Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Download as pdf or txt
Download as pdf or txt
You are on page 1of 33

Fundamentals in

Networking
Gehan Chamod Adikari
CL/HDCSE/93/56

0|Page
Assignment Cover Sheet

Qualification Module Number and Title

HND in Computing / Network Engineering SEC4206 - Fundamentals in Networking /


Network Solution for ABC higher education
institute.
Student Name & No. Assessor
Gehan Chamod / CL/HDCSE/93/56 Mr. Sunesh
Hand out date Submission Date

Assessment type Duration/Length of Weighting of Assessment


Written Report Assessment Type 40%
3000 Words One Month

Learner declaration

I certify that the work submitted for this assignment is my own and research sources are fully
acknowledged.

Marks Awarded
First assessor

IV marks

Agreed grade

Signature of the assessor Date

01
FEEDBACK FORM
INTERNATIONAL COLLEGE OF BUSINESS & TECHNOLOGY
Module: Fundamentals in Networking
Student: Gehan Chamod Adikari
Assessor: Mr. Sunesh
Assignment: Network Solution for ABC higher education institute.

Strong features of your work:

Areas for improvement:

02
Marks Awarded:

/100

Learning outcomes covered


LO 01 Understand the fundamentals of networking
LO 02 Understand the functions of networking components
LO 03 Be able to design a client server networked Environment
LO 04 Be able to monitor and troubleshoot client server networked Environment

Scenario

Scenario
ABC higher education institute which is locate in Kandy. They are going to start the
education process with in next six-month time. They are planning to conduct HND Program
in information technology (IT) and diploma in graphic designing. Later they are planning to
expand to BSc in information technology (IT). As the associate network administrator you
have been asked to design the network for the organization by identifying the requirements
for the network. The following information is given to you and the management has asked
you to design a suitable network.
Proposed Network
1. 30 PC’s for IT LAB 01
2. 15 PC’s for IT LAB 02
3. 15 PC’s for IT Lecturers
4. 5 PC’s for the Maintenance Lecturers
5. 10 PC’s for Library
6. 10 PC’s for Students working area
7. 10 PC’s for the front office
8. 2 PC’s for the Branch Manager ( 1 laptop )

03
9. 2 PC’s for the Programme Manager ( 1 laptop )
10. 5 PC’s for the Finance Department
11. IT Administration and System support department will have 10 PCs. (minimum 3 servers)
12. 10 PC’s for the Coordination Department
13. Each user will get a login to access the intranet site.
14. Files are to be stored in a central location.
15. Centralized control of the network.
16. One printer for each department.
17. The network admin can access the server remotely
18. The users can access internet through the proxy server
19. Each department and labs are to be in different networks.
20. Each department uses different class C IP address (private IP address range)
21. The network has the facility to provide IPs dynamically as well.

04
Tasks
1. Identify required types of clients and servers (end devices) for ABC higher
education institute and critically discuss your selections. (LO1) (15 Marks)

2. Design a suitable network and match your design with ABC higher education
institute specification (LO3) (25 Marks)
a. Need to show your detailed network diagram clearly

b. Describe your network design clearly by using your own words

3. Discuss on relevant IEEE 802 standards and recommend proper one for the
organization. Evaluate bandwidth requirement for ABC higher education institute
and make suggestions on how to achieve the required throughput requirements. (LO2)
(15 Marks)

a. When selecting bandwidth, carefully show your calculations and justifications.

4. Explain OSI reference model along with protocols and map network devices which
you have used when design your network. (LO2) (20 Marks)

5. Recommend the enhancements you could include into this network in terms of
hardware, software, design and technology. (LO2, LO4) (20 Marks)

a. Provide honest assessment of the strength and weakness of your network.

b. Provide detail recommendation with innovative ideas

6. Maintain proper document format. (5 Marks)

05
Acknowledgement

This research was supported by the International College of Business & Technology (ICBT).
I would like to express my deepest gratitude to my lecturer, Mr. Sunesh, who assisted and
guided throughout this assignment. Special thanks should also go to my parents and all the
colleagues of my batch for sharing information.
Thank you,

Adikari Mudiyansalage Gehan Chamod Adikari,

(CL/HDCSE/93/56).

