E172797-1671209494389-191131-Networinking Assingment 1 Final
E172797-1671209494389-191131-Networinking Assingment 1 Final
Kavindu Chethiya
Assessor Internal
Verifier
Unit 02: Networking
Unit(s)
LAN Design & Implementation for SYNTAX SOLUTIONS
Assignment title
Umair Faisal
Student’s name
Remedial action
taken
Give details:
Internal
Verifier Date
signature
Programme
Leader signature Date
(if required)
Higher Nationals - Summative Assignment Feedback Form
Assignment 1 Assessor
Number
16/12/2022 Date
Submission Date Received 1st
submission
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & P1 P2 M1
Distinction Descripts
Resubmission Feedback:
* Please note that grade decisions are provisional. They are only confirmed once internal and
external moderation has taken place and grades decisions have been agreed at the assessment
board.
Assignment Feedback
Action Plan
Summative feedback
Assessor Date
signature
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment
No, and Page Number on each page. This is useful if individual sheets become detached
for any reason.
5. Use word processing application spell check and grammar check function to help editing
your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the
body except for the before mentioned compulsory information will result in rejection of
your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL.
You will then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text
citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade
could be reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct form. I further understand what it means
to copy another’s work.
16/12/2022
Assignment Brief
Issue Date
Submission format
The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
LO1 Examine networking principles and their protocols.
Scenario
Customer Care 10
Finance 25
Legal 5
HR 10
Developers 55
Network Team 5
• 192.168 .10.0 /24 is giv en and shou ld be us ed for all the d epar tmen ts ex cep t
the s erv er ro om. IPs shou ld assign using D HCP.
• ERP and CRM Syst ems n eed to be implemen ted in Matar a br anch in lo cal
servers .
• High level of redundancy is expected in n etwork des ign to elimin ate s ing le
poin t of failu res and tr affic b ottle n ecks.
• Sales and Mark eting Team need to access Network resour ces us ing WIFI
conn ectiv ity.
• Prop er m ethods for n et work ing mon ito ring and t roubleshootin g need to
be es tablished .
Assume you have been app oin ted as the new network consultant of SYNTAX
SOLUTIONS . Prepar e a n etwor k ar chitectural d esign and imp lement it with your
suggestions and recommendations to meet the comp any req uir emen ts.
(Note: Clearly stat e your assumptions. Y ou are allo wed to des ign the net wo rk
acco rding to y our assumpt ions, but main requirements shou ld not b e v iola ted)
Activ ity 01
• Discuss th e b en efits and co nstr ain ts of diff erent n etwor k sys tem typ es that can
be imp lemen ted in th e Matara b ran ch and the main I EEE Eth ern et s tandar ds
that can be us ed in abov e LAN and WLAN desig n.
• Discuss the impor tan ce an d imp act of netwo rk to pologies and n etwo rk p roto co l
suites while co mp aring the main network topo log ies and n etwork pro to col
suites that ar e used in n etwo rk des ign usin g examples. Recommend suitab le
networ k topologies and n etwor k pro tocol su ites for abov e scenario and jus tif y
your answer w ith valid po in ts.
Activ ity 02
• Discuss the o per ating prin ciples of n etwo r k dev ices (Ex: R outer, Sw itch, Etc.)
and serv er ty pes th at can b e us ed for ab ov e s cen ario wh ile exp lor ing d iff eren t
servers th at ar e available in today’s mark et with their sp ecifications.
Reco mmend ser ver /ser vers for th e abo ve scenario and jus tif y yo ur s election w ith
valid p oin ts.
• Discuss th e inter -d ep endence o f wor kstatio n hardwar e w ith n etwo rkin g sof tware
and prov id e examp les for n etwor king sof tware th at can be used in ab ove n etwor k
desig n.
Activ ity 03
• Prepar e a written n etwor k d esign plan to meet th e abo ve men tio ned us er
requ irements in cluding a blu epr in t d rawn u sing a mo delin g too l. (Ex : Microsof t
Visio, Edr awMax) .
Support your answ er by prov id ing the VLAN and IP su bnetting s ch eme for th e
abov e s cen ario and th e lis t of d ev ices, n etwork components and sof twar e used to
desig n th e n etwo rk fo r above scenar io and while justifying yo ur selections .
• Test and ev aluate th e prop osed d esign to meet the r equ irements an d analys e us er
feed back by usin g a User f eedback f orm.
• Install and conf igur e Network s ervices , dev ices and app lications (Ex :
VLAN,DHCP, DNS,Proxy, Web, Etc.) accord ing to th e pr oposed d esign to
accomp lish the us er r equ ir ements and des ign a d etailed Main ten an ce s chedule
for ab ove Netw ork.
*Note: - Screen shots of Configu rat ion scripts shou ld be p res ented.
Activ ity 04
• Implemen t a network ed system b ased on your pr ep ared d esign w ith v alid
evid en ces an d recommend po ten tial fu tur e enh ancemen ts for th e network ed
system with v alid justif ications to y our r eco mmendations. Use critical r eflection
to critically ev aluate th e d esign , p lan , co nfiguratio n, and tes tin g of your network
while justifying with valid con clusio ns.
• Develop test cases and con duct ver if ication ( Ex : P ing, extend ed pin g, tr ace
route, teln et, SSH, etc. ) to test the ab ove Network and an alyse th e test resu lts
against th e expected resu lts.
Grading Rubric
P1
Discuss the benefits and constraints of
different network types and standards.
P2
Explain the impact of network topology,
communication and bandwidth
requirements.
