0% found this document useful (0 votes)
16 views42 pages

Networking

Uploaded by

Khôi Vũ
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views42 pages

Networking

Uploaded by

Khôi Vũ
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 42

ASSIGNMENT 1 FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title Unit 2: Networking

Submission date 25/06/2024 Date Received 1st submission 25/06/2024

Re-submission Date Date Received 2nd submission 09/08/2024

Student Name Vu Dang Khoi Student ID BS01129

Class SUM24 Assessor name Cao Tien Thanh

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.

Student’s signature khoi

Grading grid

P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 D1 D2

1
 Summative Feedback:  Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

IV Signature:

2
Table of Contents
I. INTRODUCTION...................................................................................................................................................6
II. MAIN CONTENT...................................................................................................................................................6
1. Discuss the benefits and constraints of different network types and standards (P1)......................................6
a) Define network............................................................................................................................................6
b) Network type (MAN, WAN, LAN etc.)..........................................................................................................7
c) Network protocol definition........................................................................................................................8
d) List some protocols: TCP/IP, HTTP, DNS,ICMP.............................................................................................9
e) List some standard organizations and standards names............................................................................11
2. Network topology & communication and Bandwidth requirements (P2)......................................................12
a) Network topology definition......................................................................................................................12
b) Discuss the Impact of topology..................................................................................................................12
c) Communication and Bandwidth................................................................................................................14
3. Discuss the operating principles of networking devices and server types (P3)..............................................16
a) Discuss 1 or 2 operating principles of a selected network device..............................................................16
b) List network devices..................................................................................................................................16
c) List server types.........................................................................................................................................21
4. Discuss the inter-dependence of workstation hardware with relevant networking software (P4)................21
a. Explain what is meant by interdependencies............................................................................................21
b. Give examples of interdependency...........................................................................................................22
c. Define workstation hardware....................................................................................................................22
d. Define networking software......................................................................................................................22
e. Discuss and explain the interdepencies of workstation hardware with networking software. Derive an
example form your discussion...........................................................................................................................22
5. Design a networked system to meet a given specification.(P5).....................................................................23
6. Design a maintenance schedule to support the networked system.(P6).......................................................28
7. Implement a networked system based on a prepared design.(P7)................................................................28
8. Document and analyse test results against expected results.(P8).................................................................32
9. Compare common networking principles and how protocols enable the effectiveness of networked
systems.(M1).........................................................................................................................................................38
10. Explore a range of server types and justify the selection of a server, considering a given scenario
regarding cost and performance optimisation.(M2)..............................................................................................39

3
11. Analyse user feedback on your designs with the aim of optimising your design and improving efficiency.
(M3) 40
12. Recommend potential enhancements for the networked systems.(M4)..................................................41
III. CONCLUSION.................................................................................................................................................41
REFERENCES..............................................................................................................................................................42

Table of Figure
Figure 1. Wide Area Network (WAN)...........................................................................................................................7
Figure 2. TCP/IP...........................................................................................................................................................9
Figure 3. HTTP............................................................................................................................................................10
Figure 4. DNS.............................................................................................................................................................11
Figure 5. ICMP Redirect/ Change Requesst...............................................................................................................11
Figure 6. MESH..........................................................................................................................................................13
Figure 7. STAR............................................................................................................................................................13
Figure 8. BUS.............................................................................................................................................................13
Figure 9. RING............................................................................................................................................................14
Figure 10. TREE..........................................................................................................................................................14
Figure 11. HYBRID......................................................................................................................................................14
Figure 12. Router.......................................................................................................................................................16
Figure 13. Switch.......................................................................................................................................................17
Figure 14. Hub...........................................................................................................................................................17
Figure 15. Bridge........................................................................................................................................................18
Figure 16. Gateway....................................................................................................................................................18
Figure 17. Firewall.....................................................................................................................................................19
Figure 18. Modem.....................................................................................................................................................19
Figure 19. Access Point (AP)......................................................................................................................................20
Figure 20. Repeater...................................................................................................................................................20
Figure 21. Bridge Router............................................................................................................................................21
Figure 22. Logical design............................................................................................................................................25
Figure 23. Physical design..........................................................................................................................................26
Figure 24. erase and reload router............................................................................................................................28

