to prevent hacking attempts and to
debug potential errors.
5
3. Network Standards applied Madzoo Digital
When creating a network, multiple devices are used in order to build communication between all
these devices. Therefore, different means of hardware must be incorporated to link these devices
together. Apart from that, the devices also must be working following some standards. All these
hardware components follow a list of standards therefore the network will work systemically.
This defends the network from interoperability between the devices. Few of these standards that
are standardized by the below mentioned organizations,
In simple terms, Network standard is the set of rules which ensures the data transfer between the
devices connected to a network. There are different standards for different purposes. for example
Telecommunication has different standards and networks have different a standard.
IEEE 802.1- This the standard given for LANs, it cover routing bridging etc..
6
o 10BASE-F (for optical fiber)
Now networks also use wireless medium to connect client computers and devices.
Worlds mostly used network standard.
Specially this standard is given for WLAN.
7
3.2.OSI MODEL
OSI model is the way which shows applications communicate throughout a network. It has seven
layers where each layer plays a role when transmitting data.
Let the user to interact with the application, allows to transfer files, read messages etc...
Allows the application to format or translate data based on the syntax that application
accepts. This even handles the encryption and decryption of application.
The “session time out” is measured in this layer. It is used in ATM, when the user stays
idol for some time the application stops automatically. So the user has to re login again.
This layer determines where to which data at which rate it should be sent.
Checks errors and controls data transmission.
TCP and UDP work in this layer
This layer finds the route to which the data should be sent. This identifies IP addresses
and finds the correct route from which network the packet should be sent.
8
This identifies the physical medium the data should be transported. The cables and
wireless medium are part of this layer.
Responsible to pass computer bits on device to the other.
9
3.3.TCP MODEL
TCP model is a compressed version of the OSI model. The layer of the OSI model has been
condensed to 4 layers in TCP model.
Application layer
This is the layer which provides application exchange which includes protocols. For an
example. HTTP, FTTP, POP3 etc…
Transport layer
This layer provides paths for transportation data segments through the internet layer. This
layer is similar to the session layer and the transport layer in the OSI model. This layer
uses the both UDP and TCP protocols.
INTERNET LAYER
The internet layer provides connection for network to network. Responsibilities of this
layer is to packetize, address and routing the data for the corresponding network.
LINK LAYER
This layer handles the hard drives of the network and the corresponding NIC card of the
computer.
10
4. Introduction to Network topologies
Network topologies decides the structure of arranging the computers in a network. There are 4
major types of topologies such as,
Bus topology
Ring topology
Star topology
Mesh topology
4.1.Bus Topology
The bus topology has its backbone where the data is flowed through it. So the data is flowed it
every computer until it arrives to the desired IP address. Wires used were thick and thinnet in 80s
to block the data from bouncing out of the network, a T terminator is attached in the both ends
of the backbone cable.
Easy to connect
Need less cables
Easy to start and extend the network.
11
5. Ring Topology
A single computer in the ring topology is connected nearest two computers. So at the end the
network arranges a circle. In this topology the data flows only to one direction. The information
to be sent from one node to another is sent the next computer and that computer too passes it to
the next computer. This continues until the information arrives to the desired node. This method
is known as token passing.
The data passes through all the nodes. So it slowdowns the network.
If a node gets infected, it easily spreads to the whole network.
The hardware requirements are expensive.
5.1.Star Topology
This is a type of topology whereas all the client computers are connected through a central node
which can be a switch or a hub. This central node connects the clients and the server. Before
people used the hub but nowadays switches are in use as it is better than the hub. Star topology is
the most used topology now.
In the star topology the switch works as a peripheral between the server and the client
computers.
The data isn’t sent to all the computers connected in the network like bus and ring
topology because the switch sends the data to the desired computer.
RJ45 cables, coaxial cables or wireless medium is used for connecting computers
Number of data can be sent at a time for different nodes.
12
Advantages of Star topology.
