Networking
Networking
Networking
Submission format
Part 1
The submission is in the form of an individual written report. This should be written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using the Harvard
referencing system. Please also provide a bibliography using the Harvard referencing system. The
recommended word limit is 2,000–2,500 words, although you will not be penalized for exceeding the total word
limit.
Part 2
The submission is in the form of an individual evidence portfolio. This assignment can be completed as a group,
but each student must produce their own portfolio, which will contain:
A LAN design plan and blueprint and justification document.
A fully completed test plan including an evaluation of results and recommendations for improvements to
LAN.
A proposed and justified maintenance schedule.
Part 3
You are required to make use of headings, paragraphs, subsections and illustrations as appropriate, and all work
must be supported with research and referenced using the Harvard referencing system.
1
Assignment Brief
You are employed as a Network Engineer by Nguyen Networking Limited, a high-tech networking solution
development company, which have branches in Hồ Chí Minh City, Hà Nội, Đà Nẵng and Cần Thơ.
The company has been contracted to implement a networking project from a local educational institute. The
specification of the project is given below:
People: 200 students, 15 teachers, 12 marketing and administration staff, 05 higher managers including the
head of academics and the program manager, 03 computer network administrators.
Building: 03 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located
on the first floor and another located on the second floor.
As a first task, the CEO of the company Mr. Nguyen has asked you to investigate and explain networking
principles, protocols and devices and submit a report.
Part 1
You will need to produce a report that includes the following:
1. An introduction to provide an overview of your report.
5. Discussion on operating principles of networking devices and server types and networking software.
7. Explore a range of server types and justify the selection of a server, considering a given scenario
regarding cost and performance optimization.
8. For the given specification, identify the topology protocol for the efficient utilization of a networking
system.
The CEO Mr. Nguyen is happy with your first report and now he has asked you to analyze the specification
from the institution, as given earlier.
You need to design and implement the networking project within a given time frame:
3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per
user specifications.
4. Justify the security requirements and quality of services needed for selection of accessories.
2
5. Suggest a maintenance schedule to support the networked system.
2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc.
3. Record the test results and analyze these against expected results.
4. Investigate what functionalities would allow the system to support device growth and the addition of
communication devices.
ASSESMENT CRITERIA
3
LO4 Implement and diagnose networked systems
Contents
P1 Discuss the benefits and constraints of different network types and standards …………………
…………………………………………………………………………………………………….………5.
P2 Explain the impact of network topology, communication and bandwidth requirements................
……………………………………………………………………………………………………………11.
P3 Discuss the operating principles of networking devices and server types.........................................
……………………………………………………………………………………………………………14.
P4 Discuss the inter-dependence of workstation hardware with relevant networking software……...
……………………………………………………………………………………………………………22.
P5 Design a networked system to meet a given specification………………………………………...23.
P6 Test and evaluate the design to meet the requirements and analyse user feedback……………….
……………………………………………………………………………………………………………26.
P7 Implement a networked system based on a prepared design……………………………………..27.
P8 Document and analyse test results against expected results……………………………………...28.
References……………………………………………………………………………………………….30.
4
P1 Discuss the benefits and constraints of different network types and standards .
Network system or computer network is a combination of computers together through networked
devices and media (network protocol, transmission environment) in a certain structure and
computers This exchange information back and forth to each other.
5
Computers, devices in the same network can share resources such as printers, fax machines,
computer storage devices (HDD, FDD and CD drives), webcams, scanners, modems and many
other devices.
In addition, network users can also share files and programs on the same network.
There are 4 main types that can be mentioned: LAN, WAN, INTRANET, SAN,
1. Local Network Area (LAN).
LAN has a full name is Local Network Area. LAN is understood as a combination of many
devices that are connected together in a network in a certain area (Company, school, housing,
etc.) Pairing devices in the same system allows these devices to exchange data with each other
quickly and easily (sharing files, images, printers, etc.).
Along with the ever-increasing technological development, LANs are increasingly being
developed and operated in many other forms, such as WANs - LANs are connected together
through routers ( Router) or WLAN (Wireless Local Network Area) wireless LAN -
computers connected to the network via Wi-Fi.
