Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

619

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 58

Table of Contents

L01 NETWORKING PRINCIPLES AND THEIR PROTOCOLS...........................................2


Introduction........................................................................................................................2
P1 DISCUSSES THE BENEFITS AND CONSTRAINTS OF DIFFERENT NETWORK
TYPES AND STANDARDS...............................................................................................3
Network types. Such as LAN, WLAN, CAN and MAN...................................................3
LAN....................................................................................................................................3
WLAN................................................................................................................................4
CAN...................................................................................................................................4
...........................................................................................................................................5
MAN...................................................................................................................................5
Network IEEE Standards...................................................................................................7
IEEE 802.11......................................................................................................................7
IEEE 802.11a....................................................................................................................7
IEEE 802.11b....................................................................................................................7
IEEE 802.11g....................................................................................................................8
IEEE 802.11n....................................................................................................................8
IEEE 802.11p....................................................................................................................8
P2 EXPLAIN THE IMPACT OF NETWORK TOPOLOGY, COMMUNICATION, AND
BANDWIDTH REQUIREMENTS.....................................................................................10
1.2 Network topologies................................................................................................10
Types of Network topologies........................................................................................10
1.BUS Topology...........................................................................................................10
Advantages..................................................................................................................10
Disadvantages.............................................................................................................11
2.Star topology.............................................................................................................11
Disadvantages.............................................................................................................12
3. Ring topology...........................................................................................................13
Advantages..................................................................................................................13
Disadvantages.............................................................................................................13
4. Mesh Topology.........................................................................................................14
Disadvantages.............................................................................................................14
5. Tree Topology..........................................................................................................15
Disadvantages.............................................................................................................15
Importance of Network Topology.................................................................................16
M1 COMPARE COMMON NETWORKING PRINCIPLES AND HOW PROTOCOLS
ENABLE THE EFFECTIVENESS OF NETWORKED SYSTEM.....................................16
Network Protocols........................................................................................................16
Important of Network Protocol.....................................................................................19
D1 Considering a given scenario, identify the topology protocol selected for the efficient
utilization of a networking system...................................................................................19
Network Protocol and Network Topology for XYZ Insurance (Pvt) Ltd.......................19
LO2 EXPLAIN NETWORKING DEVICES AND OPERATIONS........................................20
P3 DISCUSS THE OPERATING PRINCIPLES OF NETWORKING DEVICES AND
SERVER TYPES.............................................................................................................20
Network devices...........................................................................................................20
Servers that are available in today’s market................................................................28
3.HPE ProLiant ML350 Gen 10.......................................................................................29
M2 Explore a range of server types and justify the selection of a server, considering a
given scenario regarding cost and performance optimisation........................................30
P4 DISCUSS THE INTERDEPENDANCE OF WORKSTATION HARDWARE WITH
RELEVANT NETWORKING SOFTWARE......................................................................31
Networking software and Workstation.........................................................................31
Functions of Network Software.......................................................................................32
LO3 DESIGN EFFICIENT NETWORKED SYSTEMS........................................................33
P5 Design a networked system to meet a given specification........................................33
Network components and software used to design the network....................................34
Feedback form.................................................................................................................38
P6 Feedback Form..........................................................................................................38
M3 Install and configure network services and applications...........................................39
D2 Design a maintenance schedule to support the networked system..........................48
Maintenance schedule for the above scenario............................................................48
LO4 Implement and diagnose networked systems............................................................49
P7 Implement a networked system based on a prepared design...................................49
P8 Document and analyses test results against expected results..................................50
M4 Recommend potential enhancements for the networked systems........................51
Future Enhancements..................................................................................................51
D3 Use critical reflection..................................................................................................52
Critical Evaluation........................................................................................................52
Bibliography........................................................................................................................53
Table of Figures

Figure 1 Local Area Network................................................................................................5


Figure 2. Wireless LAN.........................................................................................................6
Figure 3 Campus Area Network...........................................................................................7
Figure 4 MAN........................................................................................................................7
Figure 5 IEEE STANDARDS..............................................................................................11
Figure 6 Bus Topology........................................................................................................13
Figure 7 Star topology........................................................................................................14
Figure 8 Ring Topology......................................................................................................16
Figure 9Mesh Topology......................................................................................................17
Figure 10 Tree Topology....................................................................................................18
Figure 11 server 1...............................................................................................................30
Figure 12 server..................................................................................................................31
Figure 13. Server 2.............................................................................................................31
Figure 14. server 3..............................................................................................................32
Figure 15 workstation.........................................................................................................33
Figure 16 Design................................................................................................................35
Figure 17 Router.................................................................................................................36
Figure 18 Switch.................................................................................................................37
Figure 19PC........................................................................................................................38
Figure 20 Wire shark..........................................................................................................39
Figure 21 Wire shark 2.......................................................................................................41
Figure 22 Wire shark 1.......................................................................................................41
Figure 23 Wire shark 4.......................................................................................................41
Figure 24 Wire shark 1.......................................................................................................41
Figure 25 Wire shark 6.......................................................................................................42
Figure 26 Wire shark 5.......................................................................................................42
Figure 27 Vlan.....................................................................................................................42
Figure 28 Vlan configure.....................................................................................................43
Figure 29 Vlan output.........................................................................................................44
Figure 30 Switchport...........................................................................................................45
Figure 31 Password............................................................................................................45
Figure 32 p.w......................................................................................................................46
Figure 33 P.w......................................................................................................................46
Figure 34 serber mode.......................................................................................................46
Figure 35 client mode.........................................................................................................46
Figure 36 sub interface.......................................................................................................47
Figure 37 DHCP.................................................................................................................48
Figure 38.............................................................................................................................49
Figure 39 WIFI....................................................................................................................49
L01 NETWORKING PRINCIPLES AND THEIR PROTOCOLS

