SlideShare a Scribd company logo
1 of 63
Higher Nationals in Computing
Unit 2: Networking Assignment
Learner’s name:DANGANTHANH
ID: GCS190644
Class:GCS0805_PPT
Subject code: 1619
Assessor name:PHANMINH TAM
Assignment due: Assignment submitted:
ASSIGNMENT FRONT SHEET
Qualification BTEC Level 5 HND Diploma in Computing
Unit number and title Unit 2: Networking
Submission date 17/8/2020 Date Received 1st submission
Re-submission Date Date Received 2nd submission
Student Name Dang An Thanh Student ID GCS190644
Class GCS0805_PPT Assessorname Phan Minh Tam
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature Thanh
Grading grid
P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 D1 D2 D3
 Summative Feedback:  Resubmission Feedback:
Grade: AssessorSignature: Date:
Signature & Date:
ASSIGNMENT BRIEF
Qualification BTEC Level 5 HND Diploma in Computing
Unit number Unit 2: Networking
Assignment title NetworkingInfrastructure
Academic Year
Unit Tutor TamPM
Issue date Submission date
IV name and date Khoa Canh Nguyen, Nhung, Michael Omar 9th/01/2020
Submission format
Part 1
The submission is in the form of an individual written report. This should be written in a concise,
formal business style using single spacing and font size 12. You are required to make use of headings,
paragraphs and subsections as appropriate, and all work must be supported with research and
referenced using the Harvard referencing system. Please also provide a bibliography using the Harvard
referencing system. The recommended word limit is 2,000–2,500 words, although you will not be
penalized for exceeding the total word limit.
Part 2
The submission is in the form of an individual evidence portfolio.
 A LAN design plan and blueprint and justification document.
 A fully completed test plan including an evaluation of results and recommendations for
improvements to LAN.
 A proposed and justified maintenance schedule.
Part 3
 Evidence of an implemented network.
You are required to make use of headings, paragraphs, subsections and illustrations as appropriate,
and all work must be supported with research and referenced using the Harvard referencing system.
Unit Learning Outcomes
LO1: Examine networking principles and their protocols.
LO 2: Explain networking devices and operations.
LO3: Design efficient networked systems.
LO4: Implement and diagnose networked systems.
Assignment Brief
You are employed as a Network Engineer by Nguyen Networking Limited, a high-tech networking
solution development company, which have branches in Ho Chi Min City, Hanoi, Da Nang and Can
Tho.
The company has been contracted to implement a networking project from a local educational
institute. The specification of the project is given below:
People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers
including the head of academics and the programme manager, 3 computer network
administrators.
Resources: 50 student lab computers, 35 staff computers, 3 printers
Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one
lab located on the first floor and another located on the second floor
As a first task, the CEO of the company Mr. Nguyen has asked you to investigate and explain
networking principles, protocols and devices and submit a report.
Part 1
You will need to produce a report that includes the following:
1. An introduction to provide an overview of your report.
2. Benefits and constraints of different types of networks and networking standards.
3. The impact of network topology, speed of communication and bandwidth requirements.
4. Effectiveness of networking systems.
5. Discussion on operating principles of networking devices and server types and networking
software.
6. Discuss the relationship of workstation hardware with networking software.
7. Explore a range of server types and justify the selection of a server, considering a given
scenario regarding cost and performance optimization.
8. For the given specification, identify the topology protocol for the efficient utilization of a
networking system.
The CEO Mr. Nguyen is happy with your first report and now he has asked you to analyze the
specification from the institution, as given earlier.
You need to design and implement the networking project within a given timeframe:
Part 2 Design efficient networked systems
1. Prepare a written step-by-step plan of how you are going to design a Local Area Network
including a blueprint of your LAN.
2. Justify your choice of devices for your network design.
3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost
constraints as per user specifications.
4. Justify the security requirements and quality of services needed for selection of accessories.
5. Suggest a maintenance schedule to support the networked system.
Part 3 Implement test and diagnose networked systems
1. Implement a networked systembased on your prepared design.
2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc.
3. Record the test results and analyze these against expected results.
4. Investigate what functionalities would allow the systemto support device growth and the
addition of communication devices.
5. Discuss the significance of upgrades and security requirements in your recommendations.
ASSESMENT CRITERIA
Learning Outcomes and Assessment Criteria
Pass Merit Distinction
LO1 Examine networking principles and their protocols
LO1 & 2
D1 Considering a given
scenario, identify the
topology protocol selected
for the efficient utilization
of a networking system.
P1 Discuss the benefits and constraints
of different network types and
standards.
P2 Explain the impact of network
topology, communication and
bandwidth requirements.
M1 Compare common
networking principles and how
protocols enable the
effectiveness of networked
systems.
LO2 Explain networking devices and operations
P3 Discuss the operating principles of
networking devices and server types.
P4 Discuss the inter-dependence of
workstation hardware with relevant
networking software.
M2 Explore a range of server
types and justify the selection
of a server, considering a given
scenario regarding cost and
performance optimisation.
LO3 Design efficient networked systems
P5 Provide a logical/physical design of
the networked systemwith clear
explanation and addressing table.
P6 Evaluate the design to meet the
requirements.
M3 Install and configure
network services and
applications on your choice.
D2 Design a maintenance
schedule to support the
networked system.
LO4 Implement and diagnose networked systems
P7 Implement a networked system
based on a prepared design.
P8 Document and analyse test results
against expected results.
M4 Recommend potential
enhancements for the
networked systems.
D3 Use critical reflection
to evaluate own work and
justify valid conclusions.
Table of Contents
Unit 2: Networking Assignment..................................................................................................................... 1
INTRODUCTION TO NETWORKING................................................................................................................ 1
P1 Discuss the benefits and constraints of different network types and standards. ........................................ 1
1. What is the network?............................................................................................................................ 1
2. Network type ( LAN,MAN, INTERNET, ect….).......................................................................................... 2
2.1. LAN ( Local Area Network) ................................................................................................................. 2
2.2. MAN ( Metropolitan Area Network)................................................................................................... 3
2.3. INTERNET ( International Network).................................................................................................... 4
2.4. Benefit of networking............................................................................................................. 4
2.4.1. Advantages of LAN................................................................................................................. 4
2.4.2. Advantages of MAN ............................................................................................................... 5
2.4.3. Advantages of WAN ............................................................................................................... 5
2.5. Protocol and Standards...................................................................................................................... 6
2.5.1. Define Standards.................................................................................................................... 6
2.5.2. List some protocols................................................................................................................ 6
2.5.3. List some standard organizations and standards names .......................................................... 6
P2. Network topology & communication and Bandwidth requirements......................................................... 7
1. What is Network topology ?.................................................................................................................. 7
1.1. Network topology definition.............................................................................................................. 7
2. Denifition of Physical & Logical Topology............................................................................................... 8
2.1. Denifition of Physical Topology.......................................................................................................... 8
2.2. Denifition of Logical Topology............................................................................................................ 9
2.3. Examples of topology with diagrams ( Mesh, Star, Bus, Ring, Tree, Hyprib) ........................................10
2.3.1. Mesh Topology......................................................................................................................10
2.3.2. Star Topology........................................................................................................................11
2.3.3. Bus Topology ........................................................................................................................12
2.3.4. Ring Topology.......................................................................................................................13
2.3.5. Hibrib Topology.....................................................................................................................14
3. Comunication and Bandwidth..............................................................................................................15
3.1. Comunication...................................................................................................................................15
3.1.1. Define commutations in terms of networking .......................................................................15
3.1.2. Rules of communication........................................................................................................15
3.2. Bandwidth........................................................................................................................................16
M1 Compare common networkingprinciplesand how protocols enable the effectivenessofnetworked
systems.......................................................................................................................................................16
1. What is the TCP / IP protocol ? .............................................................................................................16
1.1. The most popular TCP / Ip protocols..................................................................................................17
2. What is the OSI model?........................................................................................................................18
3. Compare OSI model with TCP / IP model ..............................................................................................19
P3 Discuss the operating principles of networking devices and server types..................................................20
1. Discuss 1 or 2 operating principles of a selected network device ...........................................................20
1.1. Repeater..........................................................................................................................................20
2.2. Hub ..................................................................................................................................................21
2. List network devices.............................................................................................................................22
3. List server types...................................................................................................................................22
P4 Discuss the inter-dependence of workstation hardware with relevant networking software.....................22
1. Define workstation hardware...............................................................................................................22
2. Define networking software.................................................................................................................23
3. Discuss and explainthe interdepenciesofworkstationhardware with networkingsoftware. Derive an
example form your discussion .....................................................................................................................23
M2 Explore a range of servertypes and justifythe selectionofa server,consideringa given scenario
regarding cost and performance optimization..............................................................................................24
1. Some types of server........................................................................................................................24
2. Determining Your Networking Requirements ....................................................................................26
D1 Consideringa givenscenario,identifythe topology protocol selectedforthe efficientutilizationofa
networking system......................................................................................................................................26
P5 Provide a logical/physical design of the networked system with clear explanation and addressing table ..26
1. Explain the difference between logical and physical design...................................................................26
1.1. What is logical of the networked systen?...........................................................................................26
1.2. What is physical design of the networked system? ...........................................................................27
2. Discuss and explain the USER Requirement for the design.....................................................................28
3. Provide a logical design of the network base on user reuirement ..........................................................29
P6 Evaluate the design to meet the requirements. ......................................................................................31
1. Design evaluation:...............................................................................................................................31
2. Evaluate the design of the network......................................................................................................31
3. What advice and solution would you provide to the network for efficiency and usage...........................32
3.1. Determine that your network is at fault. ...........................................................................................32
3.2. Offer guests a different network. ......................................................................................................32
3.3. Educate personnel about user behavior.............................................................................................33
3.4. Use VLANs to segment low-priority traffic.........................................................................................33
3.5. Check for viruses or system defects...................................................................................................33
M3 Install and configure network services and applications on your choice..................................................34
1. What is the network server?................................................................................................................34
2. What is the network application?.........................................................................................................34
3. Select network services and network applications in your design..........................................................34
4. Applications can be added to the network............................................................................................35
D2 Design a maintenance schedule to support the networked system..........................................................35
1. Form and Time of Support....................................................................................................................35
1.1. Forms of support:.............................................................................................................................35
1.2. Time of Support................................................................................................................................35
P7 Implement a networked system based on a prepared design...................................................................36
1. Show evidence of a working network you’ve design .............................................................................36
2. Ping some device running the screen....................................................................................................37
3. Show me implemented system.............................................................................................................41
P8 Document and analyze test results against expected results....................................................................41
1. Provide a stepby step configurationof network devicesinthe network(Choose a device in the network
and provide all the steps for configuration)..................................................................................................41
2. Test results against test plans...............................................................................................................44
M4 Recommend potential enhancements for the networked systems..........................................................45
D3 Use critical reflection to evaluate own work and justify valid conclusions................................................47
REFERENCES................................................................................................................................................48
Table of Figures
Figure 1 Network.......................................................................................................................................... 2
Figure 2 Network type................................................................................................................................... 2
Figure 3 LAN ( Local Area Network)................................................................................................................ 3
Figure 4 MAN (Metropolitan Area Network)................................................................................................... 3
Figure 5 INTERNET ( Internetnational Network).............................................................................................. 4
Figure 6 Network Topology............................................................................................................................ 8
Figure 7 Physical Topologies.......................................................................................................................... 8
Figure 8 Logical Topology .............................................................................................................................. 9
Figure 9 Mesh Topology...............................................................................................................................10
Figure 10 Star Topology................................................................................................................................11
Figure 11 Bus Topology ................................................................................................................................12
Figure 12 Ring Topology...............................................................................................................................13
Figure 13 Hibrib Topology.............................................................................................................................14
Figure 14 TCP/IP Model................................................................................................................................17
Figure 15 the most popular TCP / Ip protocols...............................................................................................18
Figure 16 OSI Basic Reference Model ............................................................................................................19
Figure 17 Compare OSI & TCP/IP...................................................................................................................20
Figure 18 Repeater.......................................................................................................................................21
Figure 19 Hub ..............................................................................................................................................21
Figure 20 workstation ..................................................................................................................................23
Figure 21 Logical of networked system..........................................................................................................27
Figure 22 Physical of networked system........................................................................................................28
Figure 23 Result of the design.......................................................................................................................30
Figure 24 Server room..................................................................................................................................34
Figure 25 New server room ..........................................................................................................................35
Figure 26 Ping PC student 1 to PC student 2 ..................................................................................................38
Figure 27 Ping PC student 2 to PC student 5 ..................................................................................................38
Figure 28 Ping PC student 6 to PC DNS ..........................................................................................................39
Figure 29 Ping PC staff 1 to printer 1 ............................................................................................................39
Figure 30 Ping PC 13 to PC 10 .......................................................................................................................40
Figure 31 Ping PC staff 2 to PC staff 5............................................................................................................40
Figure 32 implemented system.....................................................................................................................41
Figure 33Choose the device..........................................................................................................................42
Figure 34 choose the connection ..................................................................................................................42
Figure 35 Result step 1.................................................................................................................................42
Figure 36 Result step 2.................................................................................................................................43
Figure 37 Result step 3.................................................................................................................................44
Figure 38 Test plan.......................................................................................................................................44
Figure 39 Network 5G ..................................................................................................................................45
Figure 40 Benefits of 5G...............................................................................................................................46
P a g e | 1
ASSIGNMENT 1 ANSWERS
INTRODUCTION TO NETWORKING
Networking is referred as connecting computers electronically for the purpose of sharing information
. Resources such as files , applications , printers and software are common information shared in a
networking . The advantage of networking can be seen clearly in terms of security , efficiency ,
manageability and cost effectiveness as it allows collaboration between users in a wide range .
Basically , network consists of hardware component such as computer , hubs , switches , routers and
other devices which form the network infrastructure . These are the devices that play an important
role in data transfer from one place to another using different technology such as radio waves and
wires . There are many types of network available in the networking industries and the most common
network are Local Area Network ( LAN ) and Wide Area Network ( WAN ) .LAN network is made up of
two or more computers connected together in a short distance usually at home , office buildings or
school . WAN is a network that covers wider area than LAN and usually covers cities , countries and
the whole world . Several major LAN can be connect together to form a WAN . As several devices are
connected to network , it is important to ensure data collision does not happened when this devices
attempt to use date channel simultaneously. A set of rules called Carrier Sense Multiple Access /