The main object using the MAN network model is that organizations and businesses have
many branches or parts connected together. The purpose of using the MAN network for
businesses is because this network model will help provide businesses with many types of
value-added services at the same time on a connection line of voice-data-video. Best of all,
this service also makes it easy to deploy professional applications.
6
3. INTRANET
An intranet is an internal (of course) internal network, based on TCP / IP, and this type of
network is often applied in companies, businesses, schools, etc. The intranet system wants to
operate, accessible must have authentication information, including the Username and
Password. And intranet-based sites work similarly to other Internet-based websites, but are
protected by a Firewall layer, which protects the system from unknown access.
Intended for use similar to the Internet, the intranet is used to exchange and share internal
information. However, the intranet has an advantage that is protected by the Firewall, meaning
that the user must have an account to access the system (different from the Internet where
there is a network, a computer can use it).
7
server to access the memory and share it as a drive directly attached to the server. When the
server wants to access a SAN storage device it sends requests based on blocks.
SAN is a storage network assembled using three main components: cable, host bus adapter
(HBA) and finally the switch. Each switch system and SAN storage must be connected to each
other, of course, physical connections must be supported with a bandwidth that can handle a
full range of data operations.
Constraints:
Local area network (LAN):
High Setup Cost: The initial setup costs of installing Local Area Networks is high
because there is special software required to make a server. Also, communication devices
like an ethernet cable, switches, hubs, routers, cables are costly.
Privacy Violations: The LAN administrator can see and check personal data files of each
and every LAN user. Moreover, he can view the computer and internet history of the LAN
user.
Data Security Threat: Unauthorised users can access important data of an office or
campus if a server hard disk is not properly secured by the LAN administrator.
LAN Maintenance Job: Local Area Network requires a LAN Administrator because there
are problems such as software installations, program faults or hardware failures or cable
disturbances in Local Area Network. A LAN Administrator is required to maintain these
issues.
Covers Limited Area: LANs are restricted in size they cover a small area like a single
office, single building or a group of nearby buildings.
Wide Area Network (WAN):
Security problems: Wide Area Networks faces more security problem as compare to
LANs and MANs. One of the key disadvantages of WANs is a security issue when many
different people have the ability to use information from other computers.
8
Needs firewall and antivirus software: As it faces security issue, therefore it is a basic
need of WANs to use firewalls and antivirus software to protect data transfer on the internet
which can be accessed and changed by hackers. Also, some people can inject a virus into
the computers so antivirus software is also needed to install.
The setup cost is high: A WAN network covers a large geographical area, it is very
expensive to setup in the initial stage. It may involve purchasing different networking
devices, i.e routers, switches, and extra security software.
9
maintaining open markets and allow different vendors to compete on the basis of the quality
of their products while being compatible with existing market products.
10
P2 Explain the impact of network topology, communication and bandwidth requirements.
Network topology is the arrangement of different elements (links, nodes, etc.) of a computer network.
Mostly, it is the topological structure of a computer network, and can be described physically and
logically. The physical topology (physical topology) is the arrangement of various network components,
including the equipment storage and installation of the connecting cables, while the logical topology
(topological topology) indicates How data flows in a network. The distances between the network nodes,
physical intersections, transmission rates, or signal types may differ between the two networks even
though their topology may be identical.
There are 7 types of network topologies
Star Topology:
The star network has all stations connected to a central device that receives signals from
the stations and transfers them to the destination station. Depending on network
communication requirements, the central equipment may be a switch, router, hub or central
server. The role of the central equipment is to establish Point to Point links.
The network setup is simple, it is easy to reconfigure the network (adding, removing
stations) and can control and troubleshoot quickly, and maximize the transmission speed of
the physical line. However, the line length connecting a station to the central equipment is
limited (within 100m, with current technology).
Bus Topology:
All stations divide a common bus route. The main current is limited at the two ends by two
special connectors called end points. Each station is connected to the main shaft via T
connector or transceiver. The bus network model operates on Point to Multipoint or
11
Broadcast links. The backbone network is easy to design and has a low cost, but it has poor
stability, when it is difficult to detect, only one broken node will go down the entire
network.