M1
Compare common networking principles
and how protocols enable the effectiveness
of networked systems.
LO2 : Explain networking devices and operations
P3
Discuss the operating principles of
networking devices and server types.
P4
Discuss the inter-dependence of
workstation hardware with relevant
networking software.
M2
Explore a range of server types and justify
the selection of a server, considering a
given scenario regarding cost and
performance optimization.
P5
Design a networked system to meet a given
specification.
P6
Test and evaluate the design to meet the
requirements and analyze user feedback.
M3
Install and configure network services and
applications on your choice.
D2
Design a maintenance schedule to support
the networked system.
LO4 : Implement and diagnose networked systems
P7
Implement a networked system based on a
prepared design.
P8
Document and analyze test results against
expected results.
M4
Recommend potential enhancements for
the networked systems.
D3
Use critical reflection to evaluate own
work and justify valid conclusions.
I'd like to thank my institute, ESOFT METRO CAMPUS, for giving me the opportunity
to work on this database assignment. This assignment's progress and ultimate completion
needed a great deal of direction and support from many people. I consider myself
exceedingly lucky to have had this all along. completion of my assigned work Whatever I
had to do for this project was only possible because of their advice and my hard work, for
which I am grateful. Special thanks to my Networking lecturer, Mr. Kavindu Chethiya,
for guiding me in this assignment. I'm extremely lucky to get such a great lecturer to
teach this subject.
1.1.2 As I mentioned on page 1, there are twelve types of different computer networks.
However, the computer networks
are:
A personal area network (PAN) connects electronic devices in a user's close vicinity.
PANs might be as small as a few centimeters or as large as a few meters. The connection
between a Bluetooth headset and a smartphone is one of the most common real-world
examples of a PAN. Desktop screens, smartphones, laptops, tablets, and other digital
devices can also be linked by PANs.
A PAN network does not require additional cables. As a result, users no longer have to
worry about wire management or floor space. For establishing a connection between two
devices, only Bluetooth needs to be enabled. As a result, PAN is considered incredibly
cost-effective.
Because all devices and data are permitted, PAN networks are regarded as safer and more
secure than other networks. As a result, it is nearly impossible to hack or interfere with
devices in this environment
Using PAN, we can connect several devices to a single device. A single smartphone, for
example, can be used to connect numerous devices, such as a keyboard, mouse, and
printer, as well as another smartphone, which allows us to share files very easily.
Easy to use
Users can transfer devices and exchange data because PAN is wireless. This opens the
door to network portability.
PAN will not work beyond 10 meters because it relies on a short-range Bluetooth
connection. It is a significant disadvantage when it comes to long-distance data sharing.
PAN networks use infrared light to convey data. As a result, it may cause data dropouts
and interfere with other radio frequencies. This has the potential to substantially interrupt
the connection between two devices. Coverage of a smaller area
When compared to other types of networks, PAN has a slower transmission rate. This is
because infrared and Bluetooth are the most used connection types on PAN networks.
Infrared and Bluetooth are very slow types of wireless connections.
A local area network (LAN) is a network of two or more devices that are wired or
wirelessly linked and spread across a geographic region. A local area network (LAN)
connects computers and other equipment within a building or premises, allowing local
users to exchange information through file servers, print documents through centralized
printers, conduct transactions through central servers, and securely connect to outside
networks via a firewall router.
Resource Sharing
All resources are linked to a single network, and if one computer requires a resource, it
may be shared with another. DVD disks, printers, scanners, modems, and hardware drives
are examples of these resources. As a result, you may save money by not purchasing
different resources for each machine.
The server's data storage is extremely secure. On a server computer, we may simply alter
or remove data, and other computers can access the updated data. We can also grant
permission to a specific group of people to access the data.
Computers in local area networks may simply and swiftly exchange data and messages.
This saves time and allows us to do tasks more quickly. Any user on the network can
share messages and data with any other user on the network thanks to LAN. Users can
connect to the network from any computer and view the server's data.
A single server may store all data from linked machines. If a particular piece of data is
required by each computer (client), the user can quickly log in and retrieve it from the
server. For example, movies and songs can be stored on a server and accessed by any
authorized user.
Cost-Effective
Because LAN systems do not require substantial cabling and other infrastructure, they are
less expensive to set up and operate than other networks such as WAN and MAN.
Because LAN is a local network, diagnosis and maintenance are simple.
Resource Collaboration
Overpriced components, such as printers and scanners, cannot be linked to every desktop
back in the day it would be extremely inconvenient for the corporation; however, thanks
to LAN, a corporation only needs one printer and scanner, and everyone can connect to
that printer and scanner and send instructions from their machines, resulting in significant
cost savings for the corporation.
Local area networks are often formed within or around a building and cannot be expanded
to cover a wider region as WAN and MAN networks do.
If a file on the server becomes damaged or a hard disk crashes, all of the associated
machines will have difficulty working properly.
The WAN network stretches across large geographical areas. Even if some companies'
corporate offices are spread throughout the country, the company’s staff can connect with
other branches over a WAN network very easily.
High-Speed Connection
Leased lines are frequently used in corporate LANs to create the most important part of a
network. When leased lines are used, there is greater bandwidth available than with a
typical broadband connection. Here, the benefit is that the company can send and receive
data in a faster manner.
Global Business
By using the internet we can do business in the global range very easily using the WAN.
Security risks
A WAN network has greater security difficulties than a LAN or MAN network since all
the technologies are integrated, which brings up the issue of security.
