Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Networking

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 31

Fall 2019 (Part 2)

Qualification BTEC Level 5 HND Diploma in Computing

Unit number Unit 2: Networking

Assignment title Networking Infrastructure

Academic Year Fall 2019 (Part 2)

Unit Tutor Hồ Nguyễn Phú Bảo

Issue date Submission date December, 27th 2019

IV name and date Cù Duy Lộc

Submission format

Part 1

The submission is in the form of an individual written report. This should be written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using the Harvard
referencing system. Please also provide a bibliography using the Harvard referencing system. The
recommended word limit is 2,000–2,500 words, although you will not be penalized for exceeding the total word
limit.

Part 2

The submission is in the form of an individual evidence portfolio. This assignment can be completed as a group,
but each student must produce their own portfolio, which will contain:
 A LAN design plan and blueprint and justification document.
 A fully completed test plan including an evaluation of results and recommendations for improvements to
LAN.
 A proposed and justified maintenance schedule.

Part 3

 Evidence of an implemented network.

You are required to make use of headings, paragraphs, subsections and illustrations as appropriate, and all work
must be supported with research and referenced using the Harvard referencing system.

Unit Learning Outcomes


LO1: Examine networking principles and their protocols.
LO2: Explain networking devices and operations.
LO3: Design efficient networked systems.
LO4: Implement and diagnose networked systems.

1
Assignment Brief

You are employed as a Network Engineer by Nguyen Networking Limited, a high-tech networking solution
development company, which have branches in Hồ Chí Minh City, Hà Nội, Đà Nẵng and Cần Thơ.

The company has been contracted to implement a networking project from a local educational institute. The
specification of the project is given below:

People: 200 students, 15 teachers, 12 marketing and administration staff, 05 higher managers including the
head of academics and the program manager, 03 computer network administrators.

Resources: 50 student lab computers, 35 staff computers, 03 printers.

Building: 03 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located
on the first floor and another located on the second floor.

As a first task, the CEO of the company Mr. Nguyen has asked you to investigate and explain networking
principles, protocols and devices and submit a report.

Part 1
You will need to produce a report that includes the following:
1. An introduction to provide an overview of your report.

2. Benefits and constraints of different types of networks and networking standards.

3. The impact of network topology, speed of communication and bandwidth requirements.

4. Effectiveness of networking systems.

5. Discussion on operating principles of networking devices and server types and networking software.

6. Discuss the relationship of workstation hardware with networking software.

7. Explore a range of server types and justify the selection of a server, considering a given scenario
regarding cost and performance optimization.

8. For the given specification, identify the topology protocol for the efficient utilization of a networking
system.

The CEO Mr. Nguyen is happy with your first report and now he has asked you to analyze the specification
from the institution, as given earlier.

You need to design and implement the networking project within a given time frame:

Part 2 - Design efficient networked systems


1. Prepare a written step-by-step plan of how you are going to design a Local Area Network including a
blueprint of your LAN.

2. Justify your choice of devices for your network design.

3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per
user specifications.

4. Justify the security requirements and quality of services needed for selection of accessories.

2
5. Suggest a maintenance schedule to support the networked system.

Part 3 - Implement test and diagnose networked systems


1. Implement a networked system based on your prepared design.

2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc.

3. Record the test results and analyze these against expected results.

4. Investigate what functionalities would allow the system to support device growth and the addition of
communication devices.

5. Discuss the significance of upgrades and security requirements in your recommendations.

ASSESMENT CRITERIA

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Examine networking principles and their protocols. LO1 & 2


D1 Considering a given scenario,
P1 Discuss the benefits and M1 Compare common
identify the topology protocol
constraints of different network types networking principles and selected for the efficient
and standards. how protocols enable the utilization of a networking
effectiveness of networked system.
P2 Explain the impact of network systems.
topology, communication and
bandwidth requirements.

LO2 Explain networking devices and operations

P3 Discuss the operating principles of M2 Explore a range of server


networking devices and server types. types and justify the selection
of a server, considering a
P4 Discuss the inter-dependence of given scenario regarding cost
workstation hardware with relevant and performance
networking software. optimisation.