06
Introduction
ABC higher education institute which is locate in Kandy. They are going to start the
education process with in next six-month time. They are planning to conduct HND Program
in information technology (IT) and diploma in graphic designing. Later they are planning to
expand to BSc in information technology (IT). As the associate network administrator me
have been asked to design the network for the organization by identifying the requirements
for the network.

07
08
Contents
Task 01

Client Pc

Server Pc

Router

Printer

NIC

Fingerprint Scanner

Task 02

Network diagram

Overall network diagram

Task 03

Networking Standards

Required Bandwidth for ABC higher education institute

Task 04

OSI Model

OSI Model Layers

Device Mapping

Network Protocols

Task 05

Weaknesses

Strengths

Innovative Ideas

09
Task 01

Client Pc

A client is a computer that connects


to and uses the resources of a remote computer or server. Many corporate networks comprise
a client computer for each employee, each of which connects to the corporate server. The
server provides resources like files, information, Internet and intranet access, and external
processing power.

These are some of requirements for the client pc,

 Processor - dual core @ 2.4 GHz ( i7 Intel processor or equivalent AMD)

 RAM - 12 GB

 Hard Drive - 500 GB 5400 RPM hard drive

 Wireless (for laptops) - 802.11g/n (WPA2 support required)

 Monitor - 19" LCD - desktop only

 Operating System - Windows 7 with Service Pack 1 or Apple OS X 10.11

 Backup Device - External hard drive and/or USB Flash Drive

010
Server Pc

A server may be a computer designed to process requests and deliver data to a different
computer over the web or an area network. A well-known sort of server may be a web server
where sites are often accessed over the web through a client sort of a browser . However,
there are several sorts of servers, including local ones like file servers that store data within
an intranet network.

These are some of requirements for the sever pc,

 Processor : 1.4Ghz 64 – bit Processor (Intel i5/i7/Xeon)

 RAM : 8GB

 Hard Drive : 512GB

 Windows Server 2003, Server 2008, Server 2012

 GPU that is compatible with OpenGL 3.2. (Integrated graphics cards Intel HD 4000
or above).

 120GB Solid state drive(this drive can speed up processing)

 Network : Gigabit (10/100/1000baseT) Ethernet adapter, 1Gbps connection is idea

011
Router

A router may be a device that forwards data packets along networks. A router is connected to
a minimum of two networks, commonly two LANs or WANs or a LAN and its ISP's
network. Routers are located at gateways, the places where two or more networks connect.

Routers use headers and forwarding tables to work out the simplest path for forwarding the
packets, and that they use protocols like ICMP to speak with one another and configure the
best route between any two hosts.

Very little filtering of knowledge is completed through routers. (Webopidea)

There many types of routers,

 Broadband router

 Wireless router

 Edge router

 Core router (ecomputernotes)

Printer

(hope,2018)

012
A printer is an external hardware output device that takes the electronic data stored on a
computer or other device and generates a troublesome copy. for instance , if you created a
report on your computer, you'll print several copies handy out at a staff meeting. Printers are
one of the foremost popular computer peripherals and are commonly used to print text and
photos. the image is an example of an inkjet computer printer, the Lexmark Z605. (pp. hope,
2018)

Switch

A switch, within the context of networking, may be a high-speed device that receives
incoming data packets and redirects them to their destination on an area area network (LAN).

