Pearson Higher Nationals in Computing Unit 02: Networking Assignment 01 1 Networking (unit -1) General Guidelines 1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as your cover sheet and make sure all the details are accurately filled. 2. Attach this brief as the first section of your assignment. 3. All the assignments should be prepared using a word processing software. 4. All the assignments should be printed on A4 sized papers. Use single side printing. 5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page. Word Processing Rules 1. 2. 3. 4. The font size should be 12 point, and should be in the style of Time New Roman. Use 1.5 line spacing. Left justify all paragraphs. Ensure that all the headings are consistent in terms of the font size and font style. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page Number on each page. This is useful if individual sheets become detached for any reason. 5. Use word processing application spell check and grammar check function to help editing your assignment. Important Points: 1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the before mentioned compulsory information will result in rejection of your work. 2. Avoid using page borders in your assignment body. 3. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be accepted. 4. Ensure that you give yourself enough time to complete the assignment by the due date. 5. Excuses of any nature will not be accepted for failure to hand in the work on time. 6. You must take responsibility for managing your own time effectively. 7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing) for an extension. 8. Failure to achieve at least PASS criteria will result in a REFERRAL grade . 9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then be asked to complete an alternative assignment. 2 Networking (unit -1) 10. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and a reference list. 11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A REFERRAL or at worst you could be expelled from the course Student Declaration I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without attributing the sources in the correct form. I further understand what it means to copy another’s work. 1. I know that plagiarism is a punishable offence because it constitutes theft. 2. I understand the plagiarism and copying policy of Pearson UK. 3. I know what the consequences will be if I plagiarise or copy another’s work in any of the assignments for this program. 4. I declare therefore that all work presented by me for every aspect of my program, will be my own, and where I have made use of another’s work, I will attribute the source in the correct way. 5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between myself and Pearson, UK. 6. I understand that my assignment will not be considered as submitted if this document is not attached to the assignment. Student’s Signature: (Provide E-mail ID) Date: (Provide Submission Date) 3 Networking (unit -1) 4 Networking (unit -1) Higher National Diploma in Computing Assignment Brief Student Name /ID Number Unit Number and Title Unit 2: Networking Academic Year 2021/22 Unit Tutor Assignment Title LAN Design & Implementation for SYNTAX SOLUTIONS Issue Date Submission Date IV Name & Date Submission format The submission should be in the form of an individual report written in a concise, formal business style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all work must be supported with research and referenced using Harvard referencing system. Please also provide an end list of references using the Harvard referencing system. The recommended word count is 3,000–3,500 words for the report excluding annexures, although you will not be penalised for exceeding the total word limit. Unit Learning Outcomes: LO1 Examine networking principles and their protocols. LO2 Explain networking devices and operations. LO3 Design efficient networked systems. LO4 Implement and diagnose networked systems. Assignment Brief and Guidance: 5 Networking (unit -1) Scenario SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They are planning to make it one of the state-of-the-art companies in Matara with the latest facilities. It is expected to have nearly 150 employees in Matara branch. Department Number of Users Customer Care 10 Sales and Marketing 20 Finance 25 Legal 5 HR 10 Developers 55 Network Team 5 Server Room Servers +ISP connections Foll ow i ng r equir ements ar e g iv en by the Manag ement. All the departments must be separ ated with uni que subnet and sho uld no t communicate with each o ther unless ther e is a speci al r equir ement . 19 2.16 8.10. 0/24 is giv en and sho uld be use d fo r all the departments except the server room . IPs sho uld assign usi ng DHCP . ERP and CRM Sy stems need to be im plem ented in M atara branch in local serv ers. N umber of s erv ers requir ed for the Server r oom need to be decided by the Netwo rk designer and sho uld be assigned with 10.25 4.1. 0/24 subnet. (Uses static 6 Networking (unit -1) I Ps ) Hig h l ev el of r edundancy is expected in netwo rk design to eliminate single po int o f failures and traffic bottle necks. Sal es and Mar keti ng Team need to access Netwo rk reso urces usi ng WI FI co nnectiv ity . Pr oper methods fo r netw or ki ng monitoring and tr oubl eshooting need to be established. All possible netw or k sec ur ity mechanism s sho uld be im plemented. Assume yo u have been appo inted as the new netwo rk co nsultant o f SYNT AX SOLUTI ONS . P repare a netwo rk architectural design and im plement it with yo ur suggestio ns and recommendatio ns to meet the com pany requirements. (No te: Cl ea rl y state you r a ssump tion s. Y ou a re allow ed to d esign th e n etwo rk a cco rding to you r a ssump tion s, bu t main requi remen ts sho uld n ot b e viol ated) Ac tiv ity 01 D iscuss the benefits and co nstraints o f different netwo rk system types that can be im plemented in the Matara branch and the m ain IEEE Ethernet standards that can be used in above L AN and WLAN design . D iscuss the im po rtance and impact o f netwo rk to po lo gies and netwo rk proto col suites while com paring the main network to po lo gies and netwo rk proto co l suites that are used in netwo rk design using exam ples . Recomm end suitable netwo rk topolo gies and network proto co l suites fo r above scenario and justify yo ur answer with v alid po ints. 7 Networking (unit -1) Ac tiv ity 02 D iscuss the o perating principles o f network dev ices (Ex: Ro