ASSIGNMENT FRONT SHEET Qualification BTEC Level 5 HND Diploma in Computing Unit number and title Unit 2: Networking Infrastructure Submission date Date Received 1st submission Re-submission Date Date Received 2nd submission Student Name Le Tran Thai Tuan Student ID GCD191064 Class GCD0807A Assessor name Dang Quang Hien Student declaration I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that making a false declaration is a form of malpractice. Student’s signature Grading grid P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 D1 D2 D3 BTEC Level 5 HND Diploma in Computing ASSIGNMENT UNIT 2: NETWORKING INFRASTRUCTURE My report could not have been accomplished without the kind support and help of University of Greenwich, which also provide this coursework and individuals and organizations. I would like to express my sincere thanks to all of them. I would like to give a special gratitude to my lecturer, Mr. Dang Quang Hien, for his guidance and providing necessary information to finish the assignment as well. I also want to thank those authors and organizations who researched about Computer Network and Cisco Packet Tracer tutorial. Last but not at least, I pay my sincere thanks to my parents for their encouragement and careful. Le Tran Thai Tuan – GCD191064 LE TRAN THAI TUAN 1 Table of Contents P1. Discuss the benefits and constraints of different network types and standards. ................................... 8 1. Introduction to Computer Networking. .............................................................................................................. 8 2. Network type........................................................................................................................................................ 8 2.1 LAN .................................................................................................................................................................. 8 2.2 MAN .............................................................................................................................................................. 10 2.3 WAN .............................................................................................................................................................. 11 2.4 Other network types ..................................................................................................................................... 12 3. Network Standards ............................................................................................................................................ 13 3.1 What is Network Standards? ........................................................................................................................ 13 3.2 Types of Standards ........................................................................................................................................ 14 4. Network protocols ............................................................................................................................................. 14 4.1 Definition ...................................................................................................................................................... 14 4.2 Types of Networking Protocols ..................................................................................................................... 14 5. OSI model (International Standards Organization)........................................................................................... 15 5.1 Introduction to OSI model ............................................................................................................................ 15 5.2 Seven layer of OSI ......................................................................................................................................... 16 6. TCP / IP (Transmission Control Protocol/Internet Protocol ) ........................................................................... 17 P2. Network topology & communication and Bandwidth requirement ....................................................... 19 1. Network topology .............................................................................................................................................. 19 1.1 Definition ...................................................................................................................................................... 19 1.2 Physical & Logical Topology .......................................................................................................................... 19 1.3 Star topology ................................................................................................................................................. 19 1.4 Mesh Topology.............................................................................................................................................. 20 1.4 Bus Topology ................................................................................................................................................. 21 1.5 Ring Topology................................................................................................................................................ 22 1.6 Tree Topology ............................................................................................................................................... 23 1.7 Hybrid Topology ............................................................................................................................................ 24 2. Communication and Bandwidth .............................................................................................................. 24 2.1 Definition of Communication in networking ................................................................................................ 25 2.2 Communication protocols............................................................................................................................. 25 LE TRAN THAI TUAN 2 3. Bandwidth .......................................................................................................................................................... 25 3.1 Definition ...................................................................................................................................................... 25 3.2 Bandwidth requirements .............................................................................................................................. 26 P3. Discuss the operating principles of networking devices and server types. ............................................ 27 1. Introduction to network devices ....................................................................................................................... 27 2. Operating principles of some network device .................................................................................................. 32 3. Server .................................................................................................................................................................. 33 3.1 What is server ............................................................................................................................................... 33 3.2 Server types .................................................................................................................................................. 33 P4. Discuss the inter-dependence of workstation hardware with relevant networking software. ......... 36 1. Workstation hardware ....................................................................................................................................... 36 2. Network software .............................................................................................................................................. 36 3. Inter-dependence of workstation hardware with networking software......................................................... 36 P5. Provide design of the networked system with clear explanation and addressing table ..................... 38 1. Discuss User Requirement ................................................................................................................................. 38 1.1 User Requirement ........................................................................................................................................ 38 2. Logical and Physical Design................................................................................................................................ 38 2.1 The difference between logical and physical design .................................................................................... 38 2.2 Physical design for Requirement .................................................................................................................. 38 2.3 Logical design for Requirement .................................................................................................................... 40 P6 Evaluate the design to meet the requirements. ........................................................................................... 43 1. Test plan/Test case ............................................................................................................................................ 43 2. Screenshot in testing .......................................................................................................................................... 43 3. Evaluate the design of the network .................................................................................................................. 46 3.1 Advantages.................................................................................................................................................... 46 3.2 Limitation ...................................................................................................................................................... 47 3.3 Solution for efficiency and usage. ................................................................................................................. 47 P7+P8 + M3. Implement a networked system based on a prepared design. ............................................... 48 1. Router setup ....................................................................................................................................................... 48 2. Setup VLAN and Trunk mode ............................................................................................................................. 48 2.1 Setup VLAN on Multilayer Switch ................................................................................................................. 48 LE TRAN THAI TUAN 3 2.3 Setup VLAN on Router .................................................................................................................................. 49 2.2 Setup VLAN on each Switch .......................................................................................................................... 49 3. Server .................................................................................................................................................................. 50 3.1 Mail Server .................................................................................................................................................... 50 3.2 Web Server.................................................................................................................................................... 51 3.3 DNS Server .................................................................................................................................................... 52 4. Test plan and Test log ........................................................................................................................................ 52 M1. Networking principles and how protocols enable the effectiveness of networked systems. ........... 53 1. OSI model & TCP/IP............................................................................................................................................ 53 2. Some common protocols ................................................................................................................................... 53 2.1 DHCP ............................................................................................................................................................. 