A LAN switch operates at the info link layer (Layer 2) or the network layer of the OSI Model
and, intrinsically it can support all kinds of packet protocols. The layer 2 switch is
additionally sometimes called a bridge: its function is to send frames containing data packets
between nodes or segments of a network. (techopedia,2020)

Network Interface Card (NIC)

013
A network interface card (NIC) may be a hardware component without which a computer
can't be connected over a network. It is a circuit card installed during a computer that gives a
fanatical network connection to the pc . It is also called network interface controller, network
adapter or LAN adapter. (Tutorialspoint)

NIC card are two types,

(Tutorialspoint)

Internet Network Card

In internal networks cards, motherboard features a slot for the network card where it are often
inserted. It requires network cables to provide network access. Internal network cards are of
two types. The first type uses Peripheral Component Interconnect (PCI) connection, while the
second type uses Industry Standard Architecture (ISA). (Tutorialspoint)

External Network Card

The desktops and laptops that don't have an indoor NIC, external NICs are used. External
network cards are of two types: Wireless and USB based. Wireless network card must be
inserted into the motherboard, however no network cable is required to connect to the
network. They are useful while traveling or accessing a wireless signal. (Tutorialspoint)

Fingerprint Scanner

These scanners is most helpful to stay up good security within the ABC education . A
fingerprint scanner typically works by first recording fingerprint scans of all authorized
individuals for a specific system or facility. These scans are saved within a database. The user
requiring access puts their finger on a hardware scanner, which scans and copies the input
from the individual and appears for any similarity within the already-stored scans. If there is a
positive match, the individual is granted access. (techopedia,2020)
014
Task 02
Network Diagram
IT Lab 01 (Network 01)

This IT Lab 01 30PCs connected to a 32 port switch,

PC 01 ...PC 30

Switch 32

witch 32

IT Lab 02 (Network 02)

This IT Lab 02 15PCs connected to a 24 port switch,

PC 01 ...PC 15

Switch 24

IT Lecturers (Network 03)

This IT Lecturers 15PCs connected to a 24 port switch,


itch 24

PC 01 …PC 20
witch 32

Switch 24

witch 32
015
Library and Students working area (Network 04)

This Library and Student working area 15PCs connected to a 24 port switch,

PC 01 ...PC 15

Switch 24

121212it
ch 24
Coordination Department and Front office (Network 05)
witch 32
This Students working area 20PCs connected to a 24port switch,

PC 01 ...PC 20

Switch 24

121212it
ch 24
Finance Department and Programmer manager (Network 06)
witch 32
Finance Department and Programmer manager 7PCs connected to a 12 port switch ,

PC 01 ...PC 07

Switch 12

121212it
ch 24

witch 32
016
Branch Manager (Network 07)

This Branch Managers 2PCs connected to a 08 port switch,

PC 01
PC 02

Switch 08

121212it
ch 24
IT Administration and System support department (Network 08)

IT Administration and Systemwitch


support
32department 10PCs connected to a 12 port switch,

PC 01 …PC 10

Switch 12

121212it
ch 24

witch 32 Main Switch

121212itch
24
witch 32

DHCP File server Proxy Internet

121212itch 121212itch 121212itch


24 24 24
witch 32 witch 32 witch 32
017
Overall Network Diagram

This network diagram was developed by ABC Higher Education Institute. So, in the diagram
I gave the IP addresses for each device and created one lecture hall and one labs to signal the
other labs and lecture halls. Also created an IT Administration and System support
department. I created the Finance Department, the Coordination Department, the Branch
Manager, the Program Manager and the front office on the same floor.

018
Task 03

Networking Standards
A networking standard may be a document that has been developed to supply technical
requirements, specifications and guidelines that has got to be used consistently to make sure
devices, equipment and software which govern networking are fit their intended purpose.
Standards ensure quality, safety and efficiency. Networks form one of many technology arms
and there are established organizations which maintain and make their standards. we'll now
discuss and study a number of the organizations behind these industry standards. (study)

ISO
The International Standards Organization (ISO) is another standards organization represented
internationally by 17 national standards organizations and is predicated in Geneva
Switzerland. These standards cover things like manufactured products in network technology.
In networking where Ethernet technology forms the inspiration of most local area networks
(LANs), the ISO/IEC/IEEE 8802-3:2017, for instance , governs the telecommunications and
knowledge exchange between systems. (study)

ANSI
The American National Standards Institute (ANSI) may be a United States-based
organization liable for US standards and assessment systems. The standards established by
this group are geared towards strengthening the US position within the international global
economy. These standards govern the pc and technology industry. ANSI is that the main
body liable for coordinating and publishing information on standards within the networking
and technology Industry within the us . There about 13,000 standards under their control.