uter, Switch, Etc.) and server ty pes that can be used fo r abov e scenario while explo ring different servers that are available in to day’s m arket with their specificatio ns . R ecommend server/ servers fo r the abov e scenario and justify your selectio n with v alid po ints . D iscuss the inter -dependence o f wo rkstatio n hardware with networking so ftware and prov ide exam ples fo r netwo rking so ftware that can be used in abov e netwo rk design. Ac tiv ity 03 P repare a written netwo rk design plan to meet the above mentio ned user requirements including a blueprint drawn using a mo deling too l. ( Ex: M icroso ft Visio , EdrawM ax). Support yo ur answer by pro viding the VL AN and IP subnetting scheme for the above scenario and the list of dev ices, netwo rk com po nents and software used to design the netwo rk for abo ve scenario and while justifying yo ur selectio ns. Test and ev aluate the proposed design to meet the requirem ents and analy se user feedback by using a User feedbac k fo rm . Install and co nfigure Netwo rk services , devices and applications (Ex: VL AN,D HCP , D NS,Pro xy , Web, Etc.) acco rding to the pro posed design to accom plish the user requirements and design a detailed M aintenance schedule for abov e Netwo rk. *N ote: - Scr een s hots of C onfig ur ati on scri pts shoul d be pr esented. Ac tiv ity 04 Im plement a networked system based o n yo ur prepared design with v alid evidence s and recommend po tential future enhancements fo r the networked system with valid justificatio ns to yo ur recommendatio ns. Use critical reflectio n to critically evaluat e the design, plan, co nfiguration, and testing o f yo ur network while justifying with v alid co nclusio ns. 8 Networking (unit -1) D evelo p test cases and co nduct verificatio n (Ex: Ping, extended ping, trace ro ute, telnet, SSH, etc.) to test the abov e Netwo rk and analyse the test results against the expected results. 9 Networking (unit -1) 10 Networking (unit -1) Grading Rubric Grading Criteria Achieved Feedback LO1 : Examine networking principles and their protocols. P1 Discuss the benefits and constraints of different network types and standards. P2 Explain the impact of network topology, communication and bandwidth requirements. M1 Compare common networking principles and how protocols enable the effectiveness of networked systems. LO2 : Explain networking devices and operations P3 Discuss the operating principles of networking devices and server types. 11 Networking (unit -1) P4 Discuss the inter-dependence of workstation hardware with relevant networking software. M2 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization. LO 1 & LO2 D1 Critically evaluate the topology protocol selected for a given scenario to demonstrate the efficient utilisation of a networking system. LO3 : Design efficient networked systems P5 Design a networked system to meet a given specification. P6 Test and evaluate the design to meet the requirements and analyze user feedback. M3 12 Networking (unit -1) Install and configure network services and applications on your choice. 13 Networking (unit -1) 14 Networking (unit -1) 15 Networking (unit -1) CONTENTS Activity 01 1. Network System ...................................................................................................... 1.1 Peer-to-Peer ................................................................................................. 1.2 Cloud ........................................................................................................... 1.3 Client Server ................................................................................................ 1.4 Local area network ...................................................................................... 2. Network Topology................................................................................................... 3. Network Protocol ..................................................................................................... 4. IEEE Standards ....................................................................................................... Activity 02 5. Operating Principles and Server Types ................................................................. 6. Servers Types........................................................................................................ Activity 03 and 04 7. Subnetting Scheme .............................................................................................. 8. Feed back Form ................................................................................................... 9. Google Foum ....................................................................................................... 10. Installation of Window Server ............................................................................ i Networking (unit -1) ii Networking (unit -1) iii Networking (unit -1) Activity 01 Network System Network System is a group or System of interconnected computers to share information and distributed processing task. The Connection can be established by using either cable media or wireless media. Each network includes hardware and software that connects computer and devices. Computer network basic of communication in IT. Peer-to-Peer Network In the most basic sense, a peer-to-peer network is a simple network where each computer doubles as a node and a server for the files it holds exclusively. These are like a home network or an office network. However, when P2B networks are installed on the Internet, the size of the network and the available files allow a greater amount of data to be shared. Early P2P networks such as Napster used client software and a central server, while later networks such as GAZA and BitTorrent were partitioned between multiple nodes to free the bandwidth, leaving the central server. Peer-to-peer networks are commonly associated with cyber theft and illegal file-sharing. Today no one enjoys P2P usage or network exclusive dominance. Popular P2P networks include eDonkey, BitTorrent, Gnutella and eMule. (technopedia, 2016) Figure 1:- (p2p network) 1 Networking (unit -1) Advantages of Peer-to-Peer - Software used:-The operating system for building the P2P network already has built-in software. - Resume download:- When downloading any large file and network is discounted then upon reconnection to the network and can resume the download easily - Inexpensive :- Setting up a peer to peer network is inexpensive. - No need for a specialist :- There is not extra network technician needed to handle the working of the network. Any person can operate the computer on the network - New connection :- It is easy to add a new node to the network. Just need extra copper wire or USB cable to attach the node(computer) to the network. Disadvantages of Peer-to-Peer - Slow performance :- If downloading and uploading of files occur simultaneously then the speed of the internet is affected. - No central backup :- All computers have to take individual backup of files and folders. - Controlling virus :- There is no central server to control and monitor the spread of the virus. Virus and Trojan can be easily transmitted over the network. - Limited computers connected :- A limit of 10 or low computers to be connected to the network - Protection of files :- Any computer can access any file on the network 2 Networking (unit -1) Cloud Computing Cloud sells services to anyone on the Internet. A private cloud is a data center that provides services hosted to a limited number of people, with a proprietary network or specific access and access systems. Cloud infrastructure includes the hardware and software components needed to properly implement a cloud computing model. These services are divided into three main categories: 1. Infrastructure as a service (IaaS) 2. Platform as a service (PaaS) 3. Software as a service (SaaS) Figure 2 :- (Cloud Computing) Advantages and Disadvantages of Cloud computing ADVANTAGES DISADVANTAGES Reduce Infrastructure Costs Moving from cloud to on-premise is not easy Impact to personal Limited control Consolidate the data Vendor lock-in Increase Automation Slower back-up and restores Save on space Internet Reliance Maximize uptime Heavy use of internet reduce the performance Defend against to data lost disaster Table -01 3 Networking (unit -1) Client – Server The client server network is defined as a specific type of online network that consists of a single central computer that acts as a server that runs multiple computers, referred to as clients. By accessing the server, client can access shared files and information stored on the server. A client server model can be implemented on a single computer system, but it is commonly used on a variety of platforms. (Donohoe, 2019) Figure 3 :- Client-Server Advantages and Disadvantages of Client Sever ADVANTAGES DISADVANTAGES Necessary informations are placed in a single Need a specialized network manager to location maintain the server Data is well protected Lack on the side of robustness Highly Scalable Can be expensive to purchase Easy to manage files Traffic congestion Clients able to access the system Not possible to directly print document or edit any informations on the client hard disk drive Table - 02 4 Networking (unit -1) Local Area Network (LAN) A LAN is a group of computers and devices that are in a specific location, such as a building, office or home. A LAN can be small or large, from a home network with a user to an enterprise network with thousands of users and devices in an office or school Figure-4: Local Area Most Common type of LAN: - Ethernet LAN (Wired connection) - WLAN (Wireless) 1. Ethernet LAN (Wired Connection) Ethernet LAN uses Ethernet cables to connect the devices in a network. In this type of connection, the network installation is wired and the Switches and Routers are configured using the network settings. Involves a hardwired connection to the internet by Ethernet cables (Cat5,Cat6 and so on). Ethernet is more stable and secure and faster than wifi. It is less accessible and expensive. (Still, 2021) Figure 5 :- (Ethernet Cables) 5 Networking (unit -1) 2. WLAN (Wireless) WLAN uses High Frequency Radio Waves as the means of communication over short distance. It does not require traditional network cables to connect the devices. WLAN can contain several types of devices such as Mobile phones, Laptop and tablet computers, Internet audio systems, other internet-enabled home devices. It is commonly used in offices and homes. WLAN is highly flexible, low cost and users are free to move within the coverage range. It is difficult to setup, easy to hack and transmission speed slower than wired network (hightechwhizz, 2019) Advantages of LAN i. Resource Sharing :- Easy to share resource such as hard disk drives, DVD drives and Printers ii. Software Sharing :- Easy to share software (No need to purchase individual license for each and every computer) iii. Convenient Communication :- Users can exchange messages and data in a convenient way iv. Centralized Data :- Data of the users are located at the centralized serve v. Improved Security :-It can be guaranteed to be secure vi. Internet Sharing :- Has the capability to share internet connection among all the LAN users Disadvantages of LAN i. Implementation Cost :- The initial cost involved in setting up the network is quite high ii. Policy Violation :- Unauthorized users can view all the browsing history and downloads of all the connected computers. iii. Maitanance :- Often faces hardware problems and system failure iv. Area Coverage :- usually made to cover up a limited distance (up to 10km). v. Malware Spreading :-Appearance of virus in LAN based on infrastructure is highly dangerous 6 Networking (unit -1) Wide Area Network (WAN) A wide area network is a network that exists over a large-scale geographical area, such as a city, state, or country. Also known as Long Haul Network. WANs are often used by large businesses to connect their office networks; Each office usually has its own local area network. The world largest WAN is internet. Internet connects many smaller local area networks (LAN) metro area networks(MAN).It can be said WAN is a combination of LAN and MAN. (Bradley, 2020) Figure 6 :- (Wide Area Network) Types of WAN technologies i. Packet switching ii. TCP/IP protocol suite iii. Router iv. Overlay network v. Packet over SONET/SDH (PoS) vi. MPLS vii. ATM viii. Frame Relay 7 Networking (unit -1) Advantages and Disadvantages of WAN ADVANTAGES DISADVANTAGES WAN covers a large geographical area, so Expensive setting up the network networks can be made over long distances Different peripherals can be shared with all the Maintaining a network is a full-time job which computers in the network requires network supervisors and technicians to be employed Everyone on that network can access the same Security is a real issue data Shares software and resources with connecting Need a good firewall to restrict outsiders from