0% found this document useful (0 votes)
73 views120 pages

E172797-1671209494389-191131-Networinking Assingment 1 Final

The document outlines the internal verification process for assessment decisions related to the BTEC Higher National Diploma in Computing, specifically focusing on Unit 02: Networking. It includes details on assessment criteria, feedback mechanisms, and guidelines for assignment submissions, along with a specific assignment scenario for SYNTAX SOLUTIONS that requires network design and implementation. Additionally, it emphasizes the importance of adhering to academic integrity and proper referencing to avoid plagiarism.

Uploaded by

umairfaisal1227
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views120 pages

E172797-1671209494389-191131-Networinking Assingment 1 Final

The document outlines the internal verification process for assessment decisions related to the BTEC Higher National Diploma in Computing, specifically focusing on Unit 02: Networking. It includes details on assessment criteria, feedback mechanisms, and guidelines for assignment submissions, along with a specific assignment scenario for SYNTAX SOLUTIONS that requires network design and implementation. Additionally, it emphasizes the importance of adhering to academic integrity and proper referencing to avoid plagiarism.

Uploaded by

umairfaisal1227
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)

INTERNAL VERIFICATION – ASSESSMENT DECISIONS

Programme title BTEC Higher National Diploma in Computing

Kavindu Chethiya
Assessor Internal
Verifier
Unit 02: Networking
Unit(s)
LAN Design & Implementation for SYNTAX SOLUTIONS
Assignment title
Umair Faisal
Student’s name

List which assessment Pass Merit Distinction


criteria the Assessor has
awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded


match those shown in the
assignment brief? Y/N

Is the Pass/Merit/Distinction grade


awarded justified by the assessor’s Y/N
comments on the student work?

Has the work been assessed


accurately? Y/N

Is the feedback to the student:


Give details:
• Constructive?
• Linked to relevant assessment Y/N
criteria? Y/N
• Identifying opportunities for Y/N
improved performance?
• Agreeing actions? Y/N

Does the assessment decision need


amending? Y/N

Assessor signature Date

Internal Verifier signature Date

Programme Leader signature (if


required) Date

Confirm action completed

Remedial action
taken
Give details:

Assessor signature Date

Internal
Verifier Date
signature

Programme
Leader signature Date
(if required)
Higher Nationals - Summative Assignment Feedback Form

Student Name/ID Umair Faisal / 00145206

Unit Title Unit 02: Networking

Assignment 1 Assessor
Number
16/12/2022 Date
Submission Date Received 1st
submission

Date Received 2nd


Re-submission Date submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & P1 P2 M1
Distinction Descripts

LO2 Explain networking devices and operations.

Pass, Merit & P3 P4 M2 D1


Distinction Descripts

LO3 Design efficient networked systems.


Pass, Merit & P5 P6 M3 D2
Distinction Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & P7 P8 M4 D3
Distinction Descripts
Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and
external moderation has taken place and grades decisions have been agreed at the assessment
board.

Assignment Feedback

Formative Feedback: Assessor to Student

Action Plan
Summative feedback

Feedback: Student to Assessor

Assessor Date
signature

Student Date 16/12/2022


signature
Pearson Higher Nationals in
Computing

Unit 02: Networking


Assignment 01

General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment
No, and Page Number on each page. This is useful if individual sheets become detached
for any reason.
5. Use word processing application spell check and grammar check function to help editing
your assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the
body except for the before mentioned compulsory information will result in rejection of
your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL.
You will then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text
citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade
could be reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct form. I further understand what it means
to copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any
of the assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program,
will be my own, and where I have made use of another’s work, I will attribute the
source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a
binding agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this
document is not attached to the assignment.

16/12/2022

Student’s Signature: Date:


(Provide E-mail ID) (Provide Submission Date)
Higher National Diploma in Computing

Assignment Brief

Student Name /ID Number Umair Faisal / 00145206

Unit Number and Title Unit 2: Networking

Academic Year 2021/22

Unit Tutor Kavindu Chethiya

Assignment Title LAN Design & Implementation for SYNTAX SOLUTIONS

Issue Date

Submission Date 16/12/2022

IV Name & Date

Submission format

The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

Assignment Brief and Guidance:

Scenario

SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo.


The Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara.
They are planning to make it one of the state-of-the-art companies in Matara with the latest facilities.

It is expected to have nearly 150 employees in Matara branch.

Department Number of Users

Customer Care 10

Sales and Marketing 20

Finance 25

Legal 5

HR 10

Developers 55

Network Team 5

Server Room Servers +ISP connections


Follo wing requirem ents a re g iv en by th e Manag ement.
• All the dep ar tments must be sep arat ed with unique subnet and s hould no t
commun icate with each o th er unless there is a special requ irement .

• 192.168 .10.0 /24 is giv en and shou ld be us ed for all the d epar tmen ts ex cep t
the s erv er ro om. IPs shou ld assign using D HCP.

• ERP and CRM Syst ems n eed to be implemen ted in Matar a br anch in lo cal
servers .

• Number of serv ers required fo r the S erv er room need to b e d ecided by th e


Network d esign er an d sho uld b e assign ed with 10. 254.1 .0/2 4 su bnet. (Uses
static IPs )

• High level of redundancy is expected in n etwork des ign to elimin ate s ing le
poin t of failu res and tr affic b ottle n ecks.

• Sales and Mark eting Team need to access Network resour ces us ing WIFI
conn ectiv ity.

• Prop er m ethods for n et work ing mon ito ring and t roubleshootin g need to
be es tablished .

• All p ossib le n et work secu rity mechan isms should be implemented.

Assume you have been app oin ted as the new network consultant of SYNTAX
SOLUTIONS . Prepar e a n etwor k ar chitectural d esign and imp lement it with your
suggestions and recommendations to meet the comp any req uir emen ts.

(Note: Clearly stat e your assumptions. Y ou are allo wed to des ign the net wo rk
acco rding to y our assumpt ions, but main requirements shou ld not b e v iola ted)

Activ ity 01
• Discuss th e b en efits and co nstr ain ts of diff erent n etwor k sys tem typ es that can
be imp lemen ted in th e Matara b ran ch and the main I EEE Eth ern et s tandar ds
that can be us ed in abov e LAN and WLAN desig n.

• Discuss the impor tan ce an d imp act of netwo rk to pologies and n etwo rk p roto co l
suites while co mp aring the main network topo log ies and n etwork pro to col
suites that ar e used in n etwo rk des ign usin g examples. Recommend suitab le
networ k topologies and n etwor k pro tocol su ites for abov e scenario and jus tif y
your answer w ith valid po in ts.

Activ ity 02
• Discuss the o per ating prin ciples of n etwo r k dev ices (Ex: R outer, Sw itch, Etc.)
and serv er ty pes th at can b e us ed for ab ov e s cen ario wh ile exp lor ing d iff eren t
servers th at ar e available in today’s mark et with their sp ecifications.
Reco mmend ser ver /ser vers for th e abo ve scenario and jus tif y yo ur s election w ith
valid p oin ts.

• Discuss th e inter -d ep endence o f wor kstatio n hardwar e w ith n etwo rkin g sof tware
and prov id e examp les for n etwor king sof tware th at can be used in ab ove n etwor k
desig n.

Activ ity 03
• Prepar e a written n etwor k d esign plan to meet th e abo ve men tio ned us er
requ irements in cluding a blu epr in t d rawn u sing a mo delin g too l. (Ex : Microsof t
Visio, Edr awMax) .
Support your answ er by prov id ing the VLAN and IP su bnetting s ch eme for th e
abov e s cen ario and th e lis t of d ev ices, n etwork components and sof twar e used to
desig n th e n etwo rk fo r above scenar io and while justifying yo ur selections .
• Test and ev aluate th e prop osed d esign to meet the r equ irements an d analys e us er
feed back by usin g a User f eedback f orm.

• Install and conf igur e Network s ervices , dev ices and app lications (Ex :
VLAN,DHCP, DNS,Proxy, Web, Etc.) accord ing to th e pr oposed d esign to
accomp lish the us er r equ ir ements and des ign a d etailed Main ten an ce s chedule
for ab ove Netw ork.

*Note: - Screen shots of Configu rat ion scripts shou ld be p res ented.

Activ ity 04
• Implemen t a network ed system b ased on your pr ep ared d esign w ith v alid
evid en ces an d recommend po ten tial fu tur e enh ancemen ts for th e network ed
system with v alid justif ications to y our r eco mmendations. Use critical r eflection
to critically ev aluate th e d esign , p lan , co nfiguratio n, and tes tin g of your network
while justifying with valid con clusio ns.

• Develop test cases and con duct ver if ication ( Ex : P ing, extend ed pin g, tr ace
route, teln et, SSH, etc. ) to test the ab ove Network and an alyse th e test resu lts
against th e expected resu lts.
Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of
different network types and standards.
P2
Explain the impact of network topology,
communication and bandwidth
requirements.
M1
Compare common networking principles
and how protocols enable the effectiveness
of networked systems.
LO2 : Explain networking devices and operations

P3
Discuss the operating principles of
networking devices and server types.
P4
Discuss the inter-dependence of
workstation hardware with relevant
networking software.

M2
Explore a range of server types and justify
the selection of a server, considering a
given scenario regarding cost and
performance optimization.

Umair Faisal Networking Unit-2 [14]


LO 1 & LO2
D1 Critically evaluate the topology
protocol selected for a given scenario to
demonstrate the efficient utilisation of a
networking system.
LO3 : Design efficient networked systems

P5
Design a networked system to meet a given
specification.
P6
Test and evaluate the design to meet the
requirements and analyze user feedback.
M3
Install and configure network services and
applications on your choice.
D2
Design a maintenance schedule to support
the networked system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a
prepared design.
P8
Document and analyze test results against
expected results.
M4
Recommend potential enhancements for
the networked systems.
D3
Use critical reflection to evaluate own
work and justify valid conclusions.

Umair Faisal Networking Unit-2 [15]


Umair Faisal Networking Unit-2 [16]
ACKNOWLEDGEMENT

I'd like to thank my institute, ESOFT METRO CAMPUS, for giving me the opportunity
to work on this database assignment. This assignment's progress and ultimate completion
needed a great deal of direction and support from many people. I consider myself
exceedingly lucky to have had this all along. completion of my assigned work Whatever I
had to do for this project was only possible because of their advice and my hard work, for
which I am grateful. Special thanks to my Networking lecturer, Mr. Kavindu Chethiya,
for guiding me in this assignment. I'm extremely lucky to get such a great lecturer to
teach this subject.