LO3 Design efficient networked systems

P5 Design a networked system to M3 Install and configure D2 Design a maintenance


meet a given specification. network services and schedule to support the
applications on your choice. networked system.
P6 Test and evaluate the design to
meet the requirements and analyse
user feedback.

3
LO4 Implement and diagnose networked systems

P7 Implement a networked system M4 Recommend potential D3 Use critical reflection to


based on a prepared design. enhancements for the evaluate own work and
networked systems. justify valid conclusions.
P8 Document and analyse test results
against expected results.

Contents
P1 Discuss the benefits and constraints of different network types and standards …………………
…………………………………………………………………………………………………….………5.
P2 Explain the impact of network topology, communication and bandwidth requirements................
……………………………………………………………………………………………………………11.
P3 Discuss the operating principles of networking devices and server types.........................................
……………………………………………………………………………………………………………14.
P4 Discuss the inter-dependence of workstation hardware with relevant networking software……...
……………………………………………………………………………………………………………22.
P5 Design a networked system to meet a given specification………………………………………...23.
P6 Test and evaluate the design to meet the requirements and analyse user feedback……………….
……………………………………………………………………………………………………………26.
P7 Implement a networked system based on a prepared design……………………………………..27.
P8 Document and analyse test results against expected results……………………………………...28.

References……………………………………………………………………………………………….30.

4
P1 Discuss the benefits and constraints of different network types and standards .
 Network system or computer network is a combination of computers together through networked
devices and media (network protocol, transmission environment) in a certain structure and
computers This exchange information back and forth to each other.

 Benefits of the network for users and administrators

 Share your file to other users


 View, edit and copy files on another computer as easily as working with an object on your
own computer.

5
 Computers, devices in the same network can share resources such as printers, fax machines,
computer storage devices (HDD, FDD and CD drives), webcams, scanners, modems and many
other devices.
 In addition, network users can also share files and programs on the same network.

There are 4 main types that can be mentioned: LAN, WAN, INTRANET, SAN,
1. Local Network Area (LAN).
LAN has a full name is Local Network Area. LAN is understood as a combination of many
devices that are connected together in a network in a certain area (Company, school, housing,
etc.) Pairing devices in the same system allows these devices to exchange data with each other
quickly and easily (sharing files, images, printers, etc.).

Along with the ever-increasing technological development, LANs are increasingly being
developed and operated in many other forms, such as WANs - LANs are connected together
through routers ( Router) or WLAN (Wireless Local Network Area) wireless LAN -
computers connected to the network via Wi-Fi.

2. Wide Area Network (WAN).


MAN network is a network model that is connected from many LANs together through
cables, transmission facilities, etc. The connection range is in a wide area like in a city.

The main object using the MAN network model is that organizations and businesses have
many branches or parts connected together. The purpose of using the MAN network for
businesses is because this network model will help provide businesses with many types of
value-added services at the same time on a connection line of voice-data-video. Best of all,
this service also makes it easy to deploy professional applications.

6
3. INTRANET
An intranet is an internal (of course) internal network, based on TCP / IP, and this type of
network is often applied in companies, businesses, schools, etc. The intranet system wants to
operate, accessible must have authentication information, including the Username and
Password. And intranet-based sites work similarly to other Internet-based websites, but are
protected by a Firewall layer, which protects the system from unknown access.

Intended for use similar to the Internet, the intranet is used to exchange and share internal
information. However, the intranet has an advantage that is protected by the Firewall, meaning
that the user must have an account to access the system (different from the Internet where
there is a network, a computer can use it).

4. Storage area network (SAN).


SAN (Storage area network) is a high-speed network and dedicated to connecting to the
general storage of storage devices with multiple servers. The SAN stores resources from
public users and organizes them under high performance and independence. This allows each

7
server to access the memory and share it as a drive directly attached to the server. When the
server wants to access a SAN storage device it sends requests based on blocks.
SAN is a storage network assembled using three main components: cable, host bus adapter
(HBA) and finally the switch. Each switch system and SAN storage must be connected to each
other, of course, physical connections must be supported with a bandwidth that can handle a
full range of data operations.