workstations. entering and disrupting the network Table :- 03 8 Networking (unit -1) Personal Area Network (PAN) Private Area Network (PAN) is a computer network organized around an individual for personal use only. The PAN is used for data sharing between devices within 10 meters or 33 feet, various digital devices such as smartphones, tablets, printers, computers and other devices within an individual user's environment. Wireless keyboards, Wireless Mice, Smartphones, TV remotes, Wireless printers, Gaming consoles, Bluetooth, Fire-wire, ZigBee, Wibree and wireless USB are some examples for PAN (Jahejo, n.d.) Figure 7 :- (PAN) Advantages and Disadvantages of PAN ADVANTAGES DISADVANTAGES No extra space, cable and wire requires. PAN can be operated in less range of areas Infrared signals travel only in a straight line Connect to many devices at a time Can only be used for personal area Affordable Cost Slow data transfer Easy to use Interfere with radio signals: Data can Synchronize between different devices Secure Table :- 04 9 Networking (unit -1) Metropolitan Area Network A metropolitan area network (MAN) is a large computer network that usually covers a city or a large campus. A MAN network is optimal for a larger geographical area than a LAN, from multiple buildings to entire cities. The purpose of the is to provide a long-term connection to the Internet. The primary use of metropolitan networks is a customer with high potential needs in a metropolitan area. A man's aim is to provide the required capacity at a lower cost and higher efficiency than to receive an equivalent service from a local telephone company. Figure 5 :- (man) Commonly, a MAN is small enough that dedicated point-to-point, or backbone, data connections are built between buildings or to a hosted colocation (colo) data center. These backbone connections can use various connection technologies including Ethernet run, leased dark fiber or private fiber, point-to-point WiFi, wireless LAN (WLAN), millimeterwave (MM wave) radio and microwave radio connections or private. 5G networks. (Wright, 2021) 10 Networking (unit -1) Advantages of MAN - Less Expensive :- It is less expensive to connect MAN with WAN Network. MAN provides good efficiency of data. All data on MAN is simply manageable in a centralized way. - Sending Local E-mails :- Users can send local emails fast and free on MAN. - Sending Local E-mails :- Using MAN fiber optics, data speeds can easily reach 1000 Mbps. Files and database transfer rates are fast. - Sharing of the Internet :- By installing MANs, users can share their Internet connection. This way, many users can get the same high-speed internet. - High security :- The MAN has a higher security level than the WAN. Converting - LAN to MAN is easy :- MAN is a combination of two or more LAN networks. So connecting two LAN networks together is the quickest way. This is made possible by the quick configuration of the links. Disadvantages of MAN - Difficult to manage: - As the size and number of LAN network increases it becomes more difficult to manage. This is due to security and additional configuration issues. - Internet Speed Difference: - It does not work on telephone copper wires. Copper wires affect the speed of the MAN, so fiber optics are more expensive. - Hackers attack: - In this network, the risk of attacking hackers is higher compared to LAN. So there may be data leak. High security personnel are required on the MAN. - Technical staff should be set up: - High tech personnel should set up MAN. Technical Personnel Network Administrators and Adjustment. - More wires required: - In MAN, cables are required than in LAN network. You know, this is a combination of two lanes. 11 Networking (unit -1) Campus Area Network Campus Area Network (CAN) is a group of local area networks (LANs) that are interconnected within a defined geographical area, such as school campuses, university campuses, military bases or corporate campuses, and corporate buildings. This Campus Area Network is also known as the Corporate Area Network and the Residential Network or Resnet because it is used only by the residents of the particular premises. The Campus Area Network is a network of interconnected local area networks that are connected by switches and routers to form a single network, such as the CAN. The campus area network covers areas ranging from 1 to 5 km and can be wired or wireless. (Geeksforgeek, 2020) Figure 6 :- (CAN) ADVANTAGES DISADVANTAGES Economical in the sense that it uses fewer The connection between nodes (computers) is cables, switches, hubs and routers limited in size Sharing of data is easy Maintenance is expensive Use a wireless connection for connecting different departments and buildings Files are transferred with high speed over the network (internet) Internet is used from the same ISP (Internet Service Provider) Table :- 5 12 Networking (unit -1) IEEE Standards IEEE 802 is a family of Institute of Electrical and Electronics Engineers (IEEE) standards for Local Area Networks (LAN), Personal Area Networks (PAN), and Metropolitan Area Networks (MAN). The IEEE 802 LAN / MAN Standards Committee (LMSC) maintains these standards. The IEEE 802 Standards consists of twelve members, numbered 802.1 to 802.12, dedicated to each of LMSC's central committees. IEEE 802 MAN/LAN IEEE 802.1 Higher Layer LAN Protocols Working Groups IEEE 802.2 LLC IEEE 802.3 Ethernet IEEE 802.4 Token bus IEEE 802.5 Token Ring MAC layer IEEE 802.6 MANs (DQDB) IEEE 802.7 Broadband LAN using Coaxial Cable IEEE 802.8 Fibre Optic TAG IEEE 802.9 Integrated Service (ISLAN or isoEthernet) IEEE 802.10 Interoperable LAN Security IEEE 802.11 Wireless LAN (WLAN) & Mesh (Wi-Fi certification) IEEE 802.12 100BaseVG IEEE 802.14 Cable modems IEEE 802.15 Wireless PAN IEEE 802.15.1 Bluetooth certification IEEE 802.15.2 IEEE 802.15 and IEEE 802.11 coexistence 13 Networking (unit -1) IEEE 802.15.3 High-Rate wireless PAN (eg. UWB,etc) IEEE 802.15.4 Low-Rate wireless PAN (eg. ZigBee, WirelessHART etc) IEEE 802.15.5 Mesh networking for IEEE 802.15.6 Body area network IEEE 802.15.7 Visible light communication IEEE 802.16 Broadband wireless Access (WiMAX certification) Table 6 :- IEEE standards Recommendation The type of network I used for this Matara; The branch is MAN. (Metropolitan Area Network). The metropolitan area includes large geographical areas such as network cities or school districts. Therefore, the famous software company was based in Colombo. Due to this the network structure of the Matara branch should be merged with the Colombo company. Therefore, the metropolitan area network is good for this company. 