Umair Faisal Networking Unit-2 [17]


Contents
1 Activity 1 .................................................................................................................................20
1.1 What is a network? ..........................................................................................................20
1.1.1 Types Networks ......................................................................................................21
1.1.2 As I mentioned on page 1, there are twelve types of different computer networks.
However, the computer networks are:.....................................................................................21
1.1.3 Differences between LAN, MAN, and WAN .........................................................38
1.1.4 Network System types.............................................................................................39
1.2 Network Standards ..........................................................................................................43
1.3 Network Topologies ........................................................................................................46
1.3.1 What is meant by a network topology? ...................................................................46
1.3.2 Most Common Type of Network Topology............................................................47
1.3.3 Bandwidth ...............................................................................................................56
1.3.4 Data Communication ..............................................................................................56
1.4 Networking Models.........................................................................................................58
1.4.1 What is the TCP/IP model? .....................................................................................58
1.4.2 OSI model ...............................................................................................................59
1.4.3 Comparison between TCP/IP and OSI ....................................................................60
1.4.4 Protocols ..................................................................................................................60
1.4.5 Host Layers .............................................................................................................61
1.4.6 Comparison between TCP & UDP .........................................................................66
2 Activity ....................................................................................................................................68
2.1 Network Devices .............................................................................................................68
2.1.1 Hp server vs dell server ...........................................................................................76
2.1.2 Choosing a server for syntax solution .....................................................................78
2.2 Discuss the inter-dependent of workstation hardware with relevant networking software
85
2.3 Cost analysis....................................................................................................................87
3 Activity 03 ...............................................................................................................................88
3.1 Prepare a written netw ork de s ign p la n t o me e t the a bove -me nt ione d
user requirements incl udin g a bl ue print .......................................................................88
3.2 Drawing the network plane cisco packet tracer ..............................................................89
3.2.1 Provide the IP address allocation table for the redesigned network .......................90
3.2.2 IP, subnetting to the devices, IP, subnetting to the Routers & VLAN configuration
of syntax solution ....................................................................................................................94
3.3 An example of a server operating system is VM wear pro setup and the steps have been
shown below................................................................................................................................99

Umair Faisal Networking Unit-2 [18]


4 Acitivity.................................................................................................................................115
4.1 Implemented network plan for syntax solutions ...........................................................115
4.2 Network Checking .........................................................................................................116
4.3 Testing Result of the system .........................................................................................118
4.4 Future enhancements for syntax solutions ....................................................................119
5 Harvard Referencing .............................................................................................................119

Umair Faisal Networking Unit-2 [19]


1 Activity 1

1.1 What is a network?

In information technology, a network is the connection of at least two computer systems


via a cable or a wireless connection. A network connects nodes (groups of devices) or
computers. A network is a grouping of computer systems, servers, and networking
devices that are linked together to share resources like a printer or a file server.
Connections are made via cable or wireless technology. There are approximately twelve
types of computer networks in the world, but only four types of networks are mainly
used.

Figure 1 Picture of a computer network

Umair Faisal Networking Unit-2 [20]


1.1.1 Types Networks

1. Personal Area Network (PAN)


2. Local Area Network (LAN)
3. Wide Area Network (WAN)
4. Metropolitan Area Network (MAN)
5. Wireless Local Area Network (WLAN)
6. Campus Area Network (CAN)
7. System-Area Network (SAN)
8. Passive Optical Local Area Network (POLAN)
9. Enterprise Private Network (EPN)
10. Virtual Private Network (VPN)
11. Campus Area Network (CAN)
12. Home Area Network (HAN)

1.1.2 As I mentioned on page 1, there are twelve types of different computer networks.
However, the computer networks
are:

1. Personal Area Network (PAN)


2. Local Area Network (LAN)
3. Wide Area Network (WAN)
4. Metropolitan Area Network (MAN)

Figure 2 type of computer networks

Umair Faisal Networking Unit-2 [21]


1.1.2.1 Personal Area Network (PAN)

Figure 3 Picture of Personal Area Network

A personal area network (PAN) connects electronic devices in a user's close vicinity.
PANs might be as small as a few centimeters or as large as a few meters. The connection
between a Bluetooth headset and a smartphone is one of the most common real-world
examples of a PAN. Desktop screens, smartphones, laptops, tablets, and other digital
devices can also be linked by PANs.

Advantages of Personal Area Network (PAN)

No need for extra cables and wires.

A PAN network does not require additional cables. As a result, users no longer have to
worry about wire management or floor space. For establishing a connection between two
devices, only Bluetooth needs to be enabled. As a result, PAN is considered incredibly
cost-effective.

Umair Faisal Networking Unit-2 [22]


Security is very high.

Because all devices and data are permitted, PAN networks are regarded as safer and more
secure than other networks. As a result, it is nearly impossible to hack or interfere with
devices in this environment

The connection between devices

Using PAN, we can connect several devices to a single device. A single smartphone, for
example, can be used to connect numerous devices, such as a keyboard, mouse, and
printer, as well as another smartphone, which allows us to share files very easily.

Easy to use

Users can transfer devices and exchange data because PAN is wireless. This opens the
door to network portability.

Disadvantages of Personal Area Network (PAN)

Only a small area can be covered

PAN will not work beyond 10 meters because it relies on a short-range Bluetooth
connection. It is a significant disadvantage when it comes to long-distance data sharing.

Interference with radio signals

PAN networks use infrared light to convey data. As a result, it may cause data dropouts
and interfere with other radio frequencies. This has the potential to substantially interrupt
the connection between two devices. Coverage of a smaller area

Umair Faisal Networking Unit-2 [23]


Low data transfer speed

When compared to other types of networks, PAN has a slower transmission rate. This is
because infrared and Bluetooth are the most used connection types on PAN networks.
Infrared and Bluetooth are very slow types of wireless connections.

1.1.2.2 Local Area Network (LAN)

Figure 4 Picture of Local Area Network (LAN)

A local area network (LAN) is a network of two or more devices that are wired or
wirelessly linked and spread across a geographic region. A local area network (LAN)
connects computers and other equipment within a building or premises, allowing local
users to exchange information through file servers, print documents through centralized
printers, conduct transactions through central servers, and securely connect to outside
networks via a firewall router.

Advantages of Local Area Network LAN

Resource Sharing

All resources are linked to a single network, and if one computer requires a resource, it
may be shared with another. DVD disks, printers, scanners, modems, and hardware drives
are examples of these resources. As a result, you may save money by not purchasing
different resources for each machine.

Umair Faisal Networking Unit-2 [24]


Data Security

The server's data storage is extremely secure. On a server computer, we may simply alter
or remove data, and other computers can access the updated data. We can also grant
permission to a specific group of people to access the data.

Communication is simple and quick.

Computers in local area networks may simply and swiftly exchange data and messages.
This saves time and allows us to do tasks more quickly. Any user on the network can
share messages and data with any other user on the network thanks to LAN. Users can
connect to the network from any computer and view the server's data.

Good connection between the client and the server

A single server may store all data from linked machines. If a particular piece of data is
required by each computer (client), the user can quickly log in and retrieve it from the
server. For example, movies and songs can be stored on a server and accessed by any
authorized user.

Cost-Effective

Because LAN systems do not require substantial cabling and other infrastructure, they are
less expensive to set up and operate than other networks such as WAN and MAN.
Because LAN is a local network, diagnosis and maintenance are simple.

Resource Collaboration

Overpriced components, such as printers and scanners, cannot be linked to every desktop
back in the day it would be extremely inconvenient for the corporation; however, thanks
to LAN, a corporation only needs one printer and scanner, and everyone can connect to
that printer and scanner and send instructions from their machines, resulting in significant
cost savings for the corporation.

Disadvantages of Local Area Network (LAN)

Umair Faisal Networking Unit-2 [25]


Distance Limits

Local area networks are often formed within or around a building and cannot be expanded
to cover a wider region as WAN and MAN networks do.

If the server fails, the system fails.

If a file on the server becomes damaged or a hard disk crashes, all of the associated
machines will have difficulty working properly.

Making a LAN network is very expensive

Setting up a LAN is costly since special software is required to create a server.


Furthermore, communication hardware such as hubs, switches, routers, and cables are
expensive. If the LAN fails or malfunctions, a specific administrator is necessary to
maintain and debug it

1.1.2.3 Wide Area Network (WAN)

Umair Faisal Networking Unit-2 [26]


Figure 5 Picture of Wide Area Network(WAN)

A wide area network (WAN) is defined as a connected collection of telecommunication


networks that are distributed across a large geographic area spanning multiple cities,
territories, or nations so that the component networks can exchange data within the
defined WAN group. This article discusses the types of WAN to choose from, its
architecture components, and ten best practices for implementation. (BasuMallick, 2022)

Umair Faisal Networking Unit-2 [27]


Advantages of Wide Area Network (WAN)

The Scope of coverage is extensive

The WAN network stretches across large geographical areas. Even if some companies'
corporate offices are spread throughout the country, the company’s staff can connect with
other branches over a WAN network very easily.

High-Speed Connection

Leased lines are frequently used in corporate LANs to create the most important part of a
network. When leased lines are used, there is greater bandwidth available than with a
typical broadband connection. Here, the benefit is that the company can send and receive
data in a faster manner.

Global Business

By using the internet we can do business in the global range very easily using the WAN.

Disadvantages of Wide Area Network (WAN)

Security risks

A WAN network has greater security difficulties than a LAN or MAN network since all
the technologies are integrated, which brings up the issue of security.

High Cost for Installation

Umair Faisal Networking Unit-2 [28]


Because of their geographic scope, WANs are complex and complicated. As a result, they
are expensive to set up. Setting up a WAN necessitates getting routers, switches, and
access services from professionals.

Issues In Trouble Shooting

Troubleshooting WAN difficulties is a complex and time-consuming process. It is


difficult to recognize the actual source of network problems due to their extensive
geographical reach. Furthermore, the WAN cables go beneath the water. If such cables
get damaged, it might be difficult to repair them due to the large number of resources
required.

Maintaining Issues

When maintaining these kinds of networks, we want to make sure that these networks are
monitored all the time because if the system goes down, the company must face many
consequences, so there need to be some administrators who are prepared to fix the errors
at any time.

Umair Faisal Networking Unit-2 [29]


1.1.2.4 Metropolitan Area Network (MAN)

Figure 6 Picture of Metropolitan Area Network (MAN)

Metropolitan Area Network, also known as MAN, can be defined as a type of network
that is accessible across a large physical area, typically ranging from 5 Kms to 50 Kms.
As one can refer to the range of this distance to be a metropolitan area, this network is
named as Metropolitan Area Network. MAN can enable the communication systems of
numerous nodes in the said range, and so it is commonly used for generating networks in
a large office area, for various buildings in an academic institution, and even for industrial
purposes. For this reason, this network is also called a Campus Network. (pedamkar,
2019)

Umair Faisal Networking Unit-2 [30]


Advantages of Metropolitan Area Network (MAN)

Fastest internet connection

For data transfer, MAN frequently employs fiber-optic cables. Fiber optic lines may
deliver rates of up to 1000 Mbps. As a result, data and information may be exchanged
more quickly.

Less cost when compared to WAN

When compared to WAN, MAN uses far fewer resources. As a result, installation
expenses are significantly lowered. Furthermore, merging both MAN and WAN networks
saves money. Moreover, all data on the MAN network has been managed extremely
effectively and centrally. As a result, MAN is extremely cost-effective

High Security.

Metropolitan area networks have high-security levels when compared with Wide area
networks

Sharing of the Internet

Users can share their internet connections with other users by using MAN. All MAN
users will benefit from high-speed internet connectivity in this manner.

Umair Faisal Networking Unit-2 [31]


Disadvantages of Metropolitan Area Network (MAN)

MAN has a low-security level when compared to LAN

In comparison to LAN, the likelihood of hackers attacking a MAN network is very high.
As a result, data is vulnerable to hacking. Well-trained personnel and safety equipment
are required for data security.

It’s hard to Manage

When the Metropolitan Area Network grows, it becomes difficult to manage. This is due
to security issues and additional configuration.