Ring Topology:
On the network, the ring is transmitted in a single direction. Each station of the network is
connected to each other by a relay that receives the signal and then forwards to the next
station on the ring. Thus the signal is circulated on a loop in a successive sequence of Point
to Point links between transmitters. The ring network has advantages and disadvantages
similar to the star network, but the ring network requires a more complex network access
protocol than the star network. There are also mixed connections between such network
architectures as the Star Bus or Star Ring.
Mesh Topology:
In this topology every node conected with each other node. It generally used in warreless
network. It need a large amount of overhead which very difficult to manage+
12
Line Topology:
In a line topology—also known as daisy-chaining or bus topology—the host
communicates directly with all nodes through one bus line. A standard Ethernet device or
switch can be added to the end of the chain if desired and used as normal. Be aware that
these devices will compete for network bandwidth with the FieldDAQ device. Reliable
system design requires awareness of the bandwidth consumed by each device during
operations. This topology offers no redundant links.
Tree Topology:
Tree topology is a special type of structure in which many connected elements are
arranged like the branches of a tree. For example, tree topologies are frequently used to
organize the computers in a corporate network, or the information in a database.
13
P3 Discuss the operating principles of networking devices and server types.
There are 6 most popular network devices, including Repeater, Hub, Switch, Bridge, Router
and Gateway
Repeater
In areas with large space, the signal transmission between hearing aids often decreases.
Computers that are far from the signal source will be weaker than nearby devices.
Therefore, you need devices that can amplify the signal, so that the signal can be
transmitted farther but stronger. Repeater is a device in layer 1 (Physic Layer) in the OSI
model. When we use the Repeater, the physical signal at the input will be amplified,
thereby providing a stronger and more stable signal for the output, to be able to reach
farther locations. If you want to ensure the speed of the connection with large office areas,
or use in telegrams, information transmission via fiber optic,…then you should choose
Repeater.
Ex:
Hub
Hub has many ports from 4 to 24 ports, and is considered as a multi-port repeater. When
information is transmitted to one hub port, the other ports also receive the information
immediately.
14
Currently there are 2 common types of hubs: Active Hub and Smart Hub:
Active Hub: This type of Hub is much more commonly used, needs to be powered
when operating. Active Hub is used to amplify incoming signals and divide the
remaining ports to ensure the necessary signal speed when used.
Smart Hub: also known as Intelligent Hub also has the same function as Active
Hub, but is integrated with a chip that can automatically detect errors on the
network.
Ex:
Switch
Working of Switch
When switch receives data from one of the connected devices, it forwards data only to
the port on which the destination system is connected.
Uses the Media Access Control (MAC) address of the devices to determine the correct
port.
Refers to MAC table which stores MAC address with corresponding port number.
Frame Structure
Multiple switches are useful in the network for redundancy and network expansion.
Maximum number of ports available on switch are 48; this restricts the number of
users that can be connected to the switch.
To include more users than the available ports on switch, another switch is required.
This switch should be connected to the previous switch for the data transfer between
two segments.
15
Connecting Ethernet Segments – I
Multiple switches are useful in the network for redundancy and network expansion.
Maximum number of ports available on switch are 48; this restricts the number of
users that can be connected to the switch.
To include more users than the available ports on switch, another switch is required.
This switch should be connected to the previous switch for the data transfer between
two segments.
Crossover cable allows you to connect two computers together using 1000Base-T
NICs without a switch in between.
Multispeed Switches
Having number of ports such as 100 Base T and one or two gigabit ports
Port detects the speed of NIC and runs at that speed is called auto sensing
Port runs at 10, 100 or gigabit is referred to as 10/100/1000 port
Ex:
16
Bridge
A bridge is a network device belonging to layer 2 of the OSI model (Data Link Layer).
Bridges are used to pair two networks to form a single large network. Bridges are
commonly used as a bridge between two networks. The bridge observes packets on all
networks. When a packet is transferred from one computer on one network to another on
the network, Bridge copies and sends this packet to the destination network.
Working mode of Bridge
The working mode of a bridge: compared with the OSI model, a bridge works on the basis
of class LLC, is the upper part of layer 2. Thus, it will have to implement the protocols
below this class for both networks to be able to switch messages back and forth. A bridge
itself does not have its own network address.