Collision detection are used to detect and prevent collision in networks.
P1 Discuss the benefits and constraints of different network types and standards.
1. What is the network?
- A computer network is a group of computers that use a set of common communication
protocols over digital interconnections for the purpose of sharing resources located on or
provided by the network nodes. The interconnections between nodes are formed from a
broad spectrum of telecommunication network technologies, based on physically wired,
optical, and wireless radio-frequency methods that may be arranged in a variety of network
topologies.
P a g e | 2
Figure 1 Network
2. Network type ( LAN,MAN, INTERNET, ect….)
- There are three types of computer networks.
Figure 2 Network type
2.1. LAN ( Local Area Network)
- Local area network is a group of computers connected with each other in a small places
such as school, hospital, apartment etc.
- LAN is secure because there is no outside connection with the local area network thus the
data which is shared is safe on the local area network and can’t be accessed outside.
- LAN due to their small size are considerably faster, their speed can range anywhere from
P a g e | 3
100 to 100Mbps.
- LANs are not limited to wire connection, there is a new evolution to the LANs that allows
local area network to work on a wireless connection.
Figure 3 LAN ( Local Area Network)
2.2. MAN ( Metropolitan Area Network)
- MAN network covers larger area by connections LANs to a larger network of computers. In
Metropolitan area network various Local area networks are connected with each other
through telephone lines. The size of the Metropolitan area network is larger than LANs and
smaller than WANs(wide area networks), a MANs covers the larger area of a city or town.
Figure 4 MAN (Metropolitan Area Network)
P a g e | 4
2.3. INTERNET ( International Network)
- The Internet is the global system of interconnected computer networks that uses
the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is
a network of networks that consists of private, public, academic, business, and government
networks of local to global scope, linked by a broad array of electronic, wireless, and optical
networking technologies. The Internet carries a vast range of information resources and
services, such as the inter-linked hypertext documents and applications of the World Wide
Web (WWW), electronic mail, telephony, and file sharing.
Figure 5 INTERNET ( Internetnational Network)
2.4. Benefit of networking
2.4.1. Advantages of LAN
 Data Security : Data security is easy in LAN because all the computers are connected to the
server system and all the data is stored at one place in the server so easy to maintain secured
too.
P a g e | 5
 Software Applications Sharing : As we know all computers are connected to the server so it
can also share application licensing software with them. It is not required to licensing each
computer individually. All worked on only one licensed system.
 Internet Sharing : LANs also provided an advantage of cheaper cost on internet connection. As
the single interconnection is required for the server system and all the other computers are
worked with that connection.
 Easy and Cheap Communication : All the data and files are shared easily in LAN because all the
data has stored in a server so it is shared easily, fast and secured. Hence, also save a lot of time
and money.
2.4.2. Advantages of MAN
 Less expensive: It is less expensive to attach MAN with WAN. MAN gives the good efficiency of
data. In MAN data is easily managed in a centralized way.
 Sending local emails: On MAN you can send local emails fast and free.
 High speed than WAN: MAN uses fiber optics so the speed of data can easily reach upon 1000
Mbps. Files and databases can be transferred fast.
 Sharing of the internet: In some installation of MANs, users can share their internet
connection. So multiple users can get the same high-speed internet.
 Conversion from LAN to MAN is easy: MAN is a faster way to connect two fast LANs together.
This is due to the fast configuration of links.
 High Security: MAN has a high-security level than WAN.
2.4.3. Advantages of WAN
 Sharing devices such as printers saves money.
 Site (software) licences are likely to be cheaper than buying several standalone licences.
 Files can easily be shared between users.
 Network users can communicate by email and instant messenger.
 Security is good - users cannot see other users' files unlike on stand-alone machines.
P a g e | 6
 Data is easy to backup as all the data is stored on the file server.
2.5. Protocol and Standards
2.5.1. Define Standards
- A standard is a set of specifications for hardware or software, agreed upon by academic
and industry contributors. A standard makes it possible for many manufacturers to create
products that are compatible with each other. Standards may be set by official
organizations, or unofficially set, established by common use. Common examples of
standards include multiple IEEE standards for electrical interfaces (computer cables), ANSI
for programming languages, and VESA for computer monitors and video adapters.
2.5.2. List some protocols
- There are various types of protocols that support a major and compassionate role in
communicating with different devices across the network. These are:
+ Transmission Control Protocol (TCP)
+ Internet Protocol (IP)
+ User DatagramProtocol (UDP)
+ Post office Protocol (POP)
+ Simple mail transport Protocol (SMTP)
+ File Transfer Protocol (FTP)
+ Hyper Text Transfer Protocol (HTTP)
+ Hyper Text Transfer Protocol Secure (HTTPS)
2.5.3. List some standard organizations and standards names
 3GPP – 3rd Generation Partnership Project
 3GPP2 – 3rd Generation Partnership Project 2
 ABYC – The American Boat & Yacht Council (ABYC is an international organization, despite
its name)
P a g e | 7
 Accellera – Accellera Organization
 A4L – Access for Learning Community (formerly known as the Schools Interoperability
Framework)
 AES – Audio Engineering Society
 AHRI - Air-conditioning, Heating, and Refrigeration Institute
 AIIM – Association for Information and Image Management
 ASAM – Association for Automation and Measuring Systems
 ASHRAE – American Society of Heating, Refrigerating and Air-Conditioning Engineers
(ASHRAE is an international organization, despite its name)
 ASME – American Society of Mechanical Engineers
 ASTM International
P2. Network topology & communication and Bandwidth requirements
1. What is Network topology ?
1.1. Network topology definition.
- Network topology is the arrangement of the elements (links, nodes, etc.) of a
communication network. Network topology can be used to define or describe the
arrangement of various types of telecommunication networks, including command and
control radio networks, industrial fieldbusses and computer networks.
- Network topology is the topological structure of a network and may be depicted
physically or logically. It is an application of graph theory wherein communicating devices
are modeled as nodes and the connections between the devices are modeled as links or
lines between the nodes.
P a g e | 8
Figure 6 Network Topology
2. Denifition of Physical & Logical Topology
2.1. Denifition of Physical Topology
- Physical topology is the placement of the various components of a network (e.g., device
location and cable installation), while logical topology illustrates how data flows within a
network. Distances between nodes, physical interconnections, transmission rates, or signal
types may differ between two different networks, yet their logical topologies may be identical.
A network’s physical topology is a particular concern of the physical layer of the OSI model.
Figure 7 Physical Topologies
P a g e | 9
2.2. Denifition of Logical Topology
- Logical topology is the arrangement of devices on a computer network and how they
communicate with one another.[1] Logical topologies describe how signals act on the network.
- In contrast, a physical topology defines how nodes in a network are physically linked and
includes aspects such as geographic location of nodes and physical distances between nodes.
The logical topology defines how nodes in a network communicate across its physical topology.
The logical topology can be considered isomorphic to the physical topology, as vice versa.
- Early twisted pair Ethernet with a single hub is a logical bus topology with a physical star
topology. While token ring is a logical ring topology with a physical star topology.
Figure 8 Logical Topology
P a g e | 10
2.3. Examples of topology with diagrams ( Mesh, Star, Bus, Ring, Tree, Hyprib)
2.3.1. Mesh Topology.
- In mesh topology each device is connected to every other device on the network through a
dedicated point-to-point link. When we say dedicated it means that the link only carries data
for the two connected devices only. Lets say we have n devices in the network then each
device must be connected with (n-1) devices of the network. Number of links in a mesh
topology of n devices would be n(n-1)/2.
 Advantages of Mesh topology
- No data traffic issues as there is a dedicated link between two devices which means the link is
only available for those two devices.
- Mesh topology is reliable and robust as failure of one link doesn’t affect other links and the
communication between other devices on the network.
- Mesh topology is secure because there is a point to point link thus unauthorized access is not
possible.
Figure 9 Mesh Topology
P a g e | 11
- Fault detection is easy.
 Disadvantages of Mesh topology
- Amount of wires required to connected each system is tedious and headache
- Since each device needs to be connected with other devices, number of I/O ports required must
be huge.
- Scalability issues because a device cannot be connected with large number of devices with a
dedicated point to point link.
2.3.2. Star Topology
- In star topology each device in the network is connected to a central device called hub. Unlike
Mesh topology, star topology doesn’t allow direct communication between devices, a device
must have to communicate through hub. If one device wants to send data to other device, it
has to first send the data to hub and then the hub transmit that data to the designated device.
 Advantages of Star topology
- Less expensive because each device only need one I/O port and needs to be connected with
hub with one link.
Figure 10 Star Topology
P a g e | 12
- Easier to install
- Less amount of cables required because each device needs to be connected with the hub only.
- Robust, if one link fails, other links will work just fine.
- Easy fault detection because the link can be easily identified.
 Disadvantages of Star topology
- If hub goes down everything goes down, none of the devices can work without hub.
- Hub requires more resources and regular maintenance because it is the central system
of star topology.
2.3.3. Bus Topology
- In bus topology there is a main cable and all the devices are connected to this main cable
through drop lines. There is a device called tap that connects the drop line to the main cable.
Since all the data is transmitted over the main cable, there is a limit of drop lines and the
distance a main cable can have.
 Advantages of bus topology
- Easy installation, each cable needs to be connected with backbone cable.
- Less cables required than Mesh and star topology
Figure 11 Bus Topology
P a g e | 13
 Disadvantagesof bustopology
- Difficultly in fault detection.
- Not scalable as there is a limit of how many nodes you can connect with backbone
cable.
2.3.4. Ring Topology
- In ring topology each device is connected with the two devices on either side of it. There
are two dedicated point to point links a device has with the devices on the either side of it.
This structure forms a ring thus it is known as ring topology. If a device wants to send data
to another device then it sends the data in one direction, each device in ring topology has a
repeater, if the received data is intended for other device then repeater forwards this data
until the intended device receives it.
Figure 12 Ring Topology
P a g e | 14
 Advantages of Ring Topology
- Easy to install.
- Managing is easier as to add or remove a device from the topology only two links are required
to be changed.
 Disadvantages of Ring Topology
- A link failure can fail the entire network as the signal will not travel forward due to failure.
- Data traffic issues, since all the data is circulating in a ring.
2.3.5. Hibrib Topology
- A combination of two or more topology is known as hybrid topology. For example a
combination of star and mesh topology is known as hybrid topology.
Figure 13 Hibrib Topology
 Advantagesof Hybridtopology
- We can choose the topology based on the requirement for example, scalability is our
concern then we can use star topology instead of bus technology.
- Scalable as we can further connect other computer networks with the existing networks
with different topologies.
P a g e | 15
 Disadvantagesof Hybridtopology
- Fault detection is difficult.Installation is difficult.
- Design is complex so maintenance is high thus expensive.
3. Comunication and Bandwidth
3.1. Comunication
3.1.1. Define commutations in terms of networking
- Communications is the exchange of information between two or more things, such
as people, devices, governments, organizations, or businesses. In digital
communication, data is exchanged between two or more computing devices. This
data communication (datacom) occurs over a communication medium, such as a
telephone line, fiber optic cable, or wireless radio signal. The collection of digital
devices and their connection media is a computer network and is what allows
devices to "talk" to each other.
The following are examples of digital communications:
 Transferring data from one computer to another over a network. With this form of
communication, data transmits as a packet over a network connection from a
sender to a receiver using a protocol.
 Sending text messages between mobile devices.
 Sending and receiving an e-mail.
 Collaborating on shared documents and spreadsheets.
 Voice chat or calls with other people over the Internet, using VoIP software.
 Video call or conferencing with other people over the Internet, using VoIP software.
3.1.2. Rules of communication
 Access method
 Allowed physical topologies
P a g e | 16
 Types of cabling
 Speed of data transfer.
3.2. Bandwidth
- Bandwidth is the maximum rate of data transfer across a given path. Bandwidth may be
characterized as network bandwidth, data bandwidth,] or digital bandwidth.
- This definition of bandwidth is in contrast to the field of signal processing, wireless
communications, modem data transmission, digital communications, and electronics, in
which bandwidth is used to refer to analog signal bandwidth measured in hertz, meaning the
frequency range between lowest and highest attainable frequency while meeting a well-
defined impairment level in signal power. The actual bit rate that can be achieved depends not
only on the signal bandwidth but also on the noise on the channel.
M1 Compare common networking principles and how protocols enable the effectiveness of
networked systems.
1. What is the TCP / IP protocol ?
- The TCP / IP protocol is divided into 4 network layers:
+ Application layer: The mission of this layer is to provide standardized data exchange and
applications. The application layer includes many specific protocols such as HTTP, FTP, POP3,
SMTP, and SNMP. Each of these protocols will have specific functions and tasks.
+ Network layer: This floor is also known as the internet layer. The task of the internet layer is to
process packets, then connect to independent networks to transport encrypted data packets
across network boundaries. The internet layer also includes many protocols such as IP and
ICMP.
+ Transport layer: The mission of the transport layer is to maintain end-to-end communication
throughout the network. The transport layer includes TCP and UDP protocols. In many cases
the UDP protocol will be replaced by TCP.
+ Physical layer: The protocols operating on this layer are Ethernet, ARP. For Ethernet often used
for LAN local area.
P a g e | 17
Figure 14 TCP/IP Model
1.1. The most popular TCP / Ip protocols
- Currently, TCP / IP has many protocols, but the three most commonly used are HTTP, HTTPS
and FTP.
+ HTTP protocol: this protocol is used to transfer unsafe data between a web client and a web
server. How this protocol works is very simple. First, a web client will send a request to the web
server to view a website or news. Upon receiving the request, the server sends the answer
back to the web client.
P a g e | 18
+ HTTPS protocol: this protocol is used to transfer data securely between a web client and a web
server. This transaction is usually used to send credit card transaction data or personal
information from the web client to the web server.
+ FTP protocol : This protocol does not limit the number of computers. That is, a computer can
send data to one or many different computers directly.
Figure 15 the most popular TCP / Ip protocols
2. What is the OSI model?
- The OSI model is also known as the reference model connecting open systems. This
model has been developed as part of the Open Systems Interconnection plan initiated
by ISO and IUT-T.
- This model divides network interface into 7 layers. Grades 1 through 4 are lower-level
classes and only perform data migration tasks. Grades 5 through 7 belong to the
advanced classes. Each class will perform a specific task that will then forward data to
the next layer.
P a g e | 19
Figure 16 OSI Basic Reference Model
3. Compare OSI model with TCP / IP model
- Compared to the OSI model, the TCP / IP protocol is more trusted and used. Because
according to the concept, the OSI model is only an old model, a tool for reference. The TCP
/ IP protocol, in contrast, allows loosening of rules and provides general rules.
- In terms of approach, TCP / IP approaches horizontally, while OSI approaches vertically.
- The biggest difference between these two protocols is probably the combination of
layers. For TCP / IP protocols, the session layer and the presentation layer are combined in
the application layer. As for the OSI model, each different tier will perform a different task.
- In terms of design, the protocols in TCP / IP were designed first and then developed. In
contrast, in OSI, the model is developed first and then the protocol developed.
P a g e | 20
Figure 17 Compare OSI & TCP/IP
P3 Discuss the operating principles of networking devices and server types.
1. Discuss 1 or 2 operating principles of a selected networkdevice
1.1. Repeater
– A repeater operates at the physical layer. Its job is to regenerate the signal over the same
network before the signal becomes too weak or corrupted so as to extend the length to which
the signal can be transmitted over the same network. An important point to be noted about
repeaters is that they do not amplify the signal. When the signal becomes weak, they copy the
signal bit by bit and regenerate it at the original strength. It is a 2 port device.
P a g e | 21
Figure 18 Repeater
2.2. Hub
–A hub is basically a multiport repeater. A hub connects multiple wires coming from different
branches, for example, the connector in star topology which connects different stations. Hubs
cannot filter data, so data packets are sent to all connected devices. In other words, collision
domain of all hosts connected through Hub remains one. Also, they do not have intelligence to
find out best path for data packets which leads to inefficiencies and wastage.
Figure 19 Hub
P a g e | 22
 Types of Hub
 Active Hub:- These are the hubs which have their own power supply and can clean,
boost and relay the signal along with the network. It serves both as a repeater as well as wiring
centre. These are used to extend the maximum distance between nodes.
 Passive Hub :- These are the hubs which collect wiring from nodes and power supply
from active hub. These hubs relay signals onto the network without cleaning and boosting them
and can’t be used to extend the distance between nodes.
2. List network devices.
- Here is the common network device list:
 Hub
 Switch
 Router
 Bridge
 Gateway
 Modem
 Repeater
 Access Point
3. List server types
 Application Servers
 Client Servers
 Collaboration Servers
 FTP Servers
 List Servers
 Mail Servers
 Open Source Servers
 Proxy Servers
 Real-Time Communication Servers
P4 Discuss the inter-dependence of workstation hardware with relevant networking software.
1. Define workstation hardware
P a g e | 23
A workstation is a special computer designed for technical or scientific applications. Intended
primarily to be used by one person at a time, they are commonly connected to a local area
network and run multi-user operating systems. The term workstation has also been used loosely to
refer to everything from a mainframe computer terminal to a PC connected to a network, but the
most common form refers to the class of hardware offered by several current and defunct companies
such as Sun Microsystems, Silicon Graphics, Apollo Computer, DEC, HP, NeXT and IBM which opened
the door for the 3D graphics animation revolution of the late 1990s.
-
2. Define networking software
- Networking software is a foundational element for any network. It helps administrators
deploy, manage and monitor a network. Traditional networks are made up of
specialized hardware, such as routers and switches, that bundle the networking
software into the solution. Software-defined networking (SDN) separates that software
from the hardware, making it easier to innovate and adapt the network to quickly meet
changing network demands. The separation of functions from hardware, such as
firewalls or load balancing, is called network functions virtualization (NFV).
3. Discuss and explain the interdepencies of workstation hardware with networking software.
Derive an example form your discussion
Figure 20 workstation
P a g e | 24
- Inter-dependence of workstation hardware with relevant networking software:
+ A network file server is a computer system used for the purpose of managing the file
system, the network printer, handling network communication, and other functions. A
server may be dedicated is such case all of its processing power is allocated to network
function, or it may be non- dedicated which means that a part of server functions
allocated as a work stations or DOS based system.
+ Network operating system: it is loaded into the servers’ hard disk along with the system
management tools and user utilities. When the system is started, NOS boots and other
server come under its control.
+ Workstations: workstations or nodes are attached to the server through the network
interfaces card and the cable; workstations are normally intelligence systems, such as
the IBM pc. But DUMV terminals are used in mainframe computers. The concept of
distributed process depends on the fact that personal computer are attached to the
network performed their own processing after loading programs and data from servers.
- Due to this a work station is called an active device on the network. After processing,
files are stored back on the server where they can be used by others workstation.
+ Network interface card-every device connected to a LAN needs network interface card
to plug into the LAN. For example, a PC needs to have an Ethernet card installed in it to
connect to an Ethernet LAN.
+ Network cabling: once the server, workstations, and network interface cards are in
place, network cabling is used to network everything together. The most popular type
of network cables: Twisted pair wiring, Co-axial cable, Fiber optics cable.
- That is some interdependence of the workstation hardware with the relevant network
software to properly implement the network.
M2 Explore a range of server types and justify the selection of a server, considering a given
scenario regarding cost and performance optimization
1. Some types of server
- Server: One of the most abundant types of servers in today’s market is a web server. A
webserver is a special kind of application server that hosts programs and data requested by
P a g e | 25
users across the Internet or an intranet. Web servers respond to requests from browsers
running on client computers for web pages, or other web-based services. Common web servers
include Apache web servers, Microsoft Internet Information Services (IIS) servers and Nginx
servers.
- File server: File servers store and distribute files. Multiple clients or users may share files
stored on a server. In addition, centrally storing files offers easier backup or fault tolerance
solutions than attempting to provide security and integrity for files on every device in an
organization. Fileserver hardware can be designed to maximize read and write speeds to
improve performance.
- Database server: The amount of data used by companies, users, and other services is
staggering. Much of that data is stored in databases. Databases need to be accessible to
multiple clients at any given time and can require extraordinary amounts of disk space. Both of
these needs lend themselves well to locating such databases on servers. Database servers run
database applications and respond to numerous requests from clients. Common database
server applications include Oracle, Microsoft SQL Server, DB2, and Informix.
- Combination server: Even before virtualization, servers were being extracted from the
standard model of a single server operating system installed on a hardware machine.
Technology, such as network-attached storage, removed the need for a server to have its own
storage. Other technologies, such as mirroring and clustering, enabled pieces of hardware to
be combined into larger, more powerful servers. Such a server might consist of several blades,
several attached storage devices, and an external power supply, and each piece could be
swapped out for another while the server was still running.
- Virtualization server: Virtual servers are taking the server world by storm. Unlike traditional
servers that are installed as an operating system on machine hardware, virtual servers exist
onlyas defined within specialized software called hypervisor. Each hypervisor can run
hundreds, or even thousands, of virtual servers all at once. The hypervisor presents virtual
hardware to the server as if it were real physical hardware. The virtual server uses the virtual
hardware as usual, and the hypervisor passes the actual computation and storage needs onto