53 2.2 DNS................................................................................................................................................................ 54 2.3 TCP ................................................................................................................................................................ 54 2.4 UDP ............................................................................................................................................................... 55 2.5 FTP................................................................................................................................................................. 55 2.6 ICMP .............................................................................................................................................................. 55 2.7 IGMP ............................................................................................................................................................. 56 2.8 PPP ................................................................................................................................................................ 57 3. Compare some protocols ................................................................................................................................... 58 3.1 DNS & DHCP .................................................................................................................................................. 58 3.2 TCP & UDP ..................................................................................................................................................... 58 3.3 ICMP & IGMP ................................................................................................................................................ 59 M2. Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization ................................................................................................... 60 1. File servers .......................................................................................................................................................... 60 2. Print servers........................................................................................................................................................ 60 3. Application servers............................................................................................................................................. 60 4. DNS servers......................................................................................................................................................... 61 5. Mail servers ........................................................................................................................................................ 62 6. Web servers ........................................................................................................................................................ 62 7. Database servers ................................................................................................................................................ 62 LE TRAN THAI TUAN 4 8. Virtual servers .................................................................................................................................................... 62 9. Proxy servers ...................................................................................................................................................... 62 10. Monitoring and management servers ............................................................................................................. 63 M4. Recommend potential enhancements for the networked systems. ...................................................... 64 1. Configure Firewall .............................................................................................................................................. 64 2. Configuration VPN server .................................................................................................................................. 64 3. Use of Linux operating system ........................................................................................................................... 64 4. Data Compression .............................................................................................................................................. 64 D1. Considering a given scenario, identify the topology protocol selected for the efficient utilization of a networking system............................................................................................................................................... 65 1. Star topology features a better fault tolerance. ............................................................................................... 65 2. Easy to extend the reach of the network by creating multiple stars. .............................................................. 65 3. Star topology systems are highly scalable......................................................................................................... 65 4. Connect multiple device types........................................................................................................................... 66 5. It doesn’t create bottlenecks where data collisions occur. .............................................................................. 66 D2. Design a maintenance schedule to support the networked system ....................................................... 66 1. Important of Maintenance schedule ................................................................................................................. 66 2. Maintenance Schedule....................................................................................................................................... 66 D3 Use critical reflection to evaluate own work and justify valid conclusions. ........................................... 67 1. Critical reasoning on selection of the topology ................................................................................................ 67 2. Critical reason on selection of networking devices, server and server types .................................................. 68 3. Critical reflecting on the testing ........................................................................................................................ 68 4. Conclusion .......................................................................................................................................................... 68 4.1 Advantages.................................................................................................................................................... 68 4.2 Disadvantages ............................................................................................................................................... 68 4.3 Future directions ........................................................................................................................................... 69 References ................................................................................................................................................................ 70 INDEX OF COMMENTS ............................................................................................................................................ 71 LE TRAN THAI TUAN 5 Table of Figures Figure 1: Introduction to Computer Network .................................................................................................................................... 8 Figure 2: Local Area Network .................................................................................................................................................................. 9 Figure 3: Metropolitan Area Network ................................................................................................................................................ 10 Figure 4: Wide Area Network................................................................................................................................................................. 12 Figure 5: Network Types.......................................................................................................................................................................... 13 Figure 6: Network Protocols .................................................................................................................................................................. 15 Figure 7: Seven layer of OSI mode ........................................................................................................................................................ 16 Figure 8: OSI vs TCP/IP mode ............................................................................................................................................................... 18 Figure 9: Star topology ............................................................................................................................................................................. 20 Figure 10: Mesh Topology ....................................................................................................................................................................... 21 Figure 11: Bus Topology .......................................................................................................................................................................... 22 Figure 12: Ring Topology ........................................................................................................................................................................ 22 Figure 13: Tree Topology ........................................................................................................................................................................ 23 Figure 14: Hybrid Topology.................................................................................................................................................................... 24 Figure 15: Bandwidth ............................................................................................................................................................................... 26 Figure 16: WAP_Cisco Small Business 500 Series ........................................................................................................................... 27 Figure 17: Cisco WET54G Wireless-G Ethernet Bridge ................................................................................................................ 28 Figure 18: 1 Port PCI 10/100/1000 32 Bit Gigabit Ethernet Network Adapter Card ....................................................... 29 Figure 19: Wifi Repeater Long Range Extender .............................................................................................................................. 29 Figure 20: NETGEAR GS108 Unmanaged Desktop Switch features 8-Ports.......................................................................... 30 Figure 21: Bridge Networking ............................................................................................................................................................... 30 Figure 22: TENDA D303 Wireless N300 ............................................................................................................................................. 31 Figure 23: TP-LINK AC1200 Wireless Modem Router VR400 .................................................................................................... 31 Figure 24: TP-Link 5 Port Gigabit Ethernet Switch ........................................................................................................................ 31 Figure 26: Router Wifi ASUS BRT-AC828 ........................................................................................................................................... 32 Figure 26 Router Tenda AC10 1200Mbps ......................................................................................................................................... 32 Figure 27: Google service room ............................................................................................................................................................ 33 Figure 28: Server Room ........................................................................................................................................................................... 35 Figure 29: Hardware & Networking .................................................................................................................................................... 