Introduction

XYZ (Pvt) Ltd is a small-scale organization that offers insurance, investment, and other
provisions to the public. To optimize its services, the company has decided to interlink its
departments, which are situated across two floors in the building. The first floor houses
the insurance and investment departments, while the marketing and administration
departments are located on the second floor. Each department has been equipped with
an adequate number of computers, printers, and photocopiers to support their daily
operations. Notably, the insurance department enjoys privileged access to internet
connectivity. To enhance marketing efficiency, the marketing department has designated
working cabins for senior executives, providing them with a conducive environment for
decision-making. Additionally, the company has allocated a car park in the basement,
ensuring convenient parking for employees and visitors. Through this interlinking of
departments, XYZ (Pvt) Ltd aims to foster collaboration, streamline processes, and
improve overall efficiency in delivering insurance, investment, and other services to the
public.
P1 DISCUSSES THE BENEFITS AND CONSTRAINTS OF DIFFERENT
NETWORK TYPES AND STANDARDS

Network types. Such as LAN, WLAN, CAN and MAN

LAN

 A local area network (LAN) is a collection of interconnected devices that are situated
in a single physical location, such as a house, office, or building (LAN). A LAN can be
small or large; examples include a single user's home network or hundreds of users
and devices in an office or school. A local area network (LAN) is made up of cables,
access points, switches, routers, and additional parts that allow devices to connect to
internal servers, web servers, and other LANs via wide area networks. The
advantages of a LAN are the same as the advantages of any group of connected
devices. The gadgets can communicate with one another, share files, use a single
Internet connection, and even take control of one another . (Anon., n.d.)

Figure 1 Local Area Network


WLAN
 The term "wireless LAN" (WLAN) refers to any local area network in computing that
uses high-frequency radio waves to offer wireless connectivity between devices.
(Lawrence, n.d.)

 WLANs enable computing operations to be carried out everywhere, even while


carrying large data loads and contemporary online apps. A WLAN can be utilized
with a variety of commonly used devices, including computers, phones, tablets,
gaming consoles, and IoT devices. It requires less hardware than a wired network,
which reduces costs, expedites installation, and frees up space in a workplace. A
WLAN can be managed virtually in almost all cases. Through a single software
interface, visibility, user control, network health monitoring, and data gathering can
all be done.. (Anon., n.d.)

Figure 2. Wireless LAN

CAN

A campus area network (CAN) is a collection of local area networks (LANs) that
are connected inside a specific geographic region, such as a college or university
campus, a military post, or the campuses of various organizations and businesses,
among others. Local Area Networks are smaller than Campus Area Networks.
Metropolitan area networks (MAN) and wide area networks are larger than CANs 
(Anon., n.d.)
Figure 3 Campus Area Network

MAN
A metropolitan area network (MAN) is a computer network that connects
computers within a metropolitan area, which could be a single large city,
multiple cities and towns, or any given large area with multiple buildings. A
MAN is larger than a local area network (LAN) but smaller than a wide area
network (WAN). MANs do not have to be in urban areas; the term
"metropolitan" implies the size of the network, not the demographics of the
area that it serves (Anon., n.d.)

Figure 4 MAN
LAN is the best network type for the above scenario since it is installed in a single
building, even though there are numerous virtual LANs, departments, and more
than 100 users.

Advantages

 LAN increases productivity since it can perform better information storage,


retrieval, and other tasks.

 Data transfer rates between systems are slightly faster than the internet.

 LAN network can be enabled wirelessly so we can reduce wiring and cabling
expenses. Its offering rapid data transfer rates and multi departmental network
access.

 Private ownership
Network IEEE Standards

IEEE 802.11 standard, popularly known as WiFi, lays down the architecture and
specifications of wireless LANs (WLANs). WiFi or WLAN uses high frequency radio
waves for connecting the nodes.

There are several standards of IEEE 802.11 WLANs. The prominent among them
are 802.11, 802.11a, 802.11b, 802.11g, 802.11n and 802.11p. All the standards
use carrier-sense multiple access with collision avoidance (CSMA/CA). Also, they
have support for both centralized base station based as well as ad hoc networks.