Maintaining Issues
When maintaining these kinds of networks, we want to make sure that these networks are
monitored all the time because if the system goes down, the company must face many
consequences, so there need to be some administrators who are prepared to fix the errors
at any time.
Metropolitan Area Network, also known as MAN, can be defined as a type of network
that is accessible across a large physical area, typically ranging from 5 Kms to 50 Kms.
As one can refer to the range of this distance to be a metropolitan area, this network is
named as Metropolitan Area Network. MAN can enable the communication systems of
numerous nodes in the said range, and so it is commonly used for generating networks in
a large office area, for various buildings in an academic institution, and even for industrial
purposes. For this reason, this network is also called a Campus Network. (pedamkar,
2019)
For data transfer, MAN frequently employs fiber-optic cables. Fiber optic lines may
deliver rates of up to 1000 Mbps. As a result, data and information may be exchanged
more quickly.
When compared to WAN, MAN uses far fewer resources. As a result, installation
expenses are significantly lowered. Furthermore, merging both MAN and WAN networks
saves money. Moreover, all data on the MAN network has been managed extremely
effectively and centrally. As a result, MAN is extremely cost-effective
High Security.
Metropolitan area networks have high-security levels when compared with Wide area
networks
Users can share their internet connections with other users by using MAN. All MAN
users will benefit from high-speed internet connectivity in this manner.
In comparison to LAN, the likelihood of hackers attacking a MAN network is very high.
As a result, data is vulnerable to hacking. Well-trained personnel and safety equipment
are required for data security.
When the Metropolitan Area Network grows, it becomes difficult to manage. This is due
to security issues and additional configuration.
Requirement of wires
In comparison to LAN and WAN, MAN requires more wires to operate. This is primarily
due to the joining of two LAN networks. When there is a need for more wires, the
network will incur additional costs.
Internet Speed
MAN requires fiber optic cables, which are quite expensive, to function. It cannot operate
on the traditional copper wires found on telephones. If the connection is made through a
traditional copper wire, the connection will be extremely slow compared to the fiber optic
cable.
WLAN, which stands for "wireless local area network," refers to a sort of local network
that is distinguished by its wireless nature. It is a network that may connect numerous
remote computer units separated by around a hundred meters. This network is mostly
dependent on radio wave data transmission. A WLAN lets users roam throughout the
coverage area, which is often a house or small office while remaining connected to the
network. One of the best examples of a WLAN connection nowadays is the most widely
used Wi-Fi connection.
Accessibility
WLAN networks do not require wires or cords, allowing users to interact while on the
move. We may also connect to a network in the workplace without the need for adapters
or extra wires and cables.
Scalability
Cost Effective
Wireless LANs don't have cords and plugs. As a result, the cost of network installation is
reduced. A network technician, for example, is not required to install the network. This
method is significantly less expensive than traditional copper cabling.
It is efficient
Installation process
Most WLANs are challenging to set up. Particularly for inexperienced users. The
installation process necessitates the use of professionals. Furthermore, because WLAN
relies on access points rather than cables and hubs, additional equipment is required to set
up the network. This might result in more cost.
Reliability
Interference from multiple devices might cause a WLAN to fail. Interference is prevalent,
especially where there are electrical devices that consume frequency. Physical features
such as walls and ceilings can also interfere with electronic gadgets.
Coverage Issues
Wireless networks, especially WLAN, are most commonly challenged with coverage
issues. A WLAN can only cover a certain amount of ground. The signal degrades when
the user walks away from this range. This is an issue in large buildings with a high
number of users. Users may suffer frequent signal dips or no service at all in such
instances.
A VPN (virtual private network) service establishes a secure, encrypted web connection.
Internet users may use a VPN to increase their online privacy and anonymity, as well as
to avoid geographic-based filtering and restrictions. VPNs, in effect, extend a private
network across a public network, allowing a user to securely send and receive data over
the internet.
Security
VPNs assist with the protection of personal information and other data while it is in
transit or when it is transferred from and received by a device.
Privacy
VPNs hide information such as our IP address, location, and search history from websites,
web browsers, telecom companies, internet service providers (ISPs), and others.
When considering the connection of a VPN is slightly slow when compared to a normal
internet connection.
Illegal to use
VPN use is an illegal and punishable offense in some countries, including Korea, Iran,
and China.
VPNs do not always provide security, but there may be times when they do protect us
from threats that are extremely unlikely to be avoided.
It might be challenging to determine the encryption strength of your VPN unless you are
an encryption specialist. However, choosing a trustworthy VPN provider with good
reviews will increase the likelihood that your encryption is of a high caliber.
• Peer to Peer
• Client-server
A peer-to-peer (P2P) network is created when two or more PCs are linked and exchange
resources without using a separate server computer. A P2P network can also be a
permanent configuration that links a dozen PCs in a small business using copper cables.
Alternatively, a P2P network might be a much bigger network where special protocols
and applications create direct connections between users over the Internet.
Reliability
A P2P network does not rely on a central system. This implies that the connected
computers can operate independently of one another. Even if one part of the network
fails, the others will not be affected. Only the user will have access to such files.
Implementation
A peer-to-peer network is relatively simple to set up and does not require any advanced
skills. The connection requires only a hub or a switch. Furthermore, because all linked
computers can handle themselves, there should be few settings. However, some
specialized software is required.
Cost Effective
A peer-to-peer network can be created and maintained for comparatively little money
overall. Because there is no central configuration, the setup costs have been significantly
lowered. Furthermore, none of the network users on the Windows server need to pay
anything. if the payment is only made once.