Requirement of wires

In comparison to LAN and WAN, MAN requires more wires to operate. This is primarily
due to the joining of two LAN networks. When there is a need for more wires, the
network will incur additional costs.

Internet Speed

MAN requires fiber optic cables, which are quite expensive, to function. It cannot operate
on the traditional copper wires found on telephones. If the connection is made through a
traditional copper wire, the connection will be extremely slow compared to the fiber optic
cable.

Umair Faisal Networking Unit-2 [32]


1.1.2.5 Wireless Local Area Network(WLAN)

Figure 7 picture of Wide Local Area Network(WLAN)

WLAN, which stands for "wireless local area network," refers to a sort of local network
that is distinguished by its wireless nature. It is a network that may connect numerous
remote computer units separated by around a hundred meters. This network is mostly
dependent on radio wave data transmission. A WLAN lets users roam throughout the
coverage area, which is often a house or small office while remaining connected to the
network. One of the best examples of a WLAN connection nowadays is the most widely
used Wi-Fi connection.

Umair Faisal Networking Unit-2 [33]


Advantages of Wide Local Area Network (WLAN)

Accessibility

WLAN networks do not require wires or cords, allowing users to interact while on the
move. We may also connect to a network in the workplace without the need for adapters
or extra wires and cables.

Scalability

It is simple to add or remove a new workstation from a WLAN. A WLAN may be


extended in the same way that a computer is switched on. However, users must ensure
that the number of devices does not surpass a particular limit.

Cost Effective

Wireless LANs don't have cords and plugs. As a result, the cost of network installation is
reduced. A network technician, for example, is not required to install the network. This
method is significantly less expensive than traditional copper cabling.

It is efficient

It improves data transmission, resulting in speedier information transfer between partners,


customers, and inside the business. For example, it allows users to browse the internet
while on the phone.

Umair Faisal Networking Unit-2 [34]


Disadvantages of Wide Local Area Network

Installation process

Most WLANs are challenging to set up. Particularly for inexperienced users. The
installation process necessitates the use of professionals. Furthermore, because WLAN
relies on access points rather than cables and hubs, additional equipment is required to set
up the network. This might result in more cost.

Reliability

Interference from multiple devices might cause a WLAN to fail. Interference is prevalent,
especially where there are electrical devices that consume frequency. Physical features
such as walls and ceilings can also interfere with electronic gadgets.

Coverage Issues

Wireless networks, especially WLAN, are most commonly challenged with coverage
issues. A WLAN can only cover a certain amount of ground. The signal degrades when
the user walks away from this range. This is an issue in large buildings with a high
number of users. Users may suffer frequent signal dips or no service at all in such
instances.

Umair Faisal Networking Unit-2 [35]


1.1.2.6 Virtual Private Network (VPN)

A VPN (virtual private network) service establishes a secure, encrypted web connection.
Internet users may use a VPN to increase their online privacy and anonymity, as well as
to avoid geographic-based filtering and restrictions. VPNs, in effect, extend a private
network across a public network, allowing a user to securely send and receive data over
the internet.

Figure 8 Picture of how VPN works

Advantages of using VPN

Security

VPNs assist with the protection of personal information and other data while it is in
transit or when it is transferred from and received by a device.

Privacy

VPNs hide information such as our IP address, location, and search history from websites,
web browsers, telecom companies, internet service providers (ISPs), and others.

Umair Faisal Networking Unit-2 [36]


offers scalability for the network

Costs associated with establishing a specialized private network rise as enterprises


expand. Utilizing the network lines and network capacity that is already in place, internet-
based VPNs can provide enterprises access to remote and foreign sites, possibly
improving service quality and reach.

Disadvantages of using VPN

Slow internet connection

When considering the connection of a VPN is slightly slow when compared to a normal
internet connection.

Illegal to use

VPN use is an illegal and punishable offense in some countries, including Korea, Iran,
and China.

VPN is not secure always

VPNs do not always provide security, but there may be times when they do protect us
from threats that are extremely unlikely to be avoided.

Lack of knowledge of encrypting

It might be challenging to determine the encryption strength of your VPN unless you are
an encryption specialist. However, choosing a trustworthy VPN provider with good
reviews will increase the likelihood that your encryption is of a high caliber.

Umair Faisal Networking Unit-2 [37]


1.1.3 Differences between LAN, MAN, and WAN

Basis LAN MAN WAN


Full-Form Local Area Metropolitan Area Wide Area
Network Network Network
Transmission Data transmission Data transmission Data transmission
Speed speed is high speed is Average speed is High
Ownership of The ownership of The ownership of the The ownership of
the network this network is network can be private the network can be
private. or public. private or public.
Covering Area It covers little covers a big region, as a covers a larger
areas like a single town. geographic area,
building or school. such as a whole
continent or
country.
Examples Typical examples Examples of MANs Examples of
of LANs are the include computer WANs include
computer networks that cover a computer
networks found in small village or city. networks that span
workplaces, the whole city or
homes, schools, the entire world,
hospitals, and such as the
other places. internet.
Maintenance It is easy to It has to maintain when It is hard to
maintain compared to LAN maintain when
compared to both
LAN and MAN
Congestion Because there are The network congestion The network
fewer computers in MANs is high. congestion in
in LANs, there is LANs are high
relatively low
network
congestion.

Umair Faisal Networking Unit-2 [38]


Table 1 Difference between LAN, MAN, and WAN

1.1.4 Network System types


The basic definition of an operating system is that the operating system is the interface
between the computer hardware and the user. And in daily life, we use the operating
system on our devices which provides a good GUI, and many more features with it.
Similarly, a network operating system(NOS) is software that connects multiple devices
and computers on the network and allows them to share resources on the network. Let’s
see what are the functions of the network operating system. (nishant, 2022)

There are two types of network systems

• Peer to Peer
• Client-server

1.1.4.1 Peer to Peer

Figure 9 picture of Peer-to-Peer network

A peer-to-peer (P2P) network is created when two or more PCs are linked and exchange
resources without using a separate server computer. A P2P network can also be a
permanent configuration that links a dozen PCs in a small business using copper cables.
Alternatively, a P2P network might be a much bigger network where special protocols
and applications create direct connections between users over the Internet.

Umair Faisal Networking Unit-2 [39]


Advantages of Peer-to-Peer networks

Reliability

A P2P network does not rely on a central system. This implies that the connected
computers can operate independently of one another. Even if one part of the network
fails, the others will not be affected. Only the user will have access to such files.

Implementation

A peer-to-peer network is relatively simple to set up and does not require any advanced
skills. The connection requires only a hub or a switch. Furthermore, because all linked
computers can handle themselves, there should be few settings. However, some
specialized software is required.

Cost Effective

A peer-to-peer network can be created and maintained for comparatively little money
overall. Because there is no central configuration, the setup costs have been significantly
lowered. Furthermore, none of the network users on the Windows server need to pay
anything. if the payment is only made once.

Disadvantages of Peer-to-Peer networks

No centralized Storage

There is no centralized or dedicated location to store all important data or information.


And the files are spread over many computers. As a result, a single person cannot have
sufficient control over the accessibility of information. As a result, it might be difficult to
explore the file efficiently. The user may spend a considerable amount of time searching
for a file.

Umair Faisal Networking Unit-2 [40]


Slow Performance

Another challenge that a peer-to-peer network faces is performance. Because each


computer is being accessed by other users, performance will degrade as the number of
devices connecting to the network grows. As a result, P2P networks do not scale well
with expanding networks.

Issues in Remote Access

Unauthorized remote access may occur if the network has an unsecured kind of code or
another code. In that instance, the unauthorized user may gain access to sensitive data or
information about the firm. As a result, P2P network users can get around this constraint.
As a result, before establishing the peer-to-peer network, the user should ensure that they
are prepared for such eventualities.

1.1.4.2 Client – server

Figure 10 Picture of client-server network

A client-server network swiftly overcame earlier varieties of computer networking to


become the most popular as technology and computers developed. Desktop and laptop
computers, as well as other mobile devices with the necessary hardware, can use a client-
server network.

Umair Faisal Networking Unit-2 [41]


Advantages Of Client-server network

Centralization

Data security and user permission and authentication control are relatively easier with a
single server that stores all of the crucial data in one place. Any problem that develops
across the entire network may be fixed in a single place.

Scalability

Incredibly scalable client-server networks exist. The number of clients and servers can be
increased if the user wants more resources. The server's capacity can be increased without
much disruption. Since the server is centralized, there is no uncertainty regarding
permission to access network resources, even if the size grows. As a result, the
configurations only require a small number of employees.

Accessibility

The nodes in a client-server system are all independent, requiring data only from the
server, making updates, replacements, and relocations easy.

Disadvantages Of Client-server network

Expensive

The expense of installing and maintaining the server is often higher than the cost of
running the network in client-server networks. Because of their efficiency, the networks
could be expensive to purchase. As a result, not all users will be able to afford them.

Congestion

Client-server networks' main drawback is the traffic congestion they experience. The
connection will slow down or break if there are too many clients sending requests to the

Umair Faisal Networking Unit-2 [42]


same server. Information access issues are frequently caused by a server that is
overloaded.

Hard to Maintain

The servers will operate constantly after they are installed; therefore, they must be given
proper maintenance. Any errors must be corrected immediately and without additional
delay. As a result, the server has to be managed by an experienced network manager.

Here are some differences between Peer to Peer and Client server network

• In the client's server network, the servers react to the client's request, however in
the peer-to-peer network, any node can request and answer services.
• Client-server networks are appropriate for both small and big networks, but peer-
to-peer networks are only appropriate for small networks.
• Centralized servers store data in client-server networks, whereas peer-to-peer
networks store data for each peer.
• The client-server network does not keep the information that is transferred,
therefore there is no way to resend the data; however, in peer-to-peer networks, if
the information is lost, the matching node can resend the information since it is
saved.

1.2 Network Standards

Networking standards establish the data transmission rules required for networking
technologies and processes to interoperate. Standards aid in the creation and maintenance
of open markets by allowing diverse suppliers to compete on the quality of their products
while remaining compatible with existing market items.

Umair Faisal Networking Unit-2 [43]


Several standards may be utilized concurrently at various levels of data transfer. At each
stratum, the most widely used standards are

• Application layer: HTTP, HTML, POP, H.323, IMAP


• Transport layer (TCP, SPX)
• Network layer (IP, IPX)
• Data Link Layer: Ethernet (IEEE 802.3, X.25, Frame Relay)
• Physical layers: RS-232C (cable), V.92 (modem)

The most important network standards

➢ International Standard Organization (ISO)


➢ Consultative Committee for International Telephony and Telegraphy (CCITT)
➢ American National Standard Institute (ANSI)
➢ Institute of Electrical and Electronic Engineering (IEEE)
➢ Electronic Industries Association (EIA)
➢ World Wide Web Consortium (W3C)
➢ International Telecommunication Union (ITU)

Institute of Electrical and Electronic Engineering (IEEE)

IEEE is a professional worldwide organization founded in the United States that is made
up of electronics, computer, and communications engineers. It develops communication
and data processing standards with the primary purpose of developing theory, innovation,
and product quality in any field of electrical engineering.

Consultative Committee for International Telephony and Telegraphy (CCITT)

The CCITT has become the standard organization in the United States. The CCITT
developer's recommended set of telephone and telegraph communication norms and
standards

American National Standard Institute (ANSI)

Umair Faisal Networking Unit-2 [44]


ANSI is the United States' recognized standards agency and the voting characteristic for
the ISO in the United States. The American National Standards Institute (ANSI) is a
private, non-profit association of data processing equipment and service suppliers.