37 Figure 30: Physical Design ...................................................................................................................................................................... 39 Figure 31: List of Devices ......................................................................................................................................................................... 40 Figure 32: VLAN Table .............................................................................................................................................................................. 40 Figure 33: IP Address Table ................................................................................................................................................................... 41 Figure 34: Test plan & Test case ........................................................................................................................................................... 43 Figure 35: Test case 1 ............................................................................................................................................................................... 43 Figure 36: Test case 2 ............................................................................................................................................................................... 44 Figure 37: Test case 3 ............................................................................................................................................................................... 44 Figure 38: Test case 4 ............................................................................................................................................................................... 45 Figure 39: Test case 5 ............................................................................................................................................................................... 45 Figure 40: Test cacse 6 ............................................................................................................................................................................. 46 Figure 41: Router setup ........................................................................................................................................................................... 48 Figure 42: Router setup ........................................................................................................................................................................... 48 Figure 43: Setup VLAN & Trunk mode ................................................................................................................................................ 49 Figure 44: VLAN on Multilayer Switch ................................................................................................................................................ 49 Figure 45: Setup VLAN 99 on Switch .................................................................................................................................................. 49 LE TRAN THAI TUAN 6 Figure 46: Setup VLAN 100 on Switch ................................................................................................................................................ 50 Figure 47: Mail server_domain, users, password ........................................................................................................................... 50 Figure 48: Mail server_IP Configuration ............................................................................................................................................ 51 Figure 49: Web Server_IP Configuration ........................................................................................................................................... 51 Figure 50: Web content ............................................................................................................................................................................ 51 Figure 51: DNS setup ................................................................................................................................................................................. 52 Figure 52: OSI vs TCP/IP .......................................................................................................................................................................... 53 Figure 53: IGMP snooping ....................................................................................................................................................................... 56 Figure 54: Protocols at each Layer ....................................................................................................................................................... 57 Figure 55: DNS & DHCP............................................................................................................................................................................. 58 Figure 56: TCP & UDP ................................................................................................................................................................................ 58 Figure 57: ICMP & IGMP ........................................................................................................................................................................... 59 Figure 58: File servers .............................................................................................................................................................................. 60 Figure 59: Application Server ................................................................................................................................................................ 61 Figure 60: DNS servers ............................................................................................................................................................................. 61 Figure 61: Server Room ........................................................................................................................................................................... 63 LE TRAN THAI TUAN 7 P1. Discuss the benefits and constraints of different network types and standards. 1. Introduction to Computer Networking. Computer network or network system is the connection of computers together through network-connected devices and media (network protocols, transmission environments) according to a certain structure in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through network devices, or networking hardware, are physical devices that are required for communication and interaction between hardware on a computer network. Common network devices: hub, switch, router, bridge, gateway, modern, repeater, access point. Figure 1: Introduction to Computer Network 2. Network type 2.1 LAN Definition: LAN stands for the Local Area Network. LAN is a private network that connects a group of computer and peripheral devices in a building, an area such as schools, agencies that is several kilometers in size. It is a useful network for sharing resources. Example: LAN network is used to connect computers and a printer in someone's home or office. LE TRAN THAI TUAN 8 Figure 2: Local Area Network Advantages of LAN Resource Sharing: Computer resources like printers, modems, DVD-ROM drives and hard disks can be shared with the help of local area networks. This reduces cost and hardware purchases. Software Applications Sharing: It is cheaper to use same software over network instead of purchasing separate licensed software for each client a network. Easy and Cheap Communication: Data and messages can easily be transferred over networked computers. Centralized Data: The data of all network users can be saved on hard disk of the server computer. This will help users to use any workstation in a network to access their data. Because data is not stored on workstations locally. Data Security: Since, data is stored on server computer centrally, it will be easy to manage data at only one place and the data will be more secure too. Internet Sharing: Local Area Network provides the facility to share a single internet connection among all the LAN users. In Net Cafes, single internet connection sharing system keeps the internet expenses cheaper. Disadvantages of LAN High Setup Cost: LAN will indeed save cost because of shared computer resources, but the initial cost of installing Local Area Networks is quite high. Privacy Violations: The LAN administrator has the rights to check personal data files of each and every LAN user. Moreover he can check the internet history and computer use history of the LAN user. Data Security Threat: Unauthorized users can access important data of an organization if centralized data repository is not secured properly by the LAN administrator. LE TRAN THAI TUAN 9 LAN Maintenance Job: Local Area Network requires a LAN Administrator because, there are problems of software installations or hardware failures or cable disturbances in Local Area Network. A LAN Administrator is needed at this full time job. Covers Limited Area: Local Area Network covers a small area like one office, one building or a group of nearby buildings. 2.2 MAN Definition: MAN stands for Metropolitan Area Network. In general, MAN uses the similar technology as LAN, but it a bigger version of LAN. It can be means to connecting a number of LANs into a larger network or it can be a single cable. Depending upon the type of configuration, this type of network allows you to cover an area from several miles t tens of miles. Advantages of MAN Extremely efficient and provide fast communication via high-speed carriers, such as fibre optic cables. It provides a good back bone for large network and provides greater access to WANs. The dual bus used in MAN helps the transmission of data in both directions simultaneously. A MAN usually encompasses several blocks of a city or an entire city. Disadvantages of MAN You need more cable to establish MAN connection from one place to another. In MAN network it is tough to make the system secure from hackers Figure 3: Metropolitan Area Network LE TRAN THAI TUAN 10 2.3 WAN Definition: WAN stand for Wide Area Network. It is an important computer network that is spread across a large geographical area. This wide area network can both be connected to a private network and can create large connections, covering both a country or globally. WAN network system could be a connection of a LAN that connects with other LAN's using telephone lines and radio waves. It is mostly limited to an enterprise or an organization. Communication medium used by WAN are PSTN or Satellite links. WAN operates on low data rates. Advantages of WAN Covers a large geographical area so long distance business can connect on the one network. Shares software and resources with connecting workstations. Messages can be sent very quickly to anyone else on the network. These messages can have picture, sounds or data included with them(called attachments). Expensive things (such as printers or phone lines to the internet) can be shared by all the computers on the network without having to buy a different peripheral for each computer. Everyone on the network can use the same data. This avoids problems where some users may have older information than others. Disadvantages of WAN The initial setup cost of investment is very high. It is difficult to maintain the WAN network. You need skilled technicians and network administrators. There are more errors and issues because of the wide coverage and the use of different technologies. It requires more time to resolve issues because of the involvement of multiple wired and wireless technologies. Offers lower security compared to other types of networks. LE TRAN THAI TUAN 11 Figure 4: Wide Area Network 2.4 Other network types Wireless Local Area Network (WLAN): Functioning like a LAN, WLANs make use of wireless network technology, such as Wi-Fi. Typically seen in the same types of applications as LANs, these types of networks don’t require that devices rely on physical cables to connect to the network. Storage-Area Network (SAN): A Storage Area Network is a type of network which allows consolidated, block-level data storage. It is mainly used to make storage devices, like disk arrays, optical jukeboxes, and tape libraries. Home Area Network (HAN): A Home Area Network is always built using two or more interconnected computers to form a local area network (LAN) within the home. For example, in the United States, about 15 million homes have more than one computer. Storage-Area Network, System-Area Network, Passive Optical Local Area Network, etc. LE TRAN THAI TUAN 12 Figure 5: Network Types 3. Network Standards 3.1 What is Network Standards? With the creation of huge computer networks, with many more devices being added to the chain each day, it became necessary to set up some standards. Networking standards define the ground rules for data communications that are needed for the interoperability of networking technologies and processes. Standards help in creating and maintaining open markets and allow different vendors to compete on the basis of the quality of their products while being and that also allows the network to work with devices that are manufactured by many different brands. LE TRAN THAI TUAN 13 3.2 Types of Standards De facto: These standards come into existence due to historical developments. These standards are developed without any formal planning or approval by any organization. Even though, These standards are still being used by many organizations in the world. De jure − These standards are the ones which have been adopted through legislation by any officially recognized standards organization. Most of the communication standards that are used today are de jure standards. Standards Organizations International Standards Organization (ISO) International Telecommunication Union (ITU) Institute of Electronics and Electrical Engineers (IEEE) American National Standards Institute (ANSI) Internet Research Task Force (IETF) Electronic Industries Association (EIA) 4. Network protocols 4.1 Definition Network protocols are formal standards and policies comprised of rules, procedures and formats that define exchanging information between two or more devices over a network. 