Router
Similar to bridge
Routers are classified in the 3rd layer of the OSI model (Network Layer), which is
responsible for connecting two or more IP networks together.
Routers connect different types of networks, from high-speed local Ethernet to slow-speed
long-distance phone lines. But the Router's ability to work is slower than Bridge, because
it needs to calculate to find the way for the signal packets, especially when connecting to
the networks that are not at the same speed, it needs to work more.
17
Ex:
Gateway
Gateway connects two networks with different protocols, such as networks using IP
protocols with networks using IPX, Novell, DECnet, SNA ... With computers in networks
using different protocols can be easy. Easily connect with each other.
Ex:
server types
1. Application Servers
Sometimes referred to as a type of middleware, application servers occupy a large chunk of computing
territory between database servers and the end user, and they often connect the two.
18
2. Client Servers
In the client/server programming model, a server is a program that awaits and fulfills requests from client
programs in the same or other computers. A given application in a computer may function as a client with
requests for services from other programs and also as a server of requests from other programs.
3. Collaboration Servers
In many ways, collaboration software, once called ‘groupware,’ demonstrates the original power of the
Web. Collaboration software designed to enable users to collaborate, regardless of location, via the
Internet or a corporate intranet and to work together in a virtual atmosphere.
19
4. FTP Servers
One of the oldest of the Internet services, File Transfer Protocol, makes it possible to move one or more
files securely between computers while providing file security and organization as well as transfer
control.
5. List Servers
List servers offer a way to better manage mailing lists, whether they be interactive discussions open to the
public or one-way lists that deliver announcements, newsletters or advertising.
6. Mail Servers
Almost as ubiquitous and crucial as Web servers, mail servers move and store mail over corporate
networks (via LANs and WANs) and across the Internet.
20
7. Proxy Servers
Proxy servers sit between a client program (typically a Web browser) and an external server (typically
another server on the Web) to filter requests, improve performance, and share connections.
8. Web Servers
At its core, a Web server serves static content to a Web browser by loading a file from a disk and serving
it across the network to a user’s Web browser. This entire exchange is mediated by the browser and server
talking to each other using HTTP.
9. Virtual Servers
In 2009, the number of virtual servers deployed exceeded the number of physical servers. Today, server
virtualization has become near ubiquitous in the data center. From hypervisors to hybrid clouds,
ServerWatch looks at the latest virtualization technology trends.
Networking software
Network software is a fundamental element for any network. It helps administrators deploy,
manage and monitor a network. Traditional networks are made up of specialized hardware, such
as routers and switches, and network software packages into the solution. Software-defined
networks (SDNs) separate the software from hardware, making it easy to innovate and adapt the
network to quickly respond to changing network needs. Separating functions from hardware, such
as firewalls or load balancers, is called network functional virtualization (NFV).
Network software is not the same as software applications. The former exposes the inner workings
of the network to administrators, while software applications allow end users to perform specific
tasks. Network software is invisible to end users - it is simply used to facilitate those users to
access network resources seamlessly.
22
Network software allows multiple devices, such as desktops, laptops, mobile phones, tablets, and
other systems to connect to each other, as well as other networks. The Internet is a prime example
of a globally connected server and computer system based on network software to ensure end user
access.
If I had to plan to build a 3-storey company network, I would present the network design of a 3-storey
building like this. Building: 3 floors, all computers and printers are on the ground floor outside the IT lab
-One lab is on the first floor and another lab is on the second floor. The network devices I use in this
design include: DNS server, FTP, DHCP, Mail server, syslog server, NTP, Web server and 6 Switches.
Logical:
FIRST FLOOR including: internet, ASA, Cable-modem, Main server (right) and Staff (left)
23
SECOND FLOOR:
THIRD FLOOR:
Some types of PC, Switch, Router, Laptop and its price when used
24
- 13 PC x 14.500.000 = 188.500.000 VNĐ
- 2 Router x 11.999.000 = 23.998.000 VNĐ
- 2 Switch x 22.909.000 = 45.818.000 VNĐ
25
- 20 PC x 8.900.000 = 178.000.000 VNĐ
- 4 Switch x 19.527.000 = 78.108.000 VNĐ
- 2 Router x 7.062.500 = 14.125.000 VNĐ
The total value of a building is:528.549.000 VNĐ
P6 .Test and evaluate the design to meet the requirements and analyse user feedback.
performance test
Performance testing is defined as a type of testing software used to ensure software applications work
effectively within the expected workload of the application.