IEEE 802.11

IEEE 802.11 was the original version released in 1997. It provided 1 Mbps or 2
Mbps data rate in the 2.4 GHz band and used either frequency-hopping spread
spectrum (FHSS) or direct-sequence spread spectrum (DSSS). It is obsolete now.

IEEE 802.11a

802.11a was published in 1999 as a modification to 802.11, with orthogonal


frequency division multiplexing (OFDM) based air interface in physical layer
instead of FHSS or DSSS of 802.11. It provides a maximum data rate of 54 Mbps
operating in the 5 GHz band. Besides it provides error correcting code. As 2.4 GHz
band is crowded, relatively sparsely used 5 GHz imparts additional advantage to
802.11a.

Further amendments to 802.11a are 802.11ac, 802.11ad, 802.11af, 802.11ah,


802.11ai, 802.11aj etc.

IEEE 802.11b

802.11b is a direct extension of the original 802.11 standard that appeared in early
2000. It uses the same modulation technique as 802.11, i.e. DSSS and operates in
the 2.4 GHz band. It has a higher data rate of 11 Mbps as compared to 2 Mbps of
802.11, due to which it was rapidly adopted in wireless LANs. However, since 2.4
GHz band is pretty crowded, 802.11b devices faces interference from other
devices.
Further amendments to 802.11b are 802.11ba, 802.11bb, 802.11bc, 802.11bd and
802.11be.

IEEE 802.11g

802.11g was indorsed in 2003. It operates in the 2.4 GHz band (as in 802.11b) and
provides a average throughput of 22 Mbps. It uses OFDM technique (as in
802.11a). It is fully backward compatible with 802.11b. 802.11g devices also faces
interference from other devices operating in 2.4 GHz band.
IEEE 802.11n

802.11n was approved and published in 2009 that operates on both the 2.4 GHz
and the 5 GHz bands. It has variable data rate ranging from 54 Mbps to 600 Mbps.
It provides a marked improvement over previous standards 802.11 by
incorporating multiple-input multiple-output antennas (MIMO antennas).
IEEE 802.11p

802.11 is an amendment for including wireless access in vehicular environments


(WAVE) to support Intelligent Transportation Systems (ITS). They include network
communications between vehicles moving at high speed and the environment.
They have a data rate of 27 Mbps and operate in 5.9 GHz band.
P2 EXPLAIN THE IMPACT OF NETWORK TOPOLOGY,
COMMUNICATION, AND BANDWIDTH REQUIREMENTS

1.2 Network topologies

A network's topology refers to the actual and substantial configuration of the


system. This controls how the network's computers link to one another. A network's
topology refers to how its nodes and ties between them are organized. It frequently
alludes to the network elements' connected representation. Topology describes all
of the different arrangements and connections between nodes. Additionally, it
shows how information is passed between these nodes.. (Justin, n.d.)

There are two distinct types of network topology:

1. Logical topology - A logical topology is how devices appear connected to the


user. 

2. Physical topology - A physical topology is how they are actually interconnected


with wires and cables.

Types of Network topologies

1. BUS Topology - “In the bus network topology, every node is connected in
series along a linear path. This arrangement is found today primarily in cable
broadband distribution networks.” (Anon., n.d.)

Advantages

 Bus network is easy to extend and many other servers and systems can add
in.
 It is very cheap in terms of costing.
 It is best for small network setup and effectively works for LAN.

Disadvantages

 Whole network collapses if a single cable encounters some kind of problem.


 Since all networks are connected to central cable bus then it becomes difficult
to detect a problem in specific server or system.
 Bus topology’s efficiency decreases when number or nodes increases in
number.
 Security is not very good as all computers receive same signal from the common bus.
(Anon., n.d.)

Figure 6 Bus Topology

2. Star topology - “In the star network topology, a central node has a direct
connection to all other nodes. Switched local-area networks (LANs) based on
Ethernet switches, including most wired home and office networks have a
physical star topology.” (Anon., n.d.)

Advantages

 New devices can be connected easily and any device can be removed from the
topology easily.
 In star, the central junction controls and monitors all activities.
 Since every node is individually and directly connected so problem in one device
cannot affect the rest of the network.
Disadvantages

 Network cost increases with the increased number of devices.


 Capacity of central device is crucial that affects the performance of all the
connected devices.
 In this network, efficiency of all other devices is compromised if the hub junction
is not capable of supporting that number of devices

Figure 7 Star topology


3. Ring topology - “In the ring network topology, the nodes are connected in a closed loop
configuration. Some rings will pass data only in one direction, while others are capable of
transmission in both directions. These bidirectional ring networks are more resilient than bus
networks because traffic can reach a node by moving in either direction. Metro networks based
on Synchronous Optical Network Technology (SONET) are the primary example of ring
networks today.” (Anon., n.d.)

Advantages

 As information flows in single direction, therefore speed is better than any


other topology.
 Network server does not need to control the connectivity among
workstations.