Electronic Industries Association (EIA)

This group develops and promotes industry standards. The EIA has created the RS
(Recommended Standards) set of data and telecommunications standards.

International Telecommunication Union (ITU)

The International Telecommunications Union (ITU) is one of the four permanent sections
of the International Telecommunications Union, headquartered in Geneva, Switzerland. I
t has developed three sets of descriptions:
• V series for modem integration and data transmission over telephone lines.
• X series for data transmission over public digital networks, email, and directory se
rvices
• Y series for data transmission over public digital networks, email, and directory se
rvices.

Institute of Electrical and Electronic Engineering (IEEE)

It is a professional organization for electronic, computer, and communication engineering


based in the United States. It offers distinct sets of norms and standards in the sectors of
communication and networking. The IEEE standards for the Syntax Solution network are
listed below.

Table for IEEE standards

Standards Description
IEEE 802 LAN/MAN Overview and architecture
IEEE 802.1 LAN/MAN Bridging and management
IEEE 802.1s Multiple spanning tree
IEEE 802.1 w Rapid reconfiguration of spanning tree
IEEE 802.1x Port-based network access control
IEEE 802.2 Logical Link Control (LLC)

Umair Faisal Networking Unit-2 [45]


IEEE 802.3 CSMA/CD access method (Ethernet)
IEEE 802.3ae 10 Gigabit Ethernet
IEEE 802.4 Token passing bus access method and Physical layer
specifications
IEEE 802.5 Token Ring access method and Physical layer specifications
IEEE 802.6 Distributed Queue Dual Bus (DQDB) access method and
Physical layer specifications (MAN)
IEEE 802.7 Broadband LAN
IEEE 802.8 Fiber Optics
IEEE 802.9 Isochronous LANs (standard withdrawn)
IEEE 802.10 Interoperable LAN/MAN Security
IEEE 802.11 Wireless LAN MAC and Physical layer specifications
IEEE 802.12 Demand-priority access method, physical layer, and repeater
specifications
IEEE 802.13 Not used
IEEE 802.14 Cable modems (proposed standard was withdrawn)
IEEE 802.15 Wireless Personal Area Network (WPAN)
IEEE 802.16 Wireless Metropolitan Area Network (Wireless MAN)
IEEE 802.17 Resilient Packet Ring (RPR) Access
Table 2 IEEE standards table (Gupta, 2018)

1.3 Network Topologies

1.3.1 What is meant by a network topology?

The structure and arrangement of components in a computer communication system are


referred to as "network topology." The Internet is the most important technology today,
and it is dependent on network structure. Some of the benefits of establishing network
topology include appropriate network operation; improved network performance; lower
operating, installation, and maintenance costs; error or fault detection; and optimal
resource use.

Umair Faisal Networking Unit-2 [46]


Network topologies can be divided into two types

• Logical topology
• Physical topology

1.3.1.1 Logical topology

A logical topology is a networking term that describes the design of a network's


communication mechanism for all nodes. The logical topology of a network may be
dynamically maintained and modified using network equipment such as routers and
switches. Logical topologies differ from physical topologies, which relate to the physical
linkages of all network devices.

1.3.1.2 Physical topology

The interconnected structure of a local area network is referred to as its physical topology
(LAN). The physical topology is defined by the method used to link the physical devices
on the network with cables and the kind of cabling utilized. In fact, logical topology
explains the performance of a network's media signals and how it transfers device data.

1.3.2 Most Common Type of Network Topology

There are several types of network topology, and each is appropriate for a particular
purpose based on the total network size and your purpose. The mentioned below are some
of them.

• Bus Topology
• Star Topology
• Ring Topology
• Tree Topology

Umair Faisal Networking Unit-2 [47]


• Mesh Topology
• point-to-point Topology
• hybrid network Topology

1.3.2.1 Bus Topology

Figure 11 Picture represents Bus Topology

The bus topology connects all the included nodes with a single wire. The main cable
serves as the network's backbone. The server is also one of the computers in the network.
It is referred to as a "linear bus topology" when it has two terminals.

Advantages and disadvantages of bus topology

Advantages Disadvantages

Coaxial or twisted-pair cables are Adding more network devices would


mostly used in bus-based networks with slow down networks.
data rates of up to 10 Mbps.

Umair Faisal Networking Unit-2 [48]


Because cable is less expensive than Network speeds go down during large
other topologies, it is commonly utilized data transfers.
to establish smaller networks.
Because each device is linked to its own A bus topology is simpler, but it still
backbone cable, a mistake in one device needs a lot of wiring.
has no effect on the other.

Table 3 Advantages and disadvantages of bus topology

1.3.2.2 Star Topology

Figure 12 Picture represents Star Topology

All computers in the star topology are linked together through a hub. This wire is referred
to as a "central node," and it connects all other nodes. It is mostly used on LAN networks
since it is affordable and simple to set up.

Advantages and disadvantages of Star topology

Advantages Disadvantages

It is simple to update the Hub as needed. The performance depends on the hub’s
capacity

Umair Faisal Networking Unit-2 [49]


Fast performance with a small number When one computer fails, the entire
of nodes and relatively low network network is impacted.
traffic.
It is simple to identify and isolate faults. The cost of Installation is high

Table 4 Advantages and disadvantages of star topology

Umair Faisal Networking Unit-2 [50]


1.3.2.3 Ring Topology

Figure 13 Picture represents Ring Topology

Every device in a ring network has exactly two neighboring devices for communication
purposes. It is known as a ring topology because its form resembles a ring. In this
topology, each computer is linked to another. In this case, the last node is joined with the
first one.

Advantages and disadvantages of Ring topology

Advantages Disadvantages

In a ring topology, data transmission is A single node failure in the network can
extremely fast. cause the entire network to fail.
It is cheap to Install and Expand Troubleshooting in a Ring topology is a
time-consuming operation.
Because only nodes with tokens can Signals always circulate in the ring
send data, the network is unaffected by topology, resulting in unnecessary waste
many nodes or heavy traffic. of power.
Table 5 Advantages and disadvantages of ring topology

Umair Faisal Networking Unit-2 [51]


1.3.2.4 Tree Topology

Figure 14 Picture represents Tree Topology

Tree topology is a topology in which nodes are interconnected in a hierarchical fashion,


with all nodes connected to the topmost or root node. As a result, it is also known as
hierarchical topology. There are at least three levels of hierarchy in tree topology.

Advantages and disadvantages of Tree topology

Advantages Disadvantages

The failure of a single node has no It becomes tough to maintain when


effect on the rest of the network. more nodes are added.
In a tree topology, error detection and Because of the cabling, the cost is high.
correction are simple.
Node expansion is quick and simple. If the root node fails, the network will
also fail.
Table 6 Advantages and disadvantages of tree topology

Umair Faisal Networking Unit-2 [52]


1.3.2.5 Mesh Topology

Figure 15 Picture represents Mesh Topology

The mesh topology features a distinct network design in which every computer on the
network communicates with every other device. It establishes a P2P (point-to-point)
connection between all network devices. It provides a high amount of redundancy, so
even if one network cable breaks, data can still reach its destination through an alternate
way.

Advantages and disadvantages of Mesh topology

Advantages Disadvantages

Communication between nodes is Installation and configuration are


extremely quick. complex.
Because it has several links, if one route Because all of the nodes are linked,
is blocked, other routes can be used for cabling is expensive.
data transfer.
P2P links make the fault discovery and It takes a lot of space to carry the cables.
isolation procedure easier.
Table 7 Advantages and disadvantages of mesh topology

Umair Faisal Networking Unit-2 [53]


1.3.2.6 Point-to-Point topology

Figure 16 Picture represents Point to Point Topology

The point-to-point topology is the most basic of all network topologies. The network in
this manner consists of a direct link between two computers.

Advantages and disadvantages of Point-to-Point topology

Advantages Disadvantages

There is no requirement for a network The main disadvantage is that it can only
operating system. be applied in limited regions when PCs
are near together.
Individual workstations are utilized to Apart from the permissions, there is no
access the data, so no costly server is security. Users are frequently not
required. required to log in to their workstations.
There is no need for specialist network Files and folders cannot be backed up
technicians because each user controls centrally.
their own authorization.

Umair Faisal Networking Unit-2 [54]


Table 8 Advantages and disadvantages between point-to-point topology

1.3.2.7 Hybrid Topology

Figure 17 Picture represents Hybrid Topology

A hybrid topology is a network topology that combines two or more different types of
topologies. It is a reliable and scalable topology, but it is also expensive. It inherits the
benefits and drawbacks of the topologies that were used to construct it.

Advantages and disadvantages of Hybrid topology

Advantages Disadvantages

Provides the simplest ways to find and The design of hybrid topology is
troubleshoot problems. challenging.
This topology is very flexible. It is expensive since it includes more
than one topology.
It is scalable since the size may be The infrastructure cost is quite expensive
readily increased. since a hybrid network needs a large

Umair Faisal Networking Unit-2 [55]


amount of cabling and network
equipment.

Table 9 Advantages and disadvantages of hybrid topology

1.3.3 Bandwidth

The term "bandwidth" refers to the range of frequencies that a communications channel
can convey. The greatest quantity of data that a baseband networking medium can
potentially transfer is also indicated by the bandwidth. The variations that any single
carrier frequency can convey, less the overhead associated with analog-to-digital
conversion, are used to determine the bandwidth for broadband networking medium.

Advantages of High bandwidths Disadvantages of Low bandwidth


Faster Application performance Slower Application performance
Faster data transfer speed Slower data transfer speed
Enables interactivity Disables interactivity
Allows more simultaneous visitors Allow fewer simultaneous visitors
Table 10 Advantages and disadvantages of high and low band widths

1.3.4 Data Communication


The exchange of data between a source and a receiver over a transmission medium such
as a wire connection is referred to as data communication. Local data transmission occurs
when communicating devices are within the same building or a similarly constrained
geographical region. The data communication has five components they are:

➢ Sender
➢ Receiver
➢ Message
➢ Transmission medium

Umair Faisal Networking Unit-2 [56]


1.3.4.1 Sender
Someone must be present to act as a source in order for the message to be transferred
from source to destination. In a data transmission system, the sender serves as a source. It
is only a tool that transmits data messages. The device might be a computer, cell phone,
landline, tablet, or workstation, among other things.

1.3.4.2 Receiver
It is the point where the message delivered by the source has finally arrived. It is a
message-receiving device. The receiver, like the transmitter, can take the shape of a
laptop, tablet, smartphone, workstation, or another device.

1.3.4.3 Message
This is the most precious asset of a data transmission method. The message really refers
to data or information that is to be conveyed. A message can take any form, such as a text
file, an audio file, or a video file.

1.3.4.4 Transmission medium


It is the physical medium or network that the communication takes from sender to
recipient. The medium can be wired, such as twisted pair wire, coaxial cable, or fiber-
optic cable, or it can be wireless, such as laser, radio waves, and microwaves.

Data flow Model

What does a data flow model mean?

