Higher Nationals Internal verification of assessment decisions – BTEC (RQF) INTERNAL VERIFICATION – ASSESSMENT DECISIONS HND in Computing Programme title Assessor Unit(s) Assignment title Internal Verifier Unit 02: Networking LAN Design & Implementation for VIDCO Student’s name Pas s List which assessment criteria the Assessor has awarded. Merit Distinction INTERNAL VERIFIER CHECKLIST Do the assessment criteria awarded match those shown in the assignment brief? Y/N Is the Pass/Merit/Distinction grade awarded justified by the assessor’s comments on the student work? Has the work been assessed accurately? Y/N Y/N Is the feedback to the student: Give details: • Constructive? • Linked to relevant assessment criteria? • Identifying opportunities for improved performance? • Agreeing actions? Y/ N Y/ N Y/ N Y/N Does the assessment decision need amending? Y/N Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date Confirm action completed Remedial action taken Give details: 1 Sithari Wijesinghe Networking Unit 02 Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date 2 Sithari Wijesinghe Networking Unit 02 Higher Nationals - Summative Assignment Feedback Form Student Name/ID Unit Title Unit 02: Assignment Number 1 Networking Assessor Date Received 1st submission Submission Date Date Received 2nd submission Re-submission Date Assessor Feedback: LO1 Examine networking principles and their protocols. P Pass, Merit & Distinction 2 P 1 M1 LO2 Explain networking devices and operations. Pass, Merit & Distinction P 3 Descripts P4 LO3 Design efficient networked systems. P6 Pass, Merit & Distinction LO4 Implement and diagnose networked P systems. 5 Descripts P Pass, Merit & Distinction 8 P 7 Grade: M2 D1 M3 D2 M4 D 3 Assessor Signature: Date: Resubmission Feedback: Grade: Assessor Signature: Date: Internal Verifier’s Comments: Signature & Date: * Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have been agreed at the assessment board. 3 Sithari Wijesinghe Networking Unit 02 Assignment Feedback Formative Feedback: Assessor to Student Action Plan Summative feedback Feedback: Student to Assessor Assess or signatur e Date Student signatur e Date 4 Sithari Wijesinghe Networking Unit 02 Pearson Higher Nationals in Computing Unit 02: Networking Assignment 01 5 Sithari Wijesinghe Networking Unit 02 General Guidelines 1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as your cover sheet and make sure all the details are accurately filled. 2. Attach this brief as the first section of your assignment. 3. All the assignments should be prepared using a word processing software. 4. All the assignments should be printed on A4 sized papers. Use single side printing. 5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page. Word Processing Rules 1. 2. 3. 4. The font size should be 12 point, and should be in the style of Time New Roman. Use 1.5 line spacing. Left justify all paragraphs. Ensure that all the headings are consistent in terms of the font size and font style. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page Number on each page. This is useful if individual sheets become detached for any reason. 5. Use word processing application spell check and grammar check function to help editing your assignment. Important Points: 1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the before mentioned compulsory information will result in rejection of your work. 2. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be accepted. 3. Ensure that you give yourself enough time to complete the assignment by the due date. 4. Excuses of any nature will not be accepted for failure to hand in the work on time. 5. You must take responsibility for managing your own time effectively. 6. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing) for an extension. 7. Failure to achieve at least PASS criteria will result in a REFERRAL grade . 8. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then be asked to complete an alternative assignment. 9. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and a reference list. 10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A REFERRAL or at worst you could be expelled from the course 6 Sithari Wijesinghe Networking Unit 02 Student Declaration I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without attributing the sources in the correct form. I further understand what it means to copy another’s work. 1. I know that plagiarism is a punishable offence because it constitutes theft. 2. I understand the plagiarism and copying policy of Edexcel UK. 3. I know what the consequences will be if I plagiarise or copy another’s work in any of the assignments for this program. 