No centralized Storage
Unauthorized remote access may occur if the network has an unsecured kind of code or
another code. In that instance, the unauthorized user may gain access to sensitive data or
information about the firm. As a result, P2P network users can get around this constraint.
As a result, before establishing the peer-to-peer network, the user should ensure that they
are prepared for such eventualities.
Centralization
Data security and user permission and authentication control are relatively easier with a
single server that stores all of the crucial data in one place. Any problem that develops
across the entire network may be fixed in a single place.
Scalability
Incredibly scalable client-server networks exist. The number of clients and servers can be
increased if the user wants more resources. The server's capacity can be increased without
much disruption. Since the server is centralized, there is no uncertainty regarding
permission to access network resources, even if the size grows. As a result, the
configurations only require a small number of employees.
Accessibility
The nodes in a client-server system are all independent, requiring data only from the
server, making updates, replacements, and relocations easy.
Expensive
The expense of installing and maintaining the server is often higher than the cost of
running the network in client-server networks. Because of their efficiency, the networks
could be expensive to purchase. As a result, not all users will be able to afford them.
Congestion
Client-server networks' main drawback is the traffic congestion they experience. The
connection will slow down or break if there are too many clients sending requests to the
Hard to Maintain
The servers will operate constantly after they are installed; therefore, they must be given
proper maintenance. Any errors must be corrected immediately and without additional
delay. As a result, the server has to be managed by an experienced network manager.
Here are some differences between Peer to Peer and Client server network
• In the client's server network, the servers react to the client's request, however in
the peer-to-peer network, any node can request and answer services.
• Client-server networks are appropriate for both small and big networks, but peer-
to-peer networks are only appropriate for small networks.
• Centralized servers store data in client-server networks, whereas peer-to-peer
networks store data for each peer.
• The client-server network does not keep the information that is transferred,
therefore there is no way to resend the data; however, in peer-to-peer networks, if
the information is lost, the matching node can resend the information since it is
saved.
Networking standards establish the data transmission rules required for networking
technologies and processes to interoperate. Standards aid in the creation and maintenance
of open markets by allowing diverse suppliers to compete on the quality of their products
while remaining compatible with existing market items.
IEEE is a professional worldwide organization founded in the United States that is made
up of electronics, computer, and communications engineers. It develops communication
and data processing standards with the primary purpose of developing theory, innovation,
and product quality in any field of electrical engineering.
The CCITT has become the standard organization in the United States. The CCITT
developer's recommended set of telephone and telegraph communication norms and
standards
This group develops and promotes industry standards. The EIA has created the RS
(Recommended Standards) set of data and telecommunications standards.
The International Telecommunications Union (ITU) is one of the four permanent sections
of the International Telecommunications Union, headquartered in Geneva, Switzerland. I
t has developed three sets of descriptions:
• V series for modem integration and data transmission over telephone lines.
• X series for data transmission over public digital networks, email, and directory se
rvices
• Y series for data transmission over public digital networks, email, and directory se
rvices.
Standards Description
IEEE 802 LAN/MAN Overview and architecture
IEEE 802.1 LAN/MAN Bridging and management
IEEE 802.1s Multiple spanning tree
IEEE 802.1 w Rapid reconfiguration of spanning tree
IEEE 802.1x Port-based network access control
IEEE 802.2 Logical Link Control (LLC)
• Logical topology
• Physical topology
The interconnected structure of a local area network is referred to as its physical topology
(LAN). The physical topology is defined by the method used to link the physical devices
on the network with cables and the kind of cabling utilized. In fact, logical topology
explains the performance of a network's media signals and how it transfers device data.
There are several types of network topology, and each is appropriate for a particular
purpose based on the total network size and your purpose. The mentioned below are some
of them.
• Bus Topology
• Star Topology
• Ring Topology
• Tree Topology
The bus topology connects all the included nodes with a single wire. The main cable
serves as the network's backbone. The server is also one of the computers in the network.
It is referred to as a "linear bus topology" when it has two terminals.
Advantages Disadvantages
All computers in the star topology are linked together through a hub. This wire is referred
to as a "central node," and it connects all other nodes. It is mostly used on LAN networks
since it is affordable and simple to set up.
Advantages Disadvantages
It is simple to update the Hub as needed. The performance depends on the hub’s
capacity
Every device in a ring network has exactly two neighboring devices for communication
purposes. It is known as a ring topology because its form resembles a ring. In this
topology, each computer is linked to another. In this case, the last node is joined with the
first one.
Advantages Disadvantages
In a ring topology, data transmission is A single node failure in the network can
extremely fast. cause the entire network to fail.
It is cheap to Install and Expand Troubleshooting in a Ring topology is a
time-consuming operation.
Because only nodes with tokens can Signals always circulate in the ring
send data, the network is unaffected by topology, resulting in unnecessary waste
many nodes or heavy traffic. of power.
Table 5 Advantages and disadvantages of ring topology
Advantages Disadvantages
The mesh topology features a distinct network design in which every computer on the
network communicates with every other device. It establishes a P2P (point-to-point)
connection between all network devices. It provides a high amount of redundancy, so
even if one network cable breaks, data can still reach its destination through an alternate
way.
Advantages Disadvantages
The point-to-point topology is the most basic of all network topologies. The network in
this manner consists of a direct link between two computers.
Advantages Disadvantages
There is no requirement for a network The main disadvantage is that it can only
operating system. be applied in limited regions when PCs
are near together.
