619
619
619
Introduction
XYZ (Pvt) Ltd is a small-scale organization that offers insurance, investment, and other
provisions to the public. To optimize its services, the company has decided to interlink its
departments, which are situated across two floors in the building. The first floor houses
the insurance and investment departments, while the marketing and administration
departments are located on the second floor. Each department has been equipped with
an adequate number of computers, printers, and photocopiers to support their daily
operations. Notably, the insurance department enjoys privileged access to internet
connectivity. To enhance marketing efficiency, the marketing department has designated
working cabins for senior executives, providing them with a conducive environment for
decision-making. Additionally, the company has allocated a car park in the basement,
ensuring convenient parking for employees and visitors. Through this interlinking of
departments, XYZ (Pvt) Ltd aims to foster collaboration, streamline processes, and
improve overall efficiency in delivering insurance, investment, and other services to the
public.
P1 DISCUSSES THE BENEFITS AND CONSTRAINTS OF DIFFERENT
NETWORK TYPES AND STANDARDS
LAN
A local area network (LAN) is a collection of interconnected devices that are situated
in a single physical location, such as a house, office, or building (LAN). A LAN can be
small or large; examples include a single user's home network or hundreds of users
and devices in an office or school. A local area network (LAN) is made up of cables,
access points, switches, routers, and additional parts that allow devices to connect to
internal servers, web servers, and other LANs via wide area networks. The
advantages of a LAN are the same as the advantages of any group of connected
devices. The gadgets can communicate with one another, share files, use a single
Internet connection, and even take control of one another . (Anon., n.d.)
CAN
A campus area network (CAN) is a collection of local area networks (LANs) that
are connected inside a specific geographic region, such as a college or university
campus, a military post, or the campuses of various organizations and businesses,
among others. Local Area Networks are smaller than Campus Area Networks.
Metropolitan area networks (MAN) and wide area networks are larger than CANs
(Anon., n.d.)
Figure 3 Campus Area Network
MAN
A metropolitan area network (MAN) is a computer network that connects
computers within a metropolitan area, which could be a single large city,
multiple cities and towns, or any given large area with multiple buildings. A
MAN is larger than a local area network (LAN) but smaller than a wide area
network (WAN). MANs do not have to be in urban areas; the term
"metropolitan" implies the size of the network, not the demographics of the
area that it serves (Anon., n.d.)
Figure 4 MAN
LAN is the best network type for the above scenario since it is installed in a single
building, even though there are numerous virtual LANs, departments, and more
than 100 users.
Advantages
Data transfer rates between systems are slightly faster than the internet.
LAN network can be enabled wirelessly so we can reduce wiring and cabling
expenses. Its offering rapid data transfer rates and multi departmental network
access.
Private ownership
Network IEEE Standards
IEEE 802.11 standard, popularly known as WiFi, lays down the architecture and
specifications of wireless LANs (WLANs). WiFi or WLAN uses high frequency radio
waves for connecting the nodes.
There are several standards of IEEE 802.11 WLANs. The prominent among them
are 802.11, 802.11a, 802.11b, 802.11g, 802.11n and 802.11p. All the standards
use carrier-sense multiple access with collision avoidance (CSMA/CA). Also, they
have support for both centralized base station based as well as ad hoc networks.
IEEE 802.11
IEEE 802.11 was the original version released in 1997. It provided 1 Mbps or 2
Mbps data rate in the 2.4 GHz band and used either frequency-hopping spread
spectrum (FHSS) or direct-sequence spread spectrum (DSSS). It is obsolete now.
IEEE 802.11a
IEEE 802.11b
802.11b is a direct extension of the original 802.11 standard that appeared in early
2000. It uses the same modulation technique as 802.11, i.e. DSSS and operates in
the 2.4 GHz band. It has a higher data rate of 11 Mbps as compared to 2 Mbps of
802.11, due to which it was rapidly adopted in wireless LANs. However, since 2.4
GHz band is pretty crowded, 802.11b devices faces interference from other
devices.
Further amendments to 802.11b are 802.11ba, 802.11bb, 802.11bc, 802.11bd and
802.11be.
IEEE 802.11g
802.11g was indorsed in 2003. It operates in the 2.4 GHz band (as in 802.11b) and
provides a average throughput of 22 Mbps. It uses OFDM technique (as in
802.11a). It is fully backward compatible with 802.11b. 802.11g devices also faces
interference from other devices operating in 2.4 GHz band.
IEEE 802.11n
802.11n was approved and published in 2009 that operates on both the 2.4 GHz
and the 5 GHz bands. It has variable data rate ranging from 54 Mbps to 600 Mbps.