5.2.Mesh Topology
The devices in the mesh topology are connected to each and every devices of the network
through cables. This is simple topology logical wise but very complex physically. If there are X
number of devices in a mesh topology the calculation of cables goes like this,
Cables = X*(X-1)/2
Cables=2*(2-1)/2= 10
13
Less network traffic because the network can transport data of devices simultaneously.
Failure of a single device doesn’t affect the network.
Provides high security.
Easy to find out faults.
The structure of the physical and logical design of the protocols, hardware components, software
of a network is known as network architecture.
The users of a single computer in a P2P network can see, take, and share files from the other
computers in the network. So this has led to software piracy and illegal music in some instances.
Napster was the first person to use a P2P network in 1999. It stored many movies and music
where users can download them, but Napster is illegal because the movies and films were pirated
through copyrights.
Internet
P2P software
14
6. Networking communication and its rules
Transmitting data between two or more devices is known data communication. For this data
communication some kind of medium should be used to transport data. These mediums which
are used to transport data is known as communication mediums.
There are two types of data transmission modes such as half duplex and full duplex.
Ex-walky-talky
Telephone communication.
15
6.3.Data Transmission Media
There are data transmission medium which data is transferred through cables or wireless
medium.
Guided medium.
Unguided medium
1. Twisted pair
The pairs of the copper wires are twisted. It is used connect devices in a network.
UTP
Unshielded twisted pair (UTP) are a type of twisted pair and it is not shielded with aluminum foil
or any other shield.
STP
Shielded twisted pair are the type of twisted pair which is shielded with an aluminum foil or any
other shield to save from electromagnet forces.
2. Coaxial cable
A braided copper net is available and it produces electromagnetic field. there is a tabular
insulating layer which is like a shield. Little expensive and used for TV antennas.
It sends data as light so this is the fastest transmission media. Very expensive. There is a plastic
jacket to separate 2 cables in it.
16
6.3.2. Unguided medium.
This is the medium which doesn’t have any physical characteristics. This totally works from
waves.
1. Radio waves
This is a medium that uses radio waves for connection. WIFI and Bluetooth work using radio
waves.
2. Microwaves
The transmission center lies facing each other and transmits data. Satellite above 36000 km
capture data as microwaves in this medium and sends to the required tower through the satellites.
3. Infrared
It is used in TV remotes, wireless keyboards and mousses etc…it is tested through heat.
17
7. Bandwidth requirements and its importance
Bandwidth is the amount of data that a cable network can transport at a time and is known as
bandwidth. Bandwidth is measured in "Mbps" (megabits per second).
If there are three users requesting data from a server with a bandwidth of 21 Mbps, each of the
users won't receive the full 21 Mbps bandwidth rate. Instead, the bandwidth rate will be divided
among the three users, resulting in each user getting a bandwidth rate of 7 Mbps.
Medium: The path you use to send the signals if you are using a wired medium you can
use cables like Coaxial Cable, Twisted Pair and Fiber optic. In Wireless there are
Infrared, Radio Waves and Wi-Fi.
Distance: Why you should consider distance is the data will drop after it reaches a certain
distance. For example, Unshielded Twisted Pair (UTP) cables maximum distance the data
can travel is 100 meters after that the data will get lost and the more the distance the more
time it takes for the data to reach its destination.
Cost: The reason to consider cost is it is not necessary to have a fiber optic cable in a
small geographical area where there is not much to do with that much speed but when
you consider a large geographical area where there is more work to do then having a fiber
optic cable is considerable. Fiber optic cables are more expensive then any other cables.
Mostly we use UTP and STP nowadays.
18
8. Pros and cons of Network principals
8.1.Practical situations that are used for switching principles.
8.1.1. Circuit Switching
circuit switching ( an older method ) involves the setting up of a dedicated pathway between two
devices for their talk to walk through the entire duration. This path is given to them so they can
always stay connected even when they are not together. On the contrary, it also takes much time
because it stays congested even in the moments of silence (GeekforGeeks, 2024)
19
10. Common Types of Servers And use of each Server Type
20
other non-user specific tasks. Several databases can be kept on a single server or a group of
servers configured to protect data.