4
Figure 25. config mode..............................................................................................................................................29
Figure 26. Configure the password for the virtual terminal lines..............................................................................30
Figure 27. Configure the interface fast ethernet and serial R1..................................................................................30
Figure 28. Configure the interface fast Ethernet and serial R2..................................................................................31
Figure 29. Configure the interface fast Ethernet and serial R3..................................................................................31
Figure 30. Configure ip route R1................................................................................................................................31
Figure 31. Configure ip route R2................................................................................................................................31
Figure 32. Configure ip route R3................................................................................................................................31
Figure 33. Test ping pc 1 to pc4.................................................................................................................................34
Figure 34. Test ping pc 1 to pc 9................................................................................................................................35
Figure 35. Test mail server.........................................................................................................................................36
Figure 36. Test DHCP server......................................................................................................................................37
Figure 37. Test DNS server.........................................................................................................................................38

5
I. INTRODUCTION
Yes, Mr. Nguyen, I have received detailed information about the computer network project that
our company is deploying for the local education institute.

With a total of 200 students, 15 teachers, 12 marketing and administrative staff, 5 senior
managers and 3 network administrators, the construction of an effective and reliable network
system is very important important to meet the needs of this unit. Moreover, the use of 50
student labs, 35 computers for staff and 3 printers on 3 floors of the building also requires a
comprehensive and flexible network design.

Therefore, our task is to propose a suitable computer network solution, extended and easy to
manage, meeting the specific requirements of this project. The report will provide detailed
recommendations on network structure, necessary network devices and appropriate network
protocols to achieve maximum efficiency.

I believe that with the close cooperation between our company and the Institute of Education, we
will try to perfect this project in the best way.

II. MAIN CONTENT


1. Discuss the benefits and constraints of different network types and standards (P1)
a) Define network.
 A network is a collection of interconnected nodes or entities, such as computers, servers, or devices,
that communicate and share resources with each other. These nodes are linked together through
various communication channels, such as cables, Wi-Fi, or optical fibers. Networks can be
categorized based on their size, scope, and purpose, ranging from small local area networks (LANs)
within a single building or home to vast global networks like the internet. The purpose of a network is
typically to facilitate communication, data sharing, and resource access among its constituent nodes.

6
b) Network type (MAN, WAN, LAN etc.)

Figure 1. Wide Area Network (WAN)

 Benefit of the network


 Communication: Networks enable seamless communication between individuals, organizations, and
devices. They facilitate instant messaging, email, video conferencing, and other forms of real-time
communication.

 Resource Sharing: Networks allow for the sharing of resources such as printers, scanners, files, and
applications among connected devices. This reduces redundancy and increases efficiency.

 Data Transfer: Networks facilitate the transfer of data between devices, enabling the rapid exchange
of information. This is essential for collaborative work, data analysis, and access to remote resources.

 Centralized Management: In larger networks, centralized management tools and software can
streamline administrative tasks such as user authentication, security policies, and software updates.

7
 Cost Efficiency: By sharing resources and infrastructure, networks can reduce costs associated with
hardware, software, and maintenance. This is especially beneficial for businesses and organizations.

 Scalability: Networks can easily accommodate growth by adding new devices or expanding
infrastructure. This scalability ensures that the network remains functional and efficient as
requirements change over time.

 Flexibility and Mobility: With wireless networking technologies such as Wi-Fi and cellular networks,
users can access resources and communicate from virtually anywhere, providing flexibility and
mobility in both professional and personal contexts.

 Global Connectivity: Networks like the internet connect people and organizations around the world,
facilitating global commerce, collaboration, and information exchange on an unprecedented scale.
 Constraint of the network
 Bandwidth Constraints: These refer to limits on the amount of data that can be transmitted over a
network connection within a given period. Limited bandwidth can restrict the speed and capacity of
data transfers between devices or across the internet.
 Latency Constraints: Latency is the delay between the sending and receiving of data packets over a
network. High latency can impact the responsiveness of applications, especially real-time applications
like video conferencing or online gaming.
 Resource Constraints: Networks often have limits on resources such as processing power, memory, or
storage. These constraints can affect the ability of the network to handle simultaneous connections,
process data efficiently, or store large amounts of information.
 Security Constraints: Security measures such as firewalls, encryption, and access controls can impose
constraints on network traffic. While necessary for protecting data and systems, these measures can
sometimes introduce delays or limitations in network performance.
 Budgetary Constraints: Financial limitations can restrict investments in network infrastructure,
upgrades, or improvements, potentially limiting the network's capacity and capabilities.

c) Network protocol definition


 A network protocol is a set of rules and conventions that govern how devices communicate and
exchange data over a network. These protocols define the format, timing, sequencing, and error
control mechanisms for transmitting data between devices. They ensure that devices can understand
each other and successfully exchange information, regardless of differences in hardware, operating
systems, or physical transmission media.