4.2 Types of Networking Protocols Network communication protocols Communication protocols allow basic data communication between network devices. Their purposes range from transferring files between computers or via the internet, to exchange textbased messages, and establishing communication between routers and external or IoT devices. Examples of communication protocols: - Bluetooth protocols - FTP - TCP/IP - HTTP Network security protocols Security protocols implement security over network communications by guaranteeing that data transferred over a network cannot be accessed by unauthorized users. Security is established through various means, such as via the use of passwords, authentication protocols, or data encryption. Data can be cryptographed and protected during transportation between devices, and access can be denied to unknown or unauthorized devices or users. Examples of security protocols: - HTTPS - SSL LE TRAN THAI TUAN 14 - SSH - SFTP Network management protocols Network management protocols provide network governance and maintenance by defining the procedures required to operate a network. They are applied on all devices operating in a given network — such as servers, routers, and computers — to coordinate them in an efficient way. Network management protocols ensure that each device is connected to the others and to the network itself, and guarantee the stability of these connections. They are often used for troubleshooting purposes and to assess the quality of the network connection. Examples of network management protocols: - SNMP - ICMP Figure 6: Network Protocols 5. OSI model (International Standards Organization) 5.1 Introduction to OSI model The Open Systems Interconnection (OSI) model is a conceptual model created by the International Organization for Standardization which enables diverse communication systems to communicate using standard protocols. In plain English, the OSI provides a standard for different computer systems to be able to communicate with each other. OSI is divided to 7 different layer Layer 1: Physical Layer Layer 2: Data link Layer Layer 3: Network Layer Layer 4: Transport Layer Layer 5: Session Layer Layer 6: Presentation Layer LE TRAN THAI TUAN 15 Layer 7: Application Layer Figure 7: Seven layer of OSI mode 5.2 Seven layer of OSI From top to bottom, each layers of the OSI model can be defined as follows: Layer 7: Application Layer This layer directly interacts with data from users, it is responsible for providing all the necessary coordination requirements for the user, use the terminal of the system, ..... Application layer protocols include HTTP as well as SMTP (Simple Mail Transfer Protocol is one of the protocols that enables email communications). Web browsers (Google Chrome, Firefox, Safari, etc.) are examples of Layer 7 applications. Layer 6: Presentation Layer The Presentation Layer represents the area that is independent of data representation at the application layer. It represents the preparation or translation of application format to network format, or from network formatting to application format. In summary, the presentation layer is responsible for translation, encryption, and compression of data. For example, one task of this is encryption and decryption of data for secure transmission. Layer 5: Session Layer When devices, computers, or servers need to “speak” with one another, the time between when the communication is opened and closed is known as the session. This is the layer responsible for creating session, including setup, coordination, and termination between the applications at each end of the LE TRAN THAI TUAN 16 session. The session layer ensures that the session stays open long enough to transfer all the data being exchanged, and then promptly closes the session in order to avoid wasting resources. The session layer also synchronizes data transfer with checkpoints. Layer 4: Transport Layer Layer 4 is responsible for end-to-end communication between the two devices. This includes taking data from the session layer and breaking it up into chunks called segments before sending it to layer 3. The transport layer on the receiving device is responsible for reassembling the segments into data the session layer can consume. The transport layer is also responsible for flow control and error control. Flow control determines an optimal speed of transmission to ensure that a sender with a fast connection doesn’t overwhelm a receiver with a slow connection. The transport layer performs error control on the receiving end by ensuring that the data received is complete, and requesting retransmission if it isn’t. Example of the Transport Layer is the Transmission Control Protocol (TCP), which is built on top of the Internet Protocol (IP), commonly known as TCP/IP. TCP and UDP port numbers work at Layer 4, while IP addresses work at Layer 3, the Network Layer. Layer 3: Network Layer The network layer is responsible for exchange data transfer between two different networks. The network layer breaks up segments from the transport layer into smaller units, called packets, on the sender’s device, and reassembling these packets on the receiving device. The network layer also finds the best physical path for the data to reach its destination; this is known as routing. Layer 2: Data link Layer The data link layer provides node-to-node data transfer between two directly connected devices. The data link layer takes packets from the network layer and breaks them into smaller pieces called frames. And also handles error correction from the physical layer. Layer 1: Physical Layer This layer includes the physical equipment involved in the data transfer. This can include the cable type, radio frequency link (as in an 802.11 wireless systems), router, switch, as well as the layout of pins, voltages, and other physical requirements. This is also the layer where the data gets converted into a bit stream, which is a string of 1s and 0s. The physical layer of both devices must also agree on a signal convention so that the 1s can be distinguished from the 0s on both devices. 6. TCP / IP (Transmission Control Protocol/Internet Protocol ) In general, TCP/IP is similar to OSI, but it has just have layer as follow: Application layer: includes many high-level protocols. Previously used virtual terminal applications such as TELNET, FTP, SMTP. Then more protocols were added such as DNS, HTTP ... Transport layer: The task is the same as the OSI traffic, but two protocols are used, TCP and UDP. Network layer: responsible for sending packets from the destination to the destination, the packet may have to travel through multiple networks (intermediate routes). The data link LE TRAN THAI TUAN 17 layer transmits data packets between two devices in the same network, while the network layer ensures that packets are transferred from the destination to the correct destination. This layer defines a packet format and the protocol is IP. Link layer: Used to transmit data packets on a physical medium. Figure 8: OSI vs TCP/IP mode LE TRAN THAI TUAN 18 P2. Network topology & communication and Bandwidth requirement 1. Network topology 1.1 Definition Network topology is the description of the way a network is arranged (physical or logical description) and connections in a network, often represented as a graph. Types of topology: Mesh Topology. Star Topology. Bus Topology. Ring Topology. Hybrid Topology. Tree 1.2 Physical & Logical Topology Physical – The physical network topology refers to the actual connections (wires, cables, etc.) of how the network is arranged. Setup, maintenance, and provisioning tasks require insight into the physical network. Logical – The logical network topology is a higher-level idea of how the network is set up, including which nodes connect to each other and in which ways, as well as how data is transmitted through the network. Logical network topology includes any virtual and cloud resources. 1.3 Star topology Definition: In this type of topology, every node in the network is directly connected to one central switch. Every device in the network is directly connected to the switch and indirectly connected to every other node. This hub is the central node and all other nodes are connected to the central node. central node manages data transmission—as information sent from any node on the network has to pass through the central one to reach its destination— and functions as a repeater, which helps prevent data loss. With star topologies, computers are connected with a coaxial cable, twisted pair, or optical fiber cable. Advantages Fast speed with few nodes and low network traffic. Hub can be expanded, upgraded easily Easy to troubleshoot when errors occur Easy to set up and modify. Only that node is affected which has failed, the rest of the nodes can work smoothly, that means when a network cable breaks, it loses the connection of one machine, while the other is still functioning normally. Disadvantages LE TRAN THAI TUAN 19 The cost is high. If the central switch fails then the entire network will go down because all the nodes depend on the hub. Performance is tied to the hub that is it depends on its capacity Figure 9: Star topology 1.4 Mesh Topology Definition: A mesh topology is a point-to-point connection where nodes are interconnected. Mesh networks can be full or partial mesh. Data is transmitted via two methods: routing and flooding. Routing is where nodes use routing logic to work out the shortest distance to the packet’s destination. In contrast, flooding is where data is sent to all nodes within the network. Flooding doesn’t require any form of routing logic to work. Types of Mesh Topology Partial Mesh Topology: In this topology some of the systems are connected in the same fashion as mesh topology but some devices are only connected to two or three devices. Full Mesh Topology: Each and every nodes or devices are connected to each other. Advantages Each connection can carry its own data load ,there is no single machine failure that could bring down the entire network It is robust, the interconnectivity of nodes makes them extremely resistant to failures Fault is diagnosed easily. Provides security and privacy from being compromised. Disadvantage LE TRAN THAI TUAN 20 It is difficult to install and configure Cabling cost is more. Require bulk wiring Figure 10: Mesh Topology 1.4 Bus Topology Definition: Bus topology is a network type where every device is connected to a single cable that runs from one end of the network to the other. This type of network topology is often referred to as line topology. In a bus topology, data is transmitted in one direction only. If the bus topology has two endpoints, then it is called Linear Bus topology. Advantages It is cost-effective because they can be run with a single cable Cable required is least compared to other network topology. Bus topologies are used in small networks. It is easy to understand, layout simple Easy to expand joining two cables together. Disadvantages When cable fails then entries network will go down The more network nodes you have, the slower your transmission speeds are going to be Cable has a limited length. It is slower than the ring topology. LE TRAN THAI TUAN 21 A cable failure would take a lot of time while they attempt to resume service. Figure 11: Bus Topology 1.5 Ring Topology Definition: It is called ring topology because nodes are arranged in a circle (or ring) as each device is connected to another device, with the last one connected to the first. The data can travel through the ring network in either one direction or both directions, with each device having exactly two neighbors. Figure 12: Ring Topology Advantages: Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes having tokens can transmit data. Cheap to install and expand LE TRAN THAI TUAN 22 Reducing the total number of lines needed to save the cable Disadvantages: Difficult to check and troubleshooting Adding or deleting the computers disturbs the network activity. Failure of one computer disturbs the whole network. When the cable fails, the whole network will stop working. 