21
11.3. Client Operating System
Client Operating system is a system that only supports a single user. It does not need a network
to function properly. Client operating systems give an interface for the user to work with to
communicate with the server. A Client operating system controls the hardware components like
the NIC and all hardware related components to fulfill the user’s requirements.
Examples of server OS
Windows Server
Mac OS X Server
Red Hat Enterprise Linux
(Beal, n.d.)
22
12. Interdependence of Workstation Hardware with Relevant Networking
Software
In the context of a network, interdependence stands for the dependency between the components
or systems It is when each part does its job to ensure that the overall network performs as it
should be.
Talking about the workstation hardware next. Workstations are personal computers where users
work on tasks such as document editing, data processing or running special programs. At the
hardware level, the components of a workstation are the CPU, RAM, storage (hard drive or
SSD), input/output devices (keyboard, mouse, monitor), and the network interface card (NIC)
used to connect to the network.
Now, onto networking software. This concerns the processes and standards that ensure messages
are transmitted and data are shared within the network. It involves the network stack of the
operating system, device drivers for networking devices, and diverse networking protocols like
TCP/IP.
When the data transmission process from the worksation begins, the dependence of software and
hardware becomes obvious. The network software deals with the data flow management,
whereas it is the hardware parts, particularly the NIC, that causes the packets to be physically
transferred over the network.
23
13. Justification of Selected mediums for the MadZoo Digitals Network
The suitable topology for the company is star topology. The reason why I chose star
topology is:
It is easy to implement.
It is very easy to troubleshoot.
If the company wants to add new computers to the network, we can add new computers
without disturbing the network.
SMTP : For a mail server we need to use Simple Mail Transfer Protocol (SMTP)s.
FTP : To transfer files in the network or to download and upload on the internet we
need to use File Transfer Protocol (File Transfer Protocol).
POP3 : Post Office Protocol (POP3) is a client protocol. It is used to access emails.
Processor
o Minimum: 1.4 GHz 64-bit processor
o Recommended: 2.0 GHz 64-bit processor
RAM
o Minimum: 512 Mb
o Recommended: 2 GB
Hard Disk
o Minimum: 32 Gb
Processor
o Minimum: 1GHz
24
RAM
o Minimum: 1 GB for 32- bit or 2 GB for 64-bit
Graphics Card
o Minimum: DirectX 9
Mail Server
A mail server can send and receive mail for the users. All the users can get email facility
from a mail server.
A web server responds to HTTP requests. It allows you to browse websites from the
internet.
File Server
A file server allows a user to store and transfer files throughout the network. This server
accomplishes two of the requested resources of the scenario (file transferring and media).
25
14. Design of the Network
The above diagram demonstrates the whole design of the Network created for MadZoo digitals.
Each bubble shows each lab containing the computers and printers that it contains.
Grab components and drop them onto the workspace area. These may range from routers,
switches, PCs, laptops, servers and others.
26
14.2. Configure Devices
Specify IP addresses, gateway addresses, and other attributes as needed.
14.2.1. Set Up Routing
The above CLI command demonstrates the codes inserted to configure the IP address of the
router via the CLI.
Configuring the IP address of the router on Cisco Packet Tracer is a basic process for ensuring
that network communication is feasible. This is achievable by logging in to the router and then
entering the command line interface to configure the router.
Write the interface using the “interface" command, followed by the type and number such as
FastEthernet0/0. Apply the "IP address" command and choose the desired IP address. It is very
important to make sure that the interface is running on executing the 'no shutdown' command.
Following the configuring of interface type, the interface configuration mode should be exited
27
and the global configuration mode should be previous. (The commands followed in these steps
can be referred in the figure 3)
To ensure these alterations are maintained, use the "write memory" command. The process of
obtaining IP address of the router's interface not only simplifies the communication within the
network but also enables it to function smoothly.