 Constraints:
 Local area network (LAN):
 High Setup Cost: The initial setup costs of installing Local Area Networks is high
because there is special software required to make a server. Also, communication devices
like an ethernet cable, switches,  hubs, routers, cables are costly.
 Privacy Violations: The LAN administrator can see and check personal data files of each
and every LAN user. Moreover, he can view the computer and internet history of the LAN
user.
 Data Security Threat: Unauthorised users can access important data of an office or
campus if a server hard disk is not properly secured by the LAN administrator.
 LAN Maintenance Job: Local Area Network requires a LAN Administrator because there
are problems such as software installations, program faults or hardware failures or cable
disturbances in Local Area Network. A LAN Administrator is required to maintain these
issues.
Covers Limited Area: LANs are restricted in size they cover a small area like a single
office, single building or a group of nearby buildings.
 Wide Area Network (WAN):
 Security problems: Wide Area Networks faces more security problem as compare to
LANs and MANs. One of the key disadvantages of WANs is a security issue when many
different people have the ability to use information from other computers.

8
 Needs firewall and antivirus software: As it faces security issue, therefore it is a basic
need of WANs to use firewalls and antivirus software to protect data transfer on the internet
which can be accessed and changed by hackers. Also, some people can inject a virus into
the computers so antivirus software is also needed to install.
 The setup cost is high: A WAN network covers a large geographical area, it is very
expensive to setup in the initial stage.  It may involve purchasing different networking
devices, i.e routers, switches, and extra security software.

 Troubleshooting problems: A WAN network covers large geographical areas, so fixing


the problem in a network is a very difficult job. Most of WANs wires go into the sea and if
those wires get broken. It involves a lot of hard work to fix those lines under the sea.

Maintenance Issues: Once set up, maintaining a WAN network is a full-time job which
requires high tech skills of network supervisors and technicians.
 Metropolitan Area Network (MAN):
 Difficult To Manage: It is very difficult to manage if the size and number of LANs
network increase. This is due to security and extra configuration problems.
 Internet Speed Difference: As it cannot work on phone copper wires. Copper wires affect
the speed of MAN.So high cost is needed for fiber optics.
 Hackers Attack: In this network, there is a high risk of attacking hackers as compared to
LAN. So data may be a leak. Highly security staff is the need in MAN.
 Technical Staff Requires to Set up: Highly technical people require to setup MAN. The
technical people are network administrators and troubleshooters.

Need More wires: In MAN more than LAN network, cables require. As you know, it is a
combination of two LANs.
 Wireless LAN (WLAN):
 Proprietary solutions: slow standardization procedure lead to many proprietary solutions
only working in an homogeneous environment.
 Safety and security: using radio waves for data transmission might interfere with other
high-tech equipment .
 QoS: WLANs offer tipically lower QoS. Lower bandwidth due to limitations in radio
transmission (1-10 Mbit/s) and higher error rates due to interference.
 Cost: ethernet adapter vs wireless LAN adapters.
 Storage Area Network (SAN):
 Not good for high traffic: If client computers need intensive data transfer then SAN is not
the right choice. SAN is good for low data traffic.

Sensitive data may be leaked: As all the client computers share the same set of storage
devices so sensitive data can be leaked. It is better to not store sensitive data on this
network.
 Standars:
 Networking standards define the rules for data communications that are needed for
interoperability of networking technologies and processes. Standards help in creating and

9
maintaining open markets and allow different vendors to compete on the basis of the quality
of their products while being compatible with existing market products.

 During data communication, a number of standards may be used simultaneously at the


different layers. The commonly used standards at each layer are:

1. Application layer : HTTP, HTML, POP, H.323, IMAP


2. Transport layer: TCP, SPX
3. Network layer: IP, IPX
4. Data link layer: Ethernet IEEE 802.3, X.25, Frame Relay
5. Physical layer: RS-232C (cable), V.92 (modem).
Types of Standards
Standards are of two types:
 De facto: These are the standards that are followed without any formal plan or
approval by any organization. They have come into existence due to traditions or facts.
For example, the HTTP had started as a de facto standard.