14 Networking (unit -1) Network Topology Network topology is the schematic description of the arrangement of the physical and logical components of a communication network. Nodes typically include devices such as switches, routers, and software with switch and router features. Topologies are categorized as either physical network topology, which is the physical signal transmission medium, or logical network topology, which refers to how data travels through the network among devices, independent of the physical connection of the devices. (omnisci, 2021) Physical topology is the geometric representation of all the nodes in a network Bus Topology Figure 7:- (Bus topology) This type of network topology is called bus topology because all computers or servers are connected by a single cable or a backbone. Each workstation sends and receives signals through this single cable; Bus. This is a linear topography. Depending on the type of computer network card, a coaxial cable or an RJ-45 network cable is used to connect them together. (Computer Hope, 2018) 15 Networking (unit -1) Advantages and disadvantages of Bus ADVANTAGES DISADVANTAGES The bus network is easy to extend and can If a cable encounters any problem the entire include many servers and systems. network will collapse. Cost is cheap Difficult to diagnose a problem with a particular server or system. It is ideal for small network setup and works The effectiveness of bus topology decreases as effectively for LAN. the number or number of nodes increases. Security is not very good as all computers receive the same signal from the common bus. Table :- 08 Ring Topology Figure 8 :- (Ring Topology) The transmission of data takes place by token and data travels in one direction. Every node is connected to two nodes on each side. Nodes are connected in a way that makes a close loop, therefore the name ring topology. 16 Networking (unit -1) Advantages and disadvantages of Ring ADVANTAGES DISADVANTAGES Because information flows in the same In the ring, information and data are sent direction, speed is better than any other through the source and target, which makes topography it slower The network server does not need to control Since the ring is a closed loop, if any one the connection between workstations node goes down, the entire network will collapse Conflict is minimized because data flow The whole network is connected by wire and connection efficiency are very connection, so the network is completely consistent dependent on these connections Every once in a while there is equal access to resources Table :- 08 Star Topology Figure 9 :- (Star Topology) 17 Networking (unit -1) Advantages and disadvantages of star topology ADVANTAGES DISADVANTAGEGES New devices can be easily connected and The capability of the core device is important any device can be easily removed from the as it affects the performance of all connected topography. devices. In the star, the central junction controls and Network cost increases with the number of monitors all activities devices Since each terminal is connected separately In this network, the performance of all other and directly, the problem with one device devices is compromised if the hub junction is does not affect the other network. not capable of supporting that number of devices. Table :- 09 Tree Topology Figure 10 :- (Tree topology) 18 Networking (unit -1) In tree topography, the devices are arranged in a tree style like the branches of a tree. The devices on the lower level are connected to the devices on the next higher level, which resembles a tree-like structure. Tree topography-based networks have a hierarchical structure. At higher levels of the tree, often point-to-point or point-tomultipoint connections are used. Wood topography based networks are not suitable for small networks as they require additional equipment and cables. Advantages of Tree topology - This topology is a combination of bus and star topology - Provides hierarchical and central data arrangement of these topology nodes. - Provides high scalability because leaf nodes can add one or more nodes to a hierarchical chain. - If the one of nodes in the network is damaged or not working other nodes are not affected - Provides easy maintenance and can easily identify faults. - Callable topology. The leaf tips have more edges. - Supported by many hardware and software vendors. - Point-to-point wiring for individual segment. Disadvantages of Tree topology - Very difficult to configure compared to other network topologies. - The length of a section is limited & the range of the section depends on the type of cabling used. - Due to a large number of nodes, the network performance of changes slightly more slowly. - If the first level computer is faulty, the next level system is also problematic. - Requires a higher number of cables compared to star and ring topology. This creates dense network traffic as the data center must travel from the cable. - The backbone appears to be the failure point of the entire segment of the network. - Topologies treatment is more complex. - Increases organizational costs. 19 Networking (unit -1) Mesh Topology Figure 11:- (mesh topology) Mesh topology is the network topology in which all network nodes are individually connected to most other nodes. There is no concept of a central switch, hub or computer, which acts as a focal point for sending messages. it can be divided into two kinds: - Fully connected mesh topology :- All the nodes connected to every other node Partially connected mesh topology :- Does not have all the nodes connected to each other Advantages and disadvantages of Mesh topology ADVANTAGES Each connection can carry its own data load DISADVANTAGES Installation and configuration can be difficult if the connection is high It is robust A fault is easily detected Bulk wiring required The cost of cabling is high in fully connected mesh topology Provides security and privacy Table :- 11 I Recoman Mesh topology for Matara Branch. In this topology, all the nodes are directly or partially connected to each other. Mesh topology makes a point-to-point connection. 