P a g e | 26
the real hardware beneath, which is shared among all the other virtual servers.
2. Determining Your Networking Requirements
- Designing a network can be a challenging task. Your first step is to understand your networking
requirements. The rest of this chapter explains how to determine these requirements. After
you have identified these requirements, refer to Chapter 2 for information on selecting
network capability and reliability options that meet these requirements.
- Networking devices must reflect the goals, characteristics, and policies of the organizations in
which they operate. Two primary goals drive networking design and implementation:
+ Application availability—Networks carry application information between computers. If the
applications are not available to network users, the network is not doing its job.
+ Cost of ownership—Information system (IS) budgets today often run in the millions of dollars.
As large organizations increasingly rely on electronic data for managing business activities, the
associated costs of computing resources will continue to rise.
- A well-designed network can help balance these objectives. When properly implemented, the
network infrastructure can optimize application availability and allow the cost-effective use of
existing network resources.
D1 Considering a given scenario, identify the topology protocol selected for the efficient
utilization of a networking system.
- The topology protocol selected for the efficient utilization of a networking system is star
topology. The devices are connected via switches and the switches are interconnected
internally. they are connected through routers.
P5 Provide a logical/physicaldesign of the networked system with clear explanation and
addressing table
1. Explain the difference between logical and physical design
1.1. What is logical of the networked systen?
- Logical design is, “The part of the design phase of the SDLC in which all functional features of
the system chosen for development in analysis are described independently of any computer
P a g e | 27
platform.” A logical design for a network is an abstract functional specification for a
telecommunications solution. A logical design lacks specific details such as technologies and
standards and focuses on the needs at a general level. A logical network design can be a view of
any part of a network. An entire enterprise educational network can be a composition of many
logical designs. The lower level designs can be a university campus network that connects each
building to the Internet, or it could be a view of the standard office telecommunications setup. The
important quality of a logical design is that is communicates all needs in general terms
Figure 21 Logical of networked system
1.2. What is physical design of the networked system?
- Logical designs are often described using terms from the customer’s business vocabulary.
Locations, processes, roles from the business domain can show up in the logical design. An
important aspect of a logical network design is that it is part of the requirements set for a
solution to a customer problem.
- The basic idea of physical design is that it communicates “decisions about the hardware used
to deliver a system.” A physical network design is created from a logical network design. A
physical design will often expand elements found in a logical design. For instance, a WAN
connection on a logical design diagram can be shown as a line between two buildings. When
P a g e | 28
transformed into a physical design, that single line could expand into the connection, routers
and other equipment at each end of the connection. The actual connection media might be
shown on a physical design as well as manufacturers and other qualities of the network
implementation.
Figure 22 Physical of networked system
2. Discuss and explain the USER Requirement for the design
- User requirements are typically written when discussing the use cases for a project. The
requirements definition is done with the customer or product managers that know how the
embedded system will be used by the user.
- Many user requirements deal with how a user will interact with a system and what that user
expects. If there is a screen or human machine interface aspect to the system, a user
requirement may be based on what happens when the user selects an action on the screen.
P a g e | 29
Maybe with a button press not only does a process start, but it also switches to another screen
and provides an audible notification. When user requirements such as these are written down,
they can often break into multiple system requirements later due to switching of screens, the
maximum delays in starting the process, and finally what the next screen should look like. One
pitfall is starting to try to write the system requirements during a user requirement meeting.
This often detracts from gaining insight into the requirements of the user, and key functionality
pieces could be missed.
- In fact, as alluded to earlier, it is often better to keep user requirements and system
requirements separate in their tracking and reporting. The user requirements are often more
readable, understandable, and provide a better sense of how the system will operate. Even
though user requirements may lack specifics on what really needs to occur in the system, they
are still valuable in that they can provide the overarching system functionality expectations.
3. Provide a logical design of the network base on user reuirement
- At the request of users, they need 50 student lab computers, 35 staff computers, 3, printer,… ..
- Based on the requirements of the user, design 5 rooms in which 1 student lab computer, 1
staff lab computers, 1 server, 1 hingher managers, marketing and administration staff, and
network administor.
- Room differences are linked via switches and each room is connected via a router. The routers
are connected to form a circle.
- Equipment needed to equip 1 room: student lab computers requires 3 switches, 2 access
points PT, 1 router. Staff lab computer needs 3 switches, 1 access points PT, 1 router, Higher
lab mangers need 1 switch and 1 router and the marketing and administration lab staff,
network lab administor is like higher lab managers.
- Network systems are designed according to star topology.
P a g e | 30
Figure 23 Result of the design
P a g e | 31
P6 Evaluate the design to meet the requirements.
1. Design evaluation:
- The design has met the user's requirements.
- Basedon the design,itrequires93computers,11 switches,and6 routers,4 servers,3 accesspointpt,
6 laptops. 3 printers.
- Student computer room can connect up to 80 computers, because 3 switch can connect up to 60
computers and 2 access point PT can connect more 20 computers.
- Staff computer room can connect up to 70 computers, because 3 switch can connect up to 60
computers and 1 access point PT can connect more 10 computers. Thus in the future it may open 1
more room.
- Marketingand administrationstaff roomcanconnectup to 20 computers. Itcan solve the problemof
recruiting more employees.
- Higher managers and network administrators is similar to Marketing administration stafff.
- The remaining rooms can use the staff room printer. All rooms can connect to the server room.
- Inconclusionthe designhassolvedthe user's basicrequirements andprovide solutions to expand for
the future.
2. Evaluate the design of the network
- Any Network that is well designed should satisfy the characteristics listed below:
+ Network uptime: Any network should be designed to be up all the time, this means that you
have to understand your network and what failures may affect the network operation and
provide all means of redundancy to ensure virtually 100% uptime of your network. This is
usually a trade off between the criticality of the applications running over the network and the
budget.
+ Network reliability: Administrators have to make sure that at any given time the network is
capable of delivering packets to their destinations in a timely fashion with an acceptable delay
and jitter profile. The good designer must understand his traffic, its characteristics and the
acceptable performance to keep the network running smoothly.
+ Network security: The network should be as hard as possible for an attacker to disturb and the
administrators must have a plan to stop or mitigate different types of attacks real time.
P a g e | 32
+ Network management: network management is one of the most critical parts of any network
design. Network administrators must be able to reach and monitor all network devices all the
time specially in crisis times.
+ Network Troubleshooting: problems must be easy to troubleshoot and correct. The network
must be fully documented,standardized and follow the best practices as much as possible.
+ Network scalability: The network should be able to adapt to growth and business scalability
needs without having to make dramatic changes.
3. What advice and solution would you provide to the network for efficiency and usage.
- For many businesses, the hidden costs of dealing with a slow network can be like death by
a thousand paper cuts. Files take longer to send, cloud applications take longer to load,
calls are dropped, and everyone loses productivity waiting for tasks to finish.
- Because of the urgency of having a reliable network connection, many businesses are quick
to respond to the situation by throwing money at a network upgrade that may not work.
While the cost of fiber Internet is more affordable than ever, it’s still important to diagnose
alternative solutions to guarantee peak performance.
3.1. Determine that your network is at fault.
- Is your network actually slow, or do you just have slow computers? You can’t proscribe a cure
without knowing the disease, so it’s best not to leap to conclusions. Make sure that the
sluggish response time is more than just a localized issue before springing for an infrastructure
upgrade.
3.2. Offer guests a different network.
- Network slowdowns are sometimes the result of guest behavior. While it’s unlikely that a
single guest streaming a YouTube video in your lobby is the source of your troubles, you could
have problems if you frequently host a large number of guests who need Internet access.
Rather than risk them inadvertently slowing down your operations, offer them a login to a
P a g e | 33
guest network.
3.3. Educate personnel about user behavior.
- Employees need down time, and many choose to spend that time on their computers. If you
notice a slowdown during lunchtime every day, it could be because a couple coworkers have
taken the opportunity to boot up a video game or stream a show on Netflix. (Yes, it’s been
known to happen!) They probably aren’t even aware of the network resources they’re draining
during work hours, and are just trying to enjoy their lunch. Most will be happy to choose a
different lunch pastime if you take a moment to talk to them about network performance.
- Other personnel behavior that might be causing a slow down could involve poor file sharing
practices, such as emailing large PPT files to multiple contacts rather than editing them via a
shared cloud file. If you have employees frequently (and needlessly) sharing extra large files,
teaching them how to compress the files or how to use cloud drives can cut the strain they’re
placing on the network.
3.4. Use VLANs to segment low-priority traffic.
- VLANs (Virtual Local Area Networks) are an excellent way to partition your network resources
such that the most critical traffic receives the highest priority. Essentially, a VLAN offers the
benefits of a completely separate network, without having to rewire the entire office. You can
group VLANs based on computer use and function, even if they’re in separate parts of the
office.
- VLANs can also improve security by segmenting your systems from each other. That way, even
if one part of your network becomes compromised, the VLAN can act as a barrier, keeping
other parts of the network safe.
3.5. Check for viruses or system defects.
- Speaking of viruses, malware is known for slowing down networks and inhibiting workflows. If
you suspect your network slowdown might be the result of malicious network activity, you
should have an emergency IT specialist run a check on the situation right away.
P a g e | 34
- Slowdowns can also be the result of different network components growing old and defective.
It’s often relatively painless to replace these broken components, rather than upgrade the
entire network.
M3 Install and configure network services and applications on yourchoice.
1. What is the network server?
- A network server is a computer system, which is used as the central repository of data and various
programsthat are sharedby usersina network.If youhave a computerthat you're no longerusing due
to its slow speed, you can turn it into a network server for other computers in your household.
2. What is the network application?
- Computer network applications are network software applications that utilize the Internet or other
network hardware infrastructure to perform useful functions for example file transfers within a
network. They help us to transfer data from one point to another within the network.
3. Selectnetwork servicesand networkapplications inyour design.
- Networkservicesandnetworkapplications inthe designis server–PT web,server-PTSMTP,server-PT,
server-PTDNS,server-PTFPT.
Figure 24 Server room
P a g e | 35
4. Applicationscan be added to the network
- Some application thatcanbe addedto the network are Fax server,Game server,File server…..
Figure 25 New server room
D2 Design a maintenance schedule to support the networked system
1. Form and Time of Support
1.1.Forms of support:
- Online support:Use managementtools,accessandremote control tocheck and handle assoon as
problemsarise.
- Supportonsite:Come inplace tocheck andhandle casesthat cannotbe handledonline.
1.2.Time ofSupport
Service vomit Time of assistance Response time one site
1 Basic
- 08 hours / day, 05 days / week
from Monday to Friday.
- Not including holidays, New Year
- Inner Ho Chi Minh City: 2 working
hours
- Suburbs, neighborhoods: from 2
up to 4 working hours
P a g e | 36
2 Vip
- 12 hours / day, 06 days / week
from Monday to Saturday.
- Not including holidays, New Year
- Inner Ho Chi Minh City: 1 working hour
- Suburbs, neighborhoods: from 2
up to 4 working hours
P7 Implement a networked system based on a prepared design.
1. Show evidence of a working network you’ve design
Divice Interface IP address Subnet Mask Defaulgate way
PC student 1 Fa0 192.168.0.2 255.255.255.0 192.168.0.1
PC student 2 Fa0 192.168.0.3 255.255.255.0 192.168.0.1
PC student 3 Fa0 192.168.0.4 255.255.255.0 192.168.0.1
PC student 4 Fa0 192.168.0.5 255.255.255.0 192.168.0.1
PC student 5 Fa0 192.168.0.6 255.255.255.0 192.168.0.1
PC student 6 Fa0 192.168.0.7 255.255.255.0 192.168.0.1
… … … … …
PC student 50 Fa0 192.168.0.51 255.255.255.0 192.168.0.1
DNS Fa0 10.0.0.2 255.0.0.0 192.168.10.1
WEB Faa0 10.0.0.3 255.0.0.0 192.168.10.1
FPT Fa0 10.0.0.4 255.0.0.0 192.168.10.1
SMTP Fa0 10.0.0.5 255.0.0.0 192.168.10.1
Printer1 Fa0 10.0.0.8 255.0.0.0 10.0.0.1
Printer2 Fa0 10.0.0.9 255.0.0.0 10.0.0.1
Printer3 Fa0 10.0.0.10 255.0.0.0 10.0.0.1
Router 0
Se 2/0 128.128.0.1 255.255.0.0 N/A
Se3/0 172.172.0.2 255.255.0.0 N/A
Fa0/0 192.168.0.1 255.255.255.0 N/A
Router 1 Se2/0 10.0.0.2 255.0.0.0 N/A
P a g e | 37
Router 2
Se2/0 128.128.0.2 255.255.0.0 N/A
Fa0/0 192.10.16.1 255.255.0.0 N/A
Router 3
Se2/0 180.180.180.2 255.255.0.0 N/A
Se3/0 172.172.0.1 255.255.0.0 N/A
Fa0/0 192.172.172.1 255.255.255.0 N/A
Router 5
Se2/0 180.180.180.1 255.255.0.0 N/A
Se3/0 165.165.0.2 255.255.0.0 N/A
Fa0/0 192.186.186.1 255.255.0.0 N/A
Router 6
Se2/0 165.165.0.1 255.255.0.0 N/A
Se3/0 10.0.0.1 255.0.0.0 N/A
Fa0/0 192.190.190.1 255.255.0.0 N/A
PC staff 1 Fa0 192.10.16.2 255.255.255.0 192.10.16.1
PC staff 2 Fa0 192.10.16.3 255.255.255.0 192.10.16.1
PC staff 3 Fa0 192.10.16.4 255.255.255.0 192.10.16.1
PC staff 4 Fa0 192.10.16.5 255.255.255.0 192.10.16.1
PC staff 5 Fa0 192.10.16.6 255.255.255.0 192.10.16.1
PC staff 6 Fa0 192.10.16.7 255.255.255.0 192.10.16.1
… … … … …
PC staff 35 Fa0 192.10.16.36 255.255.255.0 192.10.16.1
PC6 Fa0 192.172.172.2 255.255.255.0 192.172.172.1
PC7 Fa0 192.172.172.3 255.255.255.0 192.172.172.1
PC8 Fa0 192.186.186.2 255.255.255.0 192.186.186.1
PC9 Fa0 192.186.186.3 255.255.255.0 192.186.186.1
PC10 Fa0 192.186.186.4 255.255.255.0 192.186.186.1
PC12 Fa0 192.190.190.2 255.255.255.0 192.190.190.1
PC13 Fa0 192.190.190.3 255.255.255.0 192.190.190.1
PC14 Fa0 192.190.190.4 255.255.255.0 192.190.190.1
2. Ping some device running the screen
P a g e | 38
- Ping PC student 1 to PC student 2
Figure 26 Ping PC student 1 to PC student 2
- PingPC student2 to PCstudent5
Figure 27 Ping PC student 2 to PC student 5
P a g e | 39
- PingPC student6 to PCDNS
Figure 28 Ping PC student 6 to PC DNS
- PingPC staff 1 to printer1
Figure 29 Ping PC staff 1 to printer 1
P a g e | 40
- PingPC 13 to PC10
Figure 30 Ping PC 13 to PC 10
- PingPC staff 2 to PC staff 5
Figure 31 Ping PC staff 2 to PC staff 5
P a g e | 41
3. Show me implemented system
- Run from PC student 2 to PC student 1
Figure 32 implemented system
P8 Document and analyze test results against expected results.
1. Provide a step by step configuration of network devices in the network(Choose a device in
the network and provide all the steps for configuration)
 Step 1: Open your Network Topology. Once you've opened your Network Topology on Cisco
Packet Tracer, access your network and identify the components of your network, for example;
Servers, Routers, End Devices, etc.
P a g e | 42
+ Choose the device
Figure 33Choose the device
+ Connection all of device
Figure 34 choose the connection
That is result :
Figure 35 Result step 1
 Step 2: Complete the cabling. Access the cables section and connect completely and
correctly the cables between the network in order to ensure connectivity between the
devices in the network using the connections table given.
P a g e | 43
+ Click on “ PC-PT PC0”
+ Click on “ desktop”
+ Click on “ IP configuration”
 Note: Default Gateway is IP configuration of step 3
Figure 36 Result step 2
Step 3: choose the device such as router, sever,……
+ Click on “ Router 1”
+ Click on “ CLI”
P a g e | 44
+ Click on “ Fastethernet 0/0” and completely
Figure 37 Result step 3
2. Test results against test plans
Figure 38 Test plan
P a g e | 45
- Reliesonatest that can transferdata backand forthbetweencomputers inaroom. In addition,you
can connectcomputersbetween2roomsand can connectto the serverroom.
M4 Recommend potential enhancements for the networked systems.
- 5G technology gives us tremendous technical capabilities in many industries as well as many
fields. The world has not seen a boom in the deployment of 5G infrastructure and services on a
national scale. This shows that there are still prudences in providing commercial 5G services as
they have with previous mobile technologies. Moreover, 5G applications and services are
tailor-made to each industry and country depending on the market or country's strategy.
Figure 39 Network 5G
 The benefits of 5G come from "endless" connectivity.
- The 5G network brings wireless transmission speeds dozens of times higher than the cellular
networks we use today, and the network capacity is also expanded, super-fast connectivity
with almost the same latency. 0, thereby bringing huge benefits when applied in practice,
especially in the era of industrial revolution 4.0 today.
P a g e | 46
- Verizon CEO Hans Vestberg shared this issue at CES 2019. According to Hans, there will be 8
issues that the 5G network can solve, these are:
 Mobility, Connected Devices, and the Internet of Things: 5G networks can transfer data up to
10TB per square kilometer in a unit of time, which in theory could allow 1 million IoT devices.
Working together on 1 square km, can maintain a connection on moving objects at a speed of
500km / h, thereby opening the future for the field of self-driving cars, smart cities, ...
 Energy, Efficiency, and Deployment: 5G networks promise to consume up to 90% less energy
than 4G networks, combined with fast connectivity, which helps to deploy 5G networks on a
large scale as well. will be significantly easier.
 Latency, Reliability: 5G network latency is reduced to just 1/1000 second, data travel time is in
less than a blink, thus increasing the reliability of the connection and the Deployment service
on 5G network.
Figure 40 Benefits of 5G
P a g e | 47
D3 Use critical reflection to evaluate own work and justify valid conclusions.
- The design solved the fundamental problem. The design rooms are student computer room,
staff computer room, marketing and administration staff, higher managers and network
administor. The rooms are expandable due to the network connection for the room like
student computer room and staff computer room. The remaining rooms can connect up to 20
computers. The rooms are connected each other, so higher manager room can manage the
remaining rooms. When the room has a problem, another room is not affected.
- Student computer room can connect more 30 computers and staff computer room can
connect more 40 computers. The remanining rooms can connect 15 computers, 1 access point
PT and 2 printers.
- The design has met the given requiremets and gave methods for expansion. It has limited in
the future risks and optimize the network design. The network is not secure and safe. in the
future, there will be measures to secure the system
P a g e | 48
REFERENCES
1. Wikipedia.Computer network.[ online] Available at: https://en.wikipedia.org/wiki/Computer_network
[Accessed20 July.2020]
2. BeginnersBook.Types of Computer Network: Lan, Man and Wan.[Online] Available at:
https://beginnersbook.com/2019/03/types-of-computer-network-lan-man-and-wan/ [Accessed20
July.2020]
3. WIKIPEDIA.Internet.[Online] Available at: https://en.wikipedia.org/wiki/Internet [Accessed20
July.2020]
4. NABAY.What isLocal AreaNetwork(LAN),AdvantagesandDisadcantages.[Online] Availableat:
https://snabaynetworking.com/what-is-local-area-network/ [Accessed20July.2020]
5. IT Release.Advantages and disadvantages of metropolitan area network(MAN).[Online] Available at:
https://www.itrelease.com/2018/09/advantages-and-disadvantages-of-metropolitan-area-network-man/
[Accessed20 July.2020]
6. CompTIA. What Is a Network Protocol, and How Does It work?.[Online] Available at:
https://www.comptia.org/content/guides/what-is-a-network-
protocol#:~:text=A%20network%20protocol%20is%20an,internal%20processes%2C%20structure%20or%20
design. [Accessed22July.2020]
7. Computer Hope.Standard.[Online] Available at:
https://www.computerhope.com/jargon/s/standard.htm#:~:text=A%20standard%20is%20a%20set,by%20a
cademic%20and%20industry%20contributors.&text=Common%20examples%20of%20standards%20include
,computer%20monitors%20and%20video%20adapters. [Accessed22July.2020]
8. Wikipedia.Listof technical standardorganizations.[online]Available at:
https://en.wikipedia.org/wiki/List_of_technical_standard_organizations [Accessed22July.2020]
9. Wschools. Types of Network Protocols and Their Uses.[Online] Available at:
P a g e | 49
https://www.w3schools.in/types-of-network-protocols-and-their-uses/ [Accessed22July.2020]
10. Wikipedia.Networktopoplogy.[Online] Available at: https://en.wikipedia.org/wiki/Network_topology
[Accessed22 July.2020]
11. BeginnersBook.ComputerNetworkTopology –Mesh,Star,Bus, Ringand Hybrid.[Online] Availableat:
https://beginnersbook.com/2019/03/computer-network-topology-mesh-star-bus-ring-and-hybrid/
[Accessed22 July.2020]
12. ComputerHope.Communications.[Online] Availableat:
https://www.computerhope.com/jargon/c/communic.htm#:~:text=Communications%20is%20the%20exch
ange%20of,two%20or%20more%20computing%20devices. [Accessed22July.2020]
13. Wikipedia.Bandwidth(computing).[Online] Available at:
https://en.wikipedia.org/wiki/Bandwidth_(computing) [Accessed22July.2020]
14. Circuit.Whatare the bandwidthrequirementsonmynetwork?.[Online] Availableat:
https://www.circuit.com/unifyportalfaqdetail?articleId=36901[Accessed22 July.2020]
15. Netwirx Bolg.NetworkDevicesExplained.[Online] Available at:
https://blog.netwrix.com/2019/01/08/network-devices-explained/[Accessed22July.2020]
16. NewHorizons.NETWORKSERVERTYPES EXPLAINED.[Online] Availableat:
https://www.nhgeorgia.com/blog/network-server-types-explained-6 [Accessed22 July.2020]
17. Wikipedia.Workstation.[Online]Available at:
https://en.wikipedia.org/wiki/Workstation#:~:text=A%20workstation%20is%20a%20special%20computer%
20designed%20for%20technical%20or%20scientific%20applications.&text=Typical%20workstations%20pre
viously%20employed%20proprietary,during%20the%201990s%20and%202000s. [Accessed22 July.2020]
18. Sdxcentral.What’s Networking Software?[Online] Available at:
https://www.sdxcentral.com/networking/sdn/definitions/networking-software/ [Accessed22 July.2020]
19. GeeksforGeeks.NetworkDevices( Hub,Repeater,Bridge,Switch,Router,GatewaysandBrouter).[Online]
Available at:https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-switch-router-
gateways/ [Accessed22July.2020]
20. JIMTHARIO: SOFTWAREENGINEER.EXPLAIN THE DIFFERENCEBETWEEN LOGICAL DESIGN ANDPHYSICAL
P a g e | 50
DESIGN OFA NETWORK.[Online] Availableat: https://www.thario.net/post/explain-the-difference-
between-logical-design-and-physical-design-of-anetwork/ [Accessed28 July.2020]
21. ScienDirect.UserRequierment.[Online]Available at:
https://www.sciencedirect.com/topics/engineering/user-
requirement#:~:text=User%20requirements%20are%20typically%20written,and%20what%20that%20user
%20expects. [Accessed28 July.2020]
22. TOTOLINK.Whatisthe TCP / IP protocol?Compare OSImodel withTCP/IP model.[Online].Availableat:
https://www.totolink.vn/article/32-giao-thuc-tcp-ip-la-gi-so-sanh-mo-hinh-osi-voi-mo-hinh-tcp-ip.html
[Accessed3August.2020]
23. Networkers-Online.NetworkDesignEvaluation.[Online] Availableat: https://www.networkers-
online.com/blog/2008/08/network-design-evaluation/ [Accessed3August.2020]
24. BrightlineIT.8Tips to Improve NetworkPerformanceInyourOfffice.[Online] Available at:
https://brightlineit.com/8-tips-to-improve-network-performance-in-your-office/ [Accessed3August.2020]
25. CISCO.IntroductiontoCiscoNetworkDesign.[Online] Available at:
https://www.ciscopress.com/articles/article.asp?p=25259&seqNum=6 [Accessed4August.2020]
26. Howstuffwork.Whatisthe networkserver? .[Online] Availableat:
https://computer.howstuffworks.com/what-is-network-
server.htm#:~:text=A%20network%20server%20is%20a,other%20computers%20in%20your%20household.
[Accessed21 August.2020]