De jure: These standards are the ones which have been adopted through legislation by
any officially recognized standards organization. Most of the communication standards
that are used today are de jure standards.
Standards Organizations
Some of the noted standards organizations are:

 International Standards Organization (ISO)


 International Telecommunication Union (ITU)
 Institute of Electronics and Electrical Engineers (IEEE)
 American National Standards Institute (ANSI)
 Internet Research Task Force (IETF)
 Electronic Industries Association (EIA)

10
P2 Explain the impact of network topology, communication and bandwidth requirements.
Network topology is the arrangement of different elements (links, nodes, etc.) of a computer network.
Mostly, it is the topological structure of a computer network, and can be described physically and
logically. The physical topology (physical topology) is the arrangement of various network components,
including the equipment storage and installation of the connecting cables, while the logical topology
(topological topology) indicates How data flows in a network. The distances between the network nodes,
physical intersections, transmission rates, or signal types may differ between the two networks even
though their topology may be identical.
There are 7 types of network topologies
 Star Topology:
The star network has all stations connected to a central device that receives signals from
the stations and transfers them to the destination station. Depending on network
communication requirements, the central equipment may be a switch, router, hub or central
server. The role of the central equipment is to establish Point to Point links.

The network setup is simple, it is easy to reconfigure the network (adding, removing
stations) and can control and troubleshoot quickly, and maximize the transmission speed of
the physical line. However, the line length connecting a station to the central equipment is
limited (within 100m, with current technology).

 Bus Topology:
All stations divide a common bus route. The main current is limited at the two ends by two
special connectors called end points. Each station is connected to the main shaft via T
connector or transceiver. The bus network model operates on Point to Multipoint or
11
Broadcast links. The backbone network is easy to design and has a low cost, but it has poor
stability, when it is difficult to detect, only one broken node will go down the entire
network.

 Ring Topology:
On the network, the ring is transmitted in a single direction. Each station of the network is
connected to each other by a relay that receives the signal and then forwards to the next
station on the ring. Thus the signal is circulated on a loop in a successive sequence of Point
to Point links between transmitters. The ring network has advantages and disadvantages
similar to the star network, but the ring network requires a more complex network access
protocol than the star network. There are also mixed connections between such network
architectures as the Star Bus or Star Ring.

 Mesh Topology:
In this topology every node conected with each other node. It generally used in warreless
network. It need a large amount of overhead which very difficult to manage+

12
 Line Topology:
In a line topology—also known as daisy-chaining or bus topology—the host
communicates directly with all nodes through one bus line. A standard Ethernet device or
switch can be added to the end of the chain if desired and used as normal. Be aware that
these devices will compete for network bandwidth with the FieldDAQ device. Reliable
system design requires awareness of the bandwidth consumed by each device during
operations. This topology offers no redundant links.

 Tree Topology:
Tree topology is a special type of structure in which many connected elements are
arranged like the branches of a tree. For example, tree topologies are frequently used to
organize the computers in a corporate network, or the information in a database.

 Fully connected Topology:


Fully connected replication topology indicates that all database servers connect to each
other and that Enterprise Replication establishes and manages the connections. Replication
messages are sent directly from one database server to another. No additional routing is
necessary to deliver replication messages

13
P3 Discuss the operating principles of networking devices and server types.

There are 6 most popular network devices, including Repeater, Hub, Switch, Bridge, Router
and Gateway
 Repeater
In areas with large space, the signal transmission between hearing aids often decreases.
Computers that are far from the signal source will be weaker than nearby devices.
Therefore, you need devices that can amplify the signal, so that the signal can be
transmitted farther but stronger. Repeater is a device in layer 1 (Physic Layer) in the OSI
model. When we use the Repeater, the physical signal at the input will be amplified,
thereby providing a stronger and more stable signal for the output, to be able to reach
farther locations. If you want to ensure the speed of the connection with large office areas,
or use in telegrams, information transmission via fiber optic,…then you should choose
Repeater.

Ex:
 Hub
Hub has many ports from 4 to 24 ports, and is considered as a multi-port repeater. When
information is transmitted to one hub port, the other ports also receive the information
immediately.

14
Currently there are 2 common types of hubs: Active Hub and Smart Hub:
 Active Hub: This type of Hub is much more commonly used, needs to be powered
when operating. Active Hub is used to amplify incoming signals and divide the
remaining ports to ensure the necessary signal speed when used.
 Smart Hub: also known as Intelligent Hub also has the same function as Active
Hub, but is integrated with a chip that can automatically detect errors on the
network.