20 Networking (unit -1) Hybrid Topology Figure 12 :- (Hybrid topology) Hybrid topology is a type of network topology that uses two or more different network topologies. These topologies include a combination of bus topology, mesh topology, ring topology, star topology and tree topology. Advantages and disadvantages of Hybrid topology ADVANTAGES DISADVANTAGES Can be modified as per requirement Expensive network type Extremely flexible The design of a hybrid network is very complicated. Very reliable There is a change in hardware to connect topology with another topology. Easily scalable as Hybrid networks are built Architectures are larger in scale so they in a fashion which enables easy integration of require a lot of cables in the installation new hardware components process. Error detecting and troubleshooting are easy Hubs are very costly and need to be Used for creating a large network intelligent enough to work with different architectures. Handles a large volume of traffic 21 Networking (unit -1) Table:- 12 Importance of Network Topologies 1. Influence on the operation of networks The importance and impact of topography on network evolution is enormous and influential. In recent years, studies have found that in the real world of networks, topography is essential because it mediates the effects of changes in local communication. Sometimes this can have an impact on the dynamic behavior of networks. Therefore, topography can be an influential aspect of editing or improving the functionality of networks. 2. Have a good understanding of important networking concepts If User want to know or understand the importance of networking concepts, topography can help user. For many, it is difficult to know how a computer network actually works. Topology is a significant component of network design theory. More or less all real world networks form networks set up over time. By topology, people can build a house or set up a small business computer network. The best feature is that they have good knowledge in bus design and do not want to do so with star design. Topology can provide user with a better understanding and familiarity with leading networking ideas such as broadcasters, hubs and routers. 3. Creates small world property Many networks are proving to be so-called small global property. One of the key priorities of topology in the evolution of network design is that it reduces the degree of division between worlds. Networks have been widely used in recent years. It aims to classify and create complex prototypes found across a range of social, technological and biological diversity systems. The topography of the largest social, technological, and biological networks, such as the WWW or related communication networks, has attracted considerable attention. (Justin, 2021) 22 Networking (unit -1) Impacts of Network Topology 1. LAN stands for Local Area Network, usually a group of computers and network devices connected within a single geographic area or building. By definition, connections must be high-speed and relatively inexpensive (e.g., token ring or Ethernet). Most university departments are in lanes. 2. MAN stands for Metropolitan Area Network, which is usually a large network of multiple buildings within the same city or city. The WAN is an abbreviation for a wide area network that, unlike MAN, is not limited to one geographical area, although it can be limited to the limits of a state regulation. 3. The WAN connects multiple LANs, and it can be controlled by one company (a company or an association) or made available to the public. The technology is fast and reasonably priced. The Internet is an example of a public WAN. 23 Networking (unit -1) Network Protocols A network protocol is a set of established rules that direct how computer network devices from servers and routers to endpoints - communicate, transmit, and receive data regardless of differences in their basic configurations, designs, or standards. To successfully send and receive information, devices on both sides of the communication exchange must adopt and follow ethical conventions. In networking, support for protocols can be configured in software, hardware, or both. (Alissa & Wesley, 2021) There are different types of protocols that support the important and compassionate role of interacting with different devices in the network. These are: 1. TCP 2. FTP 3. HTTP 4. UDP 5. DNS 6. POP3 24 Networking (unit -1) Transmission Control Protocol (TCP) TCP is a communications standard for delivering data and messages through networks. Most commonly used protocols within digital network communications. Organizes data so it can be transmitted between server and client. TCP is part of Internet protocol suite, So its known as TCP/IP Figure 13:- (TCP) Advantages and disadvantages of TCP ADVANTAGES DISADVANTAGES Can be deployed effectively in all the This model cannot describe new models or practical networking problems new technologies. Allow cross-platform communications To have a centralized TCP / IP domain, it among heterogeneous networks requires a lot of efforts for registration Any individual or organization can use TCP Only TCP and IP worked well in the long / IP suite without any reorganization or run whereas others lost their relevance with permission time Can add networks without disturbing any TCP / IP was designed for WAN. It cannot service with the help of TCP / IP work so efficiently with LAN and PAN It assigns a unique IP address to each TCP / IP fails to represent any other stack computer or system registered on a network (Bluetooth) except TCP / IP suite Almost all the routers can read TCP packets Does not differentiate between the data link and give special service to them and physical barriers. Table:- 13 25 Networking (unit -1) File Transfer Protocol The file transfer protocol enables file sharing between hosts, both local and remote, and runs over TCP. For file transfer, FTP creates two TCP connections: control and data connection. The control link is used to change control information such as commands for recovering passwords and files, and the data link is used to convert the actual file. These two connections run in parallel during the entire file transfer process. There are two types of FTP 1. Active FTP 2. Passive FTP Figure 14 :- (FTP) Advantages and disadvantages of FTP ADVANTAGES DISADVANTAGES Enables sharing large files and multiple FTP lacks security. Data, usernames, and directories at the same time. passwords are transferred in plain text, making them vulnerable to malicious actors. Recover lost data, and schedule a file FTP lacks encryption capabilities, making it transfer. non-compliant with industry standards. Resume file sharing if it was interrupted. Hard to script