More Related Content

What's hot

Best fit topology - lo1 part iii
Best fit topology - lo1 part iiiBest fit topology - lo1 part iii
Best fit topology - lo1 part iiiAbenezer Abiti
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masksswascher
 
Network devices
Network devicesNetwork devices
Network devicesAshok R
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application PerformanceShumon Huque
 
Configuration of ring topology in packet tracer by Tanjilur Rahman
Configuration of ring topology in packet tracer by Tanjilur RahmanConfiguration of ring topology in packet tracer by Tanjilur Rahman
Configuration of ring topology in packet tracer by Tanjilur RahmanTanjilurRahman6
 
SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMEILLEN IVY PORTUGUEZ
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal pptFrankNitty II
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKINGKiran Buriro
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING AYESHA JAVED
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IPMichael Lamont
 
Configure and administer server
Configure and administer serverConfigure and administer server
Configure and administer serverAbenezer Abiti
 
Network design
Network designNetwork design
Network designcsk selva
 
Computer networking short_questions_and_answers
Computer networking short_questions_and_answersComputer networking short_questions_and_answers
Computer networking short_questions_and_answersTarun Thakur
 
Ring Topology Design with Cisco Packet Tracer
Ring Topology Design with Cisco Packet TracerRing Topology Design with Cisco Packet Tracer
Ring Topology Design with Cisco Packet TracerMaksudujjaman
 
Network architecture
Network architectureNetwork architecture
Network architecturecsk selva
 

What's hot (20)

Best fit topology - lo1 part iii
Best fit topology - lo1 part iiiBest fit topology - lo1 part iii
Best fit topology - lo1 part iii
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
Chapter 2: Network Models
Chapter 2: Network ModelsChapter 2: Network Models
Chapter 2: Network Models
 
Network devices
Network devicesNetwork devices
Network devices
 
networking
networkingnetworking
networking
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application Performance
 
Guided Media
Guided MediaGuided Media
Guided Media
 
Configuration of ring topology in packet tracer by Tanjilur Rahman
Configuration of ring topology in packet tracer by Tanjilur RahmanConfiguration of ring topology in packet tracer by Tanjilur Rahman
Configuration of ring topology in packet tracer by Tanjilur Rahman
 
SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEM
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal ppt
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Configure and administer server
Configure and administer serverConfigure and administer server
Configure and administer server
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Network design
Network designNetwork design
Network design
 
Computer networking short_questions_and_answers
Computer networking short_questions_and_answersComputer networking short_questions_and_answers
Computer networking short_questions_and_answers
 
Ring Topology Design with Cisco Packet Tracer
Ring Topology Design with Cisco Packet TracerRing Topology Design with Cisco Packet Tracer
Ring Topology Design with Cisco Packet Tracer
 
Network architecture
Network architectureNetwork architecture
Network architecture
 

Similar to 1619_DANGANTHANH_GCS190644_AssignmentFull.docx

Assessment Details and Submission Guidelines Unit Co.docx
Assessment Details and Submission Guidelines Unit Co.docxAssessment Details and Submission Guidelines Unit Co.docx
Assessment Details and Submission Guidelines Unit Co.docxdavezstarr61655
 
CMIT 265 NETWORK DESIGN PAPER
CMIT 265 NETWORK DESIGN PAPERCMIT 265 NETWORK DESIGN PAPER
CMIT 265 NETWORK DESIGN PAPERHamesKellor
 
NSA Capstone Project III final pp
NSA Capstone Project III final ppNSA Capstone Project III final pp
NSA Capstone Project III final ppAlfonso Zamorano
 