 Data flow and connectivity efficiency is very smooth that results in


decreased collision.
 Every system has equal access to resources every time.

Disadvantages

 In ring, information and data is passed through source and destination that
makes it slower.
 Since ring is a closed loop, if any one node goes down then whole network will
collapse.
 The whole network is connected through wire connection so network is
completely dependent on these connections.
Figure 8 Ring Topology

4. Mesh Topology - “The mesh network topology links nodes with connections so
that multiple paths between at least some points of the network are available. A
network is said to be fully meshed if all nodes are directly connected to all other nodes,
and partially meshed if only some nodes have multiple connections to others. Meshing
to create multiple paths increases resiliency under failure, but increases cost. The
Internet is a mesh network.”

Advantages

 Each connection can carry its own data load


 It is robust
 A fault is diagnosed easily
 Provides security and privacy

Disadvantages

 Installation and configuration are difficult if the connectivity gets more


 Cabling cost is more and the most in case of a fully connected mesh topology
 Bulk wiring is required
Figure 9Mesh Topology

5. Tree Topology - “The tree network topology, also called a star of stars, is a network
where star topologies are themselves connected in a star configuration. Many larger Ethernet
switch networks including data center networks are configured as trees.”

Advantages

 Scalable as leaf nodes can accommodate more nodes in the hierarchical


chain.
 A point-to-point wiring to the central hub at each intermediate node of a
tree topology represents a node in the bus topology.
 Other hierarchical networks are not affected if one of them is damaged.
 Easier maintenance and faultfinding.

Disadvantages

 Huge caballing is needed

 A lot of maintenance is needed

 Backbone forms the point of failure.


Figure 10 Tree Topology

Importance of Network Topology

Two significant lessons can be drawn from network topology. It assists us in


identifying the many components of our network and their connections.
Additionally, it shows how they are connected and what to anticipate from their
performance. Topologies also help us find trouble spots in our networks, making
them one of the most crucial components of a network.

M1 COMPARE COMMON NETWORKING PRINCIPLES AND HOW


PROTOCOLS ENABLE THE EFFECTIVENESS OF NETWORKED
SYSTEM

Network Protocols

A network protocol is a set of rules that governs how data is sent between various
devices connected to the same network. Basically, it enables intercommunication
between connected devices,

Models

1. OSI Model - The open systems interconnection (OSI) model is a

conceptual model created by the International Organization. The OSI provides a


standard for different computer systems to be able to communicate with each
other.
The OSI Model can be seen as a universal language for computer networking.
It’s based on the concept of splitting up a communication system into seven
abstract layers.

 Application Layer (Layer-7) − This is where the user application sits that needs
to transfer data between or among hosts. For example − HTTP, file transfer
application (FTP) and electronic mail etc.

 Presentation Layer (Layer-6) − This layer helps to understand data


representation in one form on a host to other host in their native representation.
Data from the sender is converted to on-the-wire data (general standard format)
and at the receiver’s end it is converted to the native representation of the
receiver.

 Session Layer (Layer-5) − This layer provides session management capabilities


between hosts. For example, if some host needs a password verification for
access and if credentials are provided then for that session password verification
does not happen again. This layer can assist in synchronization, dialog control
and critical operation management (e.g., an online bank transaction).

 Transport Layer (Layer-4) − This layer provides end to end data delivery among
hosts. This layer takes data from the above layer and breaks it into smaller units
called Segments and then gives it to the Network layer for transmission.

 Network Layer (Layer-3) − This layer helps to uniquely identify hosts beyond the
subnets and defines the path which the packets will follow or be routed to reach
the destination.
 Data Link Layer (Layer-2) − This layer takes the raw transmission data (signal,
pulses etc.) from the Physical Layer and makes Data Frames, and sends that to
the upper layer and vice versa. This layer also checks any transmission errors
and sorts it out accordingly.
 Physical Layer (Layer-1) − This layer deals with hardware technology and actual
communication mechanism such as signaling, voltage, cable type and length, etc.
(Anon., n.d.)

2.TCP/IP Model - TCP (Transmission Control Protocol) /IP (Internet Protocol).


consists of four layers, with each having its protocols. The TCP/IP suite is a set of
protocols that includes TCP, UDP, ARP, DNS, HTTP, ICMP, etc. It is robust, flexible
and mostly used for interconnecting computers over the internet.

TCP/IP Layers Functions

Application layer Represent data to the user and


control dialogue.
Transport layer Supporting communications
between different devices across
different networks
Internet layer Finds the best route through the
network
Network access layer Controls the network's hardware
components and media.
Important of Network Protocol

Network protocols are essential to modern digital communications because they


make it possible to communicate with people anywhere in the globe. (Anon., n.d.)

A simple real-world example is human communication. Consider for a moment


that English is the only language you are proficient in speaking. If you try to talk
to someone who only speaks Japanese on the phone, communication will
completely fail. To converse in this situation, you must both speak and
understand the same language (without the use of a translation).