One of commonest and long-standing standards they need established is that the American
Standard Code for Information Exchange (ASCII). This standard is liable for the codes wont
to represent text utilized in computers, telecommunication system and other digital devices.
By reading this text, you're taking advantage of the standards that govern the text represented
on your screen. (study)

019
ITU
The International Telecommunications Union (ITU) is an arm of the United Nations
consisting of three sectors:

 Radio Communication (ITU-R) which sets standards for use in frequency (RF)

 Telecommunication Standardization (ITU-T) which standardizes telecommunication


operations internationally

 Telecommunication Development (ITU-D) which manages communications


operations in developed countries.

 The ITU formulates and publishes standards within the transmission and broadcasting
technologies, including the web .

IANA
Internet Assigned Numbers Authority (IANA) may be a non-profit organization liable for
coordinating the activities for the graceful functioning of the web . Since the online could
also be a worldwide network, IANA undertakes the responsibility to allocate and maintain
unique codes and numbering systems that are utilized in Internet protocols. IANA liaisons
with Internet Engineering Task Force (IETF) and Request for Comments (RFC) teams for
working on Internet-connected systems. it's liable for maintaining a set of registries for
coordination of IP addressing and name Service (DNS) root zones. (study)

ICANN
Internet Corporation for Assigned Names and Numbers (ICANN) is an internationally
organized non-profit corporation whose major role is to stay the web stable, secure and
interoperable. It includes participants from different parts of the planet who designs policies
on the Internet's unique identifiers and its naming system. As a public-private partnership,
ICANN now performs IANA functions under a contract from the United States' Department
of Commerce. (study)

020
IEEE 802
EEE 802 could even be a group of networking standards that cover the physical and data-link
layer specifications for technologies like Ethernet and wireless. These specifications apply to
local area networks (LAN) and metropolitan area networks (MAN). IEEE 802 also aids in
ensuring multi-vendor interoperability by promoting standards for vendors to follow.

Essentially, the IEEE 802 standards help confirm internet services and technologies follow a
group of recommended practices so network devices can all work together smoothly.
(earchnetworking.techtarget)

 IEEE 802.1 Higher Layer LAN Protocols Working Group

 IEEE 802.3 Ethernet Working Group

 IEEE 802.11 Wireless LAN Working Group

 IEEE 802.15 Working Group for Wireless Specialty Networks

 IEEE 802.16 Broadband Wireless Access Working Group

 IEEE 802.18 Radio Regulatory Technical Advisory Group

 IEEE 802.19 Wireless Coexistence Working Group

 IEEE 802.21 Media Independent Handover Services Working Group

 IEEE 802.22 Wireless Regional Area Working Group

 IEEE 802.24 Vertical Applications Technical Advisory Group

I recommended IEEE 802.3 Ethernet for ABC higher education institute network.

021
Required Bandwidth for ABC higher education institute.

Usage for single person Pc:-

 To browse internet :-300MB

 To call and text using WhatsApp or Viber :-200MB

 To book a taxi :- 50MB

 To use social media :- 300MB

 Total usage :-850MB

Usage for 15 people Pc:-

 Usage of one person :- 850MB

 Usage of 15 people :- 850 x 15

12750MB

Usage for 30 people Pc:-

 Usage of one person :- 850MB

 Usage of 30 people :- 850 x 30

25500MB

Total bandwidth usage :-12750 + 25500

38250MB

38250MB in Gigabytes :-38250MB / 1024 = 37.35 GB

Usage for month :-37.35 x 30

1120 GB

022
For the ABC higher education institute I recommend SLT Fiber Heavy Web Life
monthly package. In that package there is 1500GB included per month so that will be
enough for the ABC higher education institute usage.