CMIT 265 Education Redefined / snaptutorial.com
CMIT 265  Education Redefined / snaptutorial.comCMIT 265  Education Redefined / snaptutorial.com
CMIT 265 Education Redefined / snaptutorial.comMcdonaldRyan211
 
1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to solTatianaMajor22
 
Cs8581 networks lab manual 2017
Cs8581 networks lab manual   2017Cs8581 networks lab manual   2017
Cs8581 networks lab manual 2017Kayathri Devi D
 
Cmit 265 Success Begins / snaptutorial.com
Cmit 265 Success Begins / snaptutorial.comCmit 265 Success Begins / snaptutorial.com
Cmit 265 Success Begins / snaptutorial.comWilliamsTaylorza49
 
Melbourne t1 2016-assignment_2_mn504
Melbourne   t1 2016-assignment_2_mn504Melbourne   t1 2016-assignment_2_mn504
Melbourne t1 2016-assignment_2_mn504Sandeep Ratnam
 
Communication Networks.ppt
Communication Networks.pptCommunication Networks.ppt
Communication Networks.pptTheekshanMariK
 
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdf
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdfDigital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdf
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdfMathavan N
 
CSS NC II Module : Set-up Computer Networks
CSS NC II Module : Set-up Computer NetworksCSS NC II Module : Set-up Computer Networks
CSS NC II Module : Set-up Computer NetworksEric Talamisan
 
Cmit 265 Effective Communication / snaptutorial.com
Cmit 265 Effective Communication / snaptutorial.comCmit 265 Effective Communication / snaptutorial.com
Cmit 265 Effective Communication / snaptutorial.comStokesCope37
 
Networking TechnologyNQF Level 5Assignment 1 (of.docx
Networking TechnologyNQF Level 5Assignment 1 (of.docxNetworking TechnologyNQF Level 5Assignment 1 (of.docx
Networking TechnologyNQF Level 5Assignment 1 (of.docxrosemarybdodson23141
 
Design and Simulation of Local Area Network Using Cisco Packet Tracer
Design and Simulation of Local Area Network Using Cisco Packet TracerDesign and Simulation of Local Area Network Using Cisco Packet Tracer
Design and Simulation of Local Area Network Using Cisco Packet TracerAbhi abhishek
 

Similar to 1619_DANGANTHANH_GCS190644_AssignmentFull.docx (20)

IT6511 Networks Laboratory
IT6511 Networks LaboratoryIT6511 Networks Laboratory
IT6511 Networks Laboratory
 
Assessment Details and Submission Guidelines Unit Co.docx
Assessment Details and Submission Guidelines Unit Co.docxAssessment Details and Submission Guidelines Unit Co.docx
Assessment Details and Submission Guidelines Unit Co.docx
 
CMIT 265 NETWORK DESIGN PAPER
CMIT 265 NETWORK DESIGN PAPERCMIT 265 NETWORK DESIGN PAPER
CMIT 265 NETWORK DESIGN PAPER
 
Mini Project- Implementation & Evaluation Of Wireless La Ns
Mini Project- Implementation & Evaluation Of Wireless La NsMini Project- Implementation & Evaluation Of Wireless La Ns
Mini Project- Implementation & Evaluation Of Wireless La Ns
 
NSA Capstone Project III final pp
NSA Capstone Project III final ppNSA Capstone Project III final pp
NSA Capstone Project III final pp
 
Cn lab manual sb 19_scsl56 (1)
Cn lab manual sb 19_scsl56 (1)Cn lab manual sb 19_scsl56 (1)
Cn lab manual sb 19_scsl56 (1)
 
CMIT 265 Education Redefined / snaptutorial.com
CMIT 265  Education Redefined / snaptutorial.comCMIT 265  Education Redefined / snaptutorial.com
CMIT 265 Education Redefined / snaptutorial.com
 
1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol
 
Cs8581 networks lab manual 2017
Cs8581 networks lab manual   2017Cs8581 networks lab manual   2017
Cs8581 networks lab manual 2017
 
Cmit 265 Success Begins / snaptutorial.com
Cmit 265 Success Begins / snaptutorial.comCmit 265 Success Begins / snaptutorial.com
Cmit 265 Success Begins / snaptutorial.com
 
Melbourne t1 2016-assignment_2_mn504
Melbourne   t1 2016-assignment_2_mn504Melbourne   t1 2016-assignment_2_mn504
Melbourne t1 2016-assignment_2_mn504
 
Communication Networks.ppt
Communication Networks.pptCommunication Networks.ppt
Communication Networks.ppt
 
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdf
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdfDigital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdf
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdf
 
CSS NC II Module : Set-up Computer Networks
CSS NC II Module : Set-up Computer NetworksCSS NC II Module : Set-up Computer Networks
CSS NC II Module : Set-up Computer Networks
 
finalwithrec4
finalwithrec4finalwithrec4
finalwithrec4
 
Cmit 265 Effective Communication / snaptutorial.com
Cmit 265 Effective Communication / snaptutorial.comCmit 265 Effective Communication / snaptutorial.com
Cmit 265 Effective Communication / snaptutorial.com
 
FinalDocument
FinalDocumentFinalDocument
FinalDocument
 
GRE & Computer Network.
GRE & Computer Network.GRE & Computer Network.
GRE & Computer Network.
 
Networking TechnologyNQF Level 5Assignment 1 (of.docx
Networking TechnologyNQF Level 5Assignment 1 (of.docxNetworking TechnologyNQF Level 5Assignment 1 (of.docx
Networking TechnologyNQF Level 5Assignment 1 (of.docx
 
Design and Simulation of Local Area Network Using Cisco Packet Tracer
Design and Simulation of Local Area Network Using Cisco Packet TracerDesign and Simulation of Local Area Network Using Cisco Packet Tracer
Design and Simulation of Local Area Network Using Cisco Packet Tracer
 

Recently uploaded

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 

Recently uploaded (20)