Similar to the example above, there are established communication rules that
must be followed by computers and other devices if they want to interact with one
another. The set of guidelines known as a network protocol must be followed by
all computers and other devices when they engage in network communication.

D1 Considering a given scenario, identify the topology protocol


selected for the efficient utilization of a networking system .

Network Protocol and Network Topology for XYZ Insurance (Pvt) Ltd

Given that the XYZ Insurance (Pvt) Ltd is located in a two-story building and has
more than 50 users, mesh topology and the OSI Model are the best network
topology and network protocol to utilize. This will allow us to create a LAN
connection. In addition to protecting data security and privacy, the OSI Model
makes data versatile and cost-effective. Mesh topologies can be implemented for
the Matara branch without a doubt because the network won't be affected by a
single device collapsing, we can quickly find defects, and we can quickly add
new devices.
LO2 EXPLAIN NETWORKING DEVICES AND OPERATIONS

P3 DISCUSS THE OPERATING PRINCIPLES OF NETWORKING


DEVICES AND SERVER TYPES

Network devices

1. Router - Two or more packet-switched networks or network segments can be


connected using a router. It fulfills two main purposes, by sending data packets to
their intended IP addresses, it manages traffic between different networks and
enables several devices to share an Internet connection and connecting different
networks.

Advantages Disadvantages
Multiple users can be connected to the Routers are costly more than any other
internet networking devices

routers can be used as a intermediately multiple computers can share the network
between 2 networks so that the for which the router undergoes a situation
environment is secure to some extent known as '' Connection Wait “

Router reduce the network traffic. Data transmission Shortage

Figure 12. Router


2. Switch - A switch connects multiple devices in a network to one another and
enables them to "communicate" by exchanging data packets. Examples of these
devices include computers, printers, and Routers. Switches are both software-
based virtual devices and hardware devices that control physical networks.

Advantages Disadvantages
Increment the accessible data They are more costly
transfer capacity
Since the switch is isolated, data Broadcast traffic might be
will go only to the destination problematic
They help in lessening the Must have physical contact with
outstanding burden on individual the object to be actuated.
host PCs

Figure 13. Switch


3. Access point - A wireless access point (WAP) is a networking device that allows
wireless-capable devices to connect to a wired network. It is simpler and easier to
install WAPs to connect all the computers or devices in your network than to use
wires and cables.

Advantages Disadvantages
Do not require any wires or cables cost of installation is very high
Installing a wireless network is faster If wireless network is not installed
and easier correctly it may cause severe
security threats
Wireless networks have a wider Requires basic computer knowledge
reach than wired networks
the transfer of information between dust storms or fog, there are high
users is much faster. chances of interference and
jamming in wireless networks

Figure 14 Access point


4. Firewall - A Firewall is a network security device that monitors and filters
incoming and outgoing network traffic based on an organization’s previously
established security policies. At its most basic, a firewall is essentially the barrier
that sits between a private internal network and the public Internet. A firewall’s
main purpose is to allow non-threatening traffic in and to keep dangerous traffic
out.

Advantages Disadvantages
protect network with a single firewall. Cost
cannot affect system performance High maintenance required
won't easily be disabled by malicious difficult to configure
software

Figure 15 Firewall
5.Server - A server is a computer or system that provides resources, data, services,
or programs to other computers, known as clients, over a network. In theory,
whenever computers share resources with client machines, they are considered
servers. There are many types of servers, including web servers, mail servers, and
virtual servers.

Advantages Disadvantages
Backups and network security is A specialist network operating
controlled centrally system is needed
All files are stored in a central Specialist staff such as a network
location manager is needed
Users can access centrally The cost of purchasing the server is
managed shared data. high.
Centralized control is used for If any part of the network fails a lot
network peripherals. of

disruption can occur

(Rehman, n.d.) (Anon., n.d.)


Figure 16 Servers

6.Workstaion - workstation, a high-performance computer system that is basically designed


for a single user and has advanced graphics capabilities, large storage capacity, and a powerful
central processing unit. A workstation is more capable than a personal computer (PC) but is
less advanced than a server

Advantages Disadvantages
Multiple processors support: It is difficult to move workstation from
one place to another

You can easily diagnose any problem in Workstation is expensive


the workstation

A single user can use this type of The workstation uses more electricity
computer at a time than other devices

This type of computers can give more Not having batteries


performance than a normal computer
Figure 17 Workstation

Servers

Server - A server commonly refers to a computer program that receives and responds
to requests made over a network. It receives the request for a web document from the
client and sends the requested information to the client computer on the Internet. A
device can be both a client and a server at the same time, as an individual system has
the ability to provide resources and use them from another system in one go. There are
different types of servers, including mail servers, virtual servers, and web servers.

Server Types

1.WEB Server - A web server offers web pages or other content to the web browser by
loading the information from a disc and transfer files by using a network to the user's
It is used by a computer or collection of computers to provide content to several users
over the internet. This exchange was done with the help of HTTP communicating
between the browser and the server.