Individual workstations are utilized to Apart from the permissions, there is no
access the data, so no costly server is security. Users are frequently not
required. required to log in to their workstations.
There is no need for specialist network Files and folders cannot be backed up
technicians because each user controls centrally.
their own authorization.
A hybrid topology is a network topology that combines two or more different types of
topologies. It is a reliable and scalable topology, but it is also expensive. It inherits the
benefits and drawbacks of the topologies that were used to construct it.
Advantages Disadvantages
Provides the simplest ways to find and The design of hybrid topology is
troubleshoot problems. challenging.
This topology is very flexible. It is expensive since it includes more
than one topology.
It is scalable since the size may be The infrastructure cost is quite expensive
readily increased. since a hybrid network needs a large
1.3.3 Bandwidth
The term "bandwidth" refers to the range of frequencies that a communications channel
can convey. The greatest quantity of data that a baseband networking medium can
potentially transfer is also indicated by the bandwidth. The variations that any single
carrier frequency can convey, less the overhead associated with analog-to-digital
conversion, are used to determine the bandwidth for broadband networking medium.
➢ Sender
➢ Receiver
➢ Message
➢ Transmission medium
1.3.4.2 Receiver
It is the point where the message delivered by the source has finally arrived. It is a
message-receiving device. The receiver, like the transmitter, can take the shape of a
laptop, tablet, smartphone, workstation, or another device.
1.3.4.3 Message
This is the most precious asset of a data transmission method. The message really refers
to data or information that is to be conveyed. A message can take any form, such as a text
file, an audio file, or a video file.
A data flow model is diagramatic representation of the flow and exchange of information
within a system. Data flow models are used to graphically represent the flow of data in an
information system by describing the processes involved in transferring data from input to
file storage and reports generation. (Anonymous, 2019)
The primary purpose of the Internet Protocol (IP), which serves as the Internet's address
system, is to transmit data packets from a source device to a destination device. The
Internet was founded on IP, which is the main protocol used to establish network
connections. Error checking and packet ordering are not handled by IP. Another protocol,
often the Transmission Control Protocol, is required for such capability (TCP).
1.4.4 Protocols
• Physical
• Datalink
• Network
• Transport
• Session
• Presentation
• Application
Reliability)
3 Network Packets IP
(Path Determination and Logical
Addressing IP)
2 Data Link Frames Ethernet/Wi-Fi
(Physical Addressing) {Mac and
LLC}
1 Physical Bits 10 Base
(Media, signal, and Binary T,802.11
Transmission)
This layer is the seventh layer of the OSI model. The abstraction layer handles network-
sharing protocols based on the OSI and TCP/IP models. The Internet Protocol Suite's
application layer includes communication protocols and interface mechanisms for
processing network traffic. Protocols included at the application layer include
The short form Telnet stands for Telecommunication Network. Telnet features
bidirectional interactive text-oriented communication. Telnet employs a terminal
connection for text-based communication. Telnet can be used to set up networking
hardware. In an 8-bit, byte-oriented data connection, information is interpolated in-band
with Telnet control information at TCP. Telnet is a client-server protocol that allows
distant machines to open a command line. The port used by Telnet is number 23.
FTP represents the short form of file transfer protocol. This protocol facilitates the
transmission of various files from one device to another. With dependable and efficient
data transport, FTP enables file sharing across remote computer devices. FTP use port 20
for data access and port 21 for data management.
The trivial file transfer protocol (TFTP) is an application layer protocol used to deliver
files from the server to the client. To share files between a server and a client, the simple
file transfer protocol employs the User Datagram (UDP) notion’s used port 69.
SNMP stands for Simple Network Management Protocol. This protocol collects data by
polling network devices to the management station at set or random intervals, forcing
them to provide certain information. SNMP employs port numbers 161 (TCP) and 162
(UDP).
DNS stands for Domain Name server. Each host device in any network is assigned a
unique logical address known as an IP address. IP addresses are a string of digits that are
tough to memorize. When we input a web address, such as Apple.com, into a browser, we
are requesting a host with an IP address. However, there is no need to remember the IP
address of the web page we are accessing because DNS translates a name to each logical
IP address and records it. DNS protocol uses port number 53.
DHCP denotes Dynamic Host Configuration Protocol. For communication with other
network devices, the host in any network requires an IP address. It obtains this address
through manual configuration or through the use of a dynamic host configuration protocol
(DHCP). DHCP uses port numbers 67 and 68.
The presentation layer converts data from the application layer into the device's native
internal mathematical structure and displays the information. It carries out code updates,
document compression, security encryption, and so on. It also specifies the data based on
the hub's software and hardware environment.
The session layer creates a connection termed a session, maintains and authenticates it,
and ensures the information or identity's security. Simply said, it controls the
communication between devices and establishes two endpoints. If the current session is
interrupted or dropped, it reconnects and begins a new one.
The Transport Layer is the fourth layer from the top in the OSI Model and provides
communication services to the application processes that were running on different hosts.
The services are provided by the transport layer to the session layer, which receives them
from the network layer. The services provided by the transport layer include error
correction as well as segmenting and DE segmenting data before and after it's sent on the
network. The transport layer also provides flow control functionality and ensures that
segmented data is delivered across the network in the right sequence. These are two
transport layer protocols: TCP and UDP.
The TCP protocol, which sits between the application layer and the network layer, is used
to offer dependable stream delivery service. TCP employs the acknowledgment system to
verify that data is sent properly, multiplexes at the sender end, and demultiplexes at the
receiver end.