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 

1619_DANGANTHANH_GCS190644_AssignmentFull.docx

  • 1. Higher Nationals in Computing Unit 2: Networking Assignment Learner’s name:DANGANTHANH ID: GCS190644 Class:GCS0805_PPT Subject code: 1619 Assessor name:PHANMINH TAM Assignment due: Assignment submitted:
  • 2. ASSIGNMENT FRONT SHEET Qualification BTEC Level 5 HND Diploma in Computing Unit number and title Unit 2: Networking Submission date 17/8/2020 Date Received 1st submission Re-submission Date Date Received 2nd submission Student Name Dang An Thanh Student ID GCS190644 Class GCS0805_PPT Assessorname Phan Minh Tam Student declaration I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that making a false declaration is a form of malpractice. Student’s signature Thanh Grading grid P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 D1 D2 D3
  • 3.  Summative Feedback:  Resubmission Feedback: Grade: AssessorSignature: Date: Signature & Date:
  • 4. ASSIGNMENT BRIEF Qualification BTEC Level 5 HND Diploma in Computing Unit number Unit 2: Networking Assignment title NetworkingInfrastructure Academic Year Unit Tutor TamPM Issue date Submission date IV name and date Khoa Canh Nguyen, Nhung, Michael Omar 9th/01/2020 Submission format Part 1 The submission is in the form of an individual written report. This should be written in a concise, formal business style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all work must be supported with research and referenced using the Harvard referencing system. Please also provide a bibliography using the Harvard referencing system. The recommended word limit is 2,000–2,500 words, although you will not be penalized for exceeding the total word limit. Part 2 The submission is in the form of an individual evidence portfolio.  A LAN design plan and blueprint and justification document.
  • 5.  A fully completed test plan including an evaluation of results and recommendations for improvements to LAN.  A proposed and justified maintenance schedule. Part 3  Evidence of an implemented network. You are required to make use of headings, paragraphs, subsections and illustrations as appropriate, and all work must be supported with research and referenced using the Harvard referencing system. Unit Learning Outcomes LO1: Examine networking principles and their protocols. LO 2: Explain networking devices and operations. LO3: Design efficient networked systems. LO4: Implement and diagnose networked systems. Assignment Brief You are employed as a Network Engineer by Nguyen Networking Limited, a high-tech networking solution development company, which have branches in Ho Chi Min City, Hanoi, Da Nang and Can Tho. The company has been contracted to implement a networking project from a local educational institute. The specification of the project is given below: People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers including the head of academics and the programme manager, 3 computer network
  • 6. administrators. Resources: 50 student lab computers, 35 staff computers, 3 printers Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located on the first floor and another located on the second floor As a first task, the CEO of the company Mr. Nguyen has asked you to investigate and explain networking principles, protocols and devices and submit a report. Part 1 You will need to produce a report that includes the following: 1. An introduction to provide an overview of your report. 2. Benefits and constraints of different types of networks and networking standards. 3. The impact of network topology, speed of communication and bandwidth requirements. 4. Effectiveness of networking systems. 5. Discussion on operating principles of networking devices and server types and networking software. 6. Discuss the relationship of workstation hardware with networking software. 7. Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization. 8. For the given specification, identify the topology protocol for the efficient utilization of a networking system. The CEO Mr. Nguyen is happy with your first report and now he has asked you to analyze the specification from the institution, as given earlier. You need to design and implement the networking project within a given timeframe: Part 2 Design efficient networked systems 1. Prepare a written step-by-step plan of how you are going to design a Local Area Network
  • 7. including a blueprint of your LAN. 2. Justify your choice of devices for your network design. 3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per user specifications. 4. Justify the security requirements and quality of services needed for selection of accessories. 5. Suggest a maintenance schedule to support the networked system. Part 3 Implement test and diagnose networked systems 1. Implement a networked systembased on your prepared design. 2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc. 3. Record the test results and analyze these against expected results. 4. Investigate what functionalities would allow the systemto support device growth and the addition of communication devices. 5. Discuss the significance of upgrades and security requirements in your recommendations.
  • 8. ASSESMENT CRITERIA Learning Outcomes and Assessment Criteria Pass Merit Distinction LO1 Examine networking principles and their protocols LO1 & 2 D1 Considering a given scenario, identify the topology protocol selected for the efficient utilization of a networking system. P1 Discuss the benefits and constraints of different network types and standards. P2 Explain the impact of network topology, communication and bandwidth requirements. M1 Compare common networking principles and how protocols enable the effectiveness of networked systems. LO2 Explain networking devices and operations P3 Discuss the operating principles of networking devices and server types. P4 Discuss the inter-dependence of workstation hardware with relevant networking software. M2 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimisation. LO3 Design efficient networked systems P5 Provide a logical/physical design of the networked systemwith clear explanation and addressing table. P6 Evaluate the design to meet the requirements. M3 Install and configure network services and applications on your choice. D2 Design a maintenance schedule to support the networked system. LO4 Implement and diagnose networked systems P7 Implement a networked system based on a prepared design. P8 Document and analyse test results against expected results. M4 Recommend potential enhancements for the networked systems. D3 Use critical reflection to evaluate own work and justify valid conclusions.
  • 9. Table of Contents Unit 2: Networking Assignment..................................................................................................................... 1 INTRODUCTION TO NETWORKING................................................................................................................ 1 P1 Discuss the benefits and constraints of different network types and standards. ........................................ 1 1. What is the network?............................................................................................................................ 1 2. Network type ( LAN,MAN, INTERNET, ect….).......................................................................................... 2 2.1. LAN ( Local Area Network) ................................................................................................................. 2 2.2. MAN ( Metropolitan Area Network)................................................................................................... 3 2.3. INTERNET ( International Network).................................................................................................... 4 2.4. Benefit of networking............................................................................................................. 4 2.4.1. Advantages of LAN................................................................................................................. 4 2.4.2. Advantages of MAN ............................................................................................................... 5 2.4.3. Advantages of WAN ............................................................................................................... 5 2.5. Protocol and Standards...................................................................................................................... 6 2.5.1. Define Standards.................................................................................................................... 6 2.5.2. List some protocols................................................................................................................ 6 2.5.3. List some standard organizations and standards names .......................................................... 6 P2. Network topology & communication and Bandwidth requirements......................................................... 7 1. What is Network topology ?.................................................................................................................. 7 1.1. Network topology definition.............................................................................................................. 7 2. Denifition of Physical & Logical Topology............................................................................................... 8 2.1. Denifition of Physical Topology.......................................................................................................... 8 2.2. Denifition of Logical Topology............................................................................................................ 9 2.3. Examples of topology with diagrams ( Mesh, Star, Bus, Ring, Tree, Hyprib) ........................................10 2.3.1. Mesh Topology......................................................................................................................10 2.3.2. Star Topology........................................................................................................................11 2.3.3. Bus Topology ........................................................................................................................12 2.3.4. Ring Topology.......................................................................................................................13 2.3.5. Hibrib Topology.....................................................................................................................14 3. Comunication and Bandwidth..............................................................................................................15 3.1. Comunication...................................................................................................................................15 3.1.1. Define commutations in terms of networking .......................................................................15
  • 10. 3.1.2. Rules of communication........................................................................................................15 3.2. Bandwidth........................................................................................................................................16 M1 Compare common networkingprinciplesand how protocols enable the effectivenessofnetworked systems.......................................................................................................................................................16 1. What is the TCP / IP protocol ? .............................................................................................................16 1.1. The most popular TCP / Ip protocols..................................................................................................17 2. What is the OSI model?........................................................................................................................18 3. Compare OSI model with TCP / IP model ..............................................................................................19 P3 Discuss the operating principles of networking devices and server types..................................................20 1. Discuss 1 or 2 operating principles of a selected network device ...........................................................20 1.1. Repeater..........................................................................................................................................20 2.2. Hub ..................................................................................................................................................21 2. List network devices.............................................................................................................................22 3. List server types...................................................................................................................................22 P4 Discuss the inter-dependence of workstation hardware with relevant networking software.....................22 1. Define workstation hardware...............................................................................................................22 2. Define networking software.................................................................................................................23 3. Discuss and explainthe interdepenciesofworkstationhardware with networkingsoftware. Derive an example form your discussion .....................................................................................................................23 M2 Explore a range of servertypes and justifythe selectionofa server,consideringa given scenario regarding cost and performance optimization..............................................................................................24 1. Some types of server........................................................................................................................24 2. Determining Your Networking Requirements ....................................................................................26 D1 Consideringa givenscenario,identifythe topology protocol selectedforthe efficientutilizationofa networking system......................................................................................................................................26 P5 Provide a logical/physical design of the networked system with clear explanation and addressing table ..26 1. Explain the difference between logical and physical design...................................................................26 1.1. What is logical of the networked systen?...........................................................................................26 1.2. What is physical design of the networked system? ...........................................................................27 2. Discuss and explain the USER Requirement for the design.....................................................................28 3. Provide a logical design of the network base on user reuirement ..........................................................29 P6 Evaluate the design to meet the requirements. ......................................................................................31 1. Design evaluation:...............................................................................................................................31 2. Evaluate the design of the network......................................................................................................31 3. What advice and solution would you provide to the network for efficiency and usage...........................32
  • 11. 3.1. Determine that your network is at fault. ...........................................................................................32 3.2. Offer guests a different network. ......................................................................................................32 3.3. Educate personnel about user behavior.............................................................................................33 3.4. Use VLANs to segment low-priority traffic.........................................................................................33 3.5. Check for viruses or system defects...................................................................................................33 M3 Install and configure network services and applications on your choice..................................................34 1. What is the network server?................................................................................................................34 2. What is the network application?.........................................................................................................34 3. Select network services and network applications in your design..........................................................34 4. Applications can be added to the network............................................................................................35 D2 Design a maintenance schedule to support the networked system..........................................................35 1. Form and Time of Support....................................................................................................................35 1.1. Forms of support:.............................................................................................................................35 1.2. Time of Support................................................................................................................................35 P7 Implement a networked system based on a prepared design...................................................................36 1. Show evidence of a working network you’ve design .............................................................................36 2. Ping some device running the screen....................................................................................................37 3. Show me implemented system.............................................................................................................41 P8 Document and analyze test results against expected results....................................................................41 1. Provide a stepby step configurationof network devicesinthe network(Choose a device in the network and provide all the steps for configuration)..................................................................................................41 2. Test results against test plans...............................................................................................................44 M4 Recommend potential enhancements for the networked systems..........................................................45 D3 Use critical reflection to evaluate own work and justify valid conclusions................................................47 REFERENCES................................................................................................................................................48
  • 12. Table of Figures Figure 1 Network.......................................................................................................................................... 2 Figure 2 Network type................................................................................................................................... 2 Figure 3 LAN ( Local Area Network)................................................................................................................ 3 Figure 4 MAN (Metropolitan Area Network)................................................................................................... 3 Figure 5 INTERNET ( Internetnational Network).............................................................................................. 4 Figure 6 Network Topology............................................................................................................................ 8 Figure 7 Physical Topologies.......................................................................................................................... 8 Figure 8 Logical Topology .............................................................................................................................. 9 Figure 9 Mesh Topology...............................................................................................................................10 Figure 10 Star Topology................................................................................................................................11 Figure 11 Bus Topology ................................................................................................................................12 Figure 12 Ring Topology...............................................................................................................................13 Figure 13 Hibrib Topology.............................................................................................................................14 Figure 14 TCP/IP Model................................................................................................................................17 Figure 15 the most popular TCP / Ip protocols...............................................................................................18 Figure 16 OSI Basic Reference Model ............................................................................................................19 Figure 17 Compare OSI & TCP/IP...................................................................................................................20 Figure 18 Repeater.......................................................................................................................................21 Figure 19 Hub ..............................................................................................................................................21 Figure 20 workstation ..................................................................................................................................23 Figure 21 Logical of networked system..........................................................................................................27 Figure 22 Physical of networked system........................................................................................................28 Figure 23 Result of the design.......................................................................................................................30 Figure 24 Server room..................................................................................................................................34 Figure 25 New server room ..........................................................................................................................35 Figure 26 Ping PC student 1 to PC student 2 ..................................................................................................38 Figure 27 Ping PC student 2 to PC student 5 ..................................................................................................38 Figure 28 Ping PC student 6 to PC DNS ..........................................................................................................39 Figure 29 Ping PC staff 1 to printer 1 ............................................................................................................39 Figure 30 Ping PC 13 to PC 10 .......................................................................................................................40 Figure 31 Ping PC staff 2 to PC staff 5............................................................................................................40 Figure 32 implemented system.....................................................................................................................41 Figure 33Choose the device..........................................................................................................................42 Figure 34 choose the connection ..................................................................................................................42 Figure 35 Result step 1.................................................................................................................................42 Figure 36 Result step 2.................................................................................................................................43 Figure 37 Result step 3.................................................................................................................................44 Figure 38 Test plan.......................................................................................................................................44
  • 13. Figure 39 Network 5G ..................................................................................................................................45 Figure 40 Benefits of 5G...............................................................................................................................46
  • 14. P a g e | 1 ASSIGNMENT 1 ANSWERS INTRODUCTION TO NETWORKING Networking is referred as connecting computers electronically for the purpose of sharing information . Resources such as files , applications , printers and software are common information shared in a networking . The advantage of networking can be seen clearly in terms of security , efficiency , manageability and cost effectiveness as it allows collaboration between users in a wide range . Basically , network consists of hardware component such as computer , hubs , switches , routers and other devices which form the network infrastructure . These are the devices that play an important role in data transfer from one place to another using different technology such as radio waves and wires . There are many types of network available in the networking industries and the most common network are Local Area Network ( LAN ) and Wide Area Network ( WAN ) .LAN network is made up of two or more computers connected together in a short distance usually at home , office buildings or school . WAN is a network that covers wider area than LAN and usually covers cities , countries and the whole world . Several major LAN can be connect together to form a WAN . As several devices are connected to network , it is important to ensure data collision does not happened when this devices attempt to use date channel simultaneously. A set of rules called Carrier Sense Multiple Access / Collision detection are used to detect and prevent collision in networks. P1 Discuss the benefits and constraints of different network types and standards. 1. What is the network? - A computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes. The interconnections between nodes are formed from a broad spectrum of telecommunication network technologies, based on physically wired, optical, and wireless radio-frequency methods that may be arranged in a variety of network topologies.