8
d) List some protocols: TCP/IP, HTTP, DNS,ICMP
 TCP/IP is a suite of protocols that enables communication between devices over the internet or any
network that uses the Internet Protocol (IP). It provides reliable and orderly delivery of data packets
and includes protocols like TCP (Transmission Control Protocol) for reliable data transmission and IP
(Internet Protocol) for addressing and routing.

Figure 2. TCP/IP

 HTTP is the protocol used for transmitting web pages, images, videos, and other resources on the
World Wide Web. It defines how messages are formatted and transmitted between web browsers and
web servers, enabling users to access and interact with websites.

9
Figure 3. HTTP
 DNS is a protocol used to translate domain names (e.g., www.example.com) into IP addresses that
computers use to identify each other on a network. It enables users to access websites and other
resources using easy-to-remember domain names rather than numeric IP addresses.

10
Figure 4. DNS

 ICMP is a protocol used for diagnostics and error reporting in IP networks. It is primarily used by
network devices (routers, hosts) to send error messages and operational information, such as when a
destination is unreachable or to test connectivity using tools like ping.

Figure 5. ICMP Redirect/ Change Requesst

e) List some standard organizations and standards names


IEEE 802.11: Standards for wireless local area networks (Wi-Fi).
ISO 9001: Quality management systems.

11
ITU-T Recommendations: Standards for telecommunications and information and communication
technologies (ICT).
RFC 791: Internet Protocol (IP) version 4.
HTML (Hypertext Markup Language) specifications.
ANSI C: Standard programming language specification.
GSM (Global System for Mobile Communications) standards.
GSM (Global System for Mobile Communications) standards. (www.transtutors.com, 2023)

2. Network topology & communication and Bandwidth requirements (P2)


a) Network topology definition
Network topology refers to the layout or arrangement of devices (nodes) and the connections (links) that
form a computer network. It defines how different nodes in a network are interconnected and how data
flows between them. The topology can influence factors such as performance, reliability, scalability, and
ease of management of the network.

b) Discuss the Impact of topology


The impact of network topology on a computer network is significant and influences various aspects of its
performance, reliability, scalability, and management.

 Definition: Physical & Logical Topology


Physical Topology: Physical topology refers to the physical layout or arrangement of devices (nodes) and
the physical connections (links) between them in a network. It describes how devices are physically
connected to each other and how data signals are transmitted through the network medium. Physical
topology is concerned with the actual hardware configuration of the network.
Common types of physical topologies include:
 Bus Topology: All devices are connected to a single central cable (the bus), with terminators at each
end to absorb signals.
 Star Topology: All devices are connected to a central hub or switch through individual cables.
 Ring Topology: Devices are connected in a closed loop configuration, where each device is connected
to exactly two other devices.

The physical topology determines factors such as the type of cables used, the distance between devices,
and the location of network equipment (routers, switches, hubs).

Logical Topology: Logical topology refers to the way data is transmitted between devices in a network,
independent of the physical layout of the devices. It describes the paths that data packets take through the
network and how nodes communicate with each other using protocols and addressing schemes.

Common types of logical topologies include:

12
 Ethernet: Uses a bus or star physical topology but employs a logical bus topology where all devices
share the same communication medium.
 Token Ring: Uses a physical ring topology but employs a logical ring topology where data packets
circulate in a predefined sequence.

Logical topology is defined by network protocols and can differ from the physical topology. It focuses on
how data flows between devices, how devices are addressed, and how they communicate across the
network.

• Examples of topology with diagrams (Mesh, Star, Bus, Ring, Tree, Hybrid)

Mesh Topology: In a mesh topology, every device is connected to every other device in the network. This
provides multiple paths for data to travel, offering redundancy and fault tolerance.

Figure 6. MESH

Star Topology: In a star topology, all devices are connected to a central hub or switch. Data flows through
the central hub, and each device communicates indirectly through it.

Figure 7. STAR

Bus Topology: In a bus topology, all devices are connected to a single central cable (the bus). Data is
transmitted along the bus, and each device receives the data intended for it.

Figure 8. BUS

13
Ring Topology: In a ring topology, devices are connected in a closed loop configuration, where each
device is connected to exactly two other devices. Data travels in one direction around the ring.

Figure 9. RING

Tree Topology: A tree topology combines characteristics of star and bus topologies. It has multiple levels
of hierarchy, with a central root node (like a switch) connecting to branch nodes, which in turn connect to
end devices.