The full form of UDP is User Datagram Protocol. UDP is used to convey brief messages
known as "datagrams," but it is an unstable, connectionless protocol in general. David P.
Reed developed UDP, which is officially specified in RFC 768.
Figure 22 Picture shows the comparison between TCP and UDP protocols (Panigrahi, 2022)
The phrase "cloud" refers to a service that can be accessed over the internet, as well as the
software and databases that run on these servers. Because computation and storage on the
server take place in a data center rather than on a locally installed user device, users may
access files and programs from any device while utilizing the cloud.
Platform as a Service (PaaS) allows companies to design, run, and manage apps without
requiring IT infrastructure. This facilitates and accelerates the development, testing, and
deployment of apps. Developers may concentrate on writing code and building apps
without having to worry about time-consuming IT infrastructure tasks like procuring
servers, storing data, and conducting backups.
2 Activity
➢ Bridge
➢ Hub
➢ Switch
➢ Router
➢ Modem
➢ Repeater
➢ Gateway
Bridge
Switch
Router
Repeater
Networking cables
Even though there have been advances in wireless technologies, many computer
networks in the 21st century rely on cables as the physical medium that devices use to
transfer data. Several standard types of network cables exist, each designed for specific
purposes. (Selph, 2020)
• Coaxial Cable
• Twisted Pair Cable
• Fiber Optics cable
A coaxial cable is a type of cable that is used to transmit video, communications, and
audio. This cable offers increased bandwidth and transmission capacity. Most people
think of a coaxial or coax cable as the cable that connects their televisions to their cable
TV service. However, similar connections are also utilized in networks that enable
broadband cable Internet access via a cable modem. A coaxial cable is depicted in the
image.
A twisted pair cable is a type of cable formed by twisting two independent insulated wires
and running them parallel to each other. This cable is frequently utilized in several types
of data and voice infrastructures.
A server is a computer that handles requests and sends data to other computers over the
internet or a local network. A web server is a common type of server from which web
pages can be accessed via the internet using a client such as a web browser.
Types of Servers
Web server
Web pages are a collection of data, such as photos, text files, hyperlinks, database files,
and so on, that are all stored on a computer (also known as server space) on the Internet.
A web server is a software program that runs on the server. When a user requests that
their web browser execute a web page, the web server organizes all of the data elements
into an orderly web page and sends them back to the web browser via the Internet.
Proxy Server
A proxy server is a server that acts as a middleman between client requests for specific
services or requests for specific resources and a specific server. There are various types of
File Server
The file server enables network users to store and retrieve data. It also gives users a
speedier service. may backup data at any moment, and this server optimizes data
Processes of reading and writing
Database Server
In this sense, the phrase "database server" can refer to the hardware and software required
to manage a database. The database server, like software, is the endpoint of a database
program in the classic client-server approach. This spider is sometimes referred to as an
instance. This includes the actual machine that serves as the database's host. A database
server is a specific, sophisticated computer that hosts a database when it is mentioned in
this sense.
Mail Server
A mail server is also known as an email server. A mail server is a computer that sends
and receives emails. Web servers and mail servers are frequently combined on a single
computer. Large ISPs and public email services (such as Gmail and Hotmail) may,
however, use dedicated hardware for email sending and receiving.
Application Server
A server is software that waits for and fulfills requests from client programs on the same
or other computers under the client/server programming model. A given application on a
computer can act as both a client and a server in response to requests for services from
other programs.
Super Micro
IBM Server
IBM is one of the oldest established corporations in the computer technology industry. It
was established in 1911. The company provides of large-scale enterprise solutions and
servers. Its equipment is classified as business and is distinguished by fault tolerance,
security, and scalability. As for the benefits of IBM servers, we may mention greater
cyber resilience, the ability to interact with existing cloud settings, flexibility, and
scalability.
Hp Server
Dell Server
Dell is one of the world's largest and most influential computer manufacturers. The
company has been in business since 1983. It is now based in the United States. Dell
servers are quick, dependable, and simple to manage. Dell servers are significantly
quicker than those of several prominent competitors. Regular examinations demonstrate
the dependability of server equipment and components. Dell servers are also
exceptionally scalable.
Dell and HP are two of the most well-known manufacturers of powerful, cutting-edge,
and dependable servers. With a few exceptions, both brands are nearly identical in
popularity and provide similar features and benefits. People and corporations frequently
compare the two to determine which is best for their needs. Personal experiences heavily
influence decisions. So we'll see which server is the best by drawing a comparison table.
There are many companies that bring up servers, such as IBM, Dell, HPE, Lenovo, and
Supermicro. When selecting a device, we will have to compare all the devices to decide
which one is the best server. So after we compare these devices, we will end up with all
the devices performing similarly, even though they are all good. We will have to select
the best of those servers for the Syntax Solution Company.
After comparing all the servers, we had two choices: HP and Dell. Choosing one of these
two servers was a bit of a challenge because both of them performed similarly. After
further comparison, we decided to go with the Dell server for the company's syntax
solutions because it offered some advantages.