1.6 Tree Topology Definition: A tree topology network is a structure that is shaped like forming a hierarchy. It is also called hierarchical topology. The hierarchy is parent-child where there is only one mutual connection between two connected nodes. It should at least have three levels to the hierarchy. This form of topology is used within Wide Area Networks to sustain lots of spreadout devices. Advantages Tree topologies are used is to extend bus and star topologies Expansion of nodes is possible and easily follow the hierarchical format Easily managed and maintained. This format also easy to find errors and troubleshooting This format also lends itself well to finding errors and troubleshooting Disadvantages Take a lot of cabled. Costly If more nodes are added, the more difficult it becomes to manage the network, also maintenance is difficult. Central hub fails, the network fails. Figure 13: Tree Topology LE TRAN THAI TUAN 23 1.7 Hybrid Topology Definition: Hybrid topologies combine two or more different topology structures. For example, the tree topology integrates the bus and star layouts. Advantage Reliable as Error detecting and trouble shooting is easy. Effective. Scalable as size can be increased easily, scalability of hybrid setups makes them wellsuited to larger networks. Flexible, you can incorporate multiple topologies into one hybrid setup Disadvantages Depending on the topologies that you decide to use, hybrid topologies can be quite complex design Setting up a hybrid topology can end up being quite costly. Figure 14: Hybrid Topology 2. Communication and Bandwidth LE TRAN THAI TUAN 24 2.1 Definition of Communication in networking Data communications refer to the transmission of this digital data between computers and a computer network or data network is a telecommunications network that allows computers to exchange data. The physical connection between networked computing devices is established using either cable media or wireless media. The best-known computer network is the Internet. 2.2 Communication protocols There are many protocols are used to communicate, here are some typical protocols: Transmission Control Protocol (TCP): TCP is a popular communication protocol which is used for communicating over a network. It divides any message into series of packets that are sent from source to destination and there it gets reassembled at the destination. Internet Protocol (IP): IP is designed explicitly as addressing protocol. It is mostly used with TCP. The IP addresses in packets help in routing them through different nodes in a network until it reaches the destination system. TCP/IP is the most popular protocol connecting the networks. User Datagram Protocol (UDP): UDP is a substitute communication protocol to Transmission Control Protocol implemented primarily for creating loss-tolerating and lowlatency linking between different applications. Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as Hyper Text Transfer Protocol Secure is a standard protocol to secure the communication among two computers one using the browser and other fetching data from web server. HTTP is used for transferring data between the client browser (request) and the web server (response) in the hypertext format, same in case of HTTPS except that the transferring of data is done in an encrypted format. So it can be said that https thwart hackers from interpretation or modification of data throughout the transfer of packets. File Transfer Protocol (FTP): FTP allows users to transfer files from one machine to another. Types of files may include program files, multimedia files, text files, and documents, etc. 3. Bandwidth 3.1 Definition Bandwidth refers to the amount of data that can be transferred from one point to another within a network in a specific amount of time. Typically, bandwidth is expressed as a bitrate and measured in bits per second (bps). LE TRAN THAI TUAN 25 3.2 Bandwidth requirements The channel bandwidths needed to transmit various types of signals, using various processing schemes. Every signal observed in practice can be expressed as a sum (discrete or over a frequency continuum) of sinusoidal components of various frequencies. Network bandwidth represents the capacity of the network connection, but it is important to understand the difference between the theoretical throughput and the actual result when finding the correct bandwidth formula for the network mine. Example: + A 1000BASE-T uses twisted-pair unshielded cable, Gigabit Ethernet (GbE) can support 1000 Mbps, but in reality never reach this speed because the hardware and software system. Figure 15: Bandwidth + This speed band tells users how fast the network is on Mbps, Gbps, Tbps. If you do not buy enough bandwidth, your network will run slowly, but over-bandwidth will be expensive. So, how to determine the correct formula will meet the bandwidth requirements? Some network managers only care about the number of users on a virtual LAN. However, what you need to care about is what users will do on that network. For example, a 200-user network could be less congested than a network with three users using a client-server application or heavy bandwidth services such as high-definition video. LE TRAN THAI TUAN 26 P3. Discuss the operating principles of networking devices and server types. 1. Introduction to network devices WAP (Wireless Access Point) : A WAP is a device that allows different types of wireless network cards connect without cables, hence wireless, to connect to LANs and access resources, including the Internet. A WAP plugs into a hub or switch and is the device that joins the unwired network to the wired network. As shown earlier, you can put a router or firewall between the wireless network and the wired network providing a secure barrier between the unsecure wireless network and the secure wired network. WAPs support the standards we defined earlier; if you are using an 802.11b WAP then most 802.11b/g/n cards should be able to access them as they all operate on the same 2 GHz frequency. If you have an 802.11a access point you will need an 802.11a card as this is not in the same frequency as the other standards. There are a few access points that support both the 2 GHz and the 5 GHz range. Figure 16: WAP_Cisco Small Business 500 Series LE TRAN THAI TUAN 27 Wireless Ethernet Bridge is a device that allows Ethernet devices to connect to a wireless network. For example, the Linksys WET54G Wireless-G Ethernet Bridge. It supports any Ethernet device that connects to a wireless network even though the Ethernet device can be a single device or a router that connects to many other devices. Figure 17: Cisco WET54G Wireless-G Ethernet Bridge A network card is a type of expansion card that is added on a computer, which provides physical and logical communication between the computer and the network device, the network through the transmission medium. LE TRAN THAI TUAN 28 Figure 18: 1 Port PCI 10/100/1000 32 Bit Gigabit Ethernet Network Adapter Card The repeater is simply a signal amplifier between two ports of two network segments. The repeater is used in the bus model to extend the maximum distance on a cable. There are two types of repeaters in use: Electric Repeater and Optical Repeater. Used to connect two networks with the same communication protocol. Figure 19: Wifi Repeater Long Range Extender Hub is a device that functions like a Repeater, but more communication ports allow multiple network devices to connect together at one point. Hubs typically have 4 to 24 communication ports, often used in 10BaseT Ethernet networks. Actually, Hub Chi is a multi-port repeater. The hub repeats any signal received from any port and sends that signal to all the ports left over it. The hub operates at the physical layer of the OSI model and also fails to filter the data. The hub is often used for networking, through its plugs that are linked to computers in the form of stars. The hub is divided into two main categories: passive hub and active hub. LE TRAN THAI TUAN 29 Figure 20: NETGEAR GS108 Unmanaged Desktop Switch features 8-Ports Bridge is a device that connects two branches of the network, which switches selectively the packets to the network branch that contains the packet receiver. To filter packets and know which packets belong to which network branch, Bridge must contain the MAC address table. This address can be initialized automatically or manually configured. Because Bridge understands the MAC address, Bridge works on the second floor (data link layer) in the OSI model. Figure 21: Bridge Networking Modem is a device used to convert digital format data into analog format data for a transmission from the digital signal environment to the analogue signal medium and then to the digital signal medium on the side. LE TRAN THAI TUAN 30 Figure 23: TP-LINK AC1200 Wireless Modem Router VR400 Figure 22: TENDA D303 Wireless N300 Switch is a combination of technology between the Bridge and Hub. The operating mechanism of the switch is very similar to the Hub because it concentrates the network connections on it. The ports on the switch are miniature bridges built on each of the communication ports. Figure 24: TP-Link 5 Port Gigabit Ethernet Switch A router is a router that connects multiple network segments, or multiple network types (usually heterogeneous in architecture and technology) into one network. Usually there is a processor, memory, and two or more ports in and out. LE TRAN THAI TUAN 31 Figure 26 Router Tenda AC10 1200Mbps Figure 26: Router Wifi ASUS BRT-AC828 Gateway is an intermediate device that connects different networks in both the architecture and the network environment. Gateway is understood as the main gateway of an internal intranet connected to another external network. It may be a dedicated hardware device but usually a server that provides connectivity to the machines it manages to communicate with outside the network. 2. Operating principles of some network device Wireless Access Point: The Wireless Access Point also makes bridging work for all wireless (wired) and wired Ethernet computers able to communicate with each other. Briefly, the main task of a wireless access point is to connect all your wireless or wired computers to your local area network. A Wifi Repeater: A WiFi Repeater effectively contains two wireless routers, similar to the wireless router you already have in your home or office. One of these wireless routers picks up the existing WiFi network. It then transfers the signal to the other wireless router, which transmits the boosted signal. A router: A typical home has a range of internet-connected devices — personal computers, tablets, smartphones, printers, thermostats, smart TVs, and more. With your router, these devices form a network. A router directs incoming and outgoing internet traffic on that network in the fastest and most efficient way. LE TRAN THAI TUAN 32 A modern: A device that modulates analogue signal waves to encode digital data, and demodulates carrier signals to decode digital signals. 