4. I declare therefore that all work presented by me for every aspect of my program, will be my own, and where I have made use of another’s work, I will attribute the source in the correct way. 5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between myself and Pearson, UK. 6. I understand that my assignment will not be considered as submitted if this document is not attached to the assignment. Student’s Signature: (Provide E-mail ID) Date: (Provide Submission Date) 7 Sithari Wijesinghe Networking Unit 02 Higher National Diploma in Computing Assignment Brief Student Name /ID Number Unit Number and Title Unit 2: Networking Academic Year 201 2020/21 Unit Tutor Assignment Title LAN Design & Implementation for VIDCO -19 Issue Date Submission Date IV Name & Date Submission format The submission should be in the form of an individual reportwritten in a concise, formal business style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all work must be supported with research and referenced using Harvard referencing system. Please also provide an end list of references using the Harvard referencing system. The recommended word count is 3,000–3,500 words for the report excluding annexures, although you will not be penalised for exceeding the total word limit. Unit Learning Outcomes: LO1 Examine networking principles and their protocols. LO2 Explain networking devices and operations. LO3 Design efficient networked systems. LO4 Implement and diagnose networked systems. Assignment Brief and Guidance: 8 Sithari Wijesinghe Networking Unit 02 Case Study VIDCO-19 is a privately owned, well-known Software company located in Colombo. The Management of VIDCO-19 has purchased a 3 story building in the heart of Kandy. They are planning to make it one of the state-of-the-art companies in Kandy with the latest facilities. It is expected to have nearly 150 employees in Kandy branch. Department Number of Users Customer Care 10 Sales and Marketing 20 Finance 25 Legal 5 HR 10 Developers 55 Network Team 5 Server Room Servers +ISP connections Following requirements are given by the Management; All the departments must be separated with unique subnet and should not communicate with each other unless there is a special requirement. 192 . 168 . 10. 0 /24 is given and should be used for all the departments except the server room. IPs should assign using DHCP. ERP and CRM Systems need to be implemented in Kandy branch in local servers. Number of servers required for the Server room need to be decided by the 9 Sithari Wijesinghe Networking Unit 02 Network designer and should be assigned with 10. 254. 1. 0/24 subnet. ( Uses static IPs) High level of redundancy is expected in network design to eliminate single point of failures and traffic bottle necks. Sales and Marketing Team need to access Network resources using WIFI connectivity. Proper methods for networking monitoring and troubleshooting need to be established. All possible network security mechanisms should be implemented. Assume you have been appointed as the new network consultant of VIDCO - 19 Solutions. Prepare a network architectura l design and implement it with your suggestions and recommendations to meet the company requirements. ( Note: Clearly state your assumptions. You are allowed to design the network according to your assumptions, but main requirements should not be violated) Task 01 1.1 Discuss the different network models/ system types that can be implemented in Kandy branch with their benefits and constraints. 1.2 Discuss main IEEE Ethernet standards that can be used in above LAN and WLAN design? 1.3 Critically analyze network protocol suites used in Network Industry and recommend suitable network protocol suites for above scenario and justify your selection. 1.4 Explain the difference between Logical topology and Physical topology using examples and compare main network topologies used in network design. 1.5 Recommend a suitable network topology for above scenario and justify your answer with valid points. 10 Sithari Wijesinghe Networking Unit 02 Task 02 2.1 Discuss the operating principles of network devices that can be used for above scenario. Ex: Router, Switch, Etc. 2.2 Explore and describe the devices which we can use to enhance security of VIDCO- 19 Kandy Branch. 2.3 Critically analyze the importance of networking software and provide Examples for networking software can be used in above network design. 2.4 Discuss the importance of Servers in computer networks and research on Servers that are available in today’s market with their specifications a n d Recommend server/ servers and workstations for above scenario and justify your selection with valid points. 2.5 Discuss why it is important to have compatible devices and related software in network design. Task 03 3.1 1 Provide VLAN and IP subletting scheme for above scenario to satisfy user requirements. 3.2 2 Provide a list of devices, network components and software need to design a network for above scenario and justify your selection. 3.3 3 Provide a detailed network design (Diagram) for your design using modeling tool. (Ex: Microsoft Visio). 3.4 4 Design a User feedback form and get feedback from network users and analyze their feedback and suggestions. 