  • 15. P a g e | 2 Figure 1 Network 2. Network type ( LAN,MAN, INTERNET, ect….) - There are three types of computer networks. Figure 2 Network type 2.1. LAN ( Local Area Network) - Local area network is a group of computers connected with each other in a small places such as school, hospital, apartment etc. - LAN is secure because there is no outside connection with the local area network thus the data which is shared is safe on the local area network and can’t be accessed outside. - LAN due to their small size are considerably faster, their speed can range anywhere from
  • 16. P a g e | 3 100 to 100Mbps. - LANs are not limited to wire connection, there is a new evolution to the LANs that allows local area network to work on a wireless connection. Figure 3 LAN ( Local Area Network) 2.2. MAN ( Metropolitan Area Network) - MAN network covers larger area by connections LANs to a larger network of computers. In Metropolitan area network various Local area networks are connected with each other through telephone lines. The size of the Metropolitan area network is larger than LANs and smaller than WANs(wide area networks), a MANs covers the larger area of a city or town. Figure 4 MAN (Metropolitan Area Network)
  • 17. P a g e | 4 2.3. INTERNET ( International Network) - The Internet is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a network of networks that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony, and file sharing. Figure 5 INTERNET ( Internetnational Network) 2.4. Benefit of networking 2.4.1. Advantages of LAN  Data Security : Data security is easy in LAN because all the computers are connected to the server system and all the data is stored at one place in the server so easy to maintain secured too.
  • 18. P a g e | 5  Software Applications Sharing : As we know all computers are connected to the server so it can also share application licensing software with them. It is not required to licensing each computer individually. All worked on only one licensed system.  Internet Sharing : LANs also provided an advantage of cheaper cost on internet connection. As the single interconnection is required for the server system and all the other computers are worked with that connection.  Easy and Cheap Communication : All the data and files are shared easily in LAN because all the data has stored in a server so it is shared easily, fast and secured. Hence, also save a lot of time and money. 2.4.2. Advantages of MAN  Less expensive: It is less expensive to attach MAN with WAN. MAN gives the good efficiency of data. In MAN data is easily managed in a centralized way.  Sending local emails: On MAN you can send local emails fast and free.  High speed than WAN: MAN uses fiber optics so the speed of data can easily reach upon 1000 Mbps. Files and databases can be transferred fast.  Sharing of the internet: In some installation of MANs, users can share their internet connection. So multiple users can get the same high-speed internet.  Conversion from LAN to MAN is easy: MAN is a faster way to connect two fast LANs together. This is due to the fast configuration of links.  High Security: MAN has a high-security level than WAN. 2.4.3. Advantages of WAN  Sharing devices such as printers saves money.  Site (software) licences are likely to be cheaper than buying several standalone licences.  Files can easily be shared between users.  Network users can communicate by email and instant messenger.  Security is good - users cannot see other users' files unlike on stand-alone machines.
  • 19. P a g e | 6  Data is easy to backup as all the data is stored on the file server. 2.5. Protocol and Standards 2.5.1. Define Standards - A standard is a set of specifications for hardware or software, agreed upon by academic and industry contributors. A standard makes it possible for many manufacturers to create products that are compatible with each other. Standards may be set by official organizations, or unofficially set, established by common use. Common examples of standards include multiple IEEE standards for electrical interfaces (computer cables), ANSI for programming languages, and VESA for computer monitors and video adapters. 2.5.2. List some protocols - There are various types of protocols that support a major and compassionate role in communicating with different devices across the network. These are: + Transmission Control Protocol (TCP) + Internet Protocol (IP) + User DatagramProtocol (UDP) + Post office Protocol (POP) + Simple mail transport Protocol (SMTP) + File Transfer Protocol (FTP) + Hyper Text Transfer Protocol (HTTP) + Hyper Text Transfer Protocol Secure (HTTPS) 2.5.3. List some standard organizations and standards names  3GPP – 3rd Generation Partnership Project  3GPP2 – 3rd Generation Partnership Project 2  ABYC – The American Boat & Yacht Council (ABYC is an international organization, despite its name)
  • 20. P a g e | 7  Accellera – Accellera Organization  A4L – Access for Learning Community (formerly known as the Schools Interoperability Framework)  AES – Audio Engineering Society  AHRI - Air-conditioning, Heating, and Refrigeration Institute  AIIM – Association for Information and Image Management  ASAM – Association for Automation and Measuring Systems  ASHRAE – American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE is an international organization, despite its name)  ASME – American Society of Mechanical Engineers  ASTM International P2. Network topology & communication and Bandwidth requirements 1. What is Network topology ? 1.1. Network topology definition. - Network topology is the arrangement of the elements (links, nodes, etc.) of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks. - Network topology is the topological structure of a network and may be depicted physically or logically. It is an application of graph theory wherein communicating devices are modeled as nodes and the connections between the devices are modeled as links or lines between the nodes.
  • 21. P a g e | 8 Figure 6 Network Topology 2. Denifition of Physical & Logical Topology 2.1. Denifition of Physical Topology - Physical topology is the placement of the various components of a network (e.g., device location and cable installation), while logical topology illustrates how data flows within a network. Distances between nodes, physical interconnections, transmission rates, or signal types may differ between two different networks, yet their logical topologies may be identical. A network’s physical topology is a particular concern of the physical layer of the OSI model. Figure 7 Physical Topologies
  • 22. P a g e | 9 2.2. Denifition of Logical Topology - Logical topology is the arrangement of devices on a computer network and how they communicate with one another.[1] Logical topologies describe how signals act on the network. - In contrast, a physical topology defines how nodes in a network are physically linked and includes aspects such as geographic location of nodes and physical distances between nodes. The logical topology defines how nodes in a network communicate across its physical topology. The logical topology can be considered isomorphic to the physical topology, as vice versa. - Early twisted pair Ethernet with a single hub is a logical bus topology with a physical star topology. While token ring is a logical ring topology with a physical star topology. Figure 8 Logical Topology
  • 23. P a g e | 10 2.3. Examples of topology with diagrams ( Mesh, Star, Bus, Ring, Tree, Hyprib) 2.3.1. Mesh Topology. - In mesh topology each device is connected to every other device on the network through a dedicated point-to-point link. When we say dedicated it means that the link only carries data for the two connected devices only. Lets say we have n devices in the network then each device must be connected with (n-1) devices of the network. Number of links in a mesh topology of n devices would be n(n-1)/2.  Advantages of Mesh topology - No data traffic issues as there is a dedicated link between two devices which means the link is only available for those two devices. - Mesh topology is reliable and robust as failure of one link doesn’t affect other links and the communication between other devices on the network. - Mesh topology is secure because there is a point to point link thus unauthorized access is not possible. Figure 9 Mesh Topology
  • 24. P a g e | 11 - Fault detection is easy.  Disadvantages of Mesh topology - Amount of wires required to connected each system is tedious and headache - Since each device needs to be connected with other devices, number of I/O ports required must be huge. - Scalability issues because a device cannot be connected with large number of devices with a dedicated point to point link. 2.3.2. Star Topology - In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology, star topology doesn’t allow direct communication between devices, a device must have to communicate through hub. If one device wants to send data to other device, it has to first send the data to hub and then the hub transmit that data to the designated device.  Advantages of Star topology - Less expensive because each device only need one I/O port and needs to be connected with hub with one link. Figure 10 Star Topology
  • 25. P a g e | 12 - Easier to install - Less amount of cables required because each device needs to be connected with the hub only. - Robust, if one link fails, other links will work just fine. - Easy fault detection because the link can be easily identified.  Disadvantages of Star topology - If hub goes down everything goes down, none of the devices can work without hub. - Hub requires more resources and regular maintenance because it is the central system of star topology. 2.3.3. Bus Topology - In bus topology there is a main cable and all the devices are connected to this main cable through drop lines. There is a device called tap that connects the drop line to the main cable. Since all the data is transmitted over the main cable, there is a limit of drop lines and the distance a main cable can have.  Advantages of bus topology - Easy installation, each cable needs to be connected with backbone cable. - Less cables required than Mesh and star topology Figure 11 Bus Topology
  • 26. P a g e | 13  Disadvantagesof bustopology - Difficultly in fault detection. - Not scalable as there is a limit of how many nodes you can connect with backbone cable. 2.3.4. Ring Topology - In ring topology each device is connected with the two devices on either side of it. There are two dedicated point to point links a device has with the devices on the either side of it. This structure forms a ring thus it is known as ring topology. If a device wants to send data to another device then it sends the data in one direction, each device in ring topology has a repeater, if the received data is intended for other device then repeater forwards this data until the intended device receives it. Figure 12 Ring Topology
  • 27. P a g e | 14  Advantages of Ring Topology - Easy to install. - Managing is easier as to add or remove a device from the topology only two links are required to be changed.  Disadvantages of Ring Topology - A link failure can fail the entire network as the signal will not travel forward due to failure. - Data traffic issues, since all the data is circulating in a ring. 2.3.5. Hibrib Topology - A combination of two or more topology is known as hybrid topology. For example a combination of star and mesh topology is known as hybrid topology. Figure 13 Hibrib Topology  Advantagesof Hybridtopology - We can choose the topology based on the requirement for example, scalability is our concern then we can use star topology instead of bus technology. - Scalable as we can further connect other computer networks with the existing networks with different topologies.
  • 28. P a g e | 15  Disadvantagesof Hybridtopology - Fault detection is difficult.Installation is difficult. - Design is complex so maintenance is high thus expensive. 3. Comunication and Bandwidth 3.1. Comunication 3.1.1. Define commutations in terms of networking - Communications is the exchange of information between two or more things, such as people, devices, governments, organizations, or businesses. In digital communication, data is exchanged between two or more computing devices. This data communication (datacom) occurs over a communication medium, such as a telephone line, fiber optic cable, or wireless radio signal. The collection of digital devices and their connection media is a computer network and is what allows devices to "talk" to each other. The following are examples of digital communications:  Transferring data from one computer to another over a network. With this form of communication, data transmits as a packet over a network connection from a sender to a receiver using a protocol.  Sending text messages between mobile devices.  Sending and receiving an e-mail.  Collaborating on shared documents and spreadsheets.  Voice chat or calls with other people over the Internet, using VoIP software.  Video call or conferencing with other people over the Internet, using VoIP software. 3.1.2. Rules of communication  Access method  Allowed physical topologies
  • 29. P a g e | 16  Types of cabling  Speed of data transfer. 3.2. Bandwidth - Bandwidth is the maximum rate of data transfer across a given path. Bandwidth may be characterized as network bandwidth, data bandwidth,] or digital bandwidth. - This definition of bandwidth is in contrast to the field of signal processing, wireless communications, modem data transmission, digital communications, and electronics, in which bandwidth is used to refer to analog signal bandwidth measured in hertz, meaning the frequency range between lowest and highest attainable frequency while meeting a well- defined impairment level in signal power. The actual bit rate that can be achieved depends not only on the signal bandwidth but also on the noise on the channel. M1 Compare common networking principles and how protocols enable the effectiveness of networked systems. 1. What is the TCP / IP protocol ? - The TCP / IP protocol is divided into 4 network layers: + Application layer: The mission of this layer is to provide standardized data exchange and applications. The application layer includes many specific protocols such as HTTP, FTP, POP3, SMTP, and SNMP. Each of these protocols will have specific functions and tasks. + Network layer: This floor is also known as the internet layer. The task of the internet layer is to process packets, then connect to independent networks to transport encrypted data packets across network boundaries. The internet layer also includes many protocols such as IP and ICMP. + Transport layer: The mission of the transport layer is to maintain end-to-end communication throughout the network. The transport layer includes TCP and UDP protocols. In many cases the UDP protocol will be replaced by TCP. + Physical layer: The protocols operating on this layer are Ethernet, ARP. For Ethernet often used for LAN local area.
  • 30. P a g e | 17 Figure 14 TCP/IP Model 1.1. The most popular TCP / Ip protocols - Currently, TCP / IP has many protocols, but the three most commonly used are HTTP, HTTPS and FTP. + HTTP protocol: this protocol is used to transfer unsafe data between a web client and a web server. How this protocol works is very simple. First, a web client will send a request to the web server to view a website or news. Upon receiving the request, the server sends the answer back to the web client.
  • 31. P a g e | 18 + HTTPS protocol: this protocol is used to transfer data securely between a web client and a web server. This transaction is usually used to send credit card transaction data or personal information from the web client to the web server. + FTP protocol : This protocol does not limit the number of computers. That is, a computer can send data to one or many different computers directly. Figure 15 the most popular TCP / Ip protocols 2. What is the OSI model? - The OSI model is also known as the reference model connecting open systems. This model has been developed as part of the Open Systems Interconnection plan initiated by ISO and IUT-T. - This model divides network interface into 7 layers. Grades 1 through 4 are lower-level classes and only perform data migration tasks. Grades 5 through 7 belong to the advanced classes. Each class will perform a specific task that will then forward data to the next layer.
  • 32. P a g e | 19 Figure 16 OSI Basic Reference Model 3. Compare OSI model with TCP / IP model - Compared to the OSI model, the TCP / IP protocol is more trusted and used. Because according to the concept, the OSI model is only an old model, a tool for reference. The TCP / IP protocol, in contrast, allows loosening of rules and provides general rules. - In terms of approach, TCP / IP approaches horizontally, while OSI approaches vertically. - The biggest difference between these two protocols is probably the combination of layers. For TCP / IP protocols, the session layer and the presentation layer are combined in the application layer. As for the OSI model, each different tier will perform a different task. - In terms of design, the protocols in TCP / IP were designed first and then developed. In contrast, in OSI, the model is developed first and then the protocol developed.
  • 33. P a g e | 20 Figure 17 Compare OSI & TCP/IP P3 Discuss the operating principles of networking devices and server types. 1. Discuss 1 or 2 operating principles of a selected networkdevice 1.1. Repeater – A repeater operates at the physical layer. Its job is to regenerate the signal over the same network before the signal becomes too weak or corrupted so as to extend the length to which the signal can be transmitted over the same network. An important point to be noted about repeaters is that they do not amplify the signal. When the signal becomes weak, they copy the signal bit by bit and regenerate it at the original strength. It is a 2 port device.
  • 34. P a g e | 21 Figure 18 Repeater 2.2. Hub –A hub is basically a multiport repeater. A hub connects multiple wires coming from different branches, for example, the connector in star topology which connects different stations. Hubs cannot filter data, so data packets are sent to all connected devices. In other words, collision domain of all hosts connected through Hub remains one. Also, they do not have intelligence to find out best path for data packets which leads to inefficiencies and wastage. Figure 19 Hub
  • 35. P a g e | 22  Types of Hub  Active Hub:- These are the hubs which have their own power supply and can clean, boost and relay the signal along with the network. It serves both as a repeater as well as wiring centre. These are used to extend the maximum distance between nodes.  Passive Hub :- These are the hubs which collect wiring from nodes and power supply from active hub. These hubs relay signals onto the network without cleaning and boosting them and can’t be used to extend the distance between nodes. 2. List network devices. - Here is the common network device list:  Hub  Switch  Router  Bridge  Gateway  Modem  Repeater  Access Point 3. List server types  Application Servers  Client Servers  Collaboration Servers  FTP Servers  List Servers  Mail Servers  Open Source Servers  Proxy Servers  Real-Time Communication Servers P4 Discuss the inter-dependence of workstation hardware with relevant networking software. 1. Define workstation hardware
  • 36. P a g e | 23 A workstation is a special computer designed for technical or scientific applications. Intended primarily to be used by one person at a time, they are commonly connected to a local area network and run multi-user operating systems. The term workstation has also been used loosely to refer to everything from a mainframe computer terminal to a PC connected to a network, but the most common form refers to the class of hardware offered by several current and defunct companies such as Sun Microsystems, Silicon Graphics, Apollo Computer, DEC, HP, NeXT and IBM which opened the door for the 3D graphics animation revolution of the late 1990s. - 2. Define networking software - Networking software is a foundational element for any network. It helps administrators deploy, manage and monitor a network. Traditional networks are made up of specialized hardware, such as routers and switches, that bundle the networking software into the solution. Software-defined networking (SDN) separates that software from the hardware, making it easier to innovate and adapt the network to quickly meet changing network demands. The separation of functions from hardware, such as firewalls or load balancing, is called network functions virtualization (NFV). 3. Discuss and explain the interdepencies of workstation hardware with networking software. Derive an example form your discussion Figure 20 workstation
  • 37. P a g e | 24 - Inter-dependence of workstation hardware with relevant networking software: + A network file server is a computer system used for the purpose of managing the file system, the network printer, handling network communication, and other functions. A server may be dedicated is such case all of its processing power is allocated to network function, or it may be non- dedicated which means that a part of server functions allocated as a work stations or DOS based system. + Network operating system: it is loaded into the servers’ hard disk along with the system management tools and user utilities. When the system is started, NOS boots and other server come under its control. + Workstations: workstations or nodes are attached to the server through the network interfaces card and the cable; workstations are normally intelligence systems, such as the IBM pc. But DUMV terminals are used in mainframe computers. The concept of distributed process depends on the fact that personal computer are attached to the network performed their own processing after loading programs and data from servers. - Due to this a work station is called an active device on the network. After processing, files are stored back on the server where they can be used by others workstation. + Network interface card-every device connected to a LAN needs network interface card to plug into the LAN. For example, a PC needs to have an Ethernet card installed in it to connect to an Ethernet LAN. + Network cabling: once the server, workstations, and network interface cards are in place, network cabling is used to network everything together. The most popular type of network cables: Twisted pair wiring, Co-axial cable, Fiber optics cable. - That is some interdependence of the workstation hardware with the relevant network software to properly implement the network. M2 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization 1. Some types of server - Server: One of the most abundant types of servers in today’s market is a web server. A webserver is a special kind of application server that hosts programs and data requested by
  • 38. P a g e | 25 users across the Internet or an intranet. Web servers respond to requests from browsers running on client computers for web pages, or other web-based services. Common web servers include Apache web servers, Microsoft Internet Information Services (IIS) servers and Nginx servers. - File server: File servers store and distribute files. Multiple clients or users may share files stored on a server. In addition, centrally storing files offers easier backup or fault tolerance solutions than attempting to provide security and integrity for files on every device in an organization. Fileserver hardware can be designed to maximize read and write speeds to improve performance. - Database server: The amount of data used by companies, users, and other services is staggering. Much of that data is stored in databases. Databases need to be accessible to multiple clients at any given time and can require extraordinary amounts of disk space. Both of these needs lend themselves well to locating such databases on servers. Database servers run database applications and respond to numerous requests from clients. Common database server applications include Oracle, Microsoft SQL Server, DB2, and Informix. - Combination server: Even before virtualization, servers were being extracted from the standard model of a single server operating system installed on a hardware machine. Technology, such as network-attached storage, removed the need for a server to have its own storage. Other technologies, such as mirroring and clustering, enabled pieces of hardware to be combined into larger, more powerful servers. Such a server might consist of several blades, several attached storage devices, and an external power supply, and each piece could be swapped out for another while the server was still running. - Virtualization server: Virtual servers are taking the server world by storm. Unlike traditional servers that are installed as an operating system on machine hardware, virtual servers exist onlyas defined within specialized software called hypervisor. Each hypervisor can run hundreds, or even thousands, of virtual servers all at once. The hypervisor presents virtual hardware to the server as if it were real physical hardware. The virtual server uses the virtual hardware as usual, and the hypervisor passes the actual computation and storage needs onto