A data flow model is diagramatic representation of the flow and exchange of information
within a system. Data flow models are used to graphically represent the flow of data in an
information system by describing the processes involved in transferring data from input to
file storage and reports generation. (Anonymous, 2019)

There are modes of data transmission

Umair Faisal Networking Unit-2 [57]


➢ Simplex
➢ Half - duplex

Basis Simplex Half-Duplex Full-Duplex


Communication Communication is Communication is Communication is
Pathway one-way only. bidirectional, but bidirectional and
only one way at a takes place
time. simultaneously.
Send/Receive A sender can send A sender can send A sender can send
but not receive and receive data at and receive data at
data. the same time. the same time.
Performance The performance The full-duplex Full duplex improves
of half-duplex and mode outperforms performance by
Figure 18 Pictures represents modes of data transmission
full duplex is the half-duplex doubling bandwidth
superior to that of option. usage.
the simplex.
Examples Keyboard Walkie talkies Monitors
➢ Full - duplex

Comparison chart of modes of data transmission

Table 11 Comparison between modes of Data transmission

1.4 Networking Models

1.4.1 What is the TCP/IP model?

The primary purpose of the Internet Protocol (IP), which serves as the Internet's address
system, is to transmit data packets from a source device to a destination device. The
Internet was founded on IP, which is the main protocol used to establish network
connections. Error checking and packet ordering are not handled by IP. Another protocol,
often the Transmission Control Protocol, is required for such capability (TCP).

Umair Faisal Networking Unit-2 [58]


Figure 19 Picture of TCP/IP model

1.4.2 OSI model


OSI, which stands for "Open System Interconnection," is a reference model that specifies
how information from one computer's software program passes across a physical media to
another computer's software application. Each of the seven OSI levels carries out a
specific network function. In 1984, the International Organization for Standardization
(ISO) created the OSI model, which is currently regarded as an architectural framework
for inter-computer interactions.

Figure 20 7 layers of OSI model

Umair Faisal Networking Unit-2 [59]


1.4.3 Comparison between TCP/IP and OSI

Figure 21 Picture shows comparison between OSI and TCP/IP models

1.4.4 Protocols

A protocol is a collection of rules for organizing and processing data in networking.


Network protocols are like a computer language. The computers in a network may utilize
widely different software and hardware. The types of protocols are listed below. The
Protocols can be divided into seven layers three media layers and four host layers. The
seven layers a mentioned below:

• Physical
• Datalink
• Network
• Transport
• Session
• Presentation
• Application

Umair Faisal Networking Unit-2 [60]


Protocol categories

Table 12 Protocol categories


Layer Number Layers Data Protocols
Unit
7 Application Data HTTP, IMAP,
Host Layers

(Network process to Applications) FTP, etc.


6 Presentation Data ACSE, FRAM
(Data presentation and
Encryption)
5 Session Data L2TP, SMPP
(Interhost Communication)
4 Transport Segments TCP/UDP
(End-to-End Connection and
Media Layers

Reliability)
3 Network Packets IP
(Path Determination and Logical
Addressing IP)
2 Data Link Frames Ethernet/Wi-Fi
(Physical Addressing) {Mac and
LLC}
1 Physical Bits 10 Base
(Media, signal, and Binary T,802.11
Transmission)

1.4.5 Host Layers

Application Layer Protocol

This layer is the seventh layer of the OSI model. The abstraction layer handles network-
sharing protocols based on the OSI and TCP/IP models. The Internet Protocol Suite's
application layer includes communication protocols and interface mechanisms for
processing network traffic. Protocols included at the application layer include

• Telecommunication Network (Telnet)

Umair Faisal Networking Unit-2 [61]


• File Transfer Protocol (FTP)
• Trivial File Transfer Protocol (TFTP)
• Simple Mail Transfer Protocol (SMTP)
• Simple Network Management Protocol (SNMP)
• Domain Name Server (DNS)
• Dynamic Host Configuration Protocol (DHCP)

Telecommunication Network (Telnet)

The short form Telnet stands for Telecommunication Network. Telnet features
bidirectional interactive text-oriented communication. Telnet employs a terminal
connection for text-based communication. Telnet can be used to set up networking
hardware. In an 8-bit, byte-oriented data connection, information is interpolated in-band
with Telnet control information at TCP. Telnet is a client-server protocol that allows
distant machines to open a command line. The port used by Telnet is number 23.

File Transfer Protocol (FTP)

FTP represents the short form of file transfer protocol. This protocol facilitates the
transmission of various files from one device to another. With dependable and efficient
data transport, FTP enables file sharing across remote computer devices. FTP use port 20
for data access and port 21 for data management.

Trivial File Transfer Protocol (TFTP)

The trivial file transfer protocol (TFTP) is an application layer protocol used to deliver
files from the server to the client. To share files between a server and a client, the simple
file transfer protocol employs the User Datagram (UDP) notion’s used port 69.

Simple Mail Transfer Protocol (SMTP)

Umair Faisal Networking Unit-2 [62]


SMTP stands for Simple Mail Transfer Protocol. SMTP is used to send e-mails. We use
SMTP to configure the host for sending e-mails. Ports 25 and 587 are used by SMTP.

Simple Network Management Protocol (SNMP)

SNMP stands for Simple Network Management Protocol. This protocol collects data by
polling network devices to the management station at set or random intervals, forcing
them to provide certain information. SNMP employs port numbers 161 (TCP) and 162
(UDP).

Domain Name Server (DNS)

DNS stands for Domain Name server. Each host device in any network is assigned a
unique logical address known as an IP address. IP addresses are a string of digits that are
tough to memorize. When we input a web address, such as Apple.com, into a browser, we
are requesting a host with an IP address. However, there is no need to remember the IP
address of the web page we are accessing because DNS translates a name to each logical
IP address and records it. DNS protocol uses port number 53.

Dynamic Host Configuration Protocol (DHCP)

DHCP denotes Dynamic Host Configuration Protocol. For communication with other
network devices, the host in any network requires an IP address. It obtains this address
through manual configuration or through the use of a dynamic host configuration protocol
(DHCP). DHCP uses port numbers 67 and 68.

Umair Faisal Networking Unit-2 [63]


Presentation Layer Protocol

The presentation layer converts data from the application layer into the device's native
internal mathematical structure and displays the information. It carries out code updates,
document compression, security encryption, and so on. It also specifies the data based on
the hub's software and hardware environment.

Session Layer Protocol

The session layer creates a connection termed a session, maintains and authenticates it,
and ensures the information or identity's security. Simply said, it controls the
communication between devices and establishes two endpoints. If the current session is
interrupted or dropped, it reconnects and begins a new one.

Umair Faisal Networking Unit-2 [64]


Transportation Layer Protocol

The Transport Layer is the fourth layer from the top in the OSI Model and provides
communication services to the application processes that were running on different hosts.
The services are provided by the transport layer to the session layer, which receives them
from the network layer. The services provided by the transport layer include error
correction as well as segmenting and DE segmenting data before and after it's sent on the
network. The transport layer also provides flow control functionality and ensures that
segmented data is delivered across the network in the right sequence. These are two
transport layer protocols: TCP and UDP.

Transmission Control Protocol (TCP)

The TCP protocol, which sits between the application layer and the network layer, is used
to offer dependable stream delivery service. TCP employs the acknowledgment system to
verify that data is sent properly, multiplexes at the sender end, and demultiplexes at the
receiver end.

User Datagram Protocol (UDP)

The full form of UDP is User Datagram Protocol. UDP is used to convey brief messages
known as "datagrams," but it is an unstable, connectionless protocol in general. David P.
Reed developed UDP, which is officially specified in RFC 768.

Umair Faisal Networking Unit-2 [65]


1.4.6 Comparison between TCP & UDP

Figure 22 Picture shows the comparison between TCP and UDP protocols (Panigrahi, 2022)

Umair Faisal Networking Unit-2 [66]


1.4.6.1 Cloud computing service models

What are cloud computing service models?

The phrase "cloud" refers to a service that can be accessed over the internet, as well as the
software and databases that run on these servers. Because computation and storage on the
server take place in a data center rather than on a locally installed user device, users may
access files and programs from any device while utilizing the cloud.

The three types of cloud service models

• Infrastructure as a service (IaaS)


• Platform as a service (PaaS)
• Software as a service (SaaS)

Infrastructure as a service (IaaS)

Hardware as a Service (HaaS) is another name for IaaS. It is an internet-based computer


infrastructure. The primary benefit of adopting IaaS is that it allows consumers to avoid
the cost and complexity of owning and operating physical servers.

Platform as a service (PaaS)

Platform as a Service (PaaS) allows companies to design, run, and manage apps without
requiring IT infrastructure. This facilitates and accelerates the development, testing, and
deployment of apps. Developers may concentrate on writing code and building apps
without having to worry about time-consuming IT infrastructure tasks like procuring
servers, storing data, and conducting backups.

Software as s Service (SaaS)

Umair Faisal Networking Unit-2 [67]


Software as a service (SaaS) replaces conventional on-device software with subscription-
based software. It is hosted on the cloud. Most SaaS apps may be accessed immediately
through a web browser, with no downloads or installation required.

2 Activity

2.1 Network Devices

The most used network devices are:

➢ Bridge
➢ Hub
➢ Switch
➢ Router
➢ Modem
➢ Repeater
➢ Gateway

Bridge

A bridge in a network is a type of network device that


is used to divide a network into portions. Every
network segment represents a collision domain with its
own bandwidth. such that a bridge can be used to
increase network performance
Figure 23 Picture of Bridge

Umair Faisal Networking Unit-2 [68]


Hub

Hubs are networking devices that connect several


devices in a network by operating at the physical
layer of the OSI model. They are commonly used to
link computers on a local area network (LAN). A
hub has several ports. A computer is plugged into
one of these ports to connect to the network.

Figure 24 Picture of Hub

Switch

A network switch joins devices on a network (often a


local area network, or LAN) and routes data packets
to and from those devices. A switch, unlike a router,
only distributes data to the one device for which it is
designed (which might be another switch, a router, or
a user's computer), not to networks of numerous
devices.
Figure 25 Picture of switch

Router

A router is a device that operates at the network level.


These devices, like the switch, have IP addresses. It
also supports routing that is dynamically changed.
When connecting a LAN to a WAN, a table is used to
route data packets. In the above case, communication
between the Internet connection and the inter-VLAN
requires the use of a router.

Figure 26 Pictures of router

Umair Faisal Networking Unit-2 [69]


Modem

The name "modem" is a short term for "modulator-


demodulator." It is a piece of hardware that lets a
computer or other devices connected to the Internet,
such as a router or switch. It "modulates," or converts,
an analog signal from a phone or cable connection into
digital data that a computer can recognize. Similarly, it
converts digital data from a computer or other device
into an analog signal that can be sent over standard

Figure 27 Picture of Modem


phone lines.

Repeater

A repeater is an electrical device that scales the


transmission so that the signal may go a greater
distance. We will now describe what a repeater is
in a computer network, as well as its types,
purposes, and operation, incorporating various
repeater functions in networking with simplicity.
This is the most comprehensive explanation on the
internet; by the conclusion of this post, you will be
completely educated about what a repeater is in
networking and will have no difficulties.