3.5 5 Install and configure Network services and Applications* of your choice to accomplish above user requirements. (Ex: DHCP, DNS, Active Directory, Proxy, Web, Etc.) (Note: Screen shots of minimum 2 services are required) 3.6 6 Design a detailed Maintenance schedule for above Network design. * Note: - Screen shots of Configuration scripts should be presented. 11 Sithari Wijesinghe Networking Unit 02 Task 04 4.1 1 Implement and configure all network devices* according to the requirements given in the scenario. 4.2 Develop test cases and Test the above Network to verify * whether the design objectives are met. 4.3 Discuss why network monitoring is important in VIDCO- 19 Kandy branch? Explain with valid points. 4.4 Install and configure Network monitori ng tool/tools* of your choice and analyze results. 4.5 Provide troubleshooting steps for following situations; a. Everything is working normally but suddenly the connection goes away, and then comes back, and then goes away again on client Computer. (I. e., flapping) b. Network cable plugged in, but getting no connection. 4.6 Recommend potential future enhancements for the networked system and justify your recommendations. 4.7 7 Write a conclusion for your report by critically evaluating design, planning, Configuration and testing of your network. * Note: - Screen shots of Configuration scripts should be presented. 12 Sithari Wijesinghe Networking Unit 02 Grading Rubric Grading Criteria Achieved Feedback LO1 : Examine networking principles and their protocols. P1 Discuss the benefits and constraints of different network types and standards. P2 Explain the impact of network topology, communication and bandwidth requirements. M1 Compare common networking principles and how protocols enable the effectiveness of networked systems. LO2 : Explain networking devices and operations P3 Discuss the operating principles of networking devices and server types. 13 Sithari Wijesinghe Networking Unit 02 P4 Discuss the inter-dependence of workstation hardware with relevant networking software. M2 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization. LO 1 & LO2 D1 Considering a given scenario, identify the topology protocol selected for the efficient utilisation of a networking system. LO3 : Design efficient networked systems P5 Design a networked system to meet a given specification. P6 Test and evaluate the design to meet the requirements and analyze user feedback. M3 14 Sithari Wijesinghe Networking Unit 02 Install and configure network services and applications on your choice. D2 Design a maintenance schedule to support the networked system. LO4 : Implement and diagnose networked systems P7 Implement a networked system based on a prepared design. P8 Document and analyze test results against expected results. M4 Recommend potential enhancements for the networked systems. D3 Use critical reflection to evaluate own work and justify valid conclusions. 15 Sithari Wijesinghe Networking Unit 02 Acknowledgment I would like to express my deep gratitude to those who guide me and their valuable contribution to accomplish this assignment on time. First I wish to thank my Lecture Mr. Tharindu for his great support, perfect guidance, valuable supervision, and encouragement in finishing this assignment. Last but not least, I would like to thank my all the classmates of my Batch 26 who helped me always and special thank for my parents for their unlimited support. 16 Sithari Wijesinghe Networking Unit 02 17 Sithari Wijesinghe Networking Unit 02 18 Sithari Wijesinghe Networking Unit 02 Task 01 1.1 A network model is a design or architecture to manage communication between different network systems. As well as network models can define as network stacks or protocol suits. Mainly there are two network models, OSI Model TCP/IP Model Normally network model consists of layers. Those layers include specific functions. Computer network models are responsible for establishing a connection between the sender and receiver and transfer the data smoothly. The OSI Model OSI stands for Open System Interconnection and creates by International Organization for Standardization in 1984. The OSI model is the general-purpose networking model or communication model. Moreover, when we are using the OSI model, any connection can establish until any protocols are not used as the OSI model does not support protocol establishment. There are seven layers in the OSI model. Figure 1: OSI Model 19 Sithari Wijesinghe Networking Unit 02 Physical Layer This layer deals with the physical transmission medium itself. It has include specifications such as voltages, pin layout, cabling, and radio frequencies. Essentially this layer puts the data on the physical media as bits and receives it in the same way. Data Link Layer It verifies the data must be synchronized, error detection and enable the control. It has two sub layers. MAC (Media Access Control) – Flow control LLC (Logical Link Control) – Flow and error control/ Identifies the line protocols Network Layer Mainly responsible for receiving frames from the data link layer. And also deliver them to destinations by using their address. In this layer Router is the most important component to get packets from one network to another. Transport Layer This layer is responsible for delivery of data and checking errors of packets. Session Layer This layer Controls the conversations between different computers. Session layer designed for mainframe and terminal communications. Presentation Layer This layer is responsible for data formatting. Presentation layer can also handle the encryption and decryption required by the application layer. 