It provides a marked improvement over previous standards 802.11 by
incorporating multiple-input multiple-output antennas (MIMO antennas).
IEEE 802.11p
1. BUS Topology - “In the bus network topology, every node is connected in
series along a linear path. This arrangement is found today primarily in cable
broadband distribution networks.” (Anon., n.d.)
Advantages
Bus network is easy to extend and many other servers and systems can add
in.
It is very cheap in terms of costing.
It is best for small network setup and effectively works for LAN.
Disadvantages
2. Star topology - “In the star network topology, a central node has a direct
connection to all other nodes. Switched local-area networks (LANs) based on
Ethernet switches, including most wired home and office networks have a
physical star topology.” (Anon., n.d.)
Advantages
New devices can be connected easily and any device can be removed from the
topology easily.
In star, the central junction controls and monitors all activities.
Since every node is individually and directly connected so problem in one device
cannot affect the rest of the network.
Disadvantages
Advantages
Disadvantages
In ring, information and data is passed through source and destination that
makes it slower.
Since ring is a closed loop, if any one node goes down then whole network will
collapse.
The whole network is connected through wire connection so network is
completely dependent on these connections.
Figure 8 Ring Topology
4. Mesh Topology - “The mesh network topology links nodes with connections so
that multiple paths between at least some points of the network are available. A
network is said to be fully meshed if all nodes are directly connected to all other nodes,
and partially meshed if only some nodes have multiple connections to others. Meshing
to create multiple paths increases resiliency under failure, but increases cost. The
Internet is a mesh network.”
Advantages
Disadvantages
5. Tree Topology - “The tree network topology, also called a star of stars, is a network
where star topologies are themselves connected in a star configuration. Many larger Ethernet
switch networks including data center networks are configured as trees.”
Advantages
Disadvantages
Network Protocols
A network protocol is a set of rules that governs how data is sent between various
devices connected to the same network. Basically, it enables intercommunication
between connected devices,
Models
Application Layer (Layer-7) − This is where the user application sits that needs
to transfer data between or among hosts. For example − HTTP, file transfer
application (FTP) and electronic mail etc.
Transport Layer (Layer-4) − This layer provides end to end data delivery among
hosts. This layer takes data from the above layer and breaks it into smaller units
called Segments and then gives it to the Network layer for transmission.
Network Layer (Layer-3) − This layer helps to uniquely identify hosts beyond the
subnets and defines the path which the packets will follow or be routed to reach
the destination.
Data Link Layer (Layer-2) − This layer takes the raw transmission data (signal,
pulses etc.) from the Physical Layer and makes Data Frames, and sends that to
the upper layer and vice versa. This layer also checks any transmission errors
and sorts it out accordingly.
Physical Layer (Layer-1) − This layer deals with hardware technology and actual
communication mechanism such as signaling, voltage, cable type and length, etc.
(Anon., n.d.)
Similar to the example above, there are established communication rules that
must be followed by computers and other devices if they want to interact with one
another. The set of guidelines known as a network protocol must be followed by
all computers and other devices when they engage in network communication.
Network Protocol and Network Topology for XYZ Insurance (Pvt) Ltd
Given that the XYZ Insurance (Pvt) Ltd is located in a two-story building and has
more than 50 users, mesh topology and the OSI Model are the best network
topology and network protocol to utilize. This will allow us to create a LAN
connection. In addition to protecting data security and privacy, the OSI Model
makes data versatile and cost-effective. Mesh topologies can be implemented for
the Matara branch without a doubt because the network won't be affected by a
single device collapsing, we can quickly find defects, and we can quickly add
new devices.
LO2 EXPLAIN NETWORKING DEVICES AND OPERATIONS
Network devices
Advantages Disadvantages
Multiple users can be connected to the Routers are costly more than any other
internet networking devices
routers can be used as a intermediately multiple computers can share the network
between 2 networks so that the for which the router undergoes a situation
environment is secure to some extent known as '' Connection Wait “
Advantages Disadvantages
Increment the accessible data They are more costly
transfer capacity
Since the switch is isolated, data Broadcast traffic might be
will go only to the destination problematic
They help in lessening the Must have physical contact with
outstanding burden on individual the object to be actuated.
host PCs
Advantages Disadvantages
Do not require any wires or cables cost of installation is very high
Installing a wireless network is faster If wireless network is not installed
and easier correctly it may cause severe
security threats
Wireless networks have a wider Requires basic computer knowledge
reach than wired networks
the transfer of information between dust storms or fog, there are high
users is much faster. chances of interference and
jamming in wireless networks
Advantages Disadvantages
protect network with a single firewall. Cost
cannot affect system performance High maintenance required
won't easily be disabled by malicious difficult to configure
software
Figure 15 Firewall
5.Server - A server is a computer or system that provides resources, data, services,
or programs to other computers, known as clients, over a network. In theory,
whenever computers share resources with client machines, they are considered
servers. There are many types of servers, including web servers, mail servers, and
virtual servers.
