Networking Assignment
Networking Assignment
*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to be addressed. The Assessor
and the Internal Verifier must then confirm that the action has been undertaken and that the Assignment Brief is
authorised for use before being issued to learners.
Date
Action required: Target Date
Action
(If none then please state n/a) for Completion
Completed
Assessor signature
Date
Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1 D1
Descripts
Resubmission Feedback:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Assessor Date
signature
Student Date
signature
Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No,
and Page Number on each page. This is useful if individual sheets become detached for any
reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation
and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct form. I further understand what it means
to copy another’s work.
Academic Year
Unit Tutor
Issue Date
Submission Date
Submission format
The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the
US healthcare industry where its global delivery center is located in Colombo. The company is
planning to expand their business operations with their latest branch at Matara and wants it to be
one of the state-of-the-art companies in Matara with the latest facilities.
Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
• Reception area
• Sales & Marketing Department (10 employees)
• Customer Services Area – with Wi-Fi facilities
Floor 2:
• Administration Department (30 Employees)
• HR Department (20 employees)
• Accounting & Finance Department (15 employees)
• Audit Department (5 employees)
• Business Development Department (5 employees)
Floor 3
• Video conferencing room
• IT Department (60 employees)
• The Server Room
The floor plan of the branch in Matara is as follows:
Floor 1:
• Reception area
• Customer Services Area– with Wi-Fi facilities
Floor 2:
• Administration Department (10 Employees)
• HR Department (7 employees)
• Accounting & Finance Department (8 employees)
• IT Department (50 employees)
• T he c onfer enci ng r oom of the head offic e and Customer Serv ic es Ar ea s of each
branch are to be equipped w ith Wi -Fi c onnec ti ons .
• C onnec tivi ty betw een tw o br anc hes (Head Office and M atara ) wo uld allow the
intra branch co nnectiv ity between departments. (Use o f VP N is no t com pulso ry)
• T he nec ess ary I P addr ess cl asses and r ang es m ust be decided by the network
designer and sho uld be use d fo r all the departments except the serv er r oom .
• N umber of s erv ers r equi red for the Serv er r oom need to be decided by the Netwo rk
designer and sho uld be assi gned with 10 .254. 10.0/ 24 subnet. (Uses static IPs)
• Sal es and Marketi ng Team also needs to access Netwo rk resources usi ng WI FI
co nnectiv ity .
( N o t e : C l e a r l y s t at e y o ur a ss u m pt i o n s . Y ou a re a l l o w e d t o d es i g n t h e ne t w o r k a c c o r d i ng t o y ou r
a s s um p t i on s , bu t m a i n r e q u i r e m en t s sh o u l d n ot b e v i o l a te d )
Ac tiv ity 01
• D iscuss the benefits and co nstraints o f different netwo rk system types that can be
im plemented in the Matara branch and the m ain IEEE Ethernet standards that can
be used in above L AN and WLAN design .
• D iscuss the im po rtance and im pact o f netwo rk to po lo g ies and assess the m ain
netwo rk proto co l suites that are used in netwo rk design using exam ples .
Recommend suitable netwo rk to po lo gy and netwo rk pro to col s for above scenario
and evaluate with v alid po in ts how the recommended to po lo gy demo nstrates the
efficient utilizatio n o f the netwo rking system of M atara branch.
Ac tiv ity 02
• D iscuss the operating principles o f network dev ices (Ex: Ro uter, Switch, Etc.) and
server ty pes that can be used fo r abov e scenario while explo ring different serv ers
that are av ailable in today’s market with their specifications . Re commend
server/ servers fo r the abov e scenario and justify your selectio n with v alid po ints .
• D iscuss the inter -dependence o f workstatio n hardware and netwo rking so ftware
and prov ide exam ples for netwo rking so ftware that can be used in abov e network
design.
Ac tiv ity 03
• P repare a written netwo rk design plan to m eet the abo ve -mentio ned user
requirements including a blueprint drawn using a mo deling too l ( Ex: M icro so ft Visio ,
EdrawM ax) .Test and evaluate the pro posed design by analyzing user feedback with
the aim o f optimizing yo ur design and im prov ing efficiency.
(Suppo rt y our answer by prov iding the VLAN and IP subnetting schem e fo r the abov e
scenario an d the list of dev ices, netwo rk com po nents and software used to design the
netwo rk for abo ve scenario and while justifying yo ur selectio ns. )
• Install and co nfigure Netwo rk serv ices , dev ices and applicatio ns (Ex: VL AN, WiFi,
D NS,Pro xy , Web, Etc.) according to the pro po sed design to accom plish the user
requirements and design a detailed M aintenance schedule for abov e Netwo rk.
*N ote: - Scr een s hots of C onfig ur ati on scri pts shoul d be pr esented.
Ac tiv ity 04
• Im plement a netwo rked system based on yo ur prepared design with v alid
evidence s.
• D evelo p test cases and co nduct verificatio n (Ex: P ing, extended ping, trace ro ute,
telnet, SSH, etc.) to test the above Network and analyse the test results against
the expected results. Recomm end potential future enhancem ents for the
netwo rked sy stem with v alid justificatio ns and critically reflect on the
im plemented netwo rk, including the plan, desig n, configurations, test s and the
decisio ns m ade to enhance the system .
Grading Rubric
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols
enable the effectiveness of networked systems.
P3
Discuss the operating principles of networking devices and
server types.
P4
Discuss the interdependence of workstation hardware and
relevant networking software
M2
Explore a range of server types and justify the selection of a
server for a given scenario, regarding cost and performance
optimisation
LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilisation of a networking system.
LO3 : Design efficient networked systems
P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networked
system.
M3
Analyse user feedback on your designs with the aim of
optimising your design and improving efficiency.
D2
Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
LO4 : Implement and diagnose networked systems
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
Unit 02: Networking
LAN Design & Implementation for
Alliance Health
Contents
Activity 01............................................................................................................................ 1
1.0 Computer Network ..................................................................................................... 1
1.0.1 Network System Types ....................................................................................... 1
1.1 Network Standards ................................................................................................ 6
1.1.1 Institute of Electrical & Electronics Engineers (IEEE)....................................... 7
1.2 Network topology................................................................................................ 10
1.2.1 Impact of Network Topology ............................................................................ 11
1.2.2 Network Topology Type ................................................................................... 11
1.2.3 Recommended Topology for Alliance Health. ................................................. 14
1.3 Network Bandwidth ............................................................................................ 14
1.3.1 Importance of Bandwidth.................................................................................. 15
1.3.2 Impact of Bandwidth ......................................................................................... 15
1.4 Impact of Network communication ......................................................................... 16
Activity 02.......................................................................................................................... 16
2.0 Networking Devices ................................................................................................. 16
2.1 Types of network devices ........................................................................................ 16
2.2 Network Servers ....................................................................................................... 21
2.2.1 Types of Servers................................................................................................ 22
2.2.2 Server components ............................................................................................ 24
2.3 Interdependence of workstation hardware and relevant network software. ............. 24
2.3.1 Workstation ....................................................................................................... 24
2.3.2 Networking software ......................................................................................... 24
2.3.3 Discuss interdependence of workstation hardware and network software ....... 24
Activity 03.......................................................................................................................... 25
3.0 Virtual LAN (VLAN) .............................................................................................. 25
3.0.1The purpose of a VLAN..................................................................................... 26
3.0.2 Types of VLANs ............................................................................................... 26
3.1 Network system Design ........................................................................................... 27
3.2 Maintenance of Network .......................................................................................... 28
3.2.1 Network maintenance plan .......................................................................... 28
Activity 04.......................................................................................................................... 30
Page |
ii
4.0 Implement a network system based on a prepared design .................................. 30
4.0.1 Windows server installation .............................................................................. 30
Page |
iii
Figure 1(Personal Area Network) ........................................................................................ 2
Figure 2 (Local Area Network) ............................................................................................ 3
Figure 3(Metropolitan Area Network) ................................................................................. 4
Figure 4 (Wide Area Network) ............................................................................................ 5
Figure 5 (Figure 5 (IEEE Standards Part 01)) ...................................................................... 7
Figure 6 (IEEE Standards Part 02) ....................................................................................... 8
Figure 7 (Bus Topology) .................................................................................................... 11
Figure 8 (Star Topology) .................................................................................................... 12
Figure 9 (Ring Topology) .................................................................................................. 12
Figure 10 (Mesh Topology) ............................................................................................... 13
Figure 11 (Tree Topology) ................................................................................................. 13
Figure 12 (Hybrid Topology) ............................................................................................. 14
Figure 13 (Networking Hub).............................................................................................. 17
Figure 14 (Network Switch) .............................................................................................. 18
Figure 15 (Network Router) ............................................................................................... 19
Figure 16 (Network Bridge) ............................................................................................... 20
Figure 17 (Network Gateway) ........................................................................................... 20
Figure 18 (Network Modem) ............................................................................................. 21
Figure 19 Network (Repeater) ........................................................................................... 21
Figure 20 VLAN and IP Subnetting .................................................................................. 27
Figure 21 (Designed network system to Alliance Health) ................................................. 28
Figure 22 (Loading Files) .................................................................................................. 30
Figure 23 Windows server installation .............................................................................. 31
Figure 24 Windows server installation .............................................................................. 31
Figure 25 Windows server installation .............................................................................. 32
Figure 26 Windows server installation .............................................................................. 32
Figure 27 Windows server installation .............................................................................. 33
Figure 28 Windows server installation .............................................................................. 33
Figure 29 Windows server installation .............................................................................. 34
Figure 30 Windows server installation .............................................................................. 34
Figure 31 Windows server installation .............................................................................. 35
Figure 32 Windows server installation .............................................................................. 35
Figure 33 Windows server installation .............................................................................. 36
Figure 34 Windows server installation .............................................................................. 36
Figure 35: Windows server installation ............................................................................. 37
Figure 36 (Star menu) ........................................................................................................ 37
Figure 37 control panel ...................................................................................................... 38
Figure 38 network and sharing........................................................................................... 38
Figure 39 Network connections ......................................................................................... 39
Figure 40 Ethernet Properties ............................................................................................ 39
Figure 41 Internet Protocol version 4 ................................................................................ 40
Page |
iv
Figure 42: Active Directory Configuration ........................................................................ 40
Figure 43: Active Directory Configuration ........................................................................ 41
Figure 44: Active Directory Configuration ........................................................................ 41
Figure 45: Active Directory Configuration ........................................................................ 42
Figure 46: Active Directory Configuration ........................................................................ 42
Figure 47: Active Directory Configuration ........................................................................ 43
Figure 48: Active Directory Configuration ........................................................................ 43
Figure 49: Active Directory Configuration ........................................................................ 44
Figure 50: Active Directory Configuration ........................................................................ 44
Figure 51: Active Directory Configuration ........................................................................ 45
Figure 52: Active Directory Configuration ........................................................................ 45
Figure 53: Active Directory Configuration ........................................................................ 46
Figure 54: Active Directory Configuration ........................................................................ 46
Figure 55: Active Directory Configuration ........................................................................ 47
Figure 56: Active Directory Configuration ........................................................................ 47
Figure 57: Active Directory Configuration ........................................................................ 48
Figure 58: Active Directory Configuration ........................................................................ 48
Figure 59: Active Directory Configuration ........................................................................ 48
Figure 60: Active Directory Configuration ........................................................................ 49
Figure 61: Active Directory Configuration ........................................................................ 49
Figure 62: Active Directory Configuration ........................................................................ 50
Figure 63: Active Directory Configuration ........................................................................ 50
Figure 64: Active Directory Configuration ........................................................................ 51
Figure 65: New user group creation ................................................................................... 51
Figure 66: New user group creation ................................................................................... 52
Figure 67: New user group creation ................................................................................... 52
Figure 68: New user group creation ................................... Error! Bookmark not defined.
Figure 69: New user group creation ................................... Error! Bookmark not defined.
Figure 70: New user group creation ................................... Error! Bookmark not defined.
Figure 71: New user group creation ................................... Error! Bookmark not defined.
Figure 72: New user group creation ................................... Error! Bookmark not defined.
Figure 73: New user group creation ................................... Error! Bookmark not defined.
Figure 74: New user group creation ................................... Error! Bookmark not defined.
Figure 75 Server Configuration ......................................... Error! Bookmark not defined.
Figure 76 PC Configuration ............................................... Error! Bookmark not defined.
Figure 77 Switch Configuration ......................................... Error! Bookmark not defined.
Figure 78 Wireless Router Configuration .......................... Error! Bookmark not defined.
Figure 79 Check connection between mail server and administration department ....Error!
Bookmark not defined.
Figure 80 Check connection between IT department and web server .... Error! Bookmark
not defined.
Figure 81 Check connection between Administration department and IT department
............................................................................................ Error! Bookmark not defined.
Figure 82 Check intra branch connection between IT department colombo and IT
department matara .............................................................................................................. 53
Page |
v
Table 1 Maintenance schedule of Allience Health(Author developed) ............................. 30
Table 2 Test case 01 ........................................................... Error! Bookmark not defined.
Table 3 Test case 02 ........................................................... Error! Bookmark not defined.
Table 4 Test case 03 ........................................................... Error! Bookmark not defined.
Table 5 Test case 04 ........................................................... Error! Bookmark not defined.
Page |
vi
Activity 01
Computer networking is the term for a network of connected computers that may
communicate and share resources. These networked devices transmit data through
wireless or physical technologies using a set of guidelines known as communications
protocols. (amazon, 2023)
The geographical area and number of computers that make up a network should be used
to describe its size. It ranges from a single room's worth of devices to millions of
devices dispersed over the globe. (Williams, 2023)
The most common varieties of computer networks are as follows:
- PAN (Personal Area Network)
- LAN (Local Area Network)
- MAN (Metropolitan Area Network)
- WAN (Wide Area Network)
Page | 1
Figure 1(Personal Area Network)
Characteristics of PAN
- Within a small area, the majority of the network-equipped devices are personal
ones.
- gives you control over how IT devices are connected around a single person.
- PAN encompasses laptops, tablets, and mobile devices.
- WPAN is a wireless protocol that can be used to connect to the internet.
- Cordless mic, keyboards, and Bluetooth systems are devices used for PAN.
(Williams, 2023)
Benefits of PAN
- less costly
- limited to a compact space
- links to several devices at once
- Safe and secure type of network.
(Rana, 2022)
Constraints of PAN
- limited area
- data transmission is slowly
- signal interference with radio signal
- Health issues caused by harmful rays.
(Rana, 2022)
Characteristics of LAN
- Since it is a private network, it is never controlled by an outside regulatory
authority.
- When compared to other WAN systems, LAN runs at a speed that is
substantially greater.
- There are several different types of media access control techniques, including
ethernet and token rings.
(Williams, 2023)
Benefits of LAN
- Local area networks can be used to share computer resources including hard disks,
DVD-ROMs, and printers. This drastically lowers the price of purchasing
hardware.
- Instead, than buying the licensed program for each client in the network,
somebody can use the same software over a network.
- On the server computer's single hard disk, data from every network user can be
kept.
- Over networked computers, data and messages can be sent with ease.
Page |
3
- Data will be easier to handle in a single location, increasing data security.
- A single internet connection can be shared by all LAN users thanks to local area
networks. (Williams, 2023)
Constraints of LAN
- Due to share computer resources, LAN will reduce costs, however the initial cost
of constructing Local Area Networks is rather significant.
- It does not provide good privacy because every LAN user's personal data files
are accessible to the LAN administrator.
- In the event that the LAN administrator is unable to safeguard the central data
repository, unauthorized users may have access to crucial information of the
company.
- As a result of problems with software configuration and hardware failures, local
area networks require ongoing LAN management. (Williams, 2023)
MAN (Metropolitan Area Network)
A computer network covering an entire city, a college campus, or a small area is
referred to as a metropolitan area network, or MAN. Compared to LANs, which are
often restricted to a single building or location, this form of network is larger. This form
of network enables you to cover an area of several miles to tens of miles, depending on
the setup. (Williams, 2023)
Characteristics of MAN
- It primarily includes towns and cities within a 50 km radius.
- The most common medium is cables and optical fibers.
Page |
4
- Data rates sufficient for applications involving distributed computing.
(Williams, 2023)
Benefits of MAN
- Using high-speed carriers like fiber optic cables, it provides quick
communication.
- It offers increased access to WANs and strong support for networks of a large
size.
- The MAN network's dual bus enables simultaneous data transmission in both
directions.
- A city may be partially or completely covered by a MAN network. (Williams,
2023)
Constraints of MAN
- To build a MAN connection from one location to another, more cable is
required.
- It is challenging to protect the system from hackers in MAN networks.
- Need highly skilled staff to install.
- Cannot work with traditional copper wires. (Williams, 2023)
WAN (Wide Area Network)
Another significant computer network that spans a big geographic area is the WAN
(Wide Area Network). A LAN that links to other LANs via phone lines and radio waves
is an example of a WAN network infrastructure. It mainly applies to businesses or
organizations. (Williams, 2023)
Page |
5
Characteristics of WAN
- All users will have access to the most recent files because the program files will
be shared among everyone.
- Any firm can use WAN to create its own worldwide integrated network.
(Williams, 2023)
Benefits of WAN
- You can reach a wider geographic area with the aid of WAN. As a result, offices
located further apart can readily communicate.
- includes electronics such as smartphones, laptops, tablets, computers, gaming
consoles, etc.
- Client devices' built-in radio transmitters and receivers are how WLAN
connections operate. (Williams, 2023)
Constraints of WAN
- Investment's initial setup costs are relatively costly.
- The WAN network is difficult to maintain. Administrators of networks and
experienced technicians are required.
- Because of the extensive usage of many technologies and the wide distribution,
there are more mistakes and problems.
- Because several wired and wireless technologies are involved, problem solving
takes longer.
- provides less security than other computer network kinds. (Williams, 2023)
The rules for data communication that are required for the interoperability of networking
technology and processes are defined by networking standards. By allowing diverse
vendors to compete on the basis of the quality of their products while remaining
compatible with products already on the market, standards aid in the creation and
maintenance of open markets. (wachemo-elearning, 2023)
At various layers during data transfer, several standards may be used simultaneously.
The commonly used standards at each layer are,
- Application layer – HTTP, HTML, POP, H.323, IMAP
- Transport layer – TCP, SPX
Page |
6
- Network layer -IP, IPX
- Data link layer – Ethernet IEEE 802.3, X.25, Frame Relay
- Physical layer -RS-232C (cable), V.92 (modem)
Standards Organizations
Some of the most important standards organizations as follow,
- American National Standards Institute (ANSI)
- Institute of Electrical & Electronics Engineers (IEEE)
- International Organization for standardization (ISO)
- Internet Engineering Task Force (IETF)
- WorldWideWeb Consortium (W3C)
Page |
7
Best-known IEEE standards
Some of the best-known IEEE standards as follow,
IEEE 802.1 LAN/MAN Standards
Internetworking standards were created by the IEEE 802.1 group, and the local-area
networking environment uses IEEE 802.1d and IEEE 802.1q.
- IEEE 802.1d? STP, or spanning tree protocol? STP is a link-management protocol
used for Layer 2 redundancy and is a component of the IEEE 802.1 standard for
Media Access Control bridges. STP prevents loops in the LAN caused by several
active pathways between stations by using the spanning-tree algorithm to offer
redundant paths via the LAN. If there are more routes between hosts, then these
multiple paths, or loops, will appear. STP builds a tree over every switch in an
Figure 6extended
(IEEE Standards Part 02)
network to ensure path redundancy, pushing redundant paths into a
standby, or blocked, state. STP establishes redundant links as a backup but only
permits one active path at a time between any two network devices, preventing
loops (in case the primary link fails). The spanning-tree method reconfigures the
tree topology in the event that a change in the LAN takes place, such as a network
segment being unreachable, and reestablishes the link by turning on the standby
path. Without STP, it is possible for both primary and redundant connections to be
active at the same time, which would cause an infinite stream of traffic on the
LAN. (etutorials, 2023)
- Virtual LANs (VLANs) defined by IEEE 802.1q? A virtual local area network, or
VLAN, is a collection of computers that operate as if they are linked to the same
physical network segment even if they may really be spread across various LAN
segments. VLANs can be set up in software and are not restricted to a certain
physical location or set of switch ports. Because of this, using VLANS within a
network is versatile. VLANs have the benefit of allowing computers to remain on
the same VLAN even after being physically moved to a different place without
requiring any end-device or protocol change. (etutorials, 2023)
IEEE 802.3 Ethernet Standards
In the current network environment, several Ethernet standards are used. While some of
these standards, like Ethernet and Fast Ethernet, specify the capacity and functionality
Page |
8
of the Ethernet LAN, other standards, like STP, specify how these Ethernet networks
work. Each station on the segment uses a portion of the segment's total bandwidth in an
Ethernet shared-media LAN that operates in half-duplex. Ethernet's overall LAN
bandwidth is 10 megabits per second (Mbps) or 100 Mbps (Fast Ethernet). Either half-
duplex or full-duplex modes of operation for Ethernet and Fast Ethernet are possible;
full-duplex mode uses separate LAN media for the transmitting and receiving sides of
the network interface card (NIC). Because Gigabit Ethernet only functions in full-
duplex mode, the 1000 Mbps (Gigabit Ethernet) version is not a shared-media LAN.
Switches enable dedicated media LANs, whereas hubs provide shared media LANs.
Each transmitter and receiver pair can utilize the entire bandwidth using switched
Ethernet. (etutorials, 2023)
IEEE 802.5 Token Ring Standards
As long as no one else is on the line, each host connected to an Ethernet network can
transfer data at any time. The Token Ring, in contrast, operates by passing a token
among the network's users, much like a relay race runner giving the baton to the
following runner. Similar to how the relay runner can only run when holding the baton,
a host has the authority to send data over the network when it has possession of this
token. A host passes the token to the host after it in the network if it has nothing to send.
The Token Ring standard created by IBM is compatible with the related IEEE 802.5
specification. Both the IEEE 802.5 and IBM Token Ring network implementations are
referred to as Token Ring. The Token Ring network was created by IBM in the 1970s,
but a few years ago it was abandoned in favor of Ethernet.
A LAN known as a token ring has all of its hosts grouped in a logical circle. The token,
a unique frame, moves around the circle. A host must catch the token, attach the
message's data, and then permit it to circulate around the network in order to send a
message. Due to its slower speed relative to Ethernet LANs, Token Ring is no longer
commonly used in LANs. (etutorials, 2023)
IEEE 802.11 Wireless LAN (WLAN) Standards
An entire collection of specifications created for wireless LAN technology is referred to
as the IEEE 802.11 standard. IEEE 802.11 specifies an over-the-air interface between
two wireless clients, such as two wireless laptops, or between a wireless client and a
base station, such as a wireless laptop and a wireless base unit. (etutorials, 2023)
Page |
9
As Alliance Health's network analyst, I chose to develop the company's current network
using LAN (IEEE 802). For that design, I suggest LAN cabling system (IEEE 802.7),
fiber optic connection (IEEE 802.8), Gigabit Ethernet (802.3bk), WIFI (802.11),
Bluetooth (IEEE 802.15.1) and Security implementation (IEEE 802.11) for the network
system's operational procedure.
The physical and logical arrangement of a network's nodes and links is known as its
topology. Devices like switches, routers, and software with switch and router
functionality are typically included in nodes. A graph is a common way to represent
network topologies.
Network topologies explain how networks are set up and where traffic flows are located
in relation to one another. Network topology diagrams can be used by administrators to
decide where each node should be located and the best path for traffic flow. An
organization may more readily identify problems and resolve them, increasing the
effectiveness of data transport, with a clearly defined and well-planned network
topology.
The physical topology and logical topology together make up network geometry.
Devices are represented as network nodes in network topology diagrams, and the
connections between them are indicated as lines. Depending on how the network needs
to be set up, many types of network topology are used. (Gillis, 2023)
Physical Topology
A local area network's connected structure is referred to as its physical topology (LAN).
The physical topology of a network is made up of the manner and kind of cables used to
link the physical devices to one another. Comparatively, logical topology outlines how a
network transfers device data and how media signal performance inside it. (techopedia,
2017)
Logical Topology
A term in networking known as logical topology describes the design of the
communication network used by each node in a network. A network's logical topology
can be dynamically maintained and changed using network hardware like switches and
Page |
10
routers. Physical topologies, which describe the actual physical connections between
every device in the network, are in contrast to logical topologies. (techopedia, 2012)
Star Topology
Page |
11
Every device on the network is separately connected to the switch or hub, which is the
central node, in a network topology known as a star topology. This topology gets its
name from the way it appears visually, which is similar to a star. (sunbirddcim, 2023)
Ring Topology
Each device in a ring topology network is connected to two other devices on either side
by an RJ-45 cable or coaxial cable. Its name comes from the way the connected devices
create a circle. A ring that transfers data typically only in one direction is referred to as a
unidirectional ring. Up until it arrives at its final destination, the data is transmitted from
one device to the next. Data can move in either way within a bidirectional ring.
(sunbirddcim, 2023)
Mesh Topology
All of the network's components are connected to one another in a mesh topology. Data
can be delivered over a mesh topology using routing (sent the shortest distance) and
flooding (sent to all devices). (sunbirddcim, 2023)
Page |
12
Figure 10 (Mesh Topology)
Tree Topology
Each node in a tree topology is connected to the center node (the "trunk") by a single
path, and there is one central node. Nodes might be compared to the branches that
emerge from the stem. Large networks are frequently built using tree topologies. (byjus,
2023)
Hybrid Topology
A network topology known as a hybrid topology employs two or more different network
topologies. Bus topology, mesh topology, ring topology, star topology, and tree
topology are some possible combinations of these topologies. (computerhope, 2020)
Page |
13
Figure 12 (Hybrid Topology)
Page |
14
for capacity and refers to the speed of data movement. Contrary to popular belief,
network speed is not determined by bandwidth.
A data link can send and receive more data at once the more bandwidth it has. A pipe's
capacity for water flow can be likened to bandwidth conceptually. More water can flow
through a pipe at once the bigger its diameter. The same idea governs how bandwidth
functions. More data can pass over a communication channel per second the higher its
capacity.
When bandwidth expands, a network connection's cost rises. So, a dedicated internet
access (DIA) link that can handle 1 gigabit per second (Gbps) will cost more than one
that can handle 250 Mbps. (Froehlich, 2023)
It is not possible to have limitless bandwidth. There is only a certain amount of capacity
available in each given deployment area, such as a house or place of business. This can
occasionally be brought on by the network device's physical constraints, such as those of
the modem or router, the cabling, or the wireless frequencies being used. Other times, a
network administrator, internet service provider, or wide area network (WAN) carrier
will purposefully rate-limit bandwidth.
The bandwidth of multiple connected devices must be shared. Certain gadgets use a lot
of bandwidth, such TVs that transmit 4K video. A webinar, in contrast, often consumes
far less bandwidth. Despite the fact that speed and bandwidth are not equivalent, more
bandwidth is necessary to maintain acceptable speeds across several devices.
(Froehlich, 2023)
Page |
15
networks, a single logical connection is represented by a collection of aggregated links.
(Froehlich, 2023)
A set of protocols (i.e., guidelines and standards) that enable application programs to
communicate with one another regardless of the hardware and operating systems on
which they are run are referred to as network communication or internetworking.
Application programs can communicate via internetworking regardless of their physical
network connections. Transmission Control Protocol (TCP) and Internet Protocol (IP)
are the two primary protocols that make up the internetworking technology known as
TCP/IP (IP). a knowledge of TCP/IP. (ibm, 2021)
- Client: A network service-requesting process.
- Server: A program that replies to a client's request for a service.
- Datagram: The fundamental piece of information that travels through the
Internet at the transport level and is made up of one or more data packets.
- Packet: A computer's network and the component or block of a data transaction
between them. Typically, a packet consists of data blocks, at least one high-level
protocol header, and a network header. Typically, how packets are handled is
unaffected by the format of data blocks. Data is sent via the network using
packets as the exchange medium at the Internetwork layer.
Activity 02
Switch
Hubs typically play a less intelligent role than switches. A multiport device called a
switch increases network effectiveness. The switch permits connections to hubs or
routers while maintaining a minimal amount of routing information about internal
network nodes. Switches are typically used to link LAN strands. Switches typically have
the ability to read the hardware addresses of incoming packets and send them to the
correct location. Because switches have the ability to create virtual circuits, they are
more efficient for networks than hubs or routers. Switches also increase network
Page |
17
security since it is more challenging to employ network monitors to inspect virtual
circuits. Consider a switch as a piece of equipment that combines some of the best
features of hubs and routers. In the OSI model, a switch can operate at either the Data
Link layer or the Network layer. One that can function at both layers, or as a switch and
a router, is referred to as a multilayer switch. High-performance hardware that supports
the same routing protocols as routers is known as a multilayer switch. Distributed denial
of service (DDoS) attacks on switches are possible; flood guards are employed to stop
malicious traffic from shutting down the switch. Make sure to safeguard switches;
switch port security is crucial. Use DHCP snooping, ARP inspection, and MAC address
filtering, and disable all unnecessary ports. (Melnick, 2019)
Router
Routers are multifunctional devices that link two or more diverse networks. They
typically have distinct input and output network interfaces for each connected network
and are dedicated to special-purpose computers. As the central node of huge computer
networks like the internet, routers and gateways have unique features that enable them
to adapt to changing network addressing systems and frame sizes by segmenting large
packets into smaller pieces that fit the new network components. Each router interface
has a separate Internet Protocol (IP) address, LAN address (network card address), and
Address Resolution Protocol (ARP) module. The routes a packet might travel from its
source to its destination are known to the router because to a routing table. The routing
table expands dynamically, just as the bridge and switch. The router detaches the packet
headers and trailers after receiving a packet, then examines the IP header to identify the
source and destination addresses, the data type, and the arrival time. Also, it adds
additional addresses to the router table that were not previously in the table. The routing
table contains the IP header and arrival time details. In the OSI paradigm, routers
typically operate at the Network layer. Routing Information Protocol (RIP), Border
Page |
18
Gateway Protocol (BGP), and Open Shortest Path First (OSFP) are the three standard
protocols typically used by routers to exchange routing and other information.
(Melnick, 2019)
Bridge
Bridges are utilized to link up many hosts or network segments. Bridges' primary
function in network architecture is to store and forward frames between the many
segments it connects. They transport frames using hardware Media Access Control
(MAC) addresses. Bridges have the ability to either forward or prevent data from
passing by examining the MAC addresses of the devices connected to each section.
Moreover, bridges can be used to join two physical LANs to create a single, bigger
logical LAN. Only the Physical and Data Link layers of the OSI model support bridge
functionality. By lying between two physical network parts and controlling the data flow
between them, bridges are used to break bigger networks into smaller portions. Bridges
connect LAN components using the same protocols, which is one way in which they
resemble hubs. But before they are forwarded, bridges examine incoming frames, or
data packets, for addresses. The bridge does not change the incoming data's format or
content while it filters the data packets. The bridge uses a dynamic bridge table to filter
and forward frames across the network. The bridge table, which is initially empty, keeps
track of the addresses of each bridge interface that links the LAN to other LANs as well
as the LAN addresses for each machine in the LAN. Bridges can be single-port or multi-
port, just like hubs. (Melnick, 2019)
Page |
19
Figure 16 (Network Bridge)
Gateway
In the OSI model, gateways typically operate at the Transport and Session layers. There
are multiple protocols and standards from various vendors at the Transport layer and
above; gateways are used to deal with them. Transmission Control Protocol/Internet
Protocol (TCP/IP) and Open System Interconnection (OSI) are two networking
protocols that are translated by gateways. Gateways connect two or more independent
networks that each have their own topology, routing algorithms, protocols, domain
name service, and network administration guidelines. A gateway can do all a router can
do and more. A gateway is actually a router with enhanced translation capabilities. A
protocol converter is the function that converts between various network technologies.
(Melnick, 2019)
Modem
In order to send digital signals across analog telephone lines, modems (modulators-
demodulators) are used. As a result, the modem transforms digital signals into analog
signals with various frequencies and transmits them to a modem at the receiving point.
A device connected to a modem, typically a computer, receives a digital output from the
receiving modem after performing the reverse transformation. Typically, the digital data
is sent to or received from the modem over a serial line using the RS-232 interface,
Page |
20
which is the industry standard. Several cable operators and many telephone companies
utilize modems as end terminals to identify and recognize residential and personal users.
Both the Physical and Data Link layers are supported by modems. (Melnick, 2019)
Repeater
An electronic device that amplifies the signal it receives called a repeater. A repeater is a
device that receives a signal and then sends it out again at a stronger level or strength so
that it can travel farther—more than 100 meters for typical LAN lines. On the physical
layer, repeaters operate. (Melnick, 2019)
Servers are big data processing and storage equipment that can be found online as
virtual data centers or as physical pieces of hardware. Servers that are connected to a
network are computers or software programs. Any type of equipment that shares and
stores information can be a server. Servers can either request information from another
system or store and analyze it internally. The first servers were simple data transport
devices, but as they increased in size and complexity, they could handle more
Page |
21
sophisticated tasks. These days, systems for cloud computing that are located online
contain virtual servers.
Servers connect users to various data functions in a variety of ways. They store a lot of
data for businesses and make it available to users online or across internal networks.
When users ask them to retrieve specific files from previously stored or connected data
sources, they do so. Also, they cooperate with an operating system to better hear and
react to user demands.
Installing software that creates new responsibilities, such as responding to website
requests from an internet browser, can improve a server's capability. Servers can also
function as security measures to confirm users' identities prior to granting access to a
network. (Team, 2023)
Web Server
Public domain software is used to access the internet through an open-source web
server. These servers establish a connection between the computer and any saved data
from an internet website. Information for the internet is stored on web servers and is
retrieved using "HTTP" code before being transferred to your web browser. One of the
most popular server types is this one. (Team, 2023)
Proxy server
Between a host server and a client server, proxy servers operate as a bridge. After
passing through the proxy's server, data from a website is sent to the IP address of your
machine. Since the information is requested and then transported from the source to the
proxy server rather than straight from a client to another user, this method adds an extra
degree of protection. Many hazardous internet organizations can be blocked by a proxy
server. (Team, 2023)
Virtual machine (VM)
Virtual machines only store and connect data in virtual spaces, as their name implies. A
hypervisor, commonly referred to as a virtual machine monitor (VMM), is software that
allows IT teams to run hundreds of virtual machines on a single piece of physical
hardware. Because they are the most economical sort of server to run, this server
virtualization technique is commonly utilized for data transit and storage. (Team, 2023)
File transfer protocol (FTP) server
Page |
22
To transfer files from one computer to another, FTP servers are used. Downloaded files
are extracted onto your device from the server while uploaded files travel from your PC
to the server. In order to connect computers to each other securely and transfer data, this
process is known as file transfer protocol. (Team, 2023)
Application server
Via virtual server connections, these servers link clients to software programs. This
enables users to access applications without downloading data to their own hardware.
Application servers are the best choice for corporations because they can efficiently host
big amounts of application data to numerous users at once. (Team, 2023)
File server
Several users' data files are kept on a file server. They enable quicker file writing to
computers and faster data retrieval. When many users need access to files that are more
conveniently and securely saved on a server than on a personal computer, corporations
frequently utilize this basic sort of server. (Team, 2023)
Database server
Database servers act as substantial data repositories that businesses may access and use
to operate a variety of applications. Any database architecture is not necessary for a
database server to function. (Team, 2023)
Mail server
Using email service platforms, a mail server stores and delivers mail for customers.
Individual users can access their email without running any systems through their own
devices because mail servers are configured to maintain a network connection. (Team,
2023)
Print server
To print across a network, a print server establishes remote connections with nearby
computers. Businesses now have the option of using a single printer to support a whole
department thanks to these servers. When put in an office space, some printers even
have their own built-in server that is prepared to connect to a network. (Team, 2023)
Domain name system (DNS) server
Page |
23
These servers translate readable computer domain names into IP addresses written in
computer code. The DNS server uses user-supplied search information to locate the
requested address and send it to the client device. (Team, 2023)
2.3.1 Workstation
The phrase "network software" refers to a broad category of software that simplifies the
administration, planning, maintenance, and deployment of computer networks.A key
component of any networking system is network software. It assists network
administrators and security staff in managing, monitoring, and better controlling
network traffic as well as reducing network complexity. Network software is essential
for managing a network architecture and streamlining IT processes by enabling sharing
of information, data, and security. (Mohanakrishnan, 2022)
Page |
24
are necessary for the network to operate. Client software is the program that links client
and server computers together. An operating system known as a client is one that can
only run on a single machine and is used by lone users. The CPU, memory, and other
communication ports on the server hardware are frequently made available for
connection by server software. Examples of several server types include a web server,
an application server, a file server, etc. The server program required an operating system
to be installed in order for the activities to be successfully completed. An operating
system (OS) that is intended primarily for installing and maintaining servers is known as
a server OS. The firewall is installed on various servers and is used to manage both
incoming and outgoing information. Hardware and software are therefore very
interdependent on one another. To get the computer to output, they must cooperate. If
the hardware is not supported, the application cannot be used, and if the hardware is not
correctly identified, the program is useless. To execute the task, the hardware must have
the appropriate software package loaded. Similar to different software, the hardware
may carry out a range of tasks. Hardware and software are a computer system's body
and spirit, respectively. As a result, the software acts as a bridge between the user and
the hardware. They both need to be connected to one another in order for any systems to
function.
Activity 03
A logical overlay network called a virtual LAN (VLAN) is used to organize and isolate
the traffic for various groups of devices that share a physical local area network (LAN).
A local area network, or LAN, is a collection of computers or other gadgets that are all
located in the same area and use the same physical network, such as a campus or
building. An Ethernet (Layer 2) broadcast domain is the collection of network devices
that an Ethernet broadcast packet can access, and it is typically connected to a LAN.
Direct connections or connections made through wireless access points (APs) linked to
the same network switch are how computers on a LAN connect to it. A group of linked
switches, such as a collection of access switches that are all connected to a backbone
switch, can also be used by computers to connect to the network. Even though
everything remains on the same floor or building, traffic is not regarded to be on the
Page |
25
same LAN after it passes through a router and activates Layer 3 (IP-related) activities.
As a result, there might be numerous interconnected LANs at one site. The Layer 2 of a
network, or the Ethernet level, is where a VLAN operates, just like the LAN it sits on
top of. A single switching network is divided into a number of overlaying virtual
networks by VLANs so that they may each accommodate a different set of functional
and security needs. A number of unique physical networks for various use cases are not
required thanks to this segmentation. (Slattery, 2023)
VLANs are used by network engineers for a variety of purposes, including the
following:
- To improve performance
- To tighten security
- To ease administration
Page |
26
By considering the facilities have in VLAN, we hope to implement VLAN for the
Alliance Health when design the network.
Following is the VLAN and IP subnetting scheme according to the given scenario.
Also, they offer their services in Russian, German, Spanish, and French. Students may
build complex and large networks with Packet Tracer, which is frequently not viable
with physical hardware due to cost constraints. The operating systems Linux, Windows,
Macintosh, Android, and iOS all support Packet Tracer.
To build simulated network topologies, users of Packet Tracer can drag and drop
routers, switches, and other network components. Cisco claims that practicing
networking is the best way to learn it. The protocols are only implemented in software;
hence this program cannot replace hardware routers or switches. But this utility also
includes a large variety of other networking devices in addition to Cisco hardware.
(Bhardwaj, 2021)
As the network analyst of Alliance Health we also used cisco packet tracer for design
the network.
Page |
27
Figure 21 (Designed network system to Alliance Health)
You basically need to perform network maintenance to keep your network active and
operating effectively. The duties covered by this description include installing hardware
and software, identifying network problems, evaluating and improving network
performance, and organizing network growth. The two primary methodologies for
managing network device maintenance are structured and interrupt-driven. A system in
place to prevent problems from arising is an organized approach. You are prepared to
handle any problems if they do arise. A problem-driven approach waits for it to occur
before attempting to fix it. As a result, the interrupt-driven method is the most
expensive, stressful, and downtime-intensive of the two. (MGS, 2019)
Network maintenance is crucial to the effective operation of the Alliance Health
network.
A maintenance schedule for the network ensures that each of its vital parts is routinely
inspected for any problems. A sound maintenance plan should be able to predict
problems before they occur and put the right preventative measures in place. Business
continuity is ensured by doing this, and downtime is reduced.
Page |
28
An effective network maintenance plan plans for network maintenance include adding
hardware and software to make sure the tools and software you already have are
functional. (Yuson, 2022)
3.2.2 Network maintenance plan of Alliance Health.
Page |
29
Mail Server Weekly 4.00 a.m. 2 hours -Automate disaster
recovery runbooks.
Update testing of Alliance Health
Windows Update Weekly 1.00 a.m. 2 hours -Provide 5-6-hour
notice when longer
down time is required.
Server Update Weekly 2.00 a.m. 2 hours -Notify the downtime at
least ahead of 5 hours.
Security Update Daily 3.00 a.m. 1 hour -Notify at least 3 hours
ahead of time before
update.
Table 1 Maintenance schedule of Allience Health(Author developed)
Activity 04
In its simplest form, Windows Server refers to a group of Microsoft's operating systems
designed specifically for use on servers. Servers are robust computers that are designed
to function continuously and provide resources to other computers. This shows that
Windows Server is almost always used in professional settings. (Stegner, 2021).
Page |
30
Step 2 - After all files are loaded screen of language settings, Time and currency format
Page |
31
Step 4 – After clicking on “Install Now”, the setup will start and will load the files as shown
below.
Page |
32
Step 6 - After files are loaded, following screen can be seen. Next, select “Windows Server
2012 R2 Datacenter (Server with a GUI)”.
Step 7– Click the “I accept the license terms” and then click “Next” as shown below.
Page |
33
Step 8 –Then the following screen can be seen. Click “Custom: Install Windows Only”.
(Advanced)”
Step 9 – In “Driver Options”, a new partition can be created, hard disk can be deleted or
formatted. After completing the process, the partition where the Windows Server 2012 R2
will be installed, can be selected. After that, click “Next”.
Page |
34
Step10 – Wait until the process finish and then the server will reboot.
Step 11 – Once the rebooting is done, the following screen will appear. Set a password to
the server and click “Finish”.
Page |
35
Step 12 – Once the process is done, click “Ctrl + Alt + Delete” to sign in.
Step 13 – Then the following screen will appear. Enter the previously set password and
click the arrow mark.
Page |
36
Step 15 – Finally, Server Manager Dashboard can be accessed.
Page |
37
Step 02-Select Control Panel on start menu and go inside it
Step 03-select network and sharing option in control panel and go inside it
Page |
38
Step 04-select adapter settings in network and sharing center and go to network
connections
Page |
39
Step 06-select internet protocol version 4 and go to properties and put a tick to the use
following IP address, then change the IP address.
Page |
40
Step 2 – Click “Next” button of the “Add Roles and features” window popped up’
Step 3 – For the “Installation Type”, select “Role based or feature based installation” and
click “Next”.
Page |
41
Step 4 – Then select the “Destination Server” and click “Next”.
Step 5 – Then out of the “Server Roles”, click “Active Directory Domain Services” nd then
click “Next”.
Page |
42
Step 6 – Then click “Add features” of the widow popped up.
Step 7 – After the checkbox of “Active Directory Domain Services”, click “Next”.
Page |
43
Step 8 – Then keep the default feature same as it is and click “Next”.
Step 9 – After “Active Directory Domain Services” section opened, click “Next”,
Page |
44
Step 10 – After “Conformation Installation Selections” window opens tick the “Restart the
destination server automatically if required and click “Yes” to the window popped up.
Page |
45
Step 12 – After that “Installation Progress” can be seen.
Page |
46
Step 14 – Now is the configuration process. For this, click on the notification symbol of
the “Server Manager Dashboard”. Next, click “Promote the server to a domain controller.”.
Step 15 – In the “Deployment Configuration”, select the option “Add a new Forest” and
then enter a “Root Domain name” and click “Next”.
Page |
47
Step 15 – In “Domain Controller Options”, enter suitable password and confirm password
and then click “Next”.
Step 17 – In “Additional Options”, after the “NetBIOS domain name” appear, click “Next”.
Page |
48
Step 18 – in the “Paths” segment, remain the details in default and click “Next”.
Page |
49
Step 20 – In “Pre requisites Check”, check “Install” and the server will automatically at
the end of the promotion operation.
Page |
50
Step 22 – Wait until the server gets restarted.
Page |
51
Step 2 – Select relevant user group.
Page |
52
Figure 68 Check intra branch connection between IT department colombo and IT department matara
Page |
53
References
amazon, 2023. What Is Computer Networking?. [Online]
Available at: https://aws.amazon.com/what-is/computer-networking/
[Accessed 06 03 2023].
Bhardwaj, P., 2021. tutorialspoint. [Online]
Available at: https://www.tutorialspoint.com/what-is-cisco-packet-tracer
[Accessed 10 03 2023].
byjus, 2023. byjus. [Online]
Available at: https://byjus.com/gate/tree-topology-
notes/#:~:text=of%20Tree%20Topology-
,What%20is%20Tree%20Topology%3F,coming%20off%20of%20the%20trunk.
[Accessed 06 03 2023].
computerhope, 2020. computerhope. [Online]
Available at:
https://www.computerhope.com/jargon/h/hybrtopo.htm#:~:text=A%20hybrid%20topolo
gy%20is%20a,star%20topology%2C%20and%20tree%20topology.
[Accessed 06 03 2023].
etutorials, 2023. Network Standards. [Online]
Available at: http://etutorials.org/Networking/Lan+switching+first-
step/Chapter+2.+Network+Models+and+Standards/Network+Standards/
[Accessed 05 03 2023].
Page |
54
Froehlich, A., 2023. techtarget. [Online]
Available at:
https://www.techtarget.com/searchnetworking/definition/bandwidth#:~:text=The%20mo
re%20bandwidth%20a%20data,works%20on%20the%20same%20principle.
[Accessed 06 03 2023].
Gillis, A. S., 2023. techtarget. [Online]
Available at: https://www.techtarget.com/searchnetworking/definition/network-
topology#:~:text=What%20is%20a%20network%20topology,often%20represented%20
as%20a%20graph.
[Accessed 06 03 2023].
Gregersen., E., 2023. britannica. [Online]
Available at: https://www.britannica.com/technology/workstation
[Accessed 07 03 2023].
ibm, 2021. ibm. [Online]
Available at: https://www.ibm.com/docs/en/zos/2.4.0?topic=services-basics-network-
communication
[Accessed 06 03 2023].
Melnick, J., 2019. netwrix. [Online]
Available at: https://blog.netwrix.com/2019/01/08/network-devices-explained/
[Accessed 06 03 2023].
MGS, 2019. mglobalservices. [Online]
Available at: https://mglobalservices.com/knowledge-center/blog/what-is-network-
maintenance
[Accessed 10 03 2023].
Mohanakrishnan, R., 2022. spiceworks. [Online]
Available at: https://www.spiceworks.com/tech/networking/articles/what-is-network-
software/
[Accessed 07 03 2023].
Rana, K., 2022. Types of Network. [Online]
Available at: https://artoftesting.com/types-of-network
[Accessed 05 03 2023].
Slattery, T., 2023. techtarget. [Online]
Available at: https://www.techtarget.com/searchnetworking/definition/virtual-LAN
[Accessed 10 03 2023].
Stegner, B., 2021. MakeUse Of. [Online]
Available at: https://www.makeuseof.com/tag/windows-server-different-windows/
[Accessed 10 03 2023].
sunbirddcim, 2023. sunbirddcim. [Online]
Available at: https://www.sunbirddcim.com/glossary/mesh-
topology#:~:text=Mesh%20topology%20is%20a%20type,Full%20mesh%20topology.
[Accessed 06 03 2023].
sunbirddcim, 2023. sunbirddcim. [Online]
Available at: https://www.sunbirddcim.com/glossary/ring-
topology#:~:text=Ring%20topology%20is%20a%20type,known%20as%20a%20unidire
ctional%20ring.
[Accessed 06 03 2023].
Team, I. E., 2023. indeed. [Online]
Available at: https://www.indeed.com/career-advice/career-development/types-of-
Page |
55
servers
[Accessed 06 03 2023].
techopedia, 2012. techopedia. [Online]
Available at: https://www.techopedia.com/definition/25890/logical-
topology#:~:text=A%20logical%20topology%20is%20a,be%20dynamically%20maintai
ned%20and%20reconfigured.
[Accessed 06 03 2023].
techopedia, 2017. techopedia. [Online]
Available at: https://www.techopedia.com/definition/4794/physical-
topology#:~:text=Explains%20Physical%20Topology-
,What%20Does%20Physical%20Topology%20Mean%3F,all%20constitute%20the%20
physical%20topology.
[Accessed 06 03 2023].
wachemo-elearning, 2023. wachemo-elearning. [Online]
Available at: https://wachemo-elearning.net/courses/31781/lessons/chapter-four-
communications-networks-architectures/topic/4-6-network-standards-and-
standardization-bodies/
[Accessed 05 03 2023].
Williams, L., 2023. Types of Computer Network: What is LAN, MAN and WAN.
[Online]
Available at: https://www.guru99.com/types-of-computer-network.html
[Accessed 05 03 2023].
Yuson, A., 2022. etech7.. [Online]
Available at: https://blog.etech7.com/what-is-a-network-maintenance-plan
[Accessed 10 03 2023].
Page |
56
Page |
57