  • 39. P a g e | 26 the real hardware beneath, which is shared among all the other virtual servers. 2. Determining Your Networking Requirements - Designing a network can be a challenging task. Your first step is to understand your networking requirements. The rest of this chapter explains how to determine these requirements. After you have identified these requirements, refer to Chapter 2 for information on selecting network capability and reliability options that meet these requirements. - Networking devices must reflect the goals, characteristics, and policies of the organizations in which they operate. Two primary goals drive networking design and implementation: + Application availability—Networks carry application information between computers. If the applications are not available to network users, the network is not doing its job. + Cost of ownership—Information system (IS) budgets today often run in the millions of dollars. As large organizations increasingly rely on electronic data for managing business activities, the associated costs of computing resources will continue to rise. - A well-designed network can help balance these objectives. When properly implemented, the network infrastructure can optimize application availability and allow the cost-effective use of existing network resources. D1 Considering a given scenario, identify the topology protocol selected for the efficient utilization of a networking system. - The topology protocol selected for the efficient utilization of a networking system is star topology. The devices are connected via switches and the switches are interconnected internally. they are connected through routers. P5 Provide a logical/physicaldesign of the networked system with clear explanation and addressing table 1. Explain the difference between logical and physical design 1.1. What is logical of the networked systen? - Logical design is, “The part of the design phase of the SDLC in which all functional features of the system chosen for development in analysis are described independently of any computer
  • 40. P a g e | 27 platform.” A logical design for a network is an abstract functional specification for a telecommunications solution. A logical design lacks specific details such as technologies and standards and focuses on the needs at a general level. A logical network design can be a view of any part of a network. An entire enterprise educational network can be a composition of many logical designs. The lower level designs can be a university campus network that connects each building to the Internet, or it could be a view of the standard office telecommunications setup. The important quality of a logical design is that is communicates all needs in general terms Figure 21 Logical of networked system 1.2. What is physical design of the networked system? - Logical designs are often described using terms from the customer’s business vocabulary. Locations, processes, roles from the business domain can show up in the logical design. An important aspect of a logical network design is that it is part of the requirements set for a solution to a customer problem. - The basic idea of physical design is that it communicates “decisions about the hardware used to deliver a system.” A physical network design is created from a logical network design. A physical design will often expand elements found in a logical design. For instance, a WAN connection on a logical design diagram can be shown as a line between two buildings. When
  • 41. P a g e | 28 transformed into a physical design, that single line could expand into the connection, routers and other equipment at each end of the connection. The actual connection media might be shown on a physical design as well as manufacturers and other qualities of the network implementation. Figure 22 Physical of networked system 2. Discuss and explain the USER Requirement for the design - User requirements are typically written when discussing the use cases for a project. The requirements definition is done with the customer or product managers that know how the embedded system will be used by the user. - Many user requirements deal with how a user will interact with a system and what that user expects. If there is a screen or human machine interface aspect to the system, a user requirement may be based on what happens when the user selects an action on the screen.
  • 42. P a g e | 29 Maybe with a button press not only does a process start, but it also switches to another screen and provides an audible notification. When user requirements such as these are written down, they can often break into multiple system requirements later due to switching of screens, the maximum delays in starting the process, and finally what the next screen should look like. One pitfall is starting to try to write the system requirements during a user requirement meeting. This often detracts from gaining insight into the requirements of the user, and key functionality pieces could be missed. - In fact, as alluded to earlier, it is often better to keep user requirements and system requirements separate in their tracking and reporting. The user requirements are often more readable, understandable, and provide a better sense of how the system will operate. Even though user requirements may lack specifics on what really needs to occur in the system, they are still valuable in that they can provide the overarching system functionality expectations. 3. Provide a logical design of the network base on user reuirement - At the request of users, they need 50 student lab computers, 35 staff computers, 3, printer,… .. - Based on the requirements of the user, design 5 rooms in which 1 student lab computer, 1 staff lab computers, 1 server, 1 hingher managers, marketing and administration staff, and network administor. - Room differences are linked via switches and each room is connected via a router. The routers are connected to form a circle. - Equipment needed to equip 1 room: student lab computers requires 3 switches, 2 access points PT, 1 router. Staff lab computer needs 3 switches, 1 access points PT, 1 router, Higher lab mangers need 1 switch and 1 router and the marketing and administration lab staff, network lab administor is like higher lab managers. - Network systems are designed according to star topology.
  • 43. P a g e | 30 Figure 23 Result of the design
  • 44. P a g e | 31 P6 Evaluate the design to meet the requirements. 1. Design evaluation: - The design has met the user's requirements. - Basedon the design,itrequires93computers,11 switches,and6 routers,4 servers,3 accesspointpt, 6 laptops. 3 printers. - Student computer room can connect up to 80 computers, because 3 switch can connect up to 60 computers and 2 access point PT can connect more 20 computers. - Staff computer room can connect up to 70 computers, because 3 switch can connect up to 60 computers and 1 access point PT can connect more 10 computers. Thus in the future it may open 1 more room. - Marketingand administrationstaff roomcanconnectup to 20 computers. Itcan solve the problemof recruiting more employees. - Higher managers and network administrators is similar to Marketing administration stafff. - The remaining rooms can use the staff room printer. All rooms can connect to the server room. - Inconclusionthe designhassolvedthe user's basicrequirements andprovide solutions to expand for the future. 2. Evaluate the design of the network - Any Network that is well designed should satisfy the characteristics listed below: + Network uptime: Any network should be designed to be up all the time, this means that you have to understand your network and what failures may affect the network operation and provide all means of redundancy to ensure virtually 100% uptime of your network. This is usually a trade off between the criticality of the applications running over the network and the budget. + Network reliability: Administrators have to make sure that at any given time the network is capable of delivering packets to their destinations in a timely fashion with an acceptable delay and jitter profile. The good designer must understand his traffic, its characteristics and the acceptable performance to keep the network running smoothly. + Network security: The network should be as hard as possible for an attacker to disturb and the administrators must have a plan to stop or mitigate different types of attacks real time.
  • 45. P a g e | 32 + Network management: network management is one of the most critical parts of any network design. Network administrators must be able to reach and monitor all network devices all the time specially in crisis times. + Network Troubleshooting: problems must be easy to troubleshoot and correct. The network must be fully documented,standardized and follow the best practices as much as possible. + Network scalability: The network should be able to adapt to growth and business scalability needs without having to make dramatic changes. 3. What advice and solution would you provide to the network for efficiency and usage. - For many businesses, the hidden costs of dealing with a slow network can be like death by a thousand paper cuts. Files take longer to send, cloud applications take longer to load, calls are dropped, and everyone loses productivity waiting for tasks to finish. - Because of the urgency of having a reliable network connection, many businesses are quick to respond to the situation by throwing money at a network upgrade that may not work. While the cost of fiber Internet is more affordable than ever, it’s still important to diagnose alternative solutions to guarantee peak performance. 3.1. Determine that your network is at fault. - Is your network actually slow, or do you just have slow computers? You can’t proscribe a cure without knowing the disease, so it’s best not to leap to conclusions. Make sure that the sluggish response time is more than just a localized issue before springing for an infrastructure upgrade. 3.2. Offer guests a different network. - Network slowdowns are sometimes the result of guest behavior. While it’s unlikely that a single guest streaming a YouTube video in your lobby is the source of your troubles, you could have problems if you frequently host a large number of guests who need Internet access. Rather than risk them inadvertently slowing down your operations, offer them a login to a
  • 46. P a g e | 33 guest network. 3.3. Educate personnel about user behavior. - Employees need down time, and many choose to spend that time on their computers. If you notice a slowdown during lunchtime every day, it could be because a couple coworkers have taken the opportunity to boot up a video game or stream a show on Netflix. (Yes, it’s been known to happen!) They probably aren’t even aware of the network resources they’re draining during work hours, and are just trying to enjoy their lunch. Most will be happy to choose a different lunch pastime if you take a moment to talk to them about network performance. - Other personnel behavior that might be causing a slow down could involve poor file sharing practices, such as emailing large PPT files to multiple contacts rather than editing them via a shared cloud file. If you have employees frequently (and needlessly) sharing extra large files, teaching them how to compress the files or how to use cloud drives can cut the strain they’re placing on the network. 3.4. Use VLANs to segment low-priority traffic. - VLANs (Virtual Local Area Networks) are an excellent way to partition your network resources such that the most critical traffic receives the highest priority. Essentially, a VLAN offers the benefits of a completely separate network, without having to rewire the entire office. You can group VLANs based on computer use and function, even if they’re in separate parts of the office. - VLANs can also improve security by segmenting your systems from each other. That way, even if one part of your network becomes compromised, the VLAN can act as a barrier, keeping other parts of the network safe. 3.5. Check for viruses or system defects. - Speaking of viruses, malware is known for slowing down networks and inhibiting workflows. If you suspect your network slowdown might be the result of malicious network activity, you should have an emergency IT specialist run a check on the situation right away.
  • 47. P a g e | 34 - Slowdowns can also be the result of different network components growing old and defective. It’s often relatively painless to replace these broken components, rather than upgrade the entire network. M3 Install and configure network services and applications on yourchoice. 1. What is the network server? - A network server is a computer system, which is used as the central repository of data and various programsthat are sharedby usersina network.If youhave a computerthat you're no longerusing due to its slow speed, you can turn it into a network server for other computers in your household. 2. What is the network application? - Computer network applications are network software applications that utilize the Internet or other network hardware infrastructure to perform useful functions for example file transfers within a network. They help us to transfer data from one point to another within the network. 3. Selectnetwork servicesand networkapplications inyour design. - Networkservicesandnetworkapplications inthe designis server–PT web,server-PTSMTP,server-PT, server-PTDNS,server-PTFPT. Figure 24 Server room
  • 48. P a g e | 35 4. Applicationscan be added to the network - Some application thatcanbe addedto the network are Fax server,Game server,File server….. Figure 25 New server room D2 Design a maintenance schedule to support the networked system 1. Form and Time of Support 1.1.Forms of support: - Online support:Use managementtools,accessandremote control tocheck and handle assoon as problemsarise. - Supportonsite:Come inplace tocheck andhandle casesthat cannotbe handledonline. 1.2.Time ofSupport Service vomit Time of assistance Response time one site 1 Basic - 08 hours / day, 05 days / week from Monday to Friday. - Not including holidays, New Year - Inner Ho Chi Minh City: 2 working hours - Suburbs, neighborhoods: from 2 up to 4 working hours
  • 49. P a g e | 36 2 Vip - 12 hours / day, 06 days / week from Monday to Saturday. - Not including holidays, New Year - Inner Ho Chi Minh City: 1 working hour - Suburbs, neighborhoods: from 2 up to 4 working hours P7 Implement a networked system based on a prepared design. 1. Show evidence of a working network you’ve design Divice Interface IP address Subnet Mask Defaulgate way PC student 1 Fa0 192.168.0.2 255.255.255.0 192.168.0.1 PC student 2 Fa0 192.168.0.3 255.255.255.0 192.168.0.1 PC student 3 Fa0 192.168.0.4 255.255.255.0 192.168.0.1 PC student 4 Fa0 192.168.0.5 255.255.255.0 192.168.0.1 PC student 5 Fa0 192.168.0.6 255.255.255.0 192.168.0.1 PC student 6 Fa0 192.168.0.7 255.255.255.0 192.168.0.1 … … … … … PC student 50 Fa0 192.168.0.51 255.255.255.0 192.168.0.1 DNS Fa0 10.0.0.2 255.0.0.0 192.168.10.1 WEB Faa0 10.0.0.3 255.0.0.0 192.168.10.1 FPT Fa0 10.0.0.4 255.0.0.0 192.168.10.1 SMTP Fa0 10.0.0.5 255.0.0.0 192.168.10.1 Printer1 Fa0 10.0.0.8 255.0.0.0 10.0.0.1 Printer2 Fa0 10.0.0.9 255.0.0.0 10.0.0.1 Printer3 Fa0 10.0.0.10 255.0.0.0 10.0.0.1 Router 0 Se 2/0 128.128.0.1 255.255.0.0 N/A Se3/0 172.172.0.2 255.255.0.0 N/A Fa0/0 192.168.0.1 255.255.255.0 N/A Router 1 Se2/0 10.0.0.2 255.0.0.0 N/A
  • 50. P a g e | 37 Router 2 Se2/0 128.128.0.2 255.255.0.0 N/A Fa0/0 192.10.16.1 255.255.0.0 N/A Router 3 Se2/0 180.180.180.2 255.255.0.0 N/A Se3/0 172.172.0.1 255.255.0.0 N/A Fa0/0 192.172.172.1 255.255.255.0 N/A Router 5 Se2/0 180.180.180.1 255.255.0.0 N/A Se3/0 165.165.0.2 255.255.0.0 N/A Fa0/0 192.186.186.1 255.255.0.0 N/A Router 6 Se2/0 165.165.0.1 255.255.0.0 N/A Se3/0 10.0.0.1 255.0.0.0 N/A Fa0/0 192.190.190.1 255.255.0.0 N/A PC staff 1 Fa0 192.10.16.2 255.255.255.0 192.10.16.1 PC staff 2 Fa0 192.10.16.3 255.255.255.0 192.10.16.1 PC staff 3 Fa0 192.10.16.4 255.255.255.0 192.10.16.1 PC staff 4 Fa0 192.10.16.5 255.255.255.0 192.10.16.1 PC staff 5 Fa0 192.10.16.6 255.255.255.0 192.10.16.1 PC staff 6 Fa0 192.10.16.7 255.255.255.0 192.10.16.1 … … … … … PC staff 35 Fa0 192.10.16.36 255.255.255.0 192.10.16.1 PC6 Fa0 192.172.172.2 255.255.255.0 192.172.172.1 PC7 Fa0 192.172.172.3 255.255.255.0 192.172.172.1 PC8 Fa0 192.186.186.2 255.255.255.0 192.186.186.1 PC9 Fa0 192.186.186.3 255.255.255.0 192.186.186.1 PC10 Fa0 192.186.186.4 255.255.255.0 192.186.186.1 PC12 Fa0 192.190.190.2 255.255.255.0 192.190.190.1 PC13 Fa0 192.190.190.3 255.255.255.0 192.190.190.1 PC14 Fa0 192.190.190.4 255.255.255.0 192.190.190.1 2. Ping some device running the screen
  • 51. P a g e | 38 - Ping PC student 1 to PC student 2 Figure 26 Ping PC student 1 to PC student 2 - PingPC student2 to PCstudent5 Figure 27 Ping PC student 2 to PC student 5
  • 52. P a g e | 39 - PingPC student6 to PCDNS Figure 28 Ping PC student 6 to PC DNS - PingPC staff 1 to printer1 Figure 29 Ping PC staff 1 to printer 1
  • 53. P a g e | 40 - PingPC 13 to PC10 Figure 30 Ping PC 13 to PC 10 - PingPC staff 2 to PC staff 5 Figure 31 Ping PC staff 2 to PC staff 5
  • 54. P a g e | 41 3. Show me implemented system - Run from PC student 2 to PC student 1 Figure 32 implemented system P8 Document and analyze test results against expected results. 1. Provide a step by step configuration of network devices in the network(Choose a device in the network and provide all the steps for configuration)  Step 1: Open your Network Topology. Once you've opened your Network Topology on Cisco Packet Tracer, access your network and identify the components of your network, for example; Servers, Routers, End Devices, etc.
  • 55. P a g e | 42 + Choose the device Figure 33Choose the device + Connection all of device Figure 34 choose the connection That is result : Figure 35 Result step 1  Step 2: Complete the cabling. Access the cables section and connect completely and correctly the cables between the network in order to ensure connectivity between the devices in the network using the connections table given.
  • 56. P a g e | 43 + Click on “ PC-PT PC0” + Click on “ desktop” + Click on “ IP configuration”  Note: Default Gateway is IP configuration of step 3 Figure 36 Result step 2 Step 3: choose the device such as router, sever,…… + Click on “ Router 1” + Click on “ CLI”
  • 57. P a g e | 44 + Click on “ Fastethernet 0/0” and completely Figure 37 Result step 3 2. Test results against test plans Figure 38 Test plan
  • 58. P a g e | 45 - Reliesonatest that can transferdata backand forthbetweencomputers inaroom. In addition,you can connectcomputersbetween2roomsand can connectto the serverroom. M4 Recommend potential enhancements for the networked systems. - 5G technology gives us tremendous technical capabilities in many industries as well as many fields. The world has not seen a boom in the deployment of 5G infrastructure and services on a national scale. This shows that there are still prudences in providing commercial 5G services as they have with previous mobile technologies. Moreover, 5G applications and services are tailor-made to each industry and country depending on the market or country's strategy. Figure 39 Network 5G  The benefits of 5G come from "endless" connectivity. - The 5G network brings wireless transmission speeds dozens of times higher than the cellular networks we use today, and the network capacity is also expanded, super-fast connectivity with almost the same latency. 0, thereby bringing huge benefits when applied in practice, especially in the era of industrial revolution 4.0 today.
  • 59. P a g e | 46 - Verizon CEO Hans Vestberg shared this issue at CES 2019. According to Hans, there will be 8 issues that the 5G network can solve, these are:  Mobility, Connected Devices, and the Internet of Things: 5G networks can transfer data up to 10TB per square kilometer in a unit of time, which in theory could allow 1 million IoT devices. Working together on 1 square km, can maintain a connection on moving objects at a speed of 500km / h, thereby opening the future for the field of self-driving cars, smart cities, ...  Energy, Efficiency, and Deployment: 5G networks promise to consume up to 90% less energy than 4G networks, combined with fast connectivity, which helps to deploy 5G networks on a large scale as well. will be significantly easier.  Latency, Reliability: 5G network latency is reduced to just 1/1000 second, data travel time is in less than a blink, thus increasing the reliability of the connection and the Deployment service on 5G network. Figure 40 Benefits of 5G
  • 60. P a g e | 47 D3 Use critical reflection to evaluate own work and justify valid conclusions. - The design solved the fundamental problem. The design rooms are student computer room, staff computer room, marketing and administration staff, higher managers and network administor. The rooms are expandable due to the network connection for the room like student computer room and staff computer room. The remaining rooms can connect up to 20 computers. The rooms are connected each other, so higher manager room can manage the remaining rooms. When the room has a problem, another room is not affected. - Student computer room can connect more 30 computers and staff computer room can connect more 40 computers. The remanining rooms can connect 15 computers, 1 access point PT and 2 printers. - The design has met the given requiremets and gave methods for expansion. It has limited in the future risks and optimize the network design. The network is not secure and safe. in the future, there will be measures to secure the system
  • 61. P a g e | 48 REFERENCES 1. Wikipedia.Computer network.[ online] Available at: https://en.wikipedia.org/wiki/Computer_network [Accessed20 July.2020] 2. BeginnersBook.Types of Computer Network: Lan, Man and Wan.[Online] Available at: https://beginnersbook.com/2019/03/types-of-computer-network-lan-man-and-wan/ [Accessed20 July.2020] 3. WIKIPEDIA.Internet.[Online] Available at: https://en.wikipedia.org/wiki/Internet [Accessed20 July.2020] 4. NABAY.What isLocal AreaNetwork(LAN),AdvantagesandDisadcantages.[Online] Availableat: https://snabaynetworking.com/what-is-local-area-network/ [Accessed20July.2020] 5. IT Release.Advantages and disadvantages of metropolitan area network(MAN).[Online] Available at: https://www.itrelease.com/2018/09/advantages-and-disadvantages-of-metropolitan-area-network-man/ [Accessed20 July.2020] 6. CompTIA. What Is a Network Protocol, and How Does It work?.[Online] Available at: https://www.comptia.org/content/guides/what-is-a-network- protocol#:~:text=A%20network%20protocol%20is%20an,internal%20processes%2C%20structure%20or%20 design. [Accessed22July.2020] 7. Computer Hope.Standard.[Online] Available at: https://www.computerhope.com/jargon/s/standard.htm#:~:text=A%20standard%20is%20a%20set,by%20a cademic%20and%20industry%20contributors.&text=Common%20examples%20of%20standards%20include ,computer%20monitors%20and%20video%20adapters. [Accessed22July.2020] 8. Wikipedia.Listof technical standardorganizations.[online]Available at: https://en.wikipedia.org/wiki/List_of_technical_standard_organizations [Accessed22July.2020] 9. Wschools. Types of Network Protocols and Their Uses.[Online] Available at:
  • 62. P a g e | 49 https://www.w3schools.in/types-of-network-protocols-and-their-uses/ [Accessed22July.2020] 10. Wikipedia.Networktopoplogy.[Online] Available at: https://en.wikipedia.org/wiki/Network_topology [Accessed22 July.2020] 11. BeginnersBook.ComputerNetworkTopology –Mesh,Star,Bus, Ringand Hybrid.[Online] Availableat: https://beginnersbook.com/2019/03/computer-network-topology-mesh-star-bus-ring-and-hybrid/ [Accessed22 July.2020] 12. ComputerHope.Communications.[Online] Availableat: https://www.computerhope.com/jargon/c/communic.htm#:~:text=Communications%20is%20the%20exch ange%20of,two%20or%20more%20computing%20devices. [Accessed22July.2020] 13. Wikipedia.Bandwidth(computing).[Online] Available at: https://en.wikipedia.org/wiki/Bandwidth_(computing) [Accessed22July.2020] 14. Circuit.Whatare the bandwidthrequirementsonmynetwork?.[Online] Availableat: https://www.circuit.com/unifyportalfaqdetail?articleId=36901[Accessed22 July.2020] 15. Netwirx Bolg.NetworkDevicesExplained.[Online] Available at: https://blog.netwrix.com/2019/01/08/network-devices-explained/[Accessed22July.2020] 16. NewHorizons.NETWORKSERVERTYPES EXPLAINED.[Online] Availableat: https://www.nhgeorgia.com/blog/network-server-types-explained-6 [Accessed22 July.2020] 17. Wikipedia.Workstation.[Online]Available at: https://en.wikipedia.org/wiki/Workstation#:~:text=A%20workstation%20is%20a%20special%20computer% 20designed%20for%20technical%20or%20scientific%20applications.&text=Typical%20workstations%20pre viously%20employed%20proprietary,during%20the%201990s%20and%202000s. [Accessed22 July.2020] 18. Sdxcentral.What’s Networking Software?[Online] Available at: https://www.sdxcentral.com/networking/sdn/definitions/networking-software/ [Accessed22 July.2020] 19. GeeksforGeeks.NetworkDevices( Hub,Repeater,Bridge,Switch,Router,GatewaysandBrouter).[Online] Available at:https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-switch-router- gateways/ [Accessed22July.2020] 20. JIMTHARIO: SOFTWAREENGINEER.EXPLAIN THE DIFFERENCEBETWEEN LOGICAL DESIGN ANDPHYSICAL
  • 63. P a g e | 50 DESIGN OFA NETWORK.[Online] Availableat: https://www.thario.net/post/explain-the-difference- between-logical-design-and-physical-design-of-anetwork/ [Accessed28 July.2020] 21. ScienDirect.UserRequierment.[Online]Available at: https://www.sciencedirect.com/topics/engineering/user- requirement#:~:text=User%20requirements%20are%20typically%20written,and%20what%20that%20user %20expects. [Accessed28 July.2020] 22. TOTOLINK.Whatisthe TCP / IP protocol?Compare OSImodel withTCP/IP model.[Online].Availableat: https://www.totolink.vn/article/32-giao-thuc-tcp-ip-la-gi-so-sanh-mo-hinh-osi-voi-mo-hinh-tcp-ip.html [Accessed3August.2020] 23. Networkers-Online.NetworkDesignEvaluation.[Online] Availableat: https://www.networkers- online.com/blog/2008/08/network-design-evaluation/ [Accessed3August.2020] 24. BrightlineIT.8Tips to Improve NetworkPerformanceInyourOfffice.[Online] Available at: https://brightlineit.com/8-tips-to-improve-network-performance-in-your-office/ [Accessed3August.2020] 25. CISCO.IntroductiontoCiscoNetworkDesign.[Online] Available at: https://www.ciscopress.com/articles/article.asp?p=25259&seqNum=6 [Accessed4August.2020] 26. Howstuffwork.Whatisthe networkserver? .[Online] Availableat: https://computer.howstuffworks.com/what-is-network- server.htm#:~:text=A%20network%20server%20is%20a,other%20computers%20in%20your%20household. [Accessed21 August.2020]