Ex:
 Switch
Working of Switch
 When switch receives data from one of the connected devices, it forwards data only to
the port on which the destination system is connected.
 Uses the Media Access Control (MAC) address of the devices to determine the correct
port.
 Refers to MAC table which stores MAC address with corresponding port number.
Frame Structure

 Multiple switches are useful in the network for redundancy and network expansion.
 Maximum number of ports available on switch are 48; this restricts the number of
users that can be connected to the switch.
 To include more users than the available ports on switch, another switch is required.
 This switch should be connected to the previous switch for the data transfer between
two segments.

15
Connecting Ethernet Segments – I

 Multiple switches are useful in the network for redundancy and network expansion.

 Maximum number of ports available on switch are 48; this restricts the number of
users that can be connected to the switch.

 To include more users than the available ports on switch, another switch is required.

 This switch should be connected to the previous switch for the data transfer between
two segments.

Connecting Ethernet Segments – II

 A crossover cable is required to connect two or more switches.

 Crossover ports are also known as uplink, in port or out port.

 Crossover cable allows you to connect two computers together using 1000Base-T
NICs without a switch in between.

Multispeed Switches
 Having number of ports such as 100 Base T and one or two gigabit ports
 Port detects the speed of NIC and runs at that speed is called auto sensing
 Port runs at 10, 100 or gigabit is referred to as 10/100/1000 port
Ex:

16
 Bridge
A bridge is a network device belonging to layer 2 of the OSI model (Data Link Layer).
Bridges are used to pair two networks to form a single large network. Bridges are
commonly used as a bridge between two networks. The bridge observes packets on all
networks. When a packet is transferred from one computer on one network to another on
the network, Bridge copies and sends this packet to the destination network.
Working mode of Bridge
The working mode of a bridge: compared with the OSI model, a bridge works on the basis
of class LLC, is the upper part of layer 2. Thus, it will have to implement the protocols
below this class for both networks to be able to switch messages back and forth. A bridge
itself does not have its own network address.

 Router
Similar to bridge
Routers are classified in the 3rd layer of the OSI model (Network Layer), which is
responsible for connecting two or more IP networks together.

Routers connect different types of networks, from high-speed local Ethernet to slow-speed
long-distance phone lines. But the Router's ability to work is slower than Bridge, because
it needs to calculate to find the way for the signal packets, especially when connecting to
the networks that are not at the same speed, it needs to work more.

17
Ex:
 Gateway
Gateway connects two networks with different protocols, such as networks using IP
protocols with networks using IPX, Novell, DECnet, SNA ... With computers in networks
using different protocols can be easy. Easily connect with each other.

The gateway is capable of distinguishing protocols and applications when transferring


email from one network to another, converting a remote session.
 The gateway has two sides, WAN side and LAN side.
 The WAN side connects to modem and therefore to the Internet via ISP and the LAN
side connects to the network via hub or switch. So, while configuring gateway you
need to configure both WAN and LAN sides.
 Firewall is a gateway device.

Ex:

server types
1. Application Servers
Sometimes referred to as a type of middleware, application servers occupy a large chunk of computing
territory between database servers and the end user, and they often connect the two.

18
2. Client Servers
In the client/server programming model, a server is a program that awaits and fulfills requests from client
programs in the same or other computers. A given application in a computer may function as a client with
requests for services from other programs and also as a server of requests from other programs.

3. Collaboration Servers
In many ways, collaboration software, once called ‘groupware,’ demonstrates the original power of the
Web. Collaboration software designed to enable users to collaborate, regardless of location, via the
Internet or a corporate intranet and to work together in a virtual atmosphere.

19
4. FTP Servers
One of the oldest of the Internet services, File Transfer Protocol, makes it possible to move one or more
files securely between computers while providing file security and organization as well as transfer
control.

5. List Servers
List servers offer a way to better manage mailing lists, whether they be interactive discussions open to the
public or one-way lists that deliver announcements, newsletters or advertising.

6. Mail Servers
Almost as ubiquitous and crucial as Web servers, mail servers move and store mail over corporate
networks (via LANs and WANs) and across the Internet.

20
7. Proxy Servers
Proxy servers sit between a client program (typically a Web browser) and an external server (typically
another server on the Web) to filter requests, improve performance, and share connections.