20 Sithari Wijesinghe Networking Unit 02 Application Layer End user and the application layer directly interact with the software applications. Web browsing, file transfer, messaging are in this layer. This layer identifies resource availability, communication partners and synchronizes communication. Advantages of OSI Model Each layer has specific structure and functionality, therefore it is easy to use. Support for connection oriented and connection less services. As this model general purpose reference model, can use for data communication. Possible to connect with any type of devices, host, hardware or software. Disadvantages of OSI Model Due to inability to fit protocols, this model replaced by TCP/IP Internet Model. Because of the theoretical model and it restricts practical implementation Due to complex model, its initial implementation is slow TCP/IP Model This model developed before OSI model. TCP/IP model has four layers. Figure 2: TCP/IP Model 21 Sithari Wijesinghe Networking Unit 02 Network Access Layer – It handles the physical parts of sending and receiving data using the wireless network, Ethernet cable, Network Interface Card etc. Internet Layer - This layer responsible for travel to packet independently to the destination. Transport Layer – Transport layer provides good connection between two devices. Application Layer – Described a lot of applications. Some of them were TELNET, SMTP, DNS, DHCP, FTP Advantages of TCP/IP Model Use for flow control, Error control Congestion Control Provide a unique IP address for each computer on the network and it can identify over the network. Disadvantages of TCP/IP Model TCP connection is not designed for small networks like, LAN and PAN. Design only for Wide Area Networks. Loss result of congestion It can be slower at the beginning. When we implement a network to communicate different devices through the network that we choose either the OSI or the TCP/IP model. But both model has advantages and disadvantages as well. When one model is good for one case, on the other hand worst for another case. If focus on proper documentation, specification and modularization, it’s better to choose OSI model. But we focus on implementation, reliability and security, it’s better to select TCP/IP model. 22 Sithari Wijesinghe Networking Unit 02 Network System Types A computer network is a collection of computer devices that are connected together to communicate with another computer and share resources or data. A computer network can categorize by their size. LAN (Local Area Network) PAN (Personal Area Network) MAN (Metropolitan Area Network) WAN (Wide Area Network) WLAN (Wireless Local Area Network) Figure 3: Types of computer network LAN - Local Area Network LAN is designed for small geographical area such as office, factory or buildings. It is used to connect two or more computers through a communication medium such as twisted pair, coaxial cable. We can use different types of topologies through LAN such as Star, BUS, Ring, Tree etc. In Local Area Network data transferred at an extremely faster. As well as LAN provides higher security. Figure 4: Local Area Network 23 Sithari Wijesinghe Networking Unit 02 PAN – Personal Area Network Personal Area Network is a computer network that connect devices within the range of an individual person. Personal Area Network covers area of 30 feet. It’s typically involves a computer, phone, printer, tablet, speakers and video game consoles etc. Thomas Zimmerman was the first research scientist regarding personal area network. Figure 5: Personal Area Network MAN – Metropolitan Area Network Metropolitan Area Network is the large computer network that covers large geographical area which includes several buildings or even the entire city. MAN is larger than LAN but smaller than WAN. The most commonly used protocols in MAN are RS-232, Frame Relay, ATM, ISDN, OC-3 and ADSL. Figure 6: Metropolitan Area Network 24 Sithari Wijesinghe Networking Unit 02 WAN – Wide Area Network Wide Area Network is used for the network that covers large distance such as states or countries. WAN can lease private network or public network. The Internet is the biggest WAN in the world. This network commonly uses for Business field, education and government. Figure 7: Wide Area