Figure 10. TREE

Hybrid Topology: A hybrid topology combines two or more different types of topologies. For example, a
star-bus hybrid topology might have multiple star topologies connected via a bus backbone.

Figure 11. HYBRID

c) Communication and Bandwidth


 Define commutations in terms of networking

In the context of computer networking, "communications" refers to the process by which data is
exchanged or transferred between devices connected within a network. This exchange of data can occur
locally within a network or globally over the internet, facilitated by various networking protocols and
technologies.

 Rules of communication

In the context of networking, communication between devices follows specific rules and principles to
ensure efficient and reliable data exchange. These rules encompass various aspects of data transmission,
addressing, error detection, and protocol adherence.

14
 Bandwidth
 Bandwidth refers to the maximum data transfer rate of a network or internet connection, typically
measured in bits per second (bps), kilobits per second (kbps), megabits per second (Mbps), or gigabits per
second (Gbps). It represents the capacity or throughput of the communication channel and determines how
much data can be transmitted in a given amount of time.
 Bandwidth requirements for the networks
 Home or Small Office Networks:
 Basic Internet Usage: For browsing websites, checking email, and social media, a minimum bandwidth of
1-3 Mbps per user is typically sufficient.
 Streaming: HD video streaming (e.g., Netflix, YouTube) requires about 5-10 Mbps per stream. 4K
streaming may require 15-25 Mbps per stream.
 Gaming: Online gaming generally requires low latency (ping) more than high bandwidth, but stable
connections are crucial. Bandwidth requirements can vary but typically range from 3-6 Mbps.
 Enterprise Networks:
 Office Applications: For general office applications like email, document sharing, and web browsing,
around 1-5 Mbps per user is usually adequate.
 File Transfers: Larger file transfers, backups, or data replication between servers may require higher
bandwidth, depending on the size and frequency of transfers.
 VoIP and Video Conferencing: For high-quality VoIP calls or video conferencing (e.g., Zoom, Microsoft
Teamcs), around 1-4 Mbps per user is recommended for good quality audio and video.
 Educational Institutions:
 E-learning: With the rise of online learning platforms, bandwidth requirements vary based on the number
of students accessing video lectures, interactive content, and collaborative tools. Generally, 5-10 Mbps per
user may be needed during peak times.
 Data Centers and Cloud Services:
 Data Transfer: Bandwidth requirements for data centers depend on the volume of data being transferred
between servers, storage devices, and clients. High-speed connections (10 Gbps, 40 Gbps, 100 Gbps) are
common for data-intensive applications and cloud services.
 Virtualization and Cloud Computing: Virtualized environments and cloud services require high-bandwidth
connections to ensure seamless access to virtual machines, applications, and databases.
 Telecommunication Networks:
 Mobile Networks: 4G LTE networks typically offer download speeds ranging from 5 Mbps to 100 Mbps,
depending on network coverage and congestion. 5G networks can provide significantly higher speeds, up
to multiple Gbps.
 Fixed Broadband Networks: Fiber-optic and cable broadband networks can deliver speeds ranging from
100 Mbps to 1 Gbps or more, depending on the service plan and technology.
 Internet Service Providers (ISPs):
 ISPs must provision enough bandwidth to meet the aggregate demand of their subscriber base during peak
hours. They often oversubscribe their networks but monitor and manage bandwidth allocation to avoid
congestion and ensure quality of service. (www.ukessays.com, n.d.)

15
3. Discuss the operating principles of networking devices and server types (P3)
a) Discuss 1 or 2 operating principles of a selected network device
 Packet Switching and Forwarding Logic:
 Another key operating principle of a router involves packet switching and the logic used for
efficient packet forwarding:
 Packet Switching: Routers use packet-switching technology to efficiently handle and forward data
packets across networks. This involves breaking data into smaller packets, each with header
information containing source and destination addresses.
 Store-and-Forward vs Cut-Through Switching: Routers typically use store-and-forward switching,
where they receive and buffer entire packets before forwarding. This allows for error checking and
ensures data integrity before forwarding. Some high-speed routers may use cut-through switching
for low-latency forwarding of packets.

b) List network devices


 Router:

A router is a networking device that connects multiple networks together and forwards data packets
between them based on IP addresses. Routers operate at the network layer (Layer 3) of the OSI model and
use routing tables to determine the best path for data transmission.