The features and functions of a software system are not the only concerns. The performance of a software
application such as response time, reliability, resource usage and its scalability is also remarkable.
The goal of Performance Testing is not to find bugs, it is an essential activity for developing
performance-optimization solutions for software. Performance testing helps us avoid unforeseen
situations before deploying applications in real-world environments.
26
Stress Test
Involves testing an application on a workload that is too large to see how it handles high traffic or how it
handles data. The goal is to determine the limit of an application.
Reliability Test
A type of test to verify that software is capable of performing an error-free operation for a specified
period of time in a specified environment. It is also about testing the reliability of that system. Example:
The probability that a computer in a store is up and running for eight hours without an error is 99% =>
this factor is called reliability.
Scalability test
The goal of the test is to extend the application, to determine the effectiveness of the software application
when "expanding" to support increased user load, support for capacity addition planning system.
Most performance issues are about speed, response time, load time and poor scalability. Speed is often
one of the most important attributes of an application. A slow-running application will take time, reducing
user satisfaction with the system, possibly losing potential users. Performance testing is performed to
ensure the application runs fast enough to attract attention and attention as well as bring satisfaction and
satisfaction of users.
ASM.pkt
27
P8 Document and analyse test results against expected results.
Performance test.
- I will access random computer, choose desktop and press Command Prompt.
Then I will enter the ping command on a computer that has a specific IP address. It’s like a way of
transferring data between devices and helps me know if the connection is good.
28
- Ping 192.168.20.2 and I have the result below
29
References
[1] SearchNetworking. (2019). What is a LAN? - Definition from WhatIs.com. [online] Available at:
https://searchnetworking.techtarget.com/definition/local-area-network-LAN [Accessed 27 Dec. 2019].
[2] Computer Network Topology. (2019). Local Area Network | Advantages and Disadvantages of LAN
(2019). [online] Available at: https://computernetworktopology.com/local-area-network/ [Accessed 27
Dec. 2019].
[6] Yourownlinux.com. (2019). NETWORK SWITCH : Purpose and Functions. [online] Available at:
http://www.yourownlinux.com/2013/07/network-switch-purpose-and-functions.html [Accessed 27 Dec.
2019].
[7] DNSstuff. (2019). What is Network Topology? Best Guide to Types & Diagrams - DNSstuff. [online]
Available at: https://www.dnsstuff.com/what-is-network-topology [Accessed 27 Dec. 2019].
[8] Sophia. (2019). The Relationship Between Hardware and Software. [online] Available at:
30
https://www.sophia.org/tutorials/the-relationship-between-hardware-and-software [Accessed 27
Dec. 2019].
[9] Techblog của VCCloud. (2019). Performance Testing - Techblog của VCCloud. [online] Available at:
https://tech.bizflycloud.vn/performance-testing-kiem-thu-hieu-nang-20180601110304363.htm?
fbclid=IwAR1KhsxRzLjrciJkJhrDba5bdKXJQy3qBDhxFObXZsiVzGYvDuBSxDs8WDQ [Accessed 27
Dec. 2019].
[10] Stackify. (2019). Performance Testing Types, Steps, Best Practices, and Metrics. [online] Available
at: https://stackify.com/ultimate-guide-performance-testing-and-software-testing/ [Accessed 27 Dec.
2019].
[11] Guru99.com. (2019). What is STRESS Testing in Software Testing? Tools, Types, Examples. [online]
Available at: https://www.guru99.com/stress-testing-tutorial.html#2 [Accessed 27 Dec. 2019].
[12] National Technical Systems. (2019). Failure Analysis - Root Cause Failure Analysis | NTS. [online]
Available at: https://www.nts.com/services/testing/failure-analysis/ [Accessed 27 Dec. 2019].
31