Some examples:

Apache, Nginx, Tomcat

2.Cloud server

A cloud server functions in the context of cloud computing. Since it was created using
cloud computing, remote access over the internet is possible. It performs similar tasks
to a physical server, with the exception that a cloud server provider can remotely
access it.

3.Database server

Access to records or data from a database is made possible via a database server.
Many businesses utilize databases to keep their data. It enables the execution of
queries using the structures query language (SQL).

4.Fileserver

A computer acting as a file server is one that receives and sends files over a network.
shares files that are saved on the server with clients.

5.DNS server (Domain name system)

It is a type of server that is able to manage, maintain, and process internet domain
names and their records. In 1983, Jon Postel and Paul Mockapetris designed and
implemented the first DNS. Mainly, it was designed to provide websites to end-users
over the Internet. It is always required to connect to the internet to obtain services. It
includes storage that stores different domain names, internet hosts, DNS records,
network names, and other data. It has the ability to convert a domain name into its
respective IP addresses (Anon., n.d.)

Some examples:

Comodo Secure DNS , OpenDNS,  Quad9, Google Public DNS, Cloudflare (williams,
n.d.)

6.Email Server - A mail server stores and delivers mail for users via email service
platforms. Because mail servers are set up to connect to a network continually,
individual users can access their email without executing any software on their own
devices.

Some examples:

Gmail, Yahoo mail, Outlook mail, iCloud mail, AOL mail. (Malli, 2022)

Servers that are available in today’s market

1.Dell power Edge T30

CPU Intel Xeon E3-1225 v5


RAM 64 GB
Storage Up to six SATA HDD
Graphics Intel HD Graphics P530
Dimensions (W×D×H) 17.5 × 43.5 × 36cm
Connectivity 10 × USB ports, HDMI, DisplayPort,
VGA, serial, PS2, Gigabit Ethernet

Figure 11 server 1

2. Lenovo ThinkServer TS150

CPU Intel Xeon E3-1299 v6


RAM 64 GB
Storage 40TB HDD
Connectivity 8 × USB 3.0, serial, video, 2 ×
DisplayPort, audio, Gigabit Ethernet
Dimensions (W×D×H) 17.5 × 37.5 × 43cm

Figure 1213.
Figure server
Server 2
3.HPE ProLiant ML350 Gen 10
CPU Intel Scalable 4210
RAM 16GB
Storage No drives included
Graphics Intel HD Graphics P530
Dimensions (W×D×H) 18 × 65 × 47cm
Cost $977.20

Figure 14. server 3

M2 Explore a range of server types and justify the selection of a


server, considering a given scenario regarding cost and
performance optimisation.

As a result of the Dell Power Edge T30 server's extremely high performance processor, XYZ
Insurance (Pvt) Ltd network will operate quickly. We can connect numerous devices to this server
thanks to its 10 USB ports, HDMI port, DisplayPort, VGA, serial, PS2, and Gigabit Ethernet. This
server allows us to shield our data from unauthorized users. Servers ensure the stability of the
network. It enables resource sharing between users. Implementing this Dell power Edge T30 server
will help us grow our company.

P4 DISCUSS THE INTERDEPENDANCE OF WORKSTATION


HARDWARE WITH RELEVANT NETWORKING SOFTWARE

Networking software and Workstation

Workstation hardware is computer which is more powerful than PC’s (personal


computers). Mostly companies are implementing workstation hardware for their
needs. To run networking software smoothly we need a workstation hardware.
Networking software is used to design, monitoring and control the network.

Figure 15 workstation

Networking software
Network software encompasses a broad range of software used for design,
implementation, and operation and monitoring of computer networks. Traditional
networks were hardware based with software embedded. With the advent of
Software – Defined Networking (SDN), software is separated from the hardware
thus making it more adaptable to the ever-changing nature of the computer
network.

Functions of Network Software

 Helps to set up and install computer networks


 Enables users to have access to network resources in a seamless manner
 Allows administrations to add or remove users from the network
 Helps to define locations of data storage and allows users to access that data
 Helps administrators and security system to protect the network from data
breaches, unauthorized access and attacks on a network
 Enables network virtualizations (Anon., n.d.)

Networking software (e.g.):

1.Auvik
2.SolarWinds Network Performance Monitor
3.SolarWinds Flow Tool Bundle
4.Site24x7 (COOPER, 2022)
To monitor our LAN network of the XYZ Insurance (Pvt) Ltd, we can use
Auvik networking software. This provides a precise description of the
network's overall performance and its capacity to monitor remote sites.
This software makes it simple for us to administer our network.

LO3 DESIGN EFFICIENT NETWORKED SYSTEMS

P5 Design a networked system to meet a given specification.