Network WLAN – Wireless Local Area Network WLAN that connects two or more devices using a wireless distribution method and it provides access to the public Internet. WLAN is the implemented as an extension to a wired LAN within a building or campus. Wireless LAN is commercially known as WIFI. Figure 8: Wireless Local Area Network 25 Sithari Wijesinghe Networking Unit 02 1.2 Network Standards What is IEEE Ethernet Standards? Ethernet is a set of technologies and protocols that are used primarily in LANs. It was first standardized in 1980s by IEEE 802.3 standard. IEEE 802.3 defines the physical layer and the medium access control (MAC) sub-layer of the data link layer for wired Ethernet networks. Ethernet is classified into two categories: classic Ethernet and switched Ethernet. (John, 2019) Organizations ITU (International Telecommunication Union) ANSI (American National Standards Institute) ISO (International Standards Organization) IEEE (Institute of Electrical and Electronic Engineers) Data Link layer contains two sub layers. Logical Link Control (LLC) Media Access Control (MAC) The IEEE 802 standard cowl the physical layer terms of technologies from LAN to wireless. 802 LAN /MAN 802.1 Standard related to network management 802.2 Standard for the data link layer (DLL) in the OSI reference model 802.3 Ethernet standard 802.4 Token Bus network 802.5 Token Ring network 802.7 Broadband Technical advisory group 802.8 Fiber Optic Technical advisory group 26 Sithari Wijesinghe Networking Unit 02 802.9 Integrated voice and data network 802.10 Stands for Interoperable LAN / MAN security. 802.11 Wireless network 802.12 100 mbps technologies including 100 base vg LAN 802.14 Cable modems and Broadband communication 802.15 Wireless Personal Area Networks such as Bluetooth. 802.16 Wireless Metropolitan Area Networks 802.12 100 mbps technologies including 100 base vg LAN 802.14 Cable modems and Broadband communication 802.15 Wireless Personal Area Networks such as Bluetooth. 802.16 Wireless Metropolitan Area Networks Table 1: IEEE Standard 802 1.3 Network Protocol All the rules and agreements are included in a network protocol to communicate between network devices, including ways devices can identify and make connections with each other. As well as there are formatting rules that how data is packaged into sent and received messages. If not protocols devices wouldn’t ability to understand the electronic signals over the network connection. Generally modern protocols use packet switching techniques to send and receive messages in the form of packets. Those messages subdivide to pieces that are collected and reassembled at their destination. There are so many computer network protocols have been developed and each designed for specific purposes. Protocol Acronym File Transfer Protocol FTP Secure Shell Protocol SSH Simple Mail Transfer Protocol SMTP Hyper Text Transfer Protocol HTTP Post Office Protocol POP 3 27 Sithari Wijesinghe Networking Unit 02 Telnet Network File Services NTFS Domain Name service DNS Dynamic Host Configuration Protocol DHCP Simple Network Manage Protocol SNMP Transmission Control Protocol TCP User Datagram Protocol UDP Internet Control Message Protocol ICMP Address Resolution Protocol& The Reverse Address Resolution Protocol ARP&RARP Internet Protocol IP Table 2: Network Protocol Types I think Internet Protocol is most suitable for the above scenario. 1.4 Network Topology What are the Network Topologies? Network topology describes the arrangement of the elements of a communication network. It defines how the computers or nodes within the network are arranged and connected to each other. The way in which a network of computers is connected. It defines the arrangement of nodes, cable, and connectivity devices that make up the network. Types of Network Topology Figure 9: Types of Network Topology 28 Sithari Wijesinghe Networking Unit 02 Physical Topology Describes the actual layout of the network transmission media. It describes the way of a computer connects with the help of cables. Types of Physical Topology Star Topology A computer or a server or switch is used here in the middle to connect all the computers to one another. It is the most common type used. All computers are attached to a Hub. Figure 10: Star Topology Bus Topology This computer network is built centering on the main wire and connecting all the computers and other devices to it. Bus topology allows information to be directed from one computer to another. Figure 11: Bus Topology Ring Topology Here computers are positioned in a ring/bangle and connected through cables. Data or information move in a circular manner. The breakdown of one computer or cable can lead to the breakdown of the entire network. 