jobs Fastest transfer than HTTP. Table :- 14 26 Networking (unit -1) Hyper Text Transfer Protocol HTTP is an application layer protocol used for distributed, collaborative and hypermedia information systems. It runs on the client-server model, where the web browser acts as the client. Data such as text, images and other multimedia files are shared over the World Wide Web using HTTP. As a request and response type protocol, the client sends a request to the server, which is processed by the server before sending a reply to the client. HTTP is an unstable protocol, meaning that the connection between the client and the server is only visible to each other. After that, both the client and the server forget about each other. Due to this event, both the client and the server are unable to retain information between requests. Advantages and disadvantages of HTTP ADVANTAGES DISADVANTAGES Memory usage and CPU usage are low HTTP lacks encryption capabilities, making it less secure. Errors can be reported without closing Too complex for simple data connections Owing to lesser TCP connections, network Only point-to-point communication congestion is reduced Simple for page level data and Simple No reliable exchanges implementation No server resources ate required HTTP requires more power to establish communication and transfer data. Table :- 15 27 Networking (unit -1) User Datagram Protocol (UDP) UDP is an unconnected traffic layer protocol that provides a simple but unreliable messaging service. Unlike TCP, UDP does not include reliability, flow control or error recovery functions. UDP is useful in situations where TCP reliability mechanisms are not required. Retrieving lost data packets is not possible with UDP. Figure 15 :- (UDP) Advantages and disadvantages of UDP ADVANTAGES DISADVANTAGES Broadcast and multicast connections are In UDP, it's possible that a packet may not possible with UDP be delivered, be delivered twice, or not be delivered at all UDP is faster than TCP Manual disintegration of data packets is needed Table :- 15 28 Networking (unit -1) Domain Name System protocol (DNS) The DNS protocol translates or maps hostname to IP addresses. The DNS operates on the client-server model and uses the database distributed over the name servers hierarchy. Hosts are identified based on their IP addresses, but the IP address is difficult to memorize due to its complexity. IPs are also dynamic, making it very important to map domain names to IP addresses. DNS helps solve this problem by converting websites' domain names to numeric IP addresses. Figure 16 :- (DNS) Advantages and disadvantages of DNS ADVANTAGES DISADVANTAGES DNS facilitates internet access Could enable hackers to redirect to other Eliminates the need to memorize IP Don't carry information pertaining to the addresses client who initiated it Specially designed for security purpose Pages for phishing data. High Speed internet connection Only helps for new connections No new infrastructure Overheads of updating DNS server Single point of failures Table :- 16 29 Networking (unit -1) Post Office Protocol version 3 (POP3) The post office protocol is also an email protocol. Using this protocol, end users can download emails from the mail server to their own email client. Once the emails are downloaded locally, they can be read without an internet connection. Also, once the emails have been moved inland, they will be removed from the mail server and the space will be free. Unlike IMAP4, POP3 is not designed to deal extensively with messages on the mail server. POP3 is the latest version of the Post Office protocol. Figure 18 :- (POP3) Advantages and disadvantages of POP3 ADVANTAGES DISADVANTAGES Messages can be read when user is offline E-mail cannot be access from other machines Less storage space is required E-mail attachments may contain viruses Very popular Easy to configure and use Table :- 17 30 Networking (unit -1) Importance of Network Protocol Sometimes referred to as the access method, a protocol used to define the method of exchanging data over a computer network, such as a local area network, the Internet, or the Intranet. The following situations. 31 Networking (unit -1) Activity 02 Operating Principles of Network Devices Computer networking devices are also called data-mediating units and network devices in a computer network. The units that generate the last receiver or data are called hosts or data terminal equipment. Network is the building blocks that facilitate the connection between devices, services and endpoints that use those services. Some networking devices are as follows Hub Figure 19:- (Hub) Hub A hub is a common connection point, also known as a network hub, used to connect devices within a network. It acts as a central connector for all devices connected through the hub. There are several ports in the center. Once a pocket reaches one port, it can be viewed on all segments of the network as a pocket is copied to other ports. There are three type hubs i. Passive Hub: The connection point for wires that helps to make the physical network. ii. Active Hub: Able to monitor the data sent to the connected devices. iii. Intelligent Hub: These hubs have some kinds of management software that help to analyze the problem in the network and resolve them. The important of hub - Hub is used to create small home networks. - It is used for network monitoring. - They are also used in organizations to provide connectivity. - It can be used to create a device that is available thought out of the network. 32 Networking (unit -1) Repeater Figure 20 :- (Wireless Repeater) Repeater In digital communication systems, a repeater is a device that receives a digital signal on an electromagnetic or optical transmission medium and regenerate the signal through the next leg of the medium. Repeaters remove unwanted noise from the incoming signal. Unlike an analog signal, the original digital signal can be clearly perceived and recovered, even if it is weak or distorted. Types of Repeater i. Telephone repeater. ii. Optical communications repeater. iii. Radio repeater. iv. Analog repeater. v. Digital repeater. 