Features Specifications
Processors Intel® Xeon® processor E-2200 and E-2100 product family
Intel® Celeron
Power Suppliers Single or dual 350W or 550W hot-plug redundant platinum
power supplies (100–240 V AC)
Storage controllers Internal controllers: PERC H730P, H330, HBA330 Software
RAID: PERC S140 External controllers: 12Gbps SAS HBA
Boot Optimized Storage Subsystem (BOSS): 2 x M.2 240GB
(RAID 1 or No RAID) or 1 x M.2 240GB (No RAID only)
Internal Dual SD Module3: 2x microSD (16GB, 32GB or
64GB) or 1x microSD (16GB, 32GB or 64GB)
security TPM 1.2/2.0 optional Cryptographically signed firmware
Silicon Root of Trust
I/O and Ports Networking Options: 2 x 1GbE LOM Network Interface
Controller (NIC) ports Front ports: 1x USB 2.0, 1 x IDRAC
micro USB 2.0 management port Rear ports: 2 x USB 3.0,
VGA, serial connector 2 x PCIe Gen 3.0 slots: • One x8 slot
low-profile, half-length with x4 slot width • One x16 slot low-
profile/full-height, half-length with x8 bandwidth
Drive Bays Up to 8 x 2.5” Hot-Plug drives
Features Specifications
Processors Up to two 2nd Generation Intel® Xeon® Scalable processors, up
to 20 cores per processor
Power Suppliers Platinum 495W, 750W, 750W 240V HVDC3 , 1100W, 1100W
380V HVDC3 Hot plug power supplies with full redundancy
option
Storage controllers Internal controllers: PERC H750, H350, H740P, H730P, H330
External controllers: HBA355e, H840, 12Gb/s Ext SAS HBA
Software RAID: S140 SAS Host Bus Adapters: HBA350i,
HBA330 Boot Optimized Storage Subsystem (BOSS):HW
RAID 2 x M.2 SSDs 240GB or 480GB Internal Dual SD
Module
Security TPM 1.2/2.0, TCM 2.0 optional Cryptographically signed
firmware Silicon Root of Trust
I/O and Ports Network options: 2 x 1GbE LOM + (optional) LOM Riser 2 x
1GbE or 2 x 10GbE SFP+ or 2 x 10GbE BaseT Front ports: 1 x
Dedicated iDRAC Direct USB, 1 x USB 2.0, 1 x Video Rear
ports: 1 x Dedicated iDRAC network port, 1 x Serial, 2 x USB
3.0, 1 x Video With Optional Riser: Non-rear storage config:
1xFH/FL + 1xHH/HL (2U Right riser) slots + 3 HH/HL slots
Rear storage config: 1xHH/HL (1U Left Riser) + 1xHH/HL (1U
Features Specifications
Processors Up to two 2nd Generation Intel® Xeon® Scalable processors, up to 28
cores per processor
Power Suppliers 495W Platinum 750W Platinum 750W 240HVDC Platinum* 1100W
48VDC 1100W Platinum 1100W 380HVDC Platinum* 1600W
Platinum 750W Titanium Hot plug power supplies with full
redundancy option Up to 8 hot plugs fans with full redundancy
*Available in China and Japan only
Storage controllers Internal Controllers: PERC H330, HBA330, HBA350i (adapter only),
H730P, H740P, H750 (adapter only) External Controllers: H840, 12
By contrasting the three DELL servers (R340, R540, and R640), we can demonstrate that
the R640 is the best option. Due to the R640's superior specifications than the other two
➢ It is fast in performance.
➢ Its ideal balance of density and scalability
➢ Memory
➢ Faster processing power
➢ There are numerous storage options.
➢ Advanced System Management
➢ Robust Protection
It is fast in performance
This Server has good performance when compared to the other two servers. It has
Dual(2nd-Gen) Intel Xeon Scalable Processors. It also suits the requirement of the syntax
solution company.
Memory
In server R640 we can increase the memory up to 3 terabytes. It is a huge plus point if we
go out of space, we can add more memory spaces.
Operating Systems
When selecting the operating system, we have plenty of options to choose from because
this server supports many operating systems. So we can select the best O/S that matches
the requirements and needs of the company.
Robust Protection
A robust cyberinfrastructure is offered by the Dell EMC PowerEdge R640 Rack Server.
Trust, worry-free server administration and a secure infrastructure are all provided by
Dell EMC. To ensure that the server is safe from threats to the data center, PowerEdge
➢ Microsoft Windows
➢ Linux
➢ Ubuntu
➢ Apples Mac O/S
➢ Unix
➢ Chrome O/S
➢ The network operating system (NOS) is created and optimized to deliver network
services to remote customers, unlike a desktop operating system. AnNOS is not
optimized to run common programs, but it can execute them anyway.
The term "server optimization" refers to a variety of techniques used to improve a server's
application setup, data processing effectiveness, overall speed, and overall performance.
Businesses can use specific optimization techniques to create and maintain an application
delivery network that performs at its peak.
Virtualization
The practice of separating a physical server into several virtual servers using software is
known as server virtualization. The virtual servers are distinct, segregated, and capable of
independently running their own operating systems. The physical server may run many
operating systems and services simultaneously thanks to server virtualization.
Website Caching
One of the greatest methods to optimize a server is to enable caching. The act of caching
involves exposing outdated versions of a website while storing the more recent versions
Database Optimization
• Always compare the priorities of any project to the priorities of other initiatives
awaiting approval and financing. Just because one project pays off faster than
others does not mean it should be implemented first. The primary priority of the
firm is always what it needs to remain operationally and financially competitive.
• Do not attempt to do a cost-benefit analysis on your own. There are several hidden
charges that only someone in the department where the system will be installed is
aware of. As a result, having someone from that department working with you is
critical.
• Display where tangible cash is stored or earned. Soft expenses are difficult to
measure. When I tried to convince a CFO that a new system would save so many
person-hours, I always found it difficult. The reason for this is that there is always
more work to be done elsewhere, so the corporation does not realize any payroll
expense reduction.