29 Sithari Wijesinghe Networking Unit 02 Figure 12: Ring Topology Mesh Topology In this topology, all the network nodes are connected individually to most of the other nodes. Mesh topology is not a commonly used network topology. Here, normally there is not a concept of a central switch, computer, or hub that acts as a central point of communication to pass on the messages. It can divide into two categories. Fully connected mesh topology Partially connected mesh topology Figure 13: Mesh Topology Tree Topology Tree topology has characteristics of both bus and star topologies. In this design, several star topologies are connected to a bus backbone cable. One of the advantages of this is the ability to control each network individually. 30 Sithari Wijesinghe Networking Unit 02 Figure 14: Tree Topology Logical Topology Describes how signal follows as it passes among network modes. It describes the way data flow from one computer to another within a computer network. The most common logical topologies are, Bus Topology Ring Topology Difference between Physical Topology and Logical Topology Physical Topology Represents physical layout of network Can arrange in Star, Bus, Ring, Mesh and Tree topologies This has major impact on cost, scalability and bandwidth capacity of network based on selection and availability of devices. It is actual path relevant for transmission The layout can change according to the needs Physical connection of the network. Logical Topology Represents logistics of network relevant with transmission data It includes Bus and Ring topologies This has major impact on speed and delivery of data packets. It also handles flow control and ordered delivery of data packets. It is a high level representation of data flow. There is no intervention and manipulation involved here. Data path followed of the network Table 3: Difference between Physical Topology and Logical Topology 31 Sithari Wijesinghe Networking Unit 02 (yashchuahan, 2020) 1.5 Suitable Network Topology for scenario When setting up a network, first we have to decide what kind of topology is most suitable according to the requirements. Each type of topologies has advantages and disadvantages. But we should choose the topology which includes the best performance and stability for the network. In my view, Star Topology is the most suitable network topology for the scenario. Because each node within the company is connected to one central network device such as a hub, a switch, or a computer via a cable. The central network is the server, and the other devices are clients. If one computer wants to send data to another computer. Then the first computer forwards the message to the hub. After that, the hub will check the Mac Address of the recipient computer, then forward the message. The advantage is using this topology one centralized nature of star network and give a separate data transfer the devices. But the disadvantage is star topology is running use only one central hub and if this central hub is fall whole network is down. Star topology is commonly used in office and home networks these days because star topology can run backups on the using hub in private folders. When the network is down users can use the data through the next computer. This network is accessing backup files on the hub. For this reason, star topology is more privacy than other networks. Task 02 2.1 Network Devices Network devices mainly use to transmit and receive the data quickly and securely as well as to communicate between different hardware. Each network device plays a key role based on their functionality and also works for different purpose at different segments. (https://www.elprocus.com, n.d.) 32 Sithari Wijesinghe Networking Unit 02 Network Switch Network switch is working at the layer in the LAN and similar to a hub, but a switch is cleverer with comparing a hub. Hub is used for data transferring and switch is used for forwarding and filtering the data. So switch is the best technique to deal with the data packets. As well as packets receive the interface of the switch it automatically filters the packets calculate and receive. At this moment switch is also manage CAM. CAM stands for Content Addressable Memory table and that own system to contour and memory. The network switch always provides higher performance. Figure 15: Network Switch Modem In getting the internet with telephone wires, the modem is used to connect the computers of a computer network or a personal computer at home to the internet. The modem act as a data translator. Digital signals sent from the computer is translated to analog signals so that they can be transmitted via telephone line and the analog signals coming from the telephone line send to the computer from the internet is translated to digital signals. This is called ‘Modulation’ and ‘Demodulation’. Hence, MODEM is a combination of these two words. There are different types of modems. Internal External Wireless modems Figure 16: Modem 33 Sithari Wijesinghe Networking Unit 02 Router A router is a device that connects multiple networks that use similar or different protocols. It manages that the best route between any two communication