3. Server 3.1 What is server A server is a computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network. In theory, whenever computers share resources with client machines they are considered servers. There are many types of servers, including web servers, mail servers, and virtual servers. Figure 27: Google service room 3.2 Server types File servers File servers store and distribute files. Multiple clients or users may share files stored on a server. In addition, centrally storing files offers easier backup or fault tolerance solutions than attempting to provide security and integrity for files on every device in an organization. File server hardware can be designed to maximize read and write speeds to improve performance. Print servers Print servers allow for the management and distribution of printing functionality. Rather than attaching a printer to every workstation, a single print server can respond to printing requests from numerous clients. Today, some larger and higher-end printers come with their own built-in print server, which removes the need for an additional computer-based print server. This internal print server also functions by responding to print requests from a client. Application servers LE TRAN THAI TUAN 33 An application server is a component-based product which also known as middleware provides middleware services for security and state maintenance, along with data access and persistence. It contains a substantial amount of computing region between database servers and the end user. DNS servers Domain Name System (DNS) servers are application servers that provide name resolution to client computers by converting names easily understood by humans into machine-readable IP addresses. The DNS system is a widely distributed database of names and other DNS servers, each of which can be used to request an otherwise unknown computer name. When a client needs the address of a system, it sends a DNS request with the name of the desired resource to a DNS server. The DNS server responds with the necessary IP address from its table of names. Mail servers Mail servers are a very common type of application server. Mail servers receive emails sent to a user and store them until requested by a client on behalf of said user. Having an email server allows for a single machine to be properly configured and attached to the network at all times. It is then ready to send and receive messages rather than requiring every client machine to have its own email subsystem continuously running. Web servers One of the most abundant types of servers in today’s market is a web server. A web server is a special kind of application server that hosts programs and data requested by users across the Internet or an intranet. Web servers respond to requests from browsers running on client computers for web pages, or other web-based services. Common web servers include Apache web servers, Microsoft Internet Information Services (IIS) servers and Nginx servers. Database servers The amount of data used by companies, users, and other services is staggering. Much of that data is stored in databases. Databases need to be accessible to multiple clients at any given time and can require extraordinary amounts of disk space. Both of these needs lend themselves well to locating such databases on servers. Database servers run database applications and respond to numerous requests from clients. Common database server applications include Oracle, Microsoft SQL Server, DB2, and Informix. Virtual servers Virtual servers are taking the server world by storm. Unlike traditional servers that are installed as an operating system on machine hardware, virtual servers exist only as defined within specialized software called hypervisor. Each hypervisor can run hundreds, or even thousands, of virtual servers all at once. The hypervisor presents virtual hardware to the server as if it were real physical hardware. The virtual server uses the virtual hardware as usual, and the hypervisor passes the actual computation and storage needs onto the real hardware beneath, which is shared among all the other virtual servers. LE TRAN THAI TUAN 34 Proxy servers A proxy server acts as an intermediary between a client and a server. Often used to isolate either the clients or servers for security purposes, a proxy server takes the request from the client. Instead of responding to the client, it passes the request on to another server or process. The proxy server receives the response from the second server and then replies to the original client as if it were replying on its own. In this way, neither the client nor the responding server needs to directly connect to each other. Monitoring and management servers Some servers exist to monitor or manage other systems and clients. There are many types of monitoring servers. Several of them listen to the network and receive every client request and server response, but some do not request or respond to data themselves. In this way, the monitoring server can keep track of all the traffic on the network, as well as the requests and replies of clients and servers, without interfering with those operations. A monitoring server will respond to requests from monitoring clients such as those run by network administrators watching the health of the network. Figure 28: Server Room LE TRAN THAI TUAN 35 P4. Discuss the inter-dependence of workstation hardware with relevant networking software. 1. Workstation hardware A workstation is a computer intended for individual use that is faster and more capable than a personal computer. It using for business or professional work. Workstations and applications designed for them are used by small engineering companies, architects, graphic designers, and any organization, department, or individual that requires a faster microprocessor, a large amount of random access memory (RAM), disk space with special features such as high-speed graphics adapters. 2. Network software Definition: Networking software is a foundational element for any network, network software encompasses a broad range of software used for design, and administrators deploy, manage, and monitor a network. Traditional networks were hardware-based, such as routers and switches that bundle the networking software into the solution. With the advent of Software – Defined Networking (SDN), software is separated from the hardware thus making it more adaptable to the ever-changing nature of the computer network. The separation of functions from hardware, such as firewalls or load balancing, is called network functions virtualization (NFV). Network software have 2 basic function: User management: User management enables administrators to add or remove users from the network File management: allows administrators to define the location of data storage and user access to that data. 3. Inter-dependence of workstation hardware with networking software. A ,,network ,,file ,,server ,,is ,,a ,,computer ,system ,used ,for ,the ,purpose ,of ,managing ,the ,file ,system, ,the ,network ,printer, ,handling ,network ,communication, ,and ,other ,functions. ,A ,server ,may ,be ,dedicated ,is ,such ,case ,all ,of ,its ,processing ,power ,is ,allocated ,to ,network ,function, ,or ,it ,may ,bemoan- ,dedicated ,which ,means ,that ,a ,part ,of ,server ,functions ,allocated ,as ,a ,work ,stations ,or ,Debased ,system. Network ,operating ,system: ,it ,is ,loaded ,into ,the ,servers’ ,hard ,disk ,along ,with ,the ,system ,management ,tools ,and ,user ,utilities. ,When ,the ,system ,is ,started, ,NOS ,boots ,and ,other ,server ,come ,under ,its ,control. Workstations: ,workstations ,or ,nodes ,are ,attached ,to ,the ,server ,through ,the ,network ,interfaces ,card ,and ,the ,cable; ,workstations ,are ,normally ,intelligence ,systems, ,such ,as ,the ,IBM ,pc. ,But ,DUMV ,terminals ,are ,used ,in ,mainframe ,computers. ,The ,concept ,of ,distributed ,process ,depends ,on ,the ,fact ,that ,personal ,computer ,are ,attached ,to ,the ,network ,performed LE TRAN THAI TUAN 36 their ,own ,processing ,after ,loading ,programs ,and ,data ,from ,servers. ,Due ,to ,this ,a ,work ,station ,is ,called ,an ,active ,device ,on ,the ,network. ,After ,processing, ,files ,are ,stored ,back ,on ,the ,server ,where ,they ,can ,be ,used ,by ,others ,workstation. Network ,interface ,card ,every ,device ,connected ,to ,a ,LAN ,needs ,network ,interface ,card ,to ,plug ,into ,the ,LAN. ,For ,example, ,a ,PC ,needs ,to ,have ,an ,Ethernet ,card ,installed ,in ,it ,to ,connect ,to ,an ,Ethernet ,LAN. Network ,cabling: ,once ,the ,server, ,workstations, ,and ,network ,interface ,cards ,are ,in ,place, ,network ,cabling ,is ,used ,to ,network ,everything ,together. ,The ,most ,popular ,type ,of ,Network ,cables: ,Twisted ,pair ,wiring, ,Co-axial ,cable, ,and ,Fiber ,optics ,cable. , Figure 29: Hardware & Networking LE TRAN THAI TUAN 37 P5. Provide a logical/physical design of the networked system with clear explanation and addressing table 1. Discuss User Requirement 1.1 User Requirement The company has been contracted to implement a networking project from a local educational institute. The specification of the project is given below: People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers including the head of academics and the programmer manager, 3 computer network administrators. Resources: 50 student lab computers, 35 staff computers, 3 printers Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located on the first floor and another located on the second floor. 2. Logical and Physical Design 2.1 The difference between logical and physical design A physical design is a network topology diagram that represents the structure of how devices are connected physically inside a network. Otherwise, a logical design represents the logical method of communication used by the devices inside the network for network communication. Physical network topology is the placement of the various components of a network and the different connectors usually represent the physical network cables, and the nodes represent usually the physical network devices (like switches). Instead, Logical network topology illustrates, at a higher level, how data flows within a network. 2.2 Physical design for Requirement Ground floor: - Admin room: 3 computers - Manager room: 5 computers, 1 print - Marketing and Staff room: 12 computer, 1 print - Teacher room: 15 Computer, 1 print First floor: - IT-lab 1: 25 computers - Network room Second floor: - IT-lab 2: 25 computers - Canteen: LE TRAN THAI TUAN 38 Figure 30: Physical Design LE TRAN THAI TUAN 39 2.3 Logical design for Requirement To design a network model, we use Cisco Packet Tracer software, based on physical design and according to user’s requirements. List of Devices Devices Type Number Router 2621XM 1 Wireless Router WRT 300N 1 Multilayer Switch 3560-25PS 1 Switch 2960 7 PC Lab Computer 50 Staff Computer 35 Print 3 Connection Cable Copper Straight-Through Copper-Cross-Over Figure 31: List of Devices VLAN Table Room/Devices Admin Room Manager Room Staff Room Teacher Room IT-lab 1 IT-lab 2 Canteen Server Room Vlan 99 100 10 20 30 40 50 60 IP address 192.168.2.1/24 192.168.100.100/24 192.168.10.100/24 192.168.20.100/24 192.168.30.100/24 192.168.40.100/24 192.168.50.100/24 10.1.10.1/24 Figure 32: VLAN Table IP address Table Room Device Interface Vlan Default Gateway Admin PC3 -> PC5 Fa0/0 99 192.168.2.1/24 Manager PC6 -> PC10 Fa0/0 100 192.168.100.100/24 Staff PC11 -> PC22 Fa0/0 10 192.168.10.100/24 Teacher PC23 -> PC37 Fa0/0 20 192.168.20.100/24 IT-lab1 PC38 -> PC62 Fa0/0 30 192.168.30/100/24 IT-lab2 PC63 -> PC87 Fa0/0 40 192.168.40.100/24 IP address Range(192.168.2.3/24, 192.168.2.5/24) Range(192.168.100.6/24, 192.168.100.10/24 Range(192.168.10.11/24, 192.168.10.22/24) Range(192.168.20.23/24, 192.168.20.37/24 Range(192.168.30.38/24, 192.168.30.62/24) Range(192.168.40.62/24, 192.168.40.86/24 LE TRAN THAI TUAN 40 Network Room Mail Server DNS Server Web Server Router Multilayer Switch Fa0/0 Fa0/0 Fa0/0 Fa0/0 Fa0/1 60 10.1.10.1/24 Fa0/1 10.1.10.2/24 10.1.10.3/24 10.1.10.4/24 192.168.1.1/24 10.1.10.1 192.168.1.2 Figure 33: IP Address Table Design model Ground Floor: First Floor: Second Floor: LE TRAN THAI TUAN 41 Overview: LE TRAN THAI TUAN 42 P6 Evaluate the design to meet the requirements. 