E182282-1678472976368-229532-Networking Assignment 1
E182282-1678472976368-229532-Networking Assignment 1
Computing
Unit 02: Networking
Assignment 01
1
W.P.M.Sampath Dananjaya / Assignment number 1 / UNIT 02 - Networking
General Guidelines
1. A Cover page or title page – You should always attach a title page to your
assignment. Use previous page as your cover sheet and make sure all the
details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side
printing.
5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each
page.
1. The font size should be 12 point, and should be in the style of Time New
Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font
style.
4. Use footer function in the word processor to insert Your Name, Subject,
Assignment No, and Page Number on each page. This is useful if individual
sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to
help editing your assignment.
Important Points:
2
W.P.M.Sampath Dananjaya / Assignment number 1 / UNIT 02 - Networking
5. Excuses of any nature will not be accepted for failure to hand in the work on
time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons
such as illness, you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade.
9. Non-submission of work without valid reasons will lead to an automatic RE
FERRAL. You will then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them
properly using HARVARD referencing system to avoid plagiarism. You have
to provide both in-text citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your
grade could be reduced to A REFERRAL or at worst you could be expelled
from the course
3
W.P.M.Sampath Dananjaya / Assignment number 1 / UNIT 02 - Networking
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work
and to present it as my own without attributing the sources in the correct form. I
further understand what it means to copy another’s work.
4
W.P.M.Sampath Dananjaya / Assignment number 1 / UNIT 02 - Networking
Activity 1
Answers
Discuss the benefits and constraints of different network system types that can
be implemented in the Matara branch
We can use LAN, WAN, VPN, Extranet, Intranet and MAN types to connect Head
office and the Matara branches together. All network types that can be implemented
in the Matara branch are described below;
Resource sharing – Sharing resources such as hard disk drives, DVD drives
and Printers are made accessible in Local Area Networks. For example, any
resources can be connected to a networked computer and shared with the
connected computer whenever help is needed.
Software sharing – When a single computer with licenced software can be
shared with other network users. You don’t need to purchase an individual
licence for each computer on your network. All can be worked under one
licence.
Convenient communication – Exchange message and information in a timely
manner. Since the data resides on a LAN server users can access it at any
time. Any single LAN user can do this with anyone else on the network. So
this is not only saves a lot of time but also ensures that our message reaches
the right person.
5
W.P.M.Sampath Dananjaya / Assignment number 1 / UNIT 02 - Networking
Centralized Data – Any workstation in a particular network can be used to
access this information. Users can access their data by logging into their
respective accounts.
Internet sharing – Local Area Network has the ability to share the internet
connection among all users of the Local Area network. A computer
connected to the internet shares the internet with all connected computers.
Computer identification- Each computer on a LAN is assigned a MAC
address for identification purpose. This address is usually used when sending
and receiving data.
A WAN is a type of network that provides data transmission over a large area. A
WAN is a combination of a Local Area Network (LAN) and a Metropolitan Area
Network (MAN). The transmission of data is carried out with the help of Routers,
Fiber Optics, Switches, and Hubs.
• Cover large geographical area – WAN covers a large geographical area of 1000km
or more if your office is in different cities or countries then you connect your office
branches through WAN.
• Centralized data – There is no need to buy files, backup servers, and e-mails. All
branches can share information through the head office. Support, Backup, and other
useful data are available from the head office and all data is synchronized with all
other office branches.
• High Band – If you get a leased line for your company then it gives high
bandwidth than a normal broadband connection. You can get a transfer rate that can
increase your company’s productivity.
• Sharing of software and resources – Like Local Area Network (LAN) we can share
software applications and other resources like a hard drive, and RAM with other
users on the internet.
6
W.P.M.Sampath Dananjaya / Assignment number 1 / UNIT 02 - Networking
The disadvantages of the WAN are below.
The speed is slower than the LAN network type.
Wide Area Network have lower data transfer rate.
The wide Area Network is a combination of various other technologies and
therefore has many security issues compared to MAN and LAN.
Advantages of VPN,
Provides security through anonymity.
Secure connection for remote work.
VPN can bypass firewalls.
Disadvantages of VPN,
A VPN may decrease your speed.
Dropped connections.
Not all devices natively support VPNs.
Quality VPNs will cost money
Extranet
7
W.P.M.Sampath Dananjaya / Assignment number 1 / UNIT 02 - Networking
Benefits of Extranet
Increases Productivity
Reduces the Margin of Error
Offers flexibility
Provides Timely and Accurate information
Improves supply chain management
Intranet
Advantages of Intranet
Ease of access – If you know how to use a VPN you can access your intranet
anytime anywhere.
Ease of communication -
Ease of centralization – Organization have thousands of files that users must
try to read or modify. An intranet centralizes all of this data and ensures that
users have access to everything they need. This easy file access coupled with
a powerful search function leads to a significant increase in productivity
among users.
Disadvantages of Intranet
Difficulty of implementation
Complexity for users
8
W.P.M.Sampath Dananjaya / Assignment number 1 / UNIT 02 - Networking
MAN (Metropolitan Area Network)
A network that covers a modest geographic area such as a town or city. You can
enjoy services such as high-speed Internet connection through DSL/ADSL lines and
cable television. Multiple LANs are connected in a format larger than a LAN but
smaller than a WAN covering a wide geographic area and directly connecting users
around the world. MAN uses various devices such as modems and cables to transfer
data. Metropolitan Area Network offers a range of 10 to 50 km and a wide network
suitable for the connection between an offices building in one of the city’s
headquarters at that location.