networks. It consists of software and hardware. Routers are used when several networks are connected together. Routers operate at the network layer or layer 3 of OSI Model. It is used for routing traffic from one network to another. These two networks could be private network company to public network. Router has a traffic police who direct different network traffic to another different direction. Figure 17: How Router works Wireless Router A wireless router is a device in a wireless local area network that forwarded the packet should be next network point. There are two types of routers. Those are Wired and Wireless. Usually wired routers use Internet Service Provider (ISP). But wired routers become out of date and people need to get online via Ethernet cable. Wireless router stands for an electronic device that work as a router and it means send data form via internet cable to device and wireless access point this data can be shared through radio signals instead of another cable. Wireless router always come with at least four Ethernet ports for connecting PCs, TVs and other home internet tools. Figure 18: Wireless Router 34 Sithari Wijesinghe Networking Unit 02 2.2 Network Security Devices Assurance of network security is one of the most important moments for safe and correct working of the computer systems and networks. The network security includes assurance of the limited access to sensitive information, the protection from unauthorized access, risks and potential security threats, and enhancement of network performance. Moreover always needs to protect the entry points of network and another important thing is encryption, also strong passwords, the use of antivirus software and modern advanced network security devices. (https://www.conceptdraw.com, n.d.) There are some different networking security tools for VIDCO-19 Kandy Branch to enhance security. Firewalls In network, a system design to protect an intranet from unauthorized access is called ‘firewall’. Firewall can be categorized into two parts. Hardware firewalls Hardware firewall is a physical device similar to a server. When connect to the network in order to protect from unauthorized access. Software firewalls A software firewall is a piece of software that installed in computer in order to protect it from unauthorized access. Techniques used by firewalls Proxy server Application level filtering Packet level filtering Circuit level filtering Figure 19: Firewall Proxy Server Proxy server provide a valuable security for computer and can be set up as web filter. As well as protect from internet threats like malware. Also save bandwidth by caching files or compressing incoming traffic and balance internet traffic to prevent crashes. In addition, 35 Sithari Wijesinghe Networking Unit 02 allows company to block forbidden web sites. Figure 20: Proxy Server Network Access Control (NAC) NAC is a network security control device that restricts the availability of network resources to endpoint devices that comply with your security policy. Some NAC solutions can be automatically fixed non-compliant devices to verify whether they are secure before allowing them to access the network. Network access control device is responsible to enhance the endpoint security of network. NAC can use agents to assess the device’s security or it can be agentless. (Melnick, 2019) Figure 21: Network Access Control Antivirus Especially in organization Antivirus software is one of the best security tools. Antivirus can be a part of endpoint protection systems. That provides not only virus protection but DLP, AppLocker, content filtering and other capabilities as well. 36 Sithari Wijesinghe Networking Unit 02 Figure 22: Antivirus 2.3 Networking Software What is a Network Software? Network software enclosed a broad range of software used for design, implementation and operation as well as monitoring of computer networks. Traditional networks means hardware based with software embedded. Software Defined Networking (SDN) separated from the hardware thus making it more adaptable to the ever-changing nature of the computer. There are lot of computing architectures for SDN from different providers. A high-level view of the architecture in simple terms centralizes control of the network by separating the control logic to off-device computer resources. All architectures have a form of an SDN controller, southbound APIs, and northbound APIs and controllers are the brain of the network. Through the APIs relay information between the controller, switches, routers and applications. Importance of Networking Software Network software is not the same as software applications. Especially software applications allow end users to perform specific tasks. Network software is “invisible” to end users and it is simply used to facilitate the access those users have to network resources, in a seamless way. The basic functionality has user management and file management. User