8. Web Servers
At its core, a Web server serves static content to a Web browser by loading a file from a disk and serving
it across the network to a user’s Web browser. This entire exchange is mediated by the browser and server
talking to each other using HTTP.

9. Virtual Servers
In 2009, the number of virtual servers deployed exceeded the number of physical servers. Today, server
virtualization has become near ubiquitous in the data center. From hypervisors to hybrid clouds,
ServerWatch looks at the latest virtualization technology trends.

10. Telnet Servers


21
A Telnet server enables users to log on to a host computer and perform tasks as if they’re working on the
remote computer itself.

P4 Discuss the inter-dependence of workstation hardware with relevant networking software.

A workstation is a computer reserved for users or groups of users engaged in business or


professional work. It includes one or more high-resolution monitors and processors that
are faster than a personal computer (PC). A workstation also has greater multitasking
capabilities due to the addition of random access memory (RAM), disk space and disk
space. A workstation may also have a higher speed graphics adapter and more connected
peripherals. Workstations usually are built with an optimized design for complex data
manipulation and visualization.

Networking software
Network software is a fundamental element for any network. It helps administrators deploy,
manage and monitor a network. Traditional networks are made up of specialized hardware, such
as routers and switches, and network software packages into the solution. Software-defined
networks (SDNs) separate the software from hardware, making it easy to innovate and adapt the
network to quickly respond to changing network needs. Separating functions from hardware, such
as firewalls or load balancers, is called network functional virtualization (NFV).

Network software is not the same as software applications. The former exposes the inner workings
of the network to administrators, while software applications allow end users to perform specific
tasks. Network software is invisible to end users - it is simply used to facilitate those users to
access network resources seamlessly.

22
Network software allows multiple devices, such as desktops, laptops, mobile phones, tablets, and
other systems to connect to each other, as well as other networks. The Internet is a prime example
of a globally connected server and computer system based on network software to ensure end user
access.

P5 Design a networked system to meet a given specification


Introduce:

If I had to plan to build a 3-storey company network, I would present the network design of a 3-storey
building like this. Building: 3 floors, all computers and printers are on the ground floor outside the IT lab

-One lab is on the first floor and another lab is on the second floor. The network devices I use in this
design include: DNS server, FTP, DHCP, Mail server, syslog server, NTP, Web server and 6 Switches.

 Logical:

FIRST FLOOR including: internet, ASA, Cable-modem, Main server (right) and Staff (left)

23
SECOND FLOOR:

THIRD FLOOR:

Some types of PC, Switch, Router, Laptop and its price when used

 FIRST FLOOR will use the following types:

24
- 13 PC x 14.500.000 = 188.500.000 VNĐ
- 2 Router x 11.999.000 = 23.998.000 VNĐ
- 2 Switch x 22.909.000 = 45.818.000 VNĐ

FIRST FLOOR and SECOND FLOOR:

25
- 20 PC x 8.900.000 = 178.000.000 VNĐ
- 4 Switch x 19.527.000 = 78.108.000 VNĐ
- 2 Router x 7.062.500 = 14.125.000 VNĐ
 The total value of a building is:528.549.000 VNĐ

P6 .Test and evaluate the design to meet the requirements and analyse user feedback.
 performance test

Performance testing is defined as a type of testing software used to ensure software applications work
effectively within the expected workload of the application.

The features and functions of a software system are not the only concerns. The performance of a software
application such as response time, reliability, resource usage and its scalability is also remarkable.

The goal of Performance Testing is not to find bugs, it is an essential activity for developing
performance-optimization solutions for software. Performance testing helps us avoid unforeseen
situations before deploying applications in real-world environments.
26
 Stress Test

Involves testing an application on a workload that is too large to see how it handles high traffic or how it
handles data. The goal is to determine the limit of an application.

 Reliability Test 

A type of test to verify that software is capable of performing an error-free operation for a specified
period of time in a specified environment. It is also about testing the reliability of that system. Example:
The probability that a computer in a store is up and running for eight hours without an error is 99% =>
this factor is called reliability.

 Scalability test 

The goal of the test is to extend the application, to determine the effectiveness of the software application
when "expanding" to support increased user load, support for capacity addition planning system.