9
W.P.M.Sampath Dananjaya / Assignment number 1 / UNIT 02 - Networking
The main IEEE Ethernet standards that can used for the above design,
IEEE 802.3 – This standard defines the Ethernet standard. That use for Local
Area Communications.
IEEE 802.8 – This standard specify the fibre optic connections (These consist
of a set of rules that are used for fibre optic connection).
IEEE 802.11 – This standard defines wireless networking (Wi-Fi).
IEEE 802.10 – Standards for LAN/MAN security implementations.
IEEE 802.7 – Standards for exchanging information between systems.
Affect network operation. When a proper network topology is used it ensures that the
network works at maximum efficiency with better data transfer. It helps IT
administrators understand how the entire network infrastructure is organized. A
network topology tool allows effective IT operations teams to better visualize the
network and understand the dependencies of each device. A distributed network
enables geographic visibility. This ensures that the IT manager can effectively
implement the company network across multiple countries. Explain how devices and
apps on a network affect others. Knowing device dependencies across the network
topology helps identify which device or application is affecting other devices and
causing network bottlenecks. Helps detect and fix system issues. Custom network
topology maps make it easier to diagnose troubleshooting problems and allocate
network resources.
10
W.P.M.Sampath Dananjaya / Assignment number 1 / UNIT 02 - Networking
Assess the main network protocol suites that are used in network design using
examples.
The main network protocol suites that are used in network design are FTP, HTTP,
SMTP, TCP/UDP, and IP.
FTP (File Transfer Protocol) – FTP is a common use protocol for sharing files
over a network (internet). FTP typically uses a client-server architect.
Example – Suppose you have a website hosted on a server and you need to
transfer some files so you can use the FTP to transfer those files from your
computer to the server where the website is hosted.
Example – SMTP used for sending and reserving message between servers
and also the most email systems that send email over the internet users.
SMTP to send message from one server to another.
Example – When we are browsing the internet out web browser users port
number 80. (We are browsing the web so when a packet arrives at our
computer and its header contains the port no. 80 so the top layer it and sends
the packets to our web browser.)
11
W.P.M.Sampath Dananjaya / Assignment number 1 / UNIT 02 - Networking
UDP (User Datagram Protocol) – UDP is an unreliable and connectionless
protocol. UDP doesn’t have the error checking and ordering functionality of TCP.
UDP is commonly used in time sensitive communications.
Example – Take a voice all over the internet now this service requires high
performance and low latency, so during the communication if some packets
get dropped, we don’t sometimes feel it. These kind of time sensitive
application uses UDP because dropping packet is preferable than waiting for
delayed packet they just simply drop it and the go with what they have.
12
W.P.M.Sampath Dananjaya / Assignment number 1 / UNIT 02 - Networking
Recommended suitable network protocols
13
W.P.M.Sampath Dananjaya / Assignment number 1 / UNIT 02 - Networking
Activity 2
Answers
Network devices – (Hubs, Switch, Bridge, Router, Repeater, Access point, Modem,
Content filter, Firewall, Load balancer, Packet shaper, VPN concentrator).
14
W.P.M.Sampath Dananjaya / Assignment number 1 / UNIT 02 - Networking
Access Point – While an access point can technically include a wired or
wireless connection it usually means a wireless device. An Access Point
operates at the data link layer second to the OSI layer and can act either as a
bridge connecting a standard wired network to wireless devices or as a router
that forwards data traffic from one access point to another.
Content filter - Content filtering is the process of using software or hardware
to filter or restrict access to objectionable email, websites and other suspicious
content. Organizations often use content-based filtering called data filtering as
part of their internet firewall. A common security measure is content filtering
which helps organizations enforce corporate policies on the use of information
systems. For example, filtering and blocking social media platforms.
Firewall – A firewall is a network security device that monitors and filters
incoming and outgoing network traffic according to an organization’s
predefined security policies. Basically, a firewall is a barrier between a private
internal network and the public internet. The primary purpose of a firewall is
to allow non-threatening traffic and block dangerous traffic.
Load balancer – A load balancer is a device that acts as a reverse proxy and
distributes network or application traffic across multiple servers. Load
balancers are used to increase application capacity (concurrent users) and
reliability.
Packet shaper – Packet Shaper provides full visibility by automatically
classifying network traffic by application and content type.
VPN concentrator – A VPN concentrator is a hardware device that allows you
to create and manage multiple VPN connections remotely. Like a VPN it
encrypts data sent and received and uses security protocols to create a secure
tunnel but, on a larger scale. Widely used by large companies with many
remote employees.
15
W.P.M.Sampath Dananjaya / Assignment number 1 / UNIT 02 - Networking
Server types that can be used & server that are available in today’s market with their
specifications. / Recommended servers for the above scenario
Types of servers
Web server
Email Server
FTP Server
Identity Server
Proxy Server
Application Server
FTP Server – (Software – FileZilla Server, Xlight FTP Server, CompleteFTP, Core
FTP Server, Vsftpd, ProFTPD, Rebex Tiny SFTP Server)
16
W.P.M.Sampath Dananjaya / Assignment number 1 / UNIT 02 - Networking
Discuss the inter-dependence of workstation hardware and networking software.
17
W.P.M.Sampath Dananjaya / Assignment number 1 / UNIT 02 - Networking
Activity 3
18
W.P.M.Sampath Dananjaya / Assignment number 1 / UNIT 02 - Networking
19
W.P.M.Sampath Dananjaya / Assignment number 1 / UNIT 02 - Networking