Figure 28 Picture of repeater

Umair Faisal Networking Unit-2 [70]


Gateway

A gateway is a data transmission mechanism that


allows distant networks to connect to a host
network. Outside the host network's node
bounds, the computer connects to a remote
network or an automated system. To be used by
routing pathways, all data routed inside or
outside the network must first pass through and
connect with the gateway. A router is often
configured to act as a gateway in computer
networks.
Figure 29 Picture of network gateway

Networking cables

Even though there have been advances in wireless technologies, many computer
networks in the 21st century rely on cables as the physical medium that devices use to
transfer data. Several standard types of network cables exist, each designed for specific
purposes. (Selph, 2020)

Types of network cables

• Coaxial Cable
• Twisted Pair Cable
• Fiber Optics cable

Umair Faisal Networking Unit-2 [71]


Coaxial Cable

Figure 30 Picture shows coaxial cable

A coaxial cable is a type of cable that is used to transmit video, communications, and
audio. This cable offers increased bandwidth and transmission capacity. Most people
think of a coaxial or coax cable as the cable that connects their televisions to their cable
TV service. However, similar connections are also utilized in networks that enable
broadband cable Internet access via a cable modem. A coaxial cable is depicted in the
image.

Twisted Pair cables

Figure 31 Picture Shows twisted pair cables

A twisted pair cable is a type of cable formed by twisting two independent insulated wires
and running them parallel to each other. This cable is frequently utilized in several types
of data and voice infrastructures.

Umair Faisal Networking Unit-2 [72]


Fiber Optics Cable

Figure 32 Picture of fiber optics cable

A fiber-optic cable is made up of a few to hundreds of optical fibers enclosed in a plastic


housing. They convey data signals in the form of light and travel hundreds of miles
quicker than standard electrical cables. They are also known as "optic cables" or "optical
fiber cables." Furthermore, because fiber-optic cables are non-metallic, they are not
affected by electromagnetic interference, which can impair transmission speed. Fiber
cables are also safer because they do not carry current and hence cannot spark.

What are servers?

A server is a computer that handles requests and sends data to other computers over the
internet or a local network. A web server is a common type of server from which web
pages can be accessed via the internet using a client such as a web browser.

Types of Servers

Web server

Web pages are a collection of data, such as photos, text files, hyperlinks, database files,
and so on, that are all stored on a computer (also known as server space) on the Internet.
A web server is a software program that runs on the server. When a user requests that
their web browser execute a web page, the web server organizes all of the data elements
into an orderly web page and sends them back to the web browser via the Internet.

Proxy Server

A proxy server is a server that acts as a middleman between client requests for specific
services or requests for specific resources and a specific server. There are various types of

Umair Faisal Networking Unit-2 [73]


proxy servers accessible, which are used depending on the objective of a client's request
to the servers. The primary function of proxy servers is to protect direct connections
between Internet clients and internet resources.

File Server

The file server enables network users to store and retrieve data. It also gives users a
speedier service. may backup data at any moment, and this server optimizes data
Processes of reading and writing

Database Server

In this sense, the phrase "database server" can refer to the hardware and software required
to manage a database. The database server, like software, is the endpoint of a database
program in the classic client-server approach. This spider is sometimes referred to as an
instance. This includes the actual machine that serves as the database's host. A database
server is a specific, sophisticated computer that hosts a database when it is mentioned in
this sense.

Mail Server

A mail server is also known as an email server. A mail server is a computer that sends
and receives emails. Web servers and mail servers are frequently combined on a single
computer. Large ISPs and public email services (such as Gmail and Hotmail) may,
however, use dedicated hardware for email sending and receiving.

Application Server

Application servers, also known as middleware, occupy a considerable portion of the


computational area between database servers and end users, and they frequently connect
the two.

Umair Faisal Networking Unit-2 [74]


Client Server

A server is software that waits for and fulfills requests from client programs on the same
or other computers under the client/server programming model. A given application on a
computer can act as both a client and a server in response to requests for services from
other programs.

Super Micro

Super Micro is an American corporation that manufactures computer equipment for


enterprises. The company was established in 1993. Super Micro is now the world leader
in high-performance and efficient server technologies. The organization is now focused
on generating technological advances and providing new solutions. Super Micro servers
are well-known for their high performance and dependability. Flexibility is also an
advantage of server equipment because it may be used with components from different
manufacturers.

IBM Server

IBM is one of the oldest established corporations in the computer technology industry. It
was established in 1911. The company provides of large-scale enterprise solutions and
servers. Its equipment is classified as business and is distinguished by fault tolerance,
security, and scalability. As for the benefits of IBM servers, we may mention greater
cyber resilience, the ability to interact with existing cloud settings, flexibility, and
scalability.

Hp Server

Hewlett-Packard (HP) is another computer systems market powerhouse that refuses to


give up. The company was founded in 1939 in Palo Alto, California, and is currently best
recognized as a manufacturer of laptops, printers, scanners, and other gadgets. HP's

Umair Faisal Networking Unit-2 [75]


products include servers. The company manufactures equipment for all levels of business,
from start-ups to huge organizations. Hewlett-Packard, as a high-end manufacturer,
delivers dependable servers with exceptional build quality and impressive scalability.
Rackmount and tower servers of different levels and accessories are available on the
market.

Dell Server

Dell is one of the world's largest and most influential computer manufacturers. The
company has been in business since 1983. It is now based in the United States. Dell
servers are quick, dependable, and simple to manage. Dell servers are significantly
quicker than those of several prominent competitors. Regular examinations demonstrate
the dependability of server equipment and components. Dell servers are also
exceptionally scalable.

2.1.1 Hp server vs dell server

Figure 33 Picture of HP servers and DELL servers

Dell and HP are two of the most well-known manufacturers of powerful, cutting-edge,
and dependable servers. With a few exceptions, both brands are nearly identical in
popularity and provide similar features and benefits. People and corporations frequently
compare the two to determine which is best for their needs. Personal experiences heavily
influence decisions. So we'll see which server is the best by drawing a comparison table.

Comparison table between Dell and HPE

Table 13 Comparison between dell and hpe servers (Chatla, 2022)

Type of HPE servers DELL servers


Comparison

Umair Faisal Networking Unit-2 [76]


reliability HPE ProLiant servers have 2.5 Most of their servers provide
times more downtime than Dell highly scalable storage,
PowerEdge servers. HPE does an offering provision for up to
impressive job with their 16 SAS drives having speed
prognostic alerts about the parts up to 12Gbps. They offer
that might fail. This gives variable memory capacities
businesses a chance to repair or and multiple advanced
replace those parts before they processor options. Their
break down. basic structure is such that it
gives them the ability to
allocate suitable resources for
a specific workload.
Expandability They can easily and quickly deploy Most of their servers provide
your core workloads while highly scalable storage,
providing uncompromising offering provision for up to
availability and scalability. You 16 SAS drives having speed
can add more or more powerful up to 12Gbps. They offer
components and devices to boost variable memory capacities
the server-level performance. and multiple advanced
processor options.
Storage Hewlett-Packard Enterprise (HPC) Dell PE servers can support
customers can choose from a wide up to 32 2.5″ SAS/SATA
range of storage drives for their HDDs or SSDs for max
servers. Their different internal storage of 122 TB.
combinations can provide They can also support 24
maximum internal storage up to 54 1.8″ SATA SSDs, up to 8
TB. PCIe Gen 3 slots and up to
10 NVMe drives.
Memory Hewlett-Packard's ProLiant servers Dell PE servers use different
can handle memory ranging from 8 types of memory DIMMS
GB up to 4 TB. They come in across their generations.
different numbers, ranging from 2 Unbuffered DIMMs or
to 128 slots across all server types, UDIMMs do not buffer any
models, and series. And they can of the add, control, clock, or

Umair Faisal Networking Unit-2 [77]


provide maximum internal storage data I/O lines. NVDIMM-Ns
starting from 8GB up to four TB. are used for boosting storage
platforms and can provide 16
GB of nonvolatile memory.

2.1.2 Choosing a server for syntax solution

There are many companies that bring up servers, such as IBM, Dell, HPE, Lenovo, and
Supermicro. When selecting a device, we will have to compare all the devices to decide
which one is the best server. So after we compare these devices, we will end up with all
the devices performing similarly, even though they are all good. We will have to select
the best of those servers for the Syntax Solution Company.

After comparing all the servers, we had two choices: HP and Dell. Choosing one of these
two servers was a bit of a challenge because both of them performed similarly. After
further comparison, we decided to go with the Dell server for the company's syntax
solutions because it offered some advantages.

Umair Faisal Networking Unit-2 [78]


DELL Power Edge R340

Features Specifications
Processors Intel® Xeon® processor E-2200 and E-2100 product family

Intel® Core™ i3 Intel® Pentium®

Intel® Celeron
Power Suppliers Single or dual 350W or 550W hot-plug redundant platinum
power supplies (100–240 V AC)
Storage controllers Internal controllers: PERC H730P, H330, HBA330 Software
RAID: PERC S140 External controllers: 12Gbps SAS HBA
Boot Optimized Storage Subsystem (BOSS): 2 x M.2 240GB
(RAID 1 or No RAID) or 1 x M.2 240GB (No RAID only)
Internal Dual SD Module3: 2x microSD (16GB, 32GB or
64GB) or 1x microSD (16GB, 32GB or 64GB)
security TPM 1.2/2.0 optional Cryptographically signed firmware
Silicon Root of Trust
I/O and Ports Networking Options: 2 x 1GbE LOM Network Interface
Controller (NIC) ports Front ports: 1x USB 2.0, 1 x IDRAC
micro USB 2.0 management port Rear ports: 2 x USB 3.0,
VGA, serial connector 2 x PCIe Gen 3.0 slots: • One x8 slot
low-profile, half-length with x4 slot width • One x16 slot low-
profile/full-height, half-length with x8 bandwidth
Drive Bays Up to 8 x 2.5” Hot-Plug drives

Up to 4 x 3.5” Hot-Plug drives


Physical Dimensions Chassis width: 434.00mm (17.08 in) Chassis depth: 595.63mm
(23.45 in) (3.5” HDD config) Chassis depth: 544.836mm (21.45
in) (2.5” HDD config) Note: These dimensions do not include:
bezel, redundant PSU Chassis weight: 13.6 kg (29.98 lb.)
Operating System Citrix® XenServer® Microsoft® Windows Server® with
Hyper-V (2016 and 2019) Red Hat® Enterprise Linux
Ubuntu® Server LTS SUSE® Linux Enterprise Server

Umair Faisal Networking Unit-2 [79]


Table 14 Specifications of DELL Power Edge R340

Figure 34 Picture of DELL Power Edge R340

DELL Power Edge R540

Features Specifications
Processors Up to two 2nd Generation Intel® Xeon® Scalable processors, up
to 20 cores per processor
Power Suppliers Platinum 495W, 750W, 750W 240V HVDC3 , 1100W, 1100W
380V HVDC3 Hot plug power supplies with full redundancy
option
Storage controllers Internal controllers: PERC H750, H350, H740P, H730P, H330
External controllers: HBA355e, H840, 12Gb/s Ext SAS HBA
Software RAID: S140 SAS Host Bus Adapters: HBA350i,
HBA330 Boot Optimized Storage Subsystem (BOSS):HW
RAID 2 x M.2 SSDs 240GB or 480GB Internal Dual SD
Module
Security TPM 1.2/2.0, TCM 2.0 optional Cryptographically signed
firmware Silicon Root of Trust
I/O and Ports Network options: 2 x 1GbE LOM + (optional) LOM Riser 2 x
1GbE or 2 x 10GbE SFP+ or 2 x 10GbE BaseT Front ports: 1 x
Dedicated iDRAC Direct USB, 1 x USB 2.0, 1 x Video Rear
ports: 1 x Dedicated iDRAC network port, 1 x Serial, 2 x USB
3.0, 1 x Video With Optional Riser: Non-rear storage config:
1xFH/FL + 1xHH/HL (2U Right riser) slots + 3 HH/HL slots
Rear storage config: 1xHH/HL (1U Left Riser) + 1xHH/HL (1U