Task 04
OSI Model
The Open Systems Interconnection (OSI) model describes seven layers that computer
systems use to talk over a network. it had been the first standard model for network
communications, adopted by all major computer and telecommunication companies within
the first 1980s. The modern Internet isn't supported OSI, but on the simpler TCP/IP model.
However, the OSI 7-layer model remains widely used, because it helps visualize and
communicate how networks operate, and helps isolate and troubleshoot networking problems.
OSI was introduced in 1983 by representatives of the most computer and telecom companies,
and was adopted by ISO as a world standard in 1984. (imperva)

OSI Model Layers

OSI model Each Layer is responsible for some work. The seven open systems
interconnection are:

 Layer 7 – Application
 Layer 6 – Presentation
 Layer 5 – Session
 Layer 4 – Transport
 Layer 3 - Network
 Layer 2 - Data Link
 Layer 1 - Physical

023
The Application Layer

The application layer is used by end-user software like web browsers and email clients. It
provides protocols that allow software to send and receive information and present
meaningful data to users. a few of samples of application layer protocols are the Hypertext
Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post Office Protocol (POP), Simple
Mail Transfer Protocol (SMTP), and name System (DNS). (imperva)

The Presentation Layer

The presentation layer is prepares data for the appliance layer. It defines how two devices
should encode, encrypt and compress data so it's received correctly on the opposite end. The
presentation layer takes any data transmitted by the appliance layer and prepares it for
transmission over the session layer. (imperva)

The Session Layer

The session layer is creates communication channels, called sessions, between devices. it's
responsible for opening sessions, ensuring they still be open and functional while data is
being transferred, and shutting them when communication ends. The session layer can also
set checkpoints during a knowledge transfer—if the session is interrupted, devices can
resume data transfer from the last checkpoint. (imperva)

The Transport Layer

The transport layer is takes data transferred within the session layer and breaks it into
“segments” on the transmitting end. it's responsible for reassembling the segments on the
receiving end, turning it back to data which can be used by the session layer. The transport
layer carries out flow control, sending data at a rate that matches the connection speed of the
receiving device, and error control, checking if data was received incorrectly and if not,
requesting it again. (imperva)

024
The Network Layer

The network layer is 2 main functions. One is ending segments into network packets, and
reassembling the packets on the receiving end. the opposite is routing packets by discovering
the only path across a physical network. The network layer uses network addresses (typically
Internet Protocol addresses) to route packets to a destination node. (imperva)

The Data Link Layer

The data link layer is establishes and terminates a connection between two physically-
connected nodes on a network. It breaks up packets into frames and sends them from source
to destination. This layer consists of two parts—Logical Link Control (LLC), which identifies
network protocols, performs error checking and synchronizes frames, and Media Access
Control (MAC) which uses MAC addresses to attach devices and define permissions to
transmit and receive data. (imperva)

The Physical Layer

The physical layer is responsible for the physical cable or wireless connection between
network nodes. It defines the connector, the cable or wireless technology connecting the
devices, and is responsible for transmission of the info , which is simply a series of 0s and 1s,
while taking care of bit rate control. (imperva)

Device Mapping
Computer - Presentation / Session Layer

Printer - Application Layer

Fingerprint Scanner - Application Layer

Switch - Network Layer

Router - Network Layer

RJ45 Cable - Network Layer

025
Network Protocol

Network protocols are formal standards and policies comprised of rules procedures and
formats that outline communication between two or more devices over a network. They make
sure that network devices can transmit and receive data employing a common language no
matter their different designs, hardware or infrastructures. There are many different network
protocols are developed for the precise purposes and environments. (Tutorialspoint)These
are the a number of them,

 IP

 TCP

 UDP

 FTP

 HTTPS

 HTTP

IP

Internet Protocol is designed explicitly as addressing protocol. It is mostly used with TCP.
The IP addresses in packets help in routing them through different nodes during a network
until it reaches the destination system. TCP/IP is that the hottest protocol connecting the
networks. (w3schools)

TCP

Transmission Control Protocol may be a popular communication protocol which is employed


for communicating over a network. The divides any message into series of packets that are
sent from source to destination and there it gets reassembled at the destination. (w3schools)