management allows administrators to add or remove users from the network. File management enables administrators to explain the location of data storage and user access to that data. Through the network software allows multiple devices such as desktops, mobile phones, tabs, laptops and other networks to connect each other. Examples for scenario Internet Internet is a globally connected system of servers and computers that depends on networking software to verify accessibility by end users. (https://www.sdxcentral.com, n.d.) 2.4 What is the Server? A specialized machine or software used to connect multiple clients for a service. (Local or over internet). It may be physical or located on a cloud. Word “Server” is not associated with any machine, it is a role which can be assigned to any computing machine. A desktop computer may be a server. In client/server model is fulfill with requests from client programs which is running other same computers. In given application is function as a client with request service from other programs and server request from other programs. Figure 23: Server Sithari Wijesinghe Networking Unit 02 37 Types of Server A Proxy Server Proxy server is an intermediary server between client and the internet. Proxy servers have some functionalities. Those are network connection sharing, firewall and network data filtering and data caching etc. An Application Server It is designed to install, operate and host applications and associated services for end users, IT services and organizations. It provides the business logic for an application program. A Virtual Server It shares hardware and software resources with other operating systems versus dedicated servers. This server is very popular in web hosting environments. Because they provide fast resources control and cost effective. A Mail Server Handles e-mail over a network or over the internet. A mail server responsible for receives mails from client computers and deliver them to other mail servers. A Policy Server A policy server is a security element of a policy-based network. It provides authorization services as well as ease tracking and control of files. A Blade Server A Blade Server includes of a chassis containing multiple thin, modular electronic circuit boards, called as server blades, with each blade being dedicated to a single application. Importance of Servers Gives Scalability Adds Reliability Seamless Connectivity (remote and email) Improves Collaboration Makes for Faster Expansion Allows Centralized and Automated Backup Systems Best servers and specification These days most of the organizations are using different types of servers. So we have to 38 Sithari Wijesinghe Networking Unit 02 choose best server and specification before design the network system. Dell PowerEdge T20 [barebones] CPU Intel Pentium G3220 Graphics Intel HD Graphics RAM 4GB Storage No drivers included Connectivity Up to 12 x USB ports, VGA, serial, 2xPS2, Gigabit Ethernet Dimension (W x D x H) 17.5 x 43.5 x 36cm Storage 40TB HDD Connectivity Dimension 8 x USB 3.0, 17.5 x 37.5 serial, video, 2 x x 43cm DisplayPort, audio, Gigabit Ethernet Figure 24: Dell Server Lenovo Think Server TS150 CPU Graphics Intel Xeon Intel HD E3-1200 v6 Graphics P4600 RAM 64GB Figure 25: Lenovo Server 39 Sithari Wijesinghe Networking Unit 02 Dell PowerEdge T30 CPU Graphics Intel Xeon Intel HD E3-1225 v5 Graphics P530 RAM 64GB Storage six SATA HDD Connectivity Dimension 10 x USB ports, 17.5 x 43.5 HDMI, x 36cm DisplayPort, VGA, serial, PS2, Gigabit Ethernet Figure 26: Dell PowerEdge Fujitsu Primergy TX1310 M1 CPU Graphics Intel Xeon Intel HD E3-1226 v3 Graphics P4600 RAM 16GB Storage 2 x 1TB HDD Connectivity 5 x USB 3.0, 2 x Gigabit Ethernet Dimension 17.5 x 42 x 39.5cm Connectivity Dimension Figure 27: Fujitsu Primergy HP Proliant Microserver Gen8 CPU Graphics RAM Storage 40 Sithari Wijesinghe Networking Unit 02 Intel Celeron G1610T Matrox G200 4GB No drives included 4 x USB 2.0, 2 x USB 3.0, VGA, 2 x Gigabit Ethernet 23 x 24.5 x 23cm Figure 28: HP Proliant Microserver 2.5 Importance of having compatible devices and related software It’s easy to design and build a network securely and serves the organization well by having a good understanding of the types of network devices. When we carefully monitoring ongoing security and availability of network, then we can quickly spot hardware issues, configuration issues and attacks. The network devices work as a group and have a single purpose which securely transfers data as fast as possible. Also networking software is a foundational component for any network. It helps administrators deploy, manage, and monitor a network. Traditional networks made by special hardware such as switches, routers that bundle the networking software into the solution. Through the Software defined networking (SDN), making it easy to innovate and adapt the network to quickly meet changing network demands. 41 Sithari Wijesinghe Networking Unit 02