Figure 12. Router

 Switch:

A switch is a networking device that operates at the data link layer (Layer 2) of the OSI model. It connects
devices within the same local area network (LAN) and forwards data based on MAC addresses. Switches
improve network efficiency by creating dedicated pathways for data transmission between devices.

16
Figure 13. Switch

 Hub:

A hub is a basic networking device that operates at the physical layer (Layer 1) of the OSI model. It
connects multiple Ethernet devices in a network and broadcasts data packets to all connected devices.
Hubs are less efficient than switches because they do not intelligently direct data packets.

Figure 14. Hub 17


 Bridge:

A bridge is a device that connects two or more network segments and operates at the data link layer (Layer
2). Bridges filter and forward data packets between segments based on MAC addresses, effectively
extending the size of a single network.

Figure 15. Bridge

 Gateway:

A gateway is a network node that serves as an entry/exit point between two different networks that use
different protocols or data formats. Gateways translate data between incompatible networks (e.g., between
a LAN and the internet) to enable communication.

Figure 16. Gateway 18


 Firewall:

A firewall is a security device that monitors and controls incoming and outgoing network traffic based on
predetermined security rules. Firewalls protect networks and devices from unauthorized access and cyber
threats by filtering packets and blocking malicious traffic.

Figure 17. Firewall

 Modem:

A modem (modulator-demodulator) converts digital data from a computer into analog signals suitable for
transmission over telephone lines (for DSL) or cable systems (for cable internet). Modems also
demodulate analog signals back into digital data for the receiving computer.

Figure 18. Modem 19


 Access Point (AP):

An access point is a wireless networking device that allows wireless devices to connect to a wired network
using Wi-Fi. Access points typically connect to a router or switch and provide wireless access within a
specified range (Wi-Fi coverage area).

Figure 19. Access Point (AP)

 Repeater:

A repeater is a device that receives and retransmits signals to extend the reach of a network. Repeaters
amplify signals to overcome attenuation (signal loss) over long distances in wired or wireless networks.

Figure 20. Repeater

 Bridge Router:

A bridge router combines the functions of a bridge and a router. It can connect multiple LAN segments
(like a bridge) and route traffic between different networks based on IP addresses (like a router).

20
Figure 21. Bridge Router

c) List server types


 File Server
 Print Server
 Web Server
 Database Server
 DNS Server
 Proxy Server.

4. Discuss the inter-dependence of workstation hardware with relevant networking software


(P4)
a. Explain what is meant by interdependencies
Interdependencies refer to the relationships and connections between different elements, systems, or
components where each relies on the others to function properly or achieve desired outcomes. In various
contexts, interdependencies highlight how changes or disruptions in one part can impact others within a
complex system. In summary, interdependencies underscore the interconnected nature of systems and
emphasize the importance of collaboration, planning, and adaptability in achieving sustainable and
effective outcomes across various domains.

21
b. Give examples of interdependency.
Cloud Computing: Organizations rely on cloud service providers for hosting applications, storing data,
and delivering computing resources. Any outage or performance degradation in the cloud infrastructure
can affect multiple businesses and services that depend on it.

Network Infrastructure: Businesses depend on reliable network infrastructure (routers, switches, cables) to
connect offices, support telecommunication services, and enable internet access. Network failures or
cyberattacks can disrupt operations across the organization.

c. Define workstation hardware


Workstation hardware refers to the specific components and peripherals designed to support high-
performance computing tasks typically performed by professionals in fields such as engineering,
architecture, graphic design, and scientific research. Unlike standard desktop computers, workstations are
optimized for tasks that require intensive computational power, large amounts of memory, and specialized
graphics capabilities. Here are the key components that define workstation hardware:

 Central Processing Unit (CPU)


 Graphics Processing Unit (GPU)
 VGA
 Memory (RAM)
 Storage (Hard Drives and SSDs)
 Motherboard and Chipset

d. Define networking software


Networking software refers to programs, applications, or operating system components that facilitate
communication, management, and control of computer networks. This software enables devices (such as
computers, servers, routers, and switches) to connect, communicate, and exchange data over networks.
Here are the key aspects and functions of networking software:

 Network Operating Systems (NOS)


 Network Management Software
 Network Security Software
 Network Protocol Software

e. Discuss and explain the interdepencies of workstation hardware with networking software.
Derive an example form your discussion
The interdependence between workstation and network software is an important topic in the field of
information technology. Workstation hardware such as processors, memory, network cards affect the
ability to process and transmit data online. If the workstation hardware is too weak, it can cause problems
such as slow data transmission speed, high latency, causing the network performance to decline. In
contrast, network software such as network card drivers, network protocol also affects the ability to
maximize the performance of hardware.