1. Test plan/Test case Case Description Step Expected Static 1 2 3 4 5 6 Ping between PC in same Vlan Ping from PC to Mutilayer Switch Ping from vlan to other vlan Ping from PC to Server Test Web browser Ping from PC to WAP Ping PC3 to PC5 Ping PC21 to Mutilayer Switch Ping PC6(Vlan100) to PC62(Vlan40) Ping from PC39 to Mail Server Test log on Web Server Ping PC40 to WAP Successful Successful Successful Successful Successful Successful Pass Pass Pass Pass Pass FAIL Figure 34: Test plan & Test case 2. Screenshot in testing Case 1: Ping PC3 to PC5 Figure 35: Test case 1 LE TRAN THAI TUAN 43 Case 2: Ping from PC21 to Switch Figure 36: Test case 2 Case 3: Ping from PC10(Vlan100) to PC62(Vlan 30): Figure 37: Test case 3 LE TRAN THAI TUAN 44 Case 4: Ping from PC39 to Mail Server Figure 38: Test case 4 Case 5: Test Web browser Hello This is my blog – Le Tuan University of Greenwich Figure 39: Test case 5 LE TRAN THAI TUAN 45 Case 6: Ping PC39 to WAP Figure 40: Test cacse 6 3. Evaluate the design of the network 3.1 Advantages In process of design the network system, I have provided content for each part of the theory in these parts above, include definitions, explanations, and illustrations. These are essential to begin designing and implementing a network. Following the user requirements, the physical and logical design was provided. I have outlined the instruments are appropriate for the requirement, include network devices (router, switches, cable, servers) to have a good network system. In addition, I have determined IP address for the router, switches, each floor, and divided VLANs for each role of user, also IP address, and specified each cable wire which should be used. LE TRAN THAI TUAN 46 This design is simple, easy to understand, and implement. Moreover, when the system has trouble, we can find errors early and correct. Another advantage of the design is when the cable of a certain computer gets problems, it not impact the system, and all other computers still work normally. 3.2 Limitation If the center has trouble, all devices will go down. This design uses a different switch for each VLAN, that synonymous with taking more money to implement than other solution design 3.3 Solution for efficiency and usage. I think this design can be implemented and used practically, the problem is the cost of devices and cable, so before implement, we have to decide switches and cable type to save money when purchased it, it would ensure a good connection for three floors and many devices in the network. LE TRAN THAI TUAN 47 P7+P8 + M3. Implement a networked system based on a prepared design. 1. Router setup Set IP for port connected with Multilayer-Switch Figure 41: Router setup Set IP for port connected with Server-Switch Figure 42: Router setup 2. Setup VLAN and Trunk mode 2.1 Setup VLAN on Multilayer Switch Setup VLAN and IP interface for each VLAN Steps: Click on Multilayer Switch, Router => click select CLI. Enter the command Enable => configure terminal => VLAN interface ... (the VLAN name you need to add) => IP address (the VLAN IP address you need to add) => IP helper-address (ip Server). VLAN table Room/Devices Admin Room Manager Room Staff Room Teacher Room IT-lab 1 IT-lab 2 Canteen Server Room Vlan 99 100 10 20 30 40 50 60 IP address 192.168.2.1/24 192.168.100.100/24 192.168.10.100/24 192.168.20.100/24 192.168.30.100/24 192.168.40.100/24 192.168.50.100/24 10.1.10.1/24 LE TRAN THAI TUAN 48 VLAN 10 Figure 43: Setup VLAN & Trunk mode Do the same steps for other VLAN Figure 44: VLAN on Multilayer Switch 2.3 Setup VLAN on Router Do the same step on Multiplayer Switch 2.2 Setup VLAN on each Switch Setup for VLAN 99 Figure 45: Setup VLAN 99 on Switch LE TRAN THAI TUAN 49 Setup for VLAN 100 Figure 46: Setup VLAN 100 on Switch Do the same with other switch 3. Server 3.1 Mail Server A mail server (sometimes also referred to an e-mail server) is a server that handles and delivers e-mail over a network, usually over the Internet. A mail server can receive e-mails from client computers and deliver them to other mail servers. A mail server can also deliver emails to client computers. A client computer is normally the computer where you read your emails, for example your computer at home or in your office. Also an advanced mobile phone or Smartphone, with e-mail capabilities, can be regarded as a client computer in these circumstances. Add domains, users, and passwords in the mail server Figure 47: Mail server_domain, users, password LE TRAN THAI TUAN 50 Figure 48: Mail server_IP Configuration 3.2 Web Server Figure 49: Web Server_IP Configuration Figure 50: Web content Definition: A web server is a computer that runs websites. It's a computer program that distributes web pages as they are requisitioned. The basic objective of the web server is to store, process and deliver web pages to the users. This intercommunication is done using Hypertext Transfer Protocol (HTTP). These web pages are mostly static content that includes HTML documents, images, style sheets, test etc. Apart from HTTP, a web server also supports SMTP (Simple Mail transfer Protocol) and FTP (File Transfer Protocol) protocol for emailing and for file transfer and storage. LE TRAN THAI TUAN 51 3.3 DNS Server Definition: A DNS server is a type of name server that manages, maintains and processes Internet domain names and their associated records. In other words, a DNS server is the primary component that implements the DNS (Domain Name System) protocol and provisions domain name resolution services to Web hosts and clients on an IP-based network. Setup DNS Server Figure 51: DNS setup 4. Test plan and Test log Case Description Step Expected Static 1 2 3 4 5 6 Ping between PC in same Vlan Ping from PC to Mutilayer Switch Ping from Vlan to other Vlan Ping from PC to Server Test Web browser Ping from PC to WAP Ping PC3 to PC5 Ping PC21 to Mutilayer Switch Ping PC6(Vlan100) to PC62(Vlan40) Ping from PC39 to Mail Server Test log on Web Server Ping PC40 to WAP Successful Successful Successful Successful Successful Successful Pass Pass Pass Pass Pass FAIL Click to view details process LE TRAN THAI TUAN 52 M1. Compare common networking principles and how protocols enable the effectiveness of networked systems. 1. OSI model & TCP/IP Detail explanation of OSI model (P1.5) Detail explanation of TCP/IP model (P1.6) OSI model vs TCP/IP model: Figure 52: OSI vs TCP/IP 2. Some common protocols 2.1 DHCP Definition: DHCP stands for Dynamic Host Configuration protocol and is a network protocol used on IP networks where a DHCP server automatically assigns an IP address and other information to each host on the network so they can communicate efficiently with other endpoints. In addition to the IP address, DHCP also assigns the subnet mask, default gateway address, domain name server (DNS) address and other pertinent configuration parameters. Request LE TRAN THAI TUAN 53 for comments (RFC) 2131 and 2132 define DHCP as an Internet Engineering Task Force (IETF)- defined standard based on the BOOTP protocol. The primary reason DHCP is needed is to simplify the management of IP addresses on networks. No two hosts can have the same IP address, and configuring them manually will likely lead to errors. Even on small networks manually assigning IP addresses can be confusing, particularly with mobile devices that require IP addresses on a non-permanent basis. Also, most users aren’t technically proficient enough to locate the IP address information on a computer and assign it. Automating this process makes life easier for users and the network administrator. 2.2 DNS Definition: DNS stands for Domain Name System. It is the phonebook of the Internet. Humans access information online through domain names, like nytimes.com or espn.com. Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can load Internet resources. The process of DNS resolution involves converting a hostname (such as cms.greenwich.edu.vn) into a compute IP address (such as 192.168.1.1). An IP address is given to each device on the Internet, and that address is necessary to find the appropriate Internet device - like a street address is used to find a particular home. When a user wants to load a webpage, a translation must occur between what a user types into their web browser (cms.greenwich.edu.vn) and the machine-friendly address necessary to locate the cms.greenwich.edu.vn website. 2.3 TCP Definition: TCP stands for Transmission Control Protocol, is a communication protocol that was introduced to the world in a 1974 paper entitled A Protocol for Packet Network Intercommunication. Even if you haven't heard of TCP, you've heard of what runs on it, including the World Wide Web, e-mail, and peer-to-peer file sharing, among others. While TCP is used to connect network devices to the internet, it can also be used as a communication protocol for a private intranet or extranet. Check out these resources for educational info, optimization methods, and troubleshooting tips on the following topics. TCP provides communication between an application program and the Internet Protocol (they are frequently written as TCP/IP.) An application does not need to required packet fragmentation on the transmission medium or other mechanisms for sending data in order to be sent via TCP. While IP handles actual delivery of the data, TCP keeps track of 'segments' the individual units of data transmission that a message is divided into for efficient routing through the network. LE TRAN THAI TUAN 54 2.4 UDP Definition: UDP stands for User Datagram Protocol, it is a communication protocol used across the Internet for especially time-sensitive transmissions such as video playback or DNS lookups. It speeds up communications by not formally establishing a connection before data is transferred. This allows data to be transferred very quickly, but it can also cause packets to become lost in transit — and create opportunities for exploitation in the form of DDoS attacks. Like all networking protocols, UDP is a standardized method for transferring data between two computers in a network. Compared to other protocols, UDP accomplishes this process in a simple fashion: it sends packets (units of data transmission) directly to a target computer, without establishing a connection first, indicating the order of said packets, or checking whether they arrived as intended. (UDP packets are referred to as ‘datagrams’.) 2.5 FTP Definition: File Transfer Protocol is a set of protocols that the networked computers use to talk over the internet. In more simple terms, it is a way to connect two computers and move files between them. FTP allows new web pages that are created by an individual to show up on the internet. It allows the web pages to transfer to the server so that others can access them. FTP is a client-server protocol and it relies on two communication channels between the client and the server. Control Connection: The FTP client, for example, FileZilla or FileZilla Pro sends a connection request usually to server port number 21. This is the control connection. It is used for sending and receiving commands and responses. Typically a user needs to log on to the FTP server for establishing the connection but there are some servers that make all their content available without login. These servers are known as anonymous FTP. Data Connection: For transferring the files and folder we use a separate connection called data connection. The FTP server may support Active or Passive connections or both. In an Active FTP connection, the client opens a port and listens and the server actively connects to it. In a Passive FTP connection, the server opens a port and listens (passively) and the client connects to it. 2.6 ICMP Definition: The Internet Control Message Protocol (ICMP) is a network layer protocol used by network devices to diagnose network communication issues. ICMP is mainly used to determine whether or not data is reaching its intended destination in a timely manner. Commonly, the ICMP protocol is used on network devices, such as routers. LE TRAN THAI TUAN 55 ICMP is not associated with a transport layer protocol such as TCP or UDP. This makes ICMP a connectionless protocol: one device does not need to open a connection with another device before sending an ICMP message. Normal IP traffic is sent using TCP, which means any two devices that exchange data will first carry out a TCP handshake to ensure both devices are ready to receive data. ICMP does not open a connection in this way. The ICMP protocol also does not allow for targeting a specific port on a device. 2.7 IGMP Definition: Internet Group Management Protocol (IGMP) snooping constrains the flooding of IPv4 multicast traffic on VLANs on a device. With IGMP snooping enabled, the device monitors IGMP traffic on the network and uses what it learns to forward multicast traffic to only the downstream interfaces that are connected to interested receivers. The device conserves bandwidth by sending multicast traffic only to interfaces connected to devices that want to receive the traffic, instead of flooding the traffic to all the downstream interfaces in a VLAN. In a LAN, multicast packets must pass through Layer 2 switches between the router and multicast users. However, multicast packets may be broadcast to all the hosts in the broadcast domain including non-multicast group members, as the Layer 2 switch cannot learn multicast MAC addresses. This wastes network bandwidth and threatens network information security. Figure 53: IGMP snooping LE TRAN THAI TUAN 56 2.8 PPP PPP stands for Point-to-Point, it is a data link layer protocol that is used to establish a direct connection between two nodes in a network. It can provide authentication, encryption, and compression. This protocol is used to create a simple link between two peers in a network to transport packets. Figure 54: Protocols at each Layer LE TRAN THAI TUAN 57 3. Compare some protocols 3.1 DNS & DHCP Figure 55: DNS & DHCP 3.2 TCP & UDP Figure 56: TCP & UDP LE TRAN THAI TUAN 58 3.3 ICMP & IGMP Figure 57: ICMP & IGMP LE TRAN THAI TUAN 59 M2. Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization 1. File servers File servers store and distribute files. Multiple clients or users may share files stored on a server. In addition, centrally storing files offers easier backup or fault tolerance solutions than attempting to provide security and integrity for files on every device in an organization. File server hardware can be designed to maximize read and write speeds to improve performance. Figure 58: File servers 2. Print servers Print servers allow for the management and distribution of printing functionality. Rather than attaching a printer to every workstation, a single print server can respond to printing requests from numerous clients. Today, some larger and higher-end printers come with their own built-in print server, which removes the need for an additional computer-based print server. This internal print server also functions by responding to print requests from a client. 3. Application servers An application server is a component-based product which also known as middleware provides middleware services for security and state maintenance, along with data access and persistence. It contains a substantial amount of computing region between database servers and the end user. LE TRAN THAI TUAN 60 Figure 59: Application Server 4. DNS servers Domain Name System (DNS) servers are application servers that provide name resolution to client computers by converting names easily understood by humans into machine-readable IP addresses. The DNS system is a widely distributed database of names and other DNS servers, each of which can be used to request an otherwise unknown computer name. When a client needs the address of a system, it sends a DNS request with the name of the desired resource to a DNS server. The DNS server responds with the necessary IP address from its table of names. Figure 60: DNS servers LE TRAN THAI TUAN 61 5. Mail servers Mail servers are a very common type of application server. Mail servers receive emails sent to a user and store them until requested by a client on behalf of said user. Having an email server allows for a single machine to be properly configured and attached to the network at all times. It is then ready to send and receive messages rather than requiring every client machine to have its own email subsystem continuously running. 6. Web servers One of the most abundant types of servers in today’s market is a web server. A web server is a special kind of application server that hosts programs and data requested by users across the Internet or an intranet. Web servers respond to requests from browsers running on client computers for web pages, or other web-based services. Common web servers include Apache web servers, Microsoft Internet Information Services (IIS) servers and Nginx servers. 7. Database servers The amount of data used by companies, users, and other services is staggering. Much of that data is stored in databases. Databases need to be accessible to multiple clients at any given time and can require extraordinary amounts of disk space. Both of these needs lend themselves well to locating such databases on servers. Database servers run database applications and respond to numerous requests from clients. Common database server applications include Oracle, Microsoft SQL Server, DB2, and Informix. 8. Virtual servers Virtual servers are taking the server world by storm. Unlike traditional servers that are installed as an operating system on machine hardware, virtual servers exist only as defined within specialized software called hypervisor. Each hypervisor can run hundreds, or even thousands, of virtual servers all at once. The hypervisor presents virtual hardware to the server as if it were real physical hardware. The virtual server uses the virtual hardware as usual, and the hypervisor passes the actual computation and storage needs onto the real hardware beneath, which is shared among all the other virtual servers. 9. Proxy servers A proxy server acts as an intermediary between a client and a server. Often used to isolate either the clients or servers for security purposes, a proxy server takes the request from the client. Instead of responding to the client, it passes the request on to another server or process. The proxy server receives the response from the second server and then replies to the original client as if it were replying on its own. In this way, neither the client nor the responding server needs to directly connect to each other. LE TRAN THAI TUAN 62 10. Monitoring and management servers Some servers exist to monitor or manage other systems and clients. There are many types of monitoring servers. Several of them listen to the network and receive every client request and server response, but some do not request or respond to data themselves. In this way, the monitoring server can keep track of all the traffic on the network, as well as the requests and replies of clients and servers, without interfering with those operations. A monitoring server will respond to requests from monitoring clients such as those run by network administrators watching the health of the network. Figure 61: Server Room LE TRAN THAI TUAN 63 M4. Recommend potential enhancements for the networked systems. Server is used in a network which provides a service to a client. Servers usually have more processing power, memory and storage than client computers. Server provide centralized back up facility, remote accessibility, reliability and security to a network. It supports multiple user application and multiple user access. A lot of virtual machine can reside in a single server without any compromise in performance. So it is better to use server technology to improve network systems and more security. 1. Configure Firewall A firewall, which can be hardware, software or a combination of both, is the first layer of defense in cybersecurity, the firewall works as a filter that filters all the unnecessary network traffic. A firewall's job is to prevent unauthorized connections and malicious software from entering your network. It monitors incoming and outgoing traffic, and if a computer or program outside your network tries to gain access, the firewall decides what to block or allow based upon defined cybersecurity rules. So it is necessary to use a firewall in the network system to protect computers and its important files, data, and programs from harmful programs, emails, websites, etc. 2. Configuration VPN server VPN server must use in network system because VPN use powerful encryption protocols to protect online data while we browse the web and make sure our internet traffic. Bandwidth and efficiency of the network can be increased with the implementation of VPN. The great advantage of using VPN is that the information can be accessed remotely from any place which can increase the productivity. 3. Use of Linux operating system Linux is adaptable, with different distributions porting it to just about any computing platform you could name. Linux is cheap. Linux OS is an open-source technology and is the wide range of options available to use. The main advantage of using Linux OS in a network system is that it provides security and problems caught before they become an issue for the public. Linux OS has a reputation as a very efficient and fast-performing system. 4. Data Compression Bandwidth ,,limitations ,,are ,common ,solutions ,in ,order ,of ,manager ,network ,system. ,Before ,now, ,networks ,used ,to ,have ,spare ,bandwidths ,which ,always ,featured ,as ,spare ,bandwidths ,– ,just ,what ,they ,are ,meant ,to ,be ,– ,but ,with ,growing ,needs ,such ,as ,data ,recovery ,in ,case ,of LE TRAN THAI TUAN 64 emergency, ,increasing ,centralized ,network ,infrastructure ,and ,company ,growth ,which ,leads ,to ,more ,staff ,users, ,almost ,every ,bit ,of ,bandwidth ,is ,used ,up. , Consequentially, ,bandwidth ,limitation ,is ,almost ,unavoidable. To ,solve ,this ,problem, ,data ,compression ,could ,be ,a ,viable ,solution. ,Compression ,algorithms ,can ,be ,used ,to ,reduce ,the ,size ,of ,files ,being ,transmitted ,within ,a ,network, ,invariably ,increasing ,the ,network ,speed ,significantly. , D1. Considering a given scenario, identify the topology protocol selected for the efficient utilization of a networking system. In the network system above, I have already selected Star topology for the design. There are many others solutions, but I used Star topology because of advantages bellow: 1. Star topology features a better fault tolerance. When a star topology experiences a cut cable or a NIC failure, then it will only affect one node. This advantage is due to the nature of the installation as each device connects independently to the central core. One cable run connects the nodes to each other. Although this approach is someone expensive compared with other designs, the cost issues are usually outweighed by the advantage of improved fault tolerance. The only way to take down all of the devices at once is to compromise the central core. Since this equipment is not readily available to the average person, it is a safe network that businesses of any size can use to support their needs. 2. Easy to extend the reach of the network by creating multiple stars. Star topology has natural limitations that come into play when setting up the network. The reality of this approach is that you will run into physical limitations eventually. Either the cable length will not be suitable for your needs or the number of ports available for use will all be supporting the system. When you use star topology, then you can extend the length of the network by configuring multiple stars with a central core device in the middle to serve as a server. The backbone of the network must have enough power to support all activities for this approach to be useful. 3. Star topology systems are highly scalable With Star topology, adding a new device is a simple process. All you need to do is connect the new computer to the central device through cabling. When you have too many items working with a single-core, then you can expand to new stars to continue gaining the benefits of this structure. LE TRAN THAI TUAN 65 Computers get added or removed from the central connection point. That makes it easier to replace a malfunctioning unit to maintain your productivity levels. 4. Connect multiple device types It is easy to use star topology as a way to link workstations to different printers, copiers, and other stations. You can also have a server connect with the central hub to maximize the reach of each connected device. As long as the equipment is compatible with your cabling and the software or hardware of the central hub, then you can connect an entire office with this setup rather easily. 5. It doesn’t create bottlenecks where data collisions occur. Because each device connects to the central core with its own cable when using star topology, the likelihood that data collisions will occur is quite minimal. That means the performance levels of this system are exceptionally high when compared to other network designs. Although there can be times when it performs slowly due to high traffic levels, you typically have direct communication between devices. That means workers have less downtime to manage when using this setup. D2. Design a maintenance schedule to support the networked system 1. Important of Maintenance schedule No matter how much time you put into configuring your network or how advanced your network may be, there are bound to still be some technical issues. At some point, maintaining your computer network will become a necessity. The computer network is also always under constant assault from the processing needs of applications, unwanted viruses and spyware, and their own users. Maintaining your computer network is important because there are many factors that can go wrong on a daily basis. Regular maintenance can keep the big problems away, while helping to maintain your networks optimal performance. 