After configuring the IP address of the IP address, The DHCP service is configured to provide IP
address.
Configuration of DHCP in Cisco Packet Tracer's Command Line Interface (CLI) can be done
using the mentioned steps.
Firstly, access CLI of the router. Enter the global configuration mode and configure the interface
that is connected to the switch by assigning an IP address and then enabling it.
28
Then, configure a DHCP pool in which you define the network, the gateway, and the DNS
(Optional). (The commands followed in these steps can be referred in the figure 4)
After the configuration of the DHCP pool is done, the exit the configuration mode of DHCP pool
and the global configuration mode respectively. Commit the config so that the changes are saved
permanently. (The commands followed in these steps can be referred in the figure 4)
MadZoo DHCP configuration is set so that the devices connected to the switch can get IP
addresses automatically making sure that the switch port connected to the router interface is in
order.
Configuration of VLANs, switch ports and other necessary configurations for switches.
Configuration of a VLAN and switch ports in Cisco Packet Tracer involves several steps.
29
Firstly, you should go to Command Line Interface (CLI) and then enter Global Configuration
Mode. With this configuration mode you can create VLANs using the "vlan" commands and give
them IP addresses using the "interface vlan" command. (The commands followed in these steps
can be referred in the figure 5)
Next, use the "switchport" commands to configure the switch ports. It is vital to maintain your
configurations in a consistent way to promote the smooth interaction. (The commands followed
in these steps can be referred in the figure 5)
As the last step, you should save the configuration to ensure durability. Please always
personalize the VLANs, IP addresses, and port settings of switches to meet the needs of your
network.
30
15. Testing the Network
Below mentioned are few scenarios used to test workability of the network. Pinging is used to
check is the network works properly. All the pinging commands were successful with 0 packets
failure. The screenshots are added below.
31
15.1.2. Ping from R&D lab to Information Security lab
32
15.2. Extended Ping
In this section, All the router connectivity is tested by pinging the routers to each lab. All the
pings were successful. The screenshots are added below.
33
15.2.3. Router to Project management
34
15.2.4. Router to RND
35
16. Functionalities that allows the system to support device growth and
the addition of communication devices
16.1. Security
Now in MadZoo digital the servers have been configured with restriction to the clients so that
they don’t surf in any suspicious websites because malicious data packets could enter the
network. There are also firewalls in place to protect the network from hackers from stealing data.
The server is stored in a locked room so that it is harder to access it. We also use MAC Filtering
to prevent unauthorized access to the network. We have used SSH to encrypt the network so that
third party people can’t see the data that is travelling in the network.
16.2. Design
In MadZoo digital we are using wired connections which are Unshielded Twisted Pair (UTP).
The cables have been connected to different departments within 100m. We have used subnetting
to divide the networks for each department. The main reason to use subnet is to reduce the
wastage of IP Addresses.
We have configured DHCP (Dynamic Host Configuration Protocol) for each department to
automatically provide IP addresses to the devices in the network.
16.3. Performance
In MadZoo digital they use high end PC’s to do their work. The server also uses high end
components because the server should be powerful enough to fulfill the request of the users. As
per the maintenance schedule any damaged or malfunctioning components should be replaced
because if there are any damaged or malfunctioning components the network performance would
decrease. As we are using star topology in the network the network traffic would be less.
36
Bibliography
academy, c. n., 2022. Communication Principles. [Online]
Available at: https://www.ciscopress.com/articles/article.asp?p=3131360&seqNum=4
Froehlich, A., 2023. What is network bandwidth and how is it measured?. [Online]
Available at: https://www.techtarget.com/searchnetworking/definition/bandwidth
37
GeekforGeeks, 2024. Switching. [Online]
Available at: https://www.geeksforgeeks.org/message-switching-techniques/
[Accessed 2022 6 20].
38
Williams, L., 2023. Types of Computer Network: What is LAN, MAN and WAN. [Online]
Available at: https://www.guru99.com/types-of-computer-network.html
39