Advantages Disadvantages
Backups and network security is A specialist network operating
controlled centrally system is needed
All files are stored in a central Specialist staff such as a network
location manager is needed
Users can access centrally The cost of purchasing the server is
managed shared data. high.
Centralized control is used for If any part of the network fails a lot
network peripherals. of
Advantages Disadvantages
Multiple processors support: It is difficult to move workstation from
one place to another
A single user can use this type of The workstation uses more electricity
computer at a time than other devices
Servers
Server - A server commonly refers to a computer program that receives and responds
to requests made over a network. It receives the request for a web document from the
client and sends the requested information to the client computer on the Internet. A
device can be both a client and a server at the same time, as an individual system has
the ability to provide resources and use them from another system in one go. There are
different types of servers, including mail servers, virtual servers, and web servers.
Server Types
1.WEB Server - A web server offers web pages or other content to the web browser by
loading the information from a disc and transfer files by using a network to the user's
It is used by a computer or collection of computers to provide content to several users
over the internet. This exchange was done with the help of HTTP communicating
between the browser and the server.
Some examples:
2.Cloud server
A cloud server functions in the context of cloud computing. Since it was created using
cloud computing, remote access over the internet is possible. It performs similar tasks
to a physical server, with the exception that a cloud server provider can remotely
access it.
3.Database server
Access to records or data from a database is made possible via a database server.
Many businesses utilize databases to keep their data. It enables the execution of
queries using the structures query language (SQL).
4.Fileserver
A computer acting as a file server is one that receives and sends files over a network.
shares files that are saved on the server with clients.
It is a type of server that is able to manage, maintain, and process internet domain
names and their records. In 1983, Jon Postel and Paul Mockapetris designed and
implemented the first DNS. Mainly, it was designed to provide websites to end-users
over the Internet. It is always required to connect to the internet to obtain services. It
includes storage that stores different domain names, internet hosts, DNS records,
network names, and other data. It has the ability to convert a domain name into its
respective IP addresses (Anon., n.d.)
Some examples:
Comodo Secure DNS , OpenDNS, Quad9, Google Public DNS, Cloudflare (williams,
n.d.)
6.Email Server - A mail server stores and delivers mail for users via email service
platforms. Because mail servers are set up to connect to a network continually,
individual users can access their email without executing any software on their own
devices.
Some examples:
Gmail, Yahoo mail, Outlook mail, iCloud mail, AOL mail. (Malli, 2022)
Figure 11 server 1
Figure 1213.
Figure server
Server 2
3.HPE ProLiant ML350 Gen 10
CPU Intel Scalable 4210
RAM 16GB
Storage No drives included
Graphics Intel HD Graphics P530
Dimensions (W×D×H) 18 × 65 × 47cm
Cost $977.20
As a result of the Dell Power Edge T30 server's extremely high performance processor, XYZ
Insurance (Pvt) Ltd network will operate quickly. We can connect numerous devices to this server
thanks to its 10 USB ports, HDMI port, DisplayPort, VGA, serial, PS2, and Gigabit Ethernet. This
server allows us to shield our data from unauthorized users. Servers ensure the stability of the
network. It enables resource sharing between users. Implementing this Dell power Edge T30 server
will help us grow our company.
Figure 15 workstation
Networking software
Network software encompasses a broad range of software used for design,
implementation, and operation and monitoring of computer networks. Traditional
networks were hardware based with software embedded. With the advent of
Software – Defined Networking (SDN), software is separated from the hardware
thus making it more adaptable to the ever-changing nature of the computer
network.
1.Auvik
2.SolarWinds Network Performance Monitor
3.SolarWinds Flow Tool Bundle
4.Site24x7 (COOPER, 2022)
To monitor our LAN network of the XYZ Insurance (Pvt) Ltd, we can use
Auvik networking software. This provides a precise description of the
network's overall performance and its capacity to monitor remote sites.
This software makes it simple for us to administer our network.