Network components and software used to design the network

1.Router - TL-WR1043ND
Interface 4 10/100/1000Mbps LAN Ports
1 10/100/1000Mbps WAN Port

Frequency 2.4-2.4835GHz

Wireless Standards IEEE 802.11n, IEEE 802.11g,


802.11b

 450Mbps Wireless speed and Gigabit Ethernet ports are ideal for
multiple HD video streaming
 Multi-functional USB 2.0 port - Easily share a printer locally and files
& media with networked devices or remotely via FTP server
 Wireless security encryption easily at a push of WPS Button (Anon.,
n.d.)

Figure 17 Router
2.Switch - Tp-Link 24 port TI-Sg1024d

Interface 24 10/100/1000Mbps RJ45 Ports


(Auto Negotiation/Auto MDI/MDIX)

Standards and Protocols IEEE 802.3i, IEEE 802.3u, IEEE


802.3ab , IEEE 802.3x

Switching Capacity 48Gbps

• 24 10/100/1000Mbps ports
• Innovative energy-efficient technology saves power consumption
• Supports MAC address self-learning, Auto MDI/MDIX and Auto negotiation
• Plug & play design

(Anon., n.d.)

Figure 18 Switch
3.Pc – Dell Desktop Core i5

Generation 10th Gen

Ram 8 Gb DDR4

Storage 1 TB

VGA NVIDIA GeForce GTX 560 Ti 2GB

 Super-fast de Delivers power in an efficient way.


 Upgradable

 Can store more data

Figure 19PC
Software

1.Wire shark

 Network Monitoring tool


 Analyzing network traffic
P6  Network issues trouble shooter
 Network analyzer
Feedback form

Name - Date - _____________

1. Does our system meet your requirements?

Excellent Good
Figure 20 Wire shark
Poor

1. How would you rate system Speed and Design?

Excellent Good Poor

2. How would you rate the security of the system?

Excellent Good Poor

3. How would you rate the overall performance of the system?

Excellent Good Poor

4. Any Suggestions - ___________________________________

___________________________________________________

Signature -
Feedback Form
M3 Install and configure network services and applications

Installing network monitoring tool

Wireshark
Figure 21 Wire shark 2
Figure 22 Wire shark 1

Figure 45

Figure 24 Wire shark 1 Figure 23 Wire shark 4


Figure 26 Wire shark 5 Figure 25 Wire shark 6

Installing configuration
Vlan
Creating and Assigning Vlan on switch

Assingning ports on VLAN

Figure 27 Vlan
Vlan Out put
Trunking switch ports

Figure 30 Switchport

Enable Password for the Router


Figure 31 Password
While accessing router

Figure 33 P.w

Figure 32 p.w

VTP Domain and server and client mode

Figure 34 serber mode


Sub interface in Router
Figure 36 sub interface
Assigning Ip address using DHCP (configuring)

Figure 37 DHCP

Dhcp output
Figure 38

Wireless connections

Figure 39 WIFI
D2 Design a maintenance schedule to support the networked
system.

Maintenance schedule for the above scenario.

Maintenance schedule

Plan Daily Weekly Monthly Annually

Check network logs for errors or


warnings.

Check available storage space on


servers and network devices

Delete unwanted files

Check and update antivirus and


anti-malware software on all
devices

Review and update network


diagrams and documentation

Backup data

Monitoring network

Review network security logs for


unusual activity
Test network performance and
bandwidth utilization.
LO4 Implement and diagnose networked systems

P7 Implement a networked system based on a prepared design

For this network, the author used the MESH topology, which prevents the creation of a
single point of failure. Furthermore, a successful network will not suffer if one trunk port
goes down since it can send data through other ports (find alternative methods to carry
data). The network's VTP Domain setup has been used by the author because trunk
ports have been used between all switches. To transport all VLAN names to the
switches of the clients, we can set up a server switch and use trunk ports. Therefore, we
are not need to give each switch a unique detail. It helps us save time and avoid giving
each switch the wrong information. also For auditorium and customer interview area
author has implemented wireless connection using ACCESS POINT and we can
connect devices without cables and easily manage devices
P8 Document and analyses test results against expected results

Test cases

Test Case Name Details Expected result Actual result


ID
T001 Router 1 login User tries to log in User should be Expected results match
using password - able to login actual results.
XYZ123

T002 Ping Marketing Ping 192.168.1.70 Successful ping Packets: Sent = 4,


to UK Customer to Received = 4, Lost = 0
care
192.168.1.125 (0% loss)
100% successful ping

T003 Ping marketing Ping 192.168.1.170 Successful ping Packets: Sent = 4,


to Interview to 192.168.10.2
Received = 4, Lost = 0
place
(0% loss)
100% successful ping

T004 Router 1 login User tries to log in User should not Expected results match
(incorrect) using incorrect be able to login actual results.
password -
4444aa444
M4 Recommend potential enhancements for the networked systems.

Future Enhancements

Network Security Improvements: Add more robust security features to the network such as
intrusion detection and prevention, access control lists, firewalls, and encryption to improve the
network's resilience against cyber threats.

Network Scalability: Consider upgrading the network infrastructure to support more users and
devices. This could involve adding more switches, routers, and access points, or implementing
load balancing to distribute network traffic more evenly.