 General performance issues of a system

Most performance issues are about speed, response time, load time and poor scalability. Speed is often
one of the most important attributes of an application. A slow-running application will take time, reducing
user satisfaction with the system, possibly losing potential users. Performance testing is performed to
ensure the application runs fast enough to attract attention and attention as well as bring satisfaction and
satisfaction of users.

 Some performance issues


- Load time is too long: The load time is usually the initial time of an application to launch. This
should usually be kept to a minimum. Although some applications may not be able to perform the
download for less than a minute, the download time will be kept in seconds if it is best.
- Slow response time: Response time is the time required when a user enters data into an
application until the application gives feedback to that input. In general this will be very fast.
Again if users have to wait too long, they lose interest.
- Poor scalability: A software product with poor scalability cannot handle the expected number of
users or when it does not meet the range of users then load testing must be performed. to make
sure the application can handle the expected number of users.

P7 Implement a networked system based on a prepared design.

ASM.pkt

27
P8 Document and analyse test results against expected results.
Performance test.
- I will access random computer, choose desktop and press Command Prompt.

Then I will enter the ping command on a computer that has a specific IP address. It’s like a way of
transferring data between devices and helps me know if the connection is good.

- Ping 192.168.10.1 and I have the result below.

28
- Ping 192.168.20.2 and I have the result below

29
References
[1] SearchNetworking. (2019). What is a LAN? - Definition from WhatIs.com. [online] Available at:
https://searchnetworking.techtarget.com/definition/local-area-network-LAN [Accessed 27 Dec. 2019].

[2] Computer Network Topology. (2019). Local Area Network | Advantages and Disadvantages of LAN
(2019). [online] Available at: https://computernetworktopology.com/local-area-network/ [Accessed 27
Dec. 2019].

[3] Openlca.org. (2019). [online] Available at: http://www.openlca.org/collaboration-server/ [Accessed 27


Dec. 2019].https://www.nhgeorgia.com/blog/network-server-types-explained-6

[4] Webopedia.com. (2019). Server Types - Webopedia.com. [online] Available at:


https://www.webopedia.com/quick_ref/servers.asp [Accessed 27 Dec. 2019].https://hocban.vn/web-
server-la-gi

[5] En.wikipedia.org. (2019). Network topology. [online] Available at:


https://en.wikipedia.org/wiki/Network_topology [Accessed 27 Dec. 2019].

[6] Yourownlinux.com. (2019). NETWORK SWITCH : Purpose and Functions. [online] Available at:
http://www.yourownlinux.com/2013/07/network-switch-purpose-and-functions.html [Accessed 27 Dec.
2019].

[7] DNSstuff. (2019). What is Network Topology? Best Guide to Types & Diagrams - DNSstuff. [online]
Available at: https://www.dnsstuff.com/what-is-network-topology [Accessed 27 Dec. 2019].

[8] Sophia. (2019). The Relationship Between Hardware and Software. [online] Available at:
30
https://www.sophia.org/tutorials/the-relationship-between-hardware-and-software [Accessed 27
Dec. 2019].

[9] Techblog của VCCloud. (2019). Performance Testing - Techblog của VCCloud. [online] Available at:
https://tech.bizflycloud.vn/performance-testing-kiem-thu-hieu-nang-20180601110304363.htm?
fbclid=IwAR1KhsxRzLjrciJkJhrDba5bdKXJQy3qBDhxFObXZsiVzGYvDuBSxDs8WDQ [Accessed 27
Dec. 2019].

[10] Stackify. (2019). Performance Testing Types, Steps, Best Practices, and Metrics. [online] Available
at: https://stackify.com/ultimate-guide-performance-testing-and-software-testing/ [Accessed 27 Dec.
2019].
[11] Guru99.com. (2019). What is STRESS Testing in Software Testing? Tools, Types, Examples. [online]
Available at: https://www.guru99.com/stress-testing-tutorial.html#2 [Accessed 27 Dec. 2019].

[12] National Technical Systems. (2019). Failure Analysis - Root Cause Failure Analysis | NTS. [online]
Available at: https://www.nts.com/services/testing/failure-analysis/ [Accessed 27 Dec. 2019].

31

You might also like