22
Network software such as operating systems, application software must be compatible with workstation
hardware. If not, they may not work or operate unstable, resulting in connection and data transmission
issues. For example, an application software needs a specific network card and driver to be able to use
advanced features.

Hardware management and network software need to be done synchronously. Update network software
when there is a new version to take advantage of the new features of the hardware, and upgrade the
hardware when necessary to meet the needs of the network software is increasing. Understanding this
relationship will help us to manage, operate and upgrade the network effectively.

Here is an example of interdependent relationship between workstation hardware and network software:

Suppose you are using an older workstation, with a more modest hardware configuration, with the Intel
Core i3 processor, 8GB RAM and Gigabit Ethernet network card. This workstation is installed with
Windows 7 operating system. When you install a new video conference application software, you find that
the video call quality is not good, often shocked and sound asynchronous. In this case, the cause may not
be strong enough to meet the requirements of the video conference application software. Specifically, the
Intel Core i3 and 8GB RAM processor may not be able to handle the system, audio and other tasks of the
system.

To solve this problem, you can implement some solutions such as:

Upgrade workstation hardware, for example, upgrade to Intel Core i5 or i7 processor and increase RAM to
16GB.

Reinstall the video conference application software with more optimal settings for the current hardware
configuration.

Switch to using another video conference application software, which requires lower hardware
configuration.

5. Design a networked system to meet a given specification.(P5)


• Explain the difference between logical and physical design:

-Physical design: Physical topology diagrams illustrate the physical location of intermediary devices and
cable installation.

- Logical design: Logical topology diagrams illustrate devices, ports, and the addressing scheme of the
network.

23
- Physical topology – shows physical connections and how devices are interconnected.

- Logical topology – identifies the virtual connections between devices using device interfaces and IP
addressing schemes.

• Discuss and explain the USER Requirement for the design:

Location: 3 floors, 35 staff PCs and 3 printers are on ground floor, 50 student lab PCs are divided into 2
labs, 1 lab on the first floor and another one on the second floor - total of 135 people.

Ground floor: 35 staff PCs divided into 2 LAN: Staff_LAN and Admin_LAN.

• Staff_LAN contains 12 Staff PCs, 5 Manager PCs and 1 printer for each room.

• Admin_LAN contains 3 Admin PCs and the last printer.

First floor: Lab 1 with 25 PCs for students, divided into 2 sides of the room, PC 01-13 are on left side
while the rest are on right side. In this document, only PC 01 and PC 13 on the left side and PC 14 and PC
25 on the right side are shown as sample.

Second floor: Lab 2 with 25 PCs for students, divided into 2 sides of the room, PC 01-13 are on left side
while the rest are on right side. In this document, only PC 01 and PC 13 on the left side and PC 14 and PC
25 on the right side are shown as sample. Provide a logical design of the network based on user
requirement.

24
Figure 22. Logical design

25
Figure 23. Physical design

26
27
6. Design a maintenance schedule to support the networked system.(P6)
Advantages:
All of PC can connect and communicate with each other
From the original design, you may more quickly increase the number of users and PC while
minimizing any potential downtime
The range of task response times will be significantly more efficient and prevent situations like loss
data when transmission
Minimize security risks while boosting performance and efficiency.
Cost optimization
Disadvantages:
Don’t have firewall that can lead to hacker can attack
There are not many services for users yet
Solutions:
Upgrade security system like firewall
Build more server to provide services for users
Maintain the system regularly to ensure it works effectively and safely
7. Implement a networked system based on a prepared design.(P7)

Figure 24. erase and reload router

28
Figure 25. config mode

29
Figure 26. Configure the password for the virtual terminal lines

Figure 27. Configure the interface fast ethernet and serial R1


30
Figure 28. Configure the interface fast Ethernet and serial R2

Figure 29. Configure the interface fast Ethernet and serial R3

Figure 30. Configure ip route R1

Figure 31. Configure ip route R2

Figure 32. Configure ip route R3

31
8. Document and analyse test results against expected results.(P8)

32
33
Figure 33. Test ping pc 1 to pc4

34
Figure 34. Test ping pc 1 to pc 9

35
Figure 35. Test mail server

36
Figure 36. Test DHCP server

37
Figure 37. Test DNS server

9. Compare common networking principles and how protocols enable the effectiveness of
networked systems.(M1)
 Networking Principles:
 Layered Architecture: Networking systems typically follow a layered approach, such as the OSI
(Open Systems Interconnection) model or the TCP/IP (Transmission Control Protocol/Internet
Protocol) model. This layered design separates the different functions of a network, making it easier
to develop, maintain, and update individual components without affecting the overall system.
 Packet Switching: Data transmission in modern networks is based on packet switching, where
information is divided into smaller units (packets) and sent independently through the network. This
allows for more efficient use of network resources, as packets can be routed dynamically based on
network conditions.