Network Monitoring and Management: Implement network monitoring tools that provide real-
time visibility into network performance and help with network management tasks such as
identifying bottlenecks and managing bandwidth utilization.

Cloud Integration: Consider integrating cloud-based services into the network to improve
performance, scalability, and reduce infrastructure costs. For example, moving certain services
to the cloud, such as email, file sharing, and collaboration tools, can free up network resources
and improve accessibility.

Network Virtualization: Consider implementing network virtualization technologies such as


virtual LANs (VLANs) or Software-Defined Networking (SDN) to improve network efficiency and
simplify network management.

Utilizing biometric tools, we can use biometric devices for security purposes to prevent
unauthorized individuals from accessing devices and posing a serious threat to the company
D3 Use critical reflection

Critical Evaluation

The network design process begins with acquiring consumer information, and in order
to do so, we must engage with the client. Direct communication with the client allows for
the identification of customer requirements. This network's design has been
meticulously documented, with every stage of implementation covered in depth. We can
consult the manual if we wish to change anything in the network. The Call Management
(Pvt) Ltd. Colombo branch's LAN network architecture is a success since it satisfies the
needs of users and clients while also satisfying all the standards, from dividing the
departments to implementing appropriate security procedures. Mesh topology is the
network topology that was employed in the design. Planning for configuration and cable
management was difficult, but it was eventually successful after several attempts. Mesh
topology is the ideal topology because it maintains high redundancy and prevents single
points of failure. By using VLAN, every department was isolated. DHCP was used to
assign IP addresses. In order to satisfy the needs of the client, an access point was
developed for the auditorium and the customer interview area. High-performance
workstations and servers were employed to improve the network's quality. Numerous
issues were found during testing, however once they were fixed, the network satisfied
Call Management (Pvt) Ltd's requirements and users.
Bibliography

Bibliography
Anon., n.d. [Online]
Available at: https://fossbytes.com/what-is-mesh-topology-advantages-anddisadvantages-of-mesh-
topology/
[Accessed 09 05 2023].

Anon., n.d. [Online]


Available at: https://www.tutorialspoint.com/Network-Software

Anon., n.d. [Online]


Available at: https://www.tp-link.com/lk/home-networking/wifi-router/tl-wr1043nd/#overview
[Accessed 09 09 2022].

Anon., n.d. [Online]


Available at: https://www.barclays.lk/itemdesc.asp?ic=NSWT0620&eq=&Tp=
[Accessed 09 09 2022].

Anon., n.d. CISCO. [Online]


Available at: https://www.cisco.com/c/en/us/products/switches/what-is-a-lan-local-area-network.html
[Accessed 15 05 2023].

Anon., n.d. CISCO. [Online]


Available at: https://www.cisco.com/c/en/us/products/wireless/wireless-lan.html
[Accessed 15 05 2023].

Anon., n.d. Cloud Flare. [Online]


Available at: https://www.cloudflare.com/learning/network-layer/what-is-a-metropolitan-area-
network/
[Accessed 09 05 2023].

Anon., n.d. CompTIA. [Online]


Available at: https://www.comptia.org/content/guides/what-is-a-network-protocol
[Accessed 10 05 2023].

Anon., n.d. Geeks for geeks. [Online]


Available at: https://www.geeksforgeeks.org/advantages-and-disadvantages-of-computer/
[Accessed 30 07 2022].

Anon., n.d. Geeks for Geeks. [Online]


Available at: https://www.geeksforgeeks.org/overview-of-campus-area-network-can/
Anon., n.d. javatpoint. [Online]
Available at: https://www.javatpoint.com/server
[Accessed 09 09 2022].

Anon., n.d. TechTarget. [Online]


Available at: : https://searchnetworking.techtarget.com/definition/network-topology
[Accessed 09 05 2023].

Anon., n.d. tutorialspoint. [Online]


Available at: https://www.tutorialspoint.com/ipv4/ipv4_osi_model.htm
[Accessed 09 05 2023].

COOPER, S., 2022. Comparitech. [Online]


Available at: https://www.comparitech.com/net-admin/lan-monitoring/
[Accessed 28 06 2022].

Justin, S., n.d. CSEstack.org. [Online]


Available at: https://www.csestack.org/importance-of-network-topology/
[Accessed 15 05 2023].

Lawrence, C., n.d. wlan labs. [Online]


Available at: https://www.linux-wlan.org/wlan-and-wifi-systems

Malli, V., 2022. Mail Munch. [Online]


Available at: https://www.mailmunch.com/blog/best-email-service-providers
[Accessed 31 07 2022].

Rehman, J., n.d. IT Release. [Online]


Available at: https://www.itrelease.com/2020/10/advantages-and-disadvantages-of-workstation/
[Accessed 30 07 2022].

williams, M., n.d. Tech radar. [Online]


Available at: https://www.techradar.com/news/best-dns-server
[Accessed 31 07 2022].

You might also like