Umair Faisal Networking Unit-2 [80]


Right risers) slot or 1xHH/HL (1U Left Riser) + 1x FH/HL (1U
Right riser)
Drive Bays Front drive bays: Up to 12 x 3.5” SAS/SATA HDD max 168TB
Rear drive bays: Up to 2 x 3.5 SAS/SATA HDD max 28TB
Optional
Physical Dimensions Height: 86.8mm (3.41”) Width: 434mm (17.08”) Depth:
693.81mm (27.31”) Weight: 29.68kg (65.43lbs)
Operating System Canonical Ubuntu Server LTS Citrix Hypervisor Microsoft
Windows Server LTSC with Hyper-V Red Hat Enterprise Linux
SUSE Linux
Table 15 Specifications of DELL Power Edge R540

Figure 35 Picture of DELL Power Edge R540

DELL Power Edge R640

Features Specifications
Processors Up to two 2nd Generation Intel® Xeon® Scalable processors, up to 28
cores per processor
Power Suppliers 495W Platinum 750W Platinum 750W 240HVDC Platinum* 1100W
48VDC 1100W Platinum 1100W 380HVDC Platinum* 1600W
Platinum 750W Titanium Hot plug power supplies with full
redundancy option Up to 8 hot plugs fans with full redundancy
*Available in China and Japan only
Storage controllers Internal Controllers: PERC H330, HBA330, HBA350i (adapter only),
H730P, H740P, H750 (adapter only) External Controllers: H840, 12

Umair Faisal Networking Unit-2 [81]


Gbps SAS HBA, HBA355e (adapter only, non-RAID) Software
RAID: S140
Security TPM 1.2/2.0, TCM 2.0 optional Cryptographically signed firmware
Secure Boot
I/O and Ports Network Options: 4 x 1GbE 2 x 10GbE + 2 x 1GbE 4 x 10GbE 2 x
25GbE Front Ports: 1 x Dedicated iDRAC direct USB 1 x USB 2.0 1
x USB 3.0 (optional) 1 x Video Rear Ports: 1 x Dedicated iDRAC
network port 1 x Serial 2 x USB 3.0 1 x Video PCIe: 3 x Gen3 slots
all x16 Video Card: 2 x VGA
Drive Bays Front drive bays: Up to 10 x 2.5” SAS/SATA (HDD/SSD) with up to
8 NVMe SSD max 76.8TB or up to 10 NVMe drives max 64TB, or up
to 4 x 3.5” SAS/SATA HDD max 64TB Rear drive bays: Up to 2 x
2.5” SAS/SATA (HDD/SSD), NVMe SSD max 15.36TB Optional
DVD-ROM, DVD+RW
Physical Height: 42.8mm (1.69”) Width*: 482.0mm (18.98”) Depth*:
Dimensions 808.5mm (31.8”) Weight: 21.9kg (48.3 lbs.) *Dimensions include
bezel.
Operating systems This rack server works with several operating systems, such as,
Canonical, Ubuntu, LTS Citrix, XenServer, Microsoft Windows
Table 16 Specifications of DELL Power Edge R640

Figure 36 Picture of DELL R640

The selected server for Syntax solutions

By contrasting the three DELL servers (R340, R540, and R640), we can demonstrate that
the R640 is the best option. Due to the R640's superior specifications than the other two

Umair Faisal Networking Unit-2 [82]


servers. Even though the DELL R640 is Expensive it is better to go with this server
because it values the money.

These are the reasons for choosing the R640

➢ It is fast in performance.
➢ Its ideal balance of density and scalability
➢ Memory
➢ Faster processing power
➢ There are numerous storage options.
➢ Advanced System Management
➢ Robust Protection

It is fast in performance

This Server has good performance when compared to the other two servers. It has
Dual(2nd-Gen) Intel Xeon Scalable Processors. It also suits the requirement of the syntax
solution company.

Memory

In server R640 we can increase the memory up to 3 terabytes. It is a huge plus point if we
go out of space, we can add more memory spaces.

Operating Systems

When selecting the operating system, we have plenty of options to choose from because
this server supports many operating systems. So we can select the best O/S that matches
the requirements and needs of the company.

Robust Protection

A robust cyberinfrastructure is offered by the Dell EMC PowerEdge R640 Rack Server.
Trust, worry-free server administration and a secure infrastructure are all provided by
Dell EMC. To ensure that the server is safe from threats to the data center, PowerEdge

Umair Faisal Networking Unit-2 [83]


360 depends on a secure component supply chain. Additionally, a cryptographically
signed firmware package and a secure boot enable users to control the data in a secure
manner. This security system is the best when compared to the R340 and R540.

2.1.2.1 Operating Systems

Desktop Operating System

An operating system designed for desktop computers is known as a desktop operating


system. You presumably use a desktop computer unless you work as a network
administrator or something like that. These operating systems frequently include items
that one could use at a desk. For instance, Microsoft Office may be pre-installed on
Windows on occasion.

Some of examples for desktop Operating systems are

➢ Microsoft Windows
➢ Linux
➢ Ubuntu
➢ Apples Mac O/S
➢ Unix
➢ Chrome O/S

Figure 37 Picture of Desktop operating systems

Server Operating System

Umair Faisal Networking Unit-2 [84]


Platforms that operate as web servers, application servers, database servers, email servers,
or other platforms that run on a dedicated server are intended for server operating
systems. In comparison to normal operating systems, server operating systems provide a
number of advantages, such as limitless user connections, additional memory, and
sophisticated network optimizations.

Some of examples for server operating systems:

• Red Hat Enterprise Linux


• Windows Server
• Mac OS X Server
• Netware

2.2 Discuss the inter-dependent of workstation hardware with relevant networking


software

➢ Workstation hardware users need to have a specialized networking operating


system in order to make sure that their devices can effectively connect with one
another. Workstation hardware often only works with a small number of the many
networking operating systems, despite the fact that there are many different kinds
of them available. If an organization's present networking operating system is no
longer maintained, it may be challenging for them to move to a new one.

Umair Faisal Networking Unit-2 [85]


➢ Computers known as workstations are used by a team of workers to conduct
business or work alone. A workstation is a piece of hardware connected to a local
area network that is sometimes referred to as a PC or mainframe terminal (LAN).
A network interface card (NIC) has to be placed on a computer workstation before
it can be connected to the network. a group of software applications created with a
single objective in mind. Input devices, processing units, output devices, and
supplemental storage devices are all examples of hardware. Computer hardware
resources are managed by it. The server is a physical and software device that
maintains network resources, stores data, and carries out client actions.

➢ The network operating system (NOS) is created and optimized to deliver network
services to remote customers, unlike a desktop operating system. AnNOS is not
optimized to run common programs, but it can execute them anyway.

Performance optimization of the server and cost analysis

What is server optimization?

The term "server optimization" refers to a variety of techniques used to improve a server's
application setup, data processing effectiveness, overall speed, and overall performance.
Businesses can use specific optimization techniques to create and maintain an application
delivery network that performs at its peak.

Server optimization techniques

Virtualization

The practice of separating a physical server into several virtual servers using software is
known as server virtualization. The virtual servers are distinct, segregated, and capable of
independently running their own operating systems. The physical server may run many
operating systems and services simultaneously thanks to server virtualization.

Website Caching

One of the greatest methods to optimize a server is to enable caching. The act of caching
involves exposing outdated versions of a website while storing the more recent versions

Umair Faisal Networking Unit-2 [86]


on the hosting server. Web pages don't need to submit database queries repeatedly since
they are cached. Caches can be enabled in a variety of places, including:

Database Optimization

Database optimization is a tactic for speeding up database system responses. It improves


website performance in a practical way. The databases offer information that is organized
and kept in a hierarchical manner that makes it simple to extract and arrange the material.

2.3 Cost analysis

• Always compare the priorities of any project to the priorities of other initiatives
awaiting approval and financing. Just because one project pays off faster than
others does not mean it should be implemented first. The primary priority of the
firm is always what it needs to remain operationally and financially competitive.
• Do not attempt to do a cost-benefit analysis on your own. There are several hidden
charges that only someone in the department where the system will be installed is
aware of. As a result, having someone from that department working with you is
critical.
• Display where tangible cash is stored or earned. Soft expenses are difficult to
measure. When I tried to convince a CFO that a new system would save so many
person-hours, I always found it difficult. The reason for this is that there is always
more work to be done elsewhere, so the corporation does not realize any payroll
expense reduction.
• Double-check your figures. Too many IT professionals create cost-benefit
evaluations without double-checking their data for accuracy. You don't want to go
to the CFO and argue that if you simplify the month-end close, you'll save 10 full-
time workers' labor for two days when, in reality, only four people are working on
it full time.

Umair Faisal Networking Unit-2 [87]


As previously stated, we applied those methodologies when carrying out cost analysis.
We were able to effectively create our system in a cost-effective way by employing these
strategies, and we were pleased with our selections about the money spent on expenses.

3 Activity 03
3.1 Prepar e a written network design p lan to meet th e abov e - men tio ned
user r equ irements includ ing a b lu epr int

Figure 38 BLUEPRINT OF SYNTAX SOLUTION

This is the blueprint for the network of syntax solutions for which I used the designing
tool draw.io. In my network, I have used one server containing five servers, switches, and
two routers to make this network.

Umair Faisal Networking Unit-2 [88]


3.2 Drawing the network plane cisco packet tracer

Figure 39 Network plan implemented for syntax solutions

This is the plan that I have implemented for the company's syntax solutions. I used Cisco
Packet Tracer to develop this plan. As you can see, all the connections work perfectly on
the above plane. The plane was brought up according to the blue print which I drew
earlier.

Umair Faisal Networking Unit-2 [89]


3.2.1 Provide the IP address allocation table for the redesigned network

DEPARTMENT HOSTS IP RANGE SUBNET USABLE VLAN


NAME MASK HOST

CUSTOMER 10 192.168.10.145 255.255.255.240 14 10


CARE -
192.168.10.158
SALES AND 21 192.168.10.97- 255.255.255.224 30 20
MARKETING 192.168.10.126

FINANCE 25 192.168.10.65 255.255.255.224 30 30


-
192.168.10.94
LEGAL 05 192.168.10.161 255.255.255.248 6 40
-
192.168.10.166
HUMAN 10 192.168.10.129 255.255.255.240 14 50
RESOURCE -
192.168.10.142
DEVELOPER 55 192.168.10.1- 255.255.255.192 62 60
192.168.10.62

NETWORK 05 192.168.10.169 255.255.255.248 6 70


-
192.168.10.174
SERVER 10.254.1.0 255.255.255.0 255 80
ROOM

Umair Faisal Networking Unit-2 [90]


Type of devices that I used to build this system

Switch

We had some needs and requirements to meet when selecting a switch as a company, so the
switch we choose must meet our needs as well as our budget. So that is why we chose the Cisco
SG-300; this device covered our requirements.

Why we choose Cisco SG-300 switch?