1.Router - TL-WR1043ND
Interface 4 10/100/1000Mbps LAN Ports
1 10/100/1000Mbps WAN Port
Frequency 2.4-2.4835GHz
450Mbps Wireless speed and Gigabit Ethernet ports are ideal for
multiple HD video streaming
Multi-functional USB 2.0 port - Easily share a printer locally and files
& media with networked devices or remotely via FTP server
Wireless security encryption easily at a push of WPS Button (Anon.,
n.d.)
Figure 17 Router
2.Switch - Tp-Link 24 port TI-Sg1024d
• 24 10/100/1000Mbps ports
• Innovative energy-efficient technology saves power consumption
• Supports MAC address self-learning, Auto MDI/MDIX and Auto negotiation
• Plug & play design
(Anon., n.d.)
Figure 18 Switch
3.Pc – Dell Desktop Core i5
Ram 8 Gb DDR4
Storage 1 TB
Figure 19PC
Software
1.Wire shark
Excellent Good
Figure 20 Wire shark
Poor
___________________________________________________
Signature -
Feedback Form
M3 Install and configure network services and applications
Wireshark
Figure 21 Wire shark 2
Figure 22 Wire shark 1
Figure 45
Installing configuration
Vlan
Creating and Assigning Vlan on switch
Figure 27 Vlan
Vlan Out put
Trunking switch ports
Figure 30 Switchport
Figure 33 P.w
Figure 32 p.w
Figure 37 DHCP
Dhcp output
Figure 38
Wireless connections
Figure 39 WIFI
D2 Design a maintenance schedule to support the networked
system.
Maintenance schedule
Backup data
Monitoring network
For this network, the author used the MESH topology, which prevents the creation of a
single point of failure. Furthermore, a successful network will not suffer if one trunk port
goes down since it can send data through other ports (find alternative methods to carry
data). The network's VTP Domain setup has been used by the author because trunk
ports have been used between all switches. To transport all VLAN names to the
switches of the clients, we can set up a server switch and use trunk ports. Therefore, we
are not need to give each switch a unique detail. It helps us save time and avoid giving
each switch the wrong information. also For auditorium and customer interview area
author has implemented wireless connection using ACCESS POINT and we can
connect devices without cables and easily manage devices
P8 Document and analyses test results against expected results
Test cases
T004 Router 1 login User tries to log in User should not Expected results match
(incorrect) using incorrect be able to login actual results.
password -
4444aa444
M4 Recommend potential enhancements for the networked systems.
Future Enhancements
Network Security Improvements: Add more robust security features to the network such as
intrusion detection and prevention, access control lists, firewalls, and encryption to improve the
network's resilience against cyber threats.
Network Scalability: Consider upgrading the network infrastructure to support more users and
devices. This could involve adding more switches, routers, and access points, or implementing
load balancing to distribute network traffic more evenly.
Network Monitoring and Management: Implement network monitoring tools that provide real-
time visibility into network performance and help with network management tasks such as
identifying bottlenecks and managing bandwidth utilization.
Cloud Integration: Consider integrating cloud-based services into the network to improve
performance, scalability, and reduce infrastructure costs. For example, moving certain services
to the cloud, such as email, file sharing, and collaboration tools, can free up network resources
and improve accessibility.
Utilizing biometric tools, we can use biometric devices for security purposes to prevent
unauthorized individuals from accessing devices and posing a serious threat to the company
D3 Use critical reflection
Critical Evaluation
The network design process begins with acquiring consumer information, and in order
to do so, we must engage with the client. Direct communication with the client allows for
the identification of customer requirements. This network's design has been
meticulously documented, with every stage of implementation covered in depth. We can
consult the manual if we wish to change anything in the network. The Call Management
(Pvt) Ltd. Colombo branch's LAN network architecture is a success since it satisfies the
needs of users and clients while also satisfying all the standards, from dividing the
departments to implementing appropriate security procedures. Mesh topology is the
network topology that was employed in the design. Planning for configuration and cable
management was difficult, but it was eventually successful after several attempts. Mesh
topology is the ideal topology because it maintains high redundancy and prevents single
points of failure. By using VLAN, every department was isolated. DHCP was used to
assign IP addresses. In order to satisfy the needs of the client, an access point was
developed for the auditorium and the customer interview area. High-performance
workstations and servers were employed to improve the network's quality. Numerous
issues were found during testing, however once they were fixed, the network satisfied
Call Management (Pvt) Ltd's requirements and users.
Bibliography
Bibliography
Anon., n.d. [Online]
Available at: https://fossbytes.com/what-is-mesh-topology-advantages-anddisadvantages-of-mesh-
topology/
[Accessed 09 05 2023].