• Double-check your figures. Too many IT professionals create cost-benefit
evaluations without double-checking their data for accuracy. You don't want to go
to the CFO and argue that if you simplify the month-end close, you'll save 10 full-
time workers' labor for two days when, in reality, only four people are working on
it full time.
3 Activity 03
3.1 Prepar e a written network design p lan to meet th e abov e - men tio ned
user r equ irements includ ing a b lu epr int
This is the blueprint for the network of syntax solutions for which I used the designing
tool draw.io. In my network, I have used one server containing five servers, switches, and
two routers to make this network.
This is the plan that I have implemented for the company's syntax solutions. I used Cisco
Packet Tracer to develop this plan. As you can see, all the connections work perfectly on
the above plane. The plane was brought up according to the blue print which I drew
earlier.
Switch
We had some needs and requirements to meet when selecting a switch as a company, so the
switch we choose must meet our needs as well as our budget. So that is why we chose the Cisco
SG-300; this device covered our requirements.
• Switching Capacity and Forwarding Rate: 14.88 MPPS (64-byte Packets). 20.0
Gbps.
• Switches support 802.3at PoE+, 802.3af, and Cisco pre-standard (legacy) PoE.
Power Dedicated to PoE: 62W (PoE+ supported). 8x Ports support PoE.
• Total System Ports: 10x Gigabit Ethernet. Number of RJ-45 Ports: 8x Gigabit
Ethernet. Number of Combo Ports (RJ-45 + SFP): 2x Gigabit Ethernet Combo.
Router
Access point
When choosing an access point device, we made sure it covered our requirements. The main
requirements that we wanted were the area of coverage and the speed. Then I decided on the
TP-Link TL-WA801ST model.
• 300 Mbps wireless speed is ideal for smooth HD video and voice streaming.
• Supports multiple operation modes: access point, multi-SSID, client,
universal/WDS repeater, the bridge with AP
• With a single press of the WPS button, you can easily establish a WPA-encrypted
secure connection.
• With the included Passive Power over Ethernet Injector, you can deploy your
system in a variety of ways.
Feedback form
This is the user feedback form I designed for the syntax solution network. I asked a lot of
important questions in this feedback form, such as what the user thinks of my network,
what mistakes I made, and how to improve it. Creating this feedback form helped me
learn many things about which I was ignorant, and it also helped me make my mistakes.
Seven individuals commented on my network, as shown in the image above. All of their
comments were unique, and they all had different opinions about my network, most of the
people agreed with my network and appreciated me for my great work.
This is the reply that I got regarding my overall network plan. I was very pleased with this
type of response because none of them chose the poor option, indicating that my network
was perfect and had no major issues with design, user-friendliness, speed, or security.
In the above figure, we can see that I have received different kinds of suggestions on how
to develop my network. From that feedback, I was able to get a good idea of how to make
some improvements to my network. From those replies, most of them talked about the
security of the network, so I understood that the network is not well secured, so hereafter,
when planning a network, I will definitely consider the security of the network.
The Syntax Solution network is shown above. Atopology has been applied with hybrid
topology. 7 switches and 1 PT-Switch with Gigabit Ethernet port were used. Each switch
is interconnected, and all of them are linked to the PT-Switch. This implies that a problem
in one switch has no effect on the other switches, and even if one cable is destroyed, the
entire network may function normally until it is rebuilt. Unconnected Ports are also
disabled on all switches. Furthermore, each switch and router may be password secured.
In addition, the configuration files for each switch and router are saved on the server, so
there is no duplication. When replacing a device with a defect on another device, there is
no need to reconfigure the device. can
Telnet Command
In the future, we are planning to bring up many changes for this company to upgrade the
servers, upgrade the machines, and also upgrade every possible device with which we can
make the network mordanted smoother. In this system, as the server, we have the Dell
Edge R640, but in the future, our plan is to go for a better server than the Edge R640.
Currently, we’re using the normal connection, which is 4G, but in the future, we plan to
increase our network connection to fiber optics. After giving the system to some people
for testing, they also brought up some important recommendations that will also be
considered in the future, so these are the changes that we will bring up for the Syntax
Solutions Company in the future.
Conclusion
We learned a lot about networking while working on this project, including how to set up
a network and how to use programs related to networking software, among other things.
I'm convinced that the knowledge I gained from this project will be beneficial to us in the
future.
We've also discovered that networks aren't standalone entities but rather components of a
bigger system. and the system's goal is to deliver network services. Network services are
made available to users, programs, and devices so that they may accomplish their system
functions. To plan and build a network to support services, you must first comprehend
what they are, how they interact, and how to categorize them. After you've completed
this, you'll have a good sense of what the network will require. As the network analysis
develops, you may go into further detail. We gained a lot of knowledge and experience on
how to design a network by completing this task.
5 Harvard Referencing
Techopedia.com. (n.d.). What is a Data Flow Model? - Definition from Techopedia.
[online] Available at: https://www.techopedia.com/definition/28523/data-flow-
Anon, (n.d.). List of IEEE standards in Computer Networks and their functions |
LEARNABHI.COM. [online] Available at: https://www.learnabhi.com/ieee-standards-in-
computer-networks/.
www.tutorialspoint.com. (n.d.). Difference between TCP and UDP. [online] Available at:
https://www.tutorialspoint.com/difference-between-tcp-and-udp.
EDUCBA. (2020). Metropolitan Area Network | How does Metropolitan Area Network
work? [online] Available at: https://www.educba.com/metropolitan-area-network/.