33 Networking (unit -1) Router Figure 21 :- (Router) A router is a hardware device designed to receive, analyze, and move incoming packets to another network. It can be used to transfer packets to another network interface, drop them, and perform other network-related actions. Types of router i. Wired Router ii. Wireless router iii. Virtual Router iv. Core Rout v. B-Router vi. Edge Router vii. Subscriber Edge Router viii. Inter-provider Border Router 34 Networking (unit -1) Functions of Router - Create a segment: Routers play an important role in dividing the Internet network in a residency area or business. - Assign IP Address: IP (Internet Protocol) is the most essential element for every computer system because IP address refers to the address assigned to the computer on the network. - Firewall: Firewall provides protection against intruders and malicious users on internal networks. - Share resources: Routers allow multiple users to share resources such as faxes, scanners, printers and file folders on remote drives. Gateway Gateway A gateway is a piece of networking hardware or software used in telecommunications for telecommunications networks that allows data to flow from one unique network to another. Types of gateway Default gateways are computers used to access external networks when another gateway is not specified. Media gateways are used with audio and video transmissions. Payment gateways are secure computers that accept or reject online payments. VoIP gateways are used with Voice over Internet Protocol (VoIP) communications, such as phone calls made from PCs. 35 Networking (unit -1) Bridge Figure 22 :- (bridge) A network bridge is a device that divides a network into segments. Each segment represent a separate collision domain, so the number of collisions on the network is reduced. Each collision domain has its own separate bandwidth, so a bridge also improves the network performance. Function of bridge - This networking device is used for dividing local area networks into several segments. - In the OSI model, it works under the data link layer - It is used to store the address of MAC in PC used in a network - Used for diminishing the network traffic 36 Networking (unit -1) Switch Figure 23 :- (switch) Switch A switch is a multiboard bridge with a buffer and a design that maximizes its performance (a higher number of ports indicates less traffic) and performance. A switch is a data connection layer device. This makes it very efficient because the switch can perform error checking before forwarding data, which does not forward packets with errors and only selects good packets and sends them to the correct port. How a network switch works The network switch can be used in the following ways: - Edge or access switches: These switches manage incoming or outgoing traffic to the network. Devices such as computers and access points are connected to edge switches. - Assembling or distribution switches: These switches are placed within the preferred middle layer. Edge switches are connected to these, and they can send traffic from switch to switch or to core switches. - Core Switches: These network switches form the backbone of the network. Core switches are aggregation or fringe switches that connect user or device fringe networks data center networks and enterprise LANs to routers. (Burke, 2021) 37 Networking (unit -1) Comparision of Hub, Switch and Router Device Hub Switch Router Layer Physical layer Data link layer Network layer Function To connect a Allow connections Direct data in a network of personal to multiple devices, network computers together, manage ports, they can be joined manage VLAN through a central security settings hub Network type LAN LAN LAN, MAN, WAN Transmission mode Half duplex Half/Full duplex Full duplex Speed 10Mbps 10/100Mbps, 1Gbps 1-100Mbps (wireless); 100Mbps1Gbps(wired) Transmission type Frame flooding, First broadcast, then At Initial Level unicast, multicast or unicast and/or Broadcast then Uni- broadcast multicast depends cast and multicast on the need Port 4/12 ports multi-port, usually 2/4/5/8 ports between 4 and 48 Data Transmission electrical signal or form bits frame & packet packet Table :- 18 Recommandation 38 Networking (unit -1) Server Type There are Several types in server Client Servers In the client/server programming model, a server is a program that awaits and fulfills requests from client programs in the same or other computers. A given application in a computer may function as a client with requests for services from other programs and also as a server of requests from other programs. Mail Servers Almost as ubiquitous and crucial as Web servers, mail servers move and store mail over corporate networks (via LANs and WANs) and across the Internet. Virtual Servers In 2009, the number of virtual servers deployed exceeded the number of physical servers. Today, server virtualization has become near ubiquitous in the data center. From hypervisors to hybrid clouds, ServerWatch looks at the latest virtualization technology trends. Web Servers At its core, a Web server serves static content to a Web browser by loading a file from a disk and serving it across the network to a user’s Web browser. This entire exchange is mediated by the browser and server talking to each other using HTTP. 39 Networking (unit -1) Activity 3 and Activity 4 Figure 24:- (Author Developed) 40 Networking (unit -1) Subnetting Scheme 41 Networking (unit -1) 42 Networking (unit -1) Figure 25 :- (Author Developed) 43 Networking (unit -1) Feedback Form Specify your user type Administrator User Other Is it helpful for you? Yes No It its secure for you? Yes No Rate the connection between various devices within the network Excellent Above Average Average Below Average Poor What you think about this network? Any suggestions for improve the network 44 Networking (unit -1) Google Forum 45 Networking (unit -1) Figure 25:- (Author Developed) 46 Networking (unit -1) Install Window Server Figure 26:- (Author developed) Select the defaults on the language and click Next Figure 27:- (Author developed) Click “Install now” 47 Networking (unit -1) Figure 28:- (Author developed) Select “Window server 2016 Standard Evalution (Desktop Experience)” and Click Next Figure 30:-(Author developed) Consider the license agreement and click the checkbox “I accept the license terms” and click Next. 48 Networking (unit -1) Figure 31:- (Author developed) Select “upgrade” Figure 32:-(Author developed) Click Next 49 Networking (unit -1) Figure 33:- (Author developed) Figure 34:- (Author developed) Create an account with User name and Password and Click Finish. 50 Networking (unit -1) Figure 35:- (Author developed) Wait until Restart Figure 36:-(Author developed) 51 Networking (unit -1) Figure 37:- (Author developed) Figure 38:- (Author developed) Future Enhacement 52 Networking (unit -1)