UDP

User Datagram Protocol (UDP) may be a substitute communication protocol to Transmission


Control Protocol implemented primarily for creating loss-tolerating and low-latency linking
between different applications. (w3schools)

026
FTP

File Transfer Protocol is allows users to transfer files from one machine to a different . Types
of files may include program files, multimedia files, text files and documents etc.
(w3schools)

HTTPS

Hyper Text Transfer Protocol Secure may be abbreviated as Hyper Text Transfer Protocol
Secure is a standard protocol to secure the communication among two computers one using
the browser and other fetching data from web server. Hyper Text Transfer Protocol is
employed for transferring data between the client browser and therefore the web server
within the hypertext format, same just in case of HTTPS except that the transferring of data is
done in an encrypted format. So it are often said that https thwart hackers from interpretation
or modification of knowledge throughout the transfer of packets. (w3schools)

HTTP

Hyper Text Transfer Protocol is meant for transferring a hypertext among two or more
systems. HTML tags are used for creating links. These links could also be in any form like
text or images. Hyper Text Transfer Protocol is meant on Client-server principles which
permit a client system for establishing a reference to the server machine for creating an
invitation . The server acknowledges the request initiated by the client and responds
accordingly. (w3schools)

027
Task 05
Weaknesses
 Network connections slowly in Pc.

 There is no built-in backup server.

 There is no back up switches for this network if one switch fails need to replace it
immediately.

 The network connection coming into IT lab is not fast.

 The Internet is slow for children inside the institute.

 Lack of space inside the institute.

Strengths
 Using Fiber optics connections get a stable network connection to the hospital.

 A good internet connection is provided.

 Good cable management while doing the networking part.

 Recommendation of best hardware and software for speed up the work in the ABC
higher education institute.

 Using landline for communicate inside the ABC higher education institute.

028
Innovative Ideas
 Extending Internet Connection at ABC Higher Education Institute.

 Increasing the number of computers in the ABC higher education institution will
make it easier for more children to learn. The number of children is also increasing.

 Students wishing to attend the ABC Institute of Higher Education should set up a web
page to obtain information on diploma programs, the HND program, and the BSc
program.

References

 https://www.facebook.com/lifewire (2018). Lifewire. [online] Lifewire. Available at:


https://www.lifewire.com.

 Computer Hope’s free computer help (2019). Computer Hope’s free computer help.
[online] Computerhope.com. Available at: https://www.computerhope.com.

 www.servermania.com. (n.d.). Server Mania: Top Digital & Physical Server Hosting
Company. [online] Available at https:/www.servermania.com [Accessed 25 Nov.
2020].

 Webopedia.com. (2020). Webopedia: Online Tech Dictionary for IT Professionals.


[online] Available at: https://www.webopedia.com.

 Techopedia.com. (2019). Techopedia - Where IT and Business Meet. [online]


Available at: https://www.techopedia.com.

029
 Tutorialspoint.com. (2019). H2O, Colab, Theano, Flutter, KNime, Mean.js, Weka,
Solidity, Org.Json, AWS QuickSight, JSON.Simple, Jackson Annotations, Passay,
Boon, MuleSoft, Nagios, Matplotlib, Java NIO, PyTorch, SLF4J, Parallax Scrolling,
Java Cryptography. [online] Available at: https://www.tutorialspoint.com.

 Techtarget.com. (2019). Networking information, news and tips - SearchNetworking.


[online] Available at: https://searchnetworking.techtarget.com.

 Organizations that Create Networking Standards Video (2017). Organizations that


Create Networking Standards | Study.com. [online] Study.com. Available at:
https://study.com/academy/lesson/organizations-that-create-networking-
standards.html.

 Imperva. (n.d.). Cyber Security Leader | Imperva, Inc. [online] Available at:
https://www.imperva.com.

 www.w3schools.in. (n.d.). W3schools Online Programming Tutorials. [online]


Available athttps:/www.w3schools.in[Accessed 25 Nov. 2020].

030
031
032

You might also like