Figure 40 picture of Switch

Features of Cisco SG-300

• Switching Capacity and Forwarding Rate: 14.88 MPPS (64-byte Packets). 20.0
Gbps.
• Switches support 802.3at PoE+, 802.3af, and Cisco pre-standard (legacy) PoE.
Power Dedicated to PoE: 62W (PoE+ supported). 8x Ports support PoE.
• Total System Ports: 10x Gigabit Ethernet. Number of RJ-45 Ports: 8x Gigabit
Ethernet. Number of Combo Ports (RJ-45 + SFP): 2x Gigabit Ethernet Combo.

Router

Umair Faisal Networking Unit-2 [91]


We also have used two routers in this network and we made sure that we choose one of
the best routers in the industry so that we can have good data transferring capacity so that
is where the router TP-link Archer AX-50 comes in.

Figure 41 Picture of Router

Why we choose Tp-link Archer AX-50 router?

• Fast AX3000 Wi-Fi 6 connection


• USB 3.0 storage support
• One Mesh expansion
• TP-Link Homecare security and parental controls
• 160MHz support

Access point

When choosing an access point device, we made sure it covered our requirements. The main
requirements that we wanted were the area of coverage and the speed. Then I decided on the
TP-Link TL-WA801ST model.

Why we choose TP-Link TL-WA801ND Access point?

Umair Faisal Networking Unit-2 [92]


Figure 42 Picture of Access point

• 300 Mbps wireless speed is ideal for smooth HD video and voice streaming.
• Supports multiple operation modes: access point, multi-SSID, client,
universal/WDS repeater, the bridge with AP
• With a single press of the WPS button, you can easily establish a WPA-encrypted
secure connection.
• With the included Passive Power over Ethernet Injector, you can deploy your
system in a variety of ways.

Umair Faisal Networking Unit-2 [93]


3.2.2 IP, subnetting to the devices, IP, subnetting to the Routers & VLAN configuration
of syntax solution

Figure 43 VLAN configuration for customer care

Figure 44 VLAN configuration for Developers Department

Umair Faisal Networking Unit-2 [94]


Figure 46 Figure 47 VLAN configuration for sales Department

Figure 45 VLAN configuration for network department

Umair Faisal Networking Unit-2 [95]


Figure 48 VLAN
Figure configuration
49 VLAN for network
configuration forDepartment
sales and marketing department

Figure 50 VLAN configuration for Legal Department

Umair Faisal Networking Unit-2 [96]


Figure 51 VLAN configuration for Finance Department

Configuring the file server

Figure 52 configuring the fil server

Umair Faisal Networking Unit-2 [97]


Configuring the DHCP sever

Figure 53 configuring the DHCP server

Figure 54 configuring the DNS server

Umair Faisal Networking Unit-2 [98]


3.3 An example of a server operating system is VM wear pro setup and the steps
have been shown below.

Figure 55 Evidence for the virtual Machine

Figure 56 Evidence for the virtual Machine

Umair Faisal Networking Unit-2 [99]


Figure 57 Evidence for the virtual Machine

Figure 58 Evidence for the virtual Machine

Umair Faisal Networking Unit-2 [100]


Figure 59 Evidence for the virtual Machine

Umair Faisal Networking Unit-2 [101]


Figure 60 Evidence for the virtual Machine

Umair Faisal Networking Unit-2 [102]


Figure 61 Evidence for the virtual Machine

Figure 62 Evidence for the virtual Machine

Umair Faisal Networking Unit-2 [103]


Figure 64 Evidence for the virtual Machine

Figure 63 Evidence for the virtual Machine

Umair Faisal Networking Unit-2 [104]


Figure 65 Evidence for the virtual Machine

Figure 66 Evidence for the virtual Machine

Umair Faisal Networking Unit-2 [105]


Figure 67 Evidence for the virtual Machine

Figure 68 Evidence for the virtual Machine

Umair Faisal Networking Unit-2 [106]


Figure 69 Evidence for the virtual Machine

Figure 70 Evidence for the virtual Machine

Umair Faisal Networking Unit-2 [107]


Feedback Form for syntax solutions

Figure 71 feedback form

Umair Faisal Networking Unit-2 [108]


Figure
72

Feedback form

This is the user feedback form I designed for the syntax solution network. I asked a lot of
important questions in this feedback form, such as what the user thinks of my network,
what mistakes I made, and how to improve it. Creating this feedback form helped me
learn many things about which I was ignorant, and it also helped me make my mistakes.

Umair Faisal Networking Unit-2 [109]


Responses for the feedback form

Figure 73 Responses for the feedback form

Seven individuals commented on my network, as shown in the image above. All of their
comments were unique, and they all had different opinions about my network, most of the
people agreed with my network and appreciated me for my great work.

Umair Faisal Networking Unit-2 [110]


Figure 74 Responses for the Feedback form

This is the reply that I got regarding my overall network plan. I was very pleased with this
type of response because none of them chose the poor option, indicating that my network
was perfect and had no major issues with design, user-friendliness, speed, or security.

Umair Faisal Networking Unit-2 [111]


Figure 75 Response to the feedback form

In the above figure, we can see that I have received different kinds of suggestions on how
to develop my network. From that feedback, I was able to get a good idea of how to make
some improvements to my network. From those replies, most of them talked about the
security of the network, so I understood that the network is not well secured, so hereafter,
when planning a network, I will definitely consider the security of the network.

Umair Faisal Networking Unit-2 [112]


Maintenance schedule

Software maintenance Schedule

Date/Time Job Role Duty Last check by the


Network manager
Every December Update Operating The Network manager
Last week of the Technical System must check whether the
year from 7:00 pm Officer job is done at the end of
to 10:00 pm the day
Every January first Update The Network manager
week of the year Technical Application must check whether the
from 8:00 am to Officer Software job is done at the end of
11:00 am the day
Every May first Technical Update Antivirus The Network manager
week from 8:00 am Officer must check whether the
to 11:00 pm job is done at the end of
the day
Table 17 Software maintenance table

Umair Faisal Networking Unit-2 [113]


Hardware maintenance Schedule

Date/Time Job Role Duty Last check by the


Network manager
Every December Technical officer Update The Network manager
end of the week Processors must check whether the
from 10:00 pm job is done at the end of
to 11:00 pm the day
End of every Technical officer Updating The Network manager
three months Devices must check whether the
from 9:00 pm to job is done at the end of
10:pm the day
Every January Technical officer Updating RAM The Network manager
when starting a must check whether the
year job is done at the end of
From 8:00 am to the day
11:00 am
Yearly twice IT administrator Updating Hard The Network manager
from 9:00 pm to Disk must check whether the
11:00 pm job is done at the end of
the day
Table 18 Hardware maintenance table

Umair Faisal Networking Unit-2 [114]


4 Acitivity

4.1 Implemented network plan for syntax solutions

Figure 76 Implemented plan for syntax solutions

The Syntax Solution network is shown above. Atopology has been applied with hybrid
topology. 7 switches and 1 PT-Switch with Gigabit Ethernet port were used. Each switch
is interconnected, and all of them are linked to the PT-Switch. This implies that a problem
in one switch has no effect on the other switches, and even if one cable is destroyed, the
entire network may function normally until it is rebuilt. Unconnected Ports are also
disabled on all switches. Furthermore, each switch and router may be password secured.
In addition, the configuration files for each switch and router are saved on the server, so
there is no duplication. When replacing a device with a defect on another device, there is
no need to reconfigure the device. can

Umair Faisal Networking Unit-2 [115]


4.2 Network Checking

Network Check using ping command

Figure 77 Evidence for ping command

Extended ping (-t)

Figure 78 Evidence for extend trace

Umair Faisal Networking Unit-2 [116]


Trace Command

Figure 79 Evidence for trace command

Telnet Command

Figure 80 Evidence for telnet command

Umair Faisal Networking Unit-2 [117]


Secure Shell Command

Figure 81 Evidence for SSH command

4.3 Testing Result of the system

Testing purpose Result expected Results


Security Check If an unauthorized person try If an unauthorized person try
to log in the access will be to log in the access will be
rejected rejected
DNS server test DNS server that can translate DNS server that can translate
URLs URLs
If one switch breaks down All switch and router All switch and router
configuration files must be on configuration files must be on
the server. the server.
Access to the server room Every node has access to the Every node has access to the
server room. server room.

Umair Faisal Networking Unit-2 [118]


4.4 Future enhancements for syntax solutions

In the future, we are planning to bring up many changes for this company to upgrade the
servers, upgrade the machines, and also upgrade every possible device with which we can
make the network mordanted smoother. In this system, as the server, we have the Dell
Edge R640, but in the future, our plan is to go for a better server than the Edge R640.
Currently, we’re using the normal connection, which is 4G, but in the future, we plan to
increase our network connection to fiber optics. After giving the system to some people
for testing, they also brought up some important recommendations that will also be
considered in the future, so these are the changes that we will bring up for the Syntax
Solutions Company in the future.

Conclusion

We learned a lot about networking while working on this project, including how to set up
a network and how to use programs related to networking software, among other things.
I'm convinced that the knowledge I gained from this project will be beneficial to us in the
future.

We've also discovered that networks aren't standalone entities but rather components of a
bigger system. and the system's goal is to deliver network services. Network services are
made available to users, programs, and devices so that they may accomplish their system
functions. To plan and build a network to support services, you must first comprehend
what they are, how they interact, and how to categorize them. After you've completed
this, you'll have a good sense of what the network will require. As the network analysis
develops, you may go into further detail. We gained a lot of knowledge and experience on
how to design a network by completing this task.

5 Harvard Referencing
Techopedia.com. (n.d.). What is a Data Flow Model? - Definition from Techopedia.
[online] Available at: https://www.techopedia.com/definition/28523/data-flow-

Umair Faisal Networking Unit-2 [119]


model#:~:text=A%20data%20flow%20model%20is%20diagramatic%20representation%
20of [Accessed 14 Dec. 2022].

Spiceworks. (n.d.). What Is a Wide Area Network (WAN)? Definition, Types,


Architecture, and Best Practices. [online] Available at:
https://www.spiceworks.com/tech/networking/articles/what-is-wide-area-network/.

Serverbasket Help. (2022). Dell Servers vs HP Servers Comparison. [online] Available


at: https://www.serverbasket.com/help/dell-servers-vs-hp-servers-comparison/.

Anon, (n.d.). List of IEEE standards in Computer Networks and their functions |
LEARNABHI.COM. [online] Available at: https://www.learnabhi.com/ieee-standards-in-
computer-networks/.

GeeksforGeeks. (2021). What is a Network Operating System? [online] Available at:


https://www.geeksforgeeks.org/what-is-a-network-operating-
system/#:~:text=There%20are%20mainly%20two%20types%20of%20networks%2C%20
one [Accessed 14 Dec. 2022].

www.tutorialspoint.com. (n.d.). Difference between TCP and UDP. [online] Available at:
https://www.tutorialspoint.com/difference-between-tcp-and-udp.

EDUCBA. (2020). Metropolitan Area Network | How does Metropolitan Area Network
work? [online] Available at: https://www.educba.com/metropolitan-area-network/.

https://www.facebook.com/lifewire (2019). A Beginner’s Guide to Network Cables.


[online] Lifewire. Available at: https://www.lifewire.com/introduction-to-network-cables-
817868

Umair Faisal Networking Unit-2 [120]

You might also like