38
 Addressing and Identification: Networked systems rely on addressing schemes, such as IP addresses
(IPv4 and IPv6) and MAC addresses, to uniquely identify devices on a network. These addressing
mechanisms enable the proper routing and delivery of data between endpoints.
 Reliability and Error Handling: Networking principles incorporate mechanisms to ensure reliable data
transmission, such as error detection, retransmission, and flow control. This helps mitigate the impact
of network errors, packet loss, or congestion, ensuring the integrity of the data being exchanged.
 Networking Protocols:
 Networking protocols are the rules and standards that govern how devices communicate and exchange
data within a networked system. Some key protocols and their roles include
 TCP/IP: The Transmission Control Protocol (TCP) and the Internet Protocol (IP) are the foundational
protocols of the Internet. They handle tasks like addressing, routing, and reliable data transfer,
enabling seamless communication between networked devices.
 HTTP/HTTPS: The Hypertext Transfer Protocol (HTTP) and its secure counterpart, HTTPS, are the
primary protocols used for web-based applications, allowing clients (e.g., web browsers) to request
and receive data from web servers.
 DNS: The Domain Name System (DNS) translates human-readable domain names (e.g.,
www.example.com) into the corresponding IP addresses, enabling users to access websites and other
network resources by their domain names.
 Ethernet: Ethernet is a widely-used local area network (LAN) protocol that defines the physical and
data link layer specifications for wired Ethernet networks, ensuring reliable and efficient data transfer
between devices.

10. Explore a range of server types and justify the selection of a server, considering a given
scenario regarding cost and performance optimisation.(M2)
 Physical Servers:
 Description: Traditional, on-premises hardware servers that provide computing resources and host
applications directly on the physical machine.
 Advantages: Greater control, customization, and performance optimization for specific workloads.
 Disadvantages: Higher upfront costs, maintenance, and physical space requirements.
 Virtual Servers (VMS):
 Description: Software-based servers
 Advantages: Improved resource
 Disadvantages: Potential performance limitations depending on the host server's resources an
 Cloud Servers (IaaS):
 Description: Servers hosted and managed by a cloud service provider
 Advantages: Scalability, flexibility, and reduced up
 Disadvantages: Potential vendor lock-in, ongoing subscription
 Containerized Servers (Docker, Kubernetes):
 Description: Applications and their dependencies are packaged into lightweig
 Advantages: Improved portability, scalability

39
 Disadvantages: Increased complexity in
 If it was me, I would choose Cloud Servers (IaaS):
 Cost Optimization:
 Cloud servers typically have lower upfront costs compared to physical servers or on-premises
virtualization solutions, as the cloud provider handles the hardware procurement, maintenance, and
management.
 The pay-as-you-go pricing model of cloud servers allows the business to scale resources up or down
as needed, avoiding the need for over-provisioning and minimizing ongoing costs.
 Performance Optimization:
 Cloud servers can
 Many cloud providers offer various server configurations and options, allowing the
 Cloud providers typically have multiple data centers and content delivery networks (CDNs) that can
help reduce latency and improve responsiveness for the end-users.
 By selecting a cloud server solution, the small to medium-sized e-commerce business can benefit
from cost optimization through the cloud's pay-

11. Analyse user feedback on your designs with the aim of optimising your design and improving
efficiency.(M3)
The network seems to be divided into several logical zones or segments, such as the "Principal's room",
"Teacher's room", "Managing room", and "Book 2". These areas appear to be connected through various
network devices like switches, servers, and workstations.

The connections between the devices and zones seem to be well-documented, indicating a structured and
organized network design. The use of IP addresses and port numbers suggests that this is a TCP/IP-based
network, likely following industry standards and best practices.

From an optimization perspective, the network appears to be fairly complex, with a significant number
of interconnected devices and potential bottlenecks. This could indicate a need to review the overall
network architecture and identify areas for improvement, such as load balancing, redundancy, or
segmentation.

Additionally, the information presented in the diagram may be useful for troubleshooting and
maintenance purposes, as it provides a comprehensive view of the network topology and device
configurations. Regularly reviewing and updating this documentation can help ensure the network's
efficiency and reliability over time.

Without more context or user feedback, it's difficult to provide specific recommendations for
optimization. However, the overall impression is that this network diagram represents a well-designed
and documented system that could potentially benefit from further analysis and optimization to address
any performance or scalability concerns.

40
12. Recommend potential enhancements for the networked systems.(M4)
 The /24 subnet mask results in unmanageable IP addresses for improvements. The business
mightadd new routers to address this issue, set aside specific buildings for different departments,
andutilize a different subnet mask to control the functionality of each component. Thus, managing
buildings becomes simple for network infrastructure managers. The business may use a
hardwarefirewall for security purposes and set up rules to protect itself from outside attackers.
 Visibility into layer 7 data flows is becoming more and more essential as modern
networks'complexity rises and they start to operate at higher layers of the OSI model. Make sure
you havethe required network performance monitoring tools in place when planning your new
network sothat you can easily identify and swiftly fix application-specific issues. The use of
proactiveautomation approaches can assist discover common issues, making them simple to fix.
Switchesand more access points will be introduced as the network expands, which will help your
organization and business grow as well as the outcome of your business.
 Your network devices run quickly and efficiently due to switches. To keep everything
functioningsmoothly as your business and network expand, you'll need to upgrade and expand
your switches.Better application sharing across networks and locations, more access to real-time
data, andimproved network management are all possible with switches that are operating at their
peak efficiency.
 Implementing a wireless router: The network is set up with a wired router, but with the most
recentadvancements in wireless router technology, you can transmit files from one source to
another without the need for a USB port or any other form of port or lugging around various
devices. Nowadays, your devices have many clouds like OneDrive, Google Drive, and iCloud
where youmay store and let other people see your information without needing to have a single
device for adding a port, sharing files, and then removing it.With the development of wireless
routers, theyare can provide you a ton of speed without requiring any cables to be connected to
your device. All you need is your smartphone, and you may move freely from one location to
another within thenecessary range without worrying about anything, such as speed or connection
loss. With the mostrecent wireless router technology, you have the option of freedom of movement
as well as security,so students will be able to use the college's PCs from anywhere in the building.
Talk aboutimportant network upgrades and security requirements.
III. CONCLUSION

In conclusion, networking stands as a pivotal strategy for both personal and professional advancement.
Throughout this exploration, we have underscored its multifaceted benefits, including enhanced career
opportunities, enriched knowledge bases, and strengthened support systems. Embracing proactive
networking not only empowers individuals in their career journeys but also fosters a collaborative
environment essential for continuous growth. As we navigate an increasingly interconnected world, the
ability to forge and maintain meaningful connections becomes ever more critical. Whether through face-
to-face interactions or digital platforms, each networking opportunity offers a pathway to broaden
horizons and cultivate impactful relationships. Therefore, I encourage everyone to seize these

41
opportunities, recognizing networking not just as a tool, but as a cornerstone of success in today's dynamic
landscape.

REFERENCES
www.transtutors.com. (2023). (Solved) - discuss the benefits and constraints of different
networking... (1 Answer) | Transtutors. [online] Available at:
https://www.transtutors.com/questions/discuss-the-benefits-and-constraints-of-different-
networking-systems-types-and-topol-90240.htm [Accessed 25 Jun. 2024].
‌www.ukessays.com. (n.d.). Explain the Impact of Network Topology, Communication and
Bandwidth Requirements. [online] Available at:
https://www.ukessays.com/essays/information-systems/explain-the-impact-of-network-
topology-communication-and-bandwidth-requirements.php.
Melnick, J. (2019). Network Devices Explained. [online] Netwrix.com. Available at:
https://blog.netwrix.com/2019/01/08/network-devices-explained/.
www.expertsmind.com. (n.d.). networking, discuss the interdependence of workstation
hardware with relevant software, Computer Networking. [online] Available at:
https://www.expertsmind.com/questions/networking-301164452.aspx [Accessed 25 Jun.
2024].
‌cloud.z.com. (2024). Các tiêu chí để lựa chọn server. Vì sao nên thuê thay vì mua máy chủ?
Z.com Cloud VPS – Tốc Độ Cao Khởi Tạo Trong 1 Phút. [online] Available at:
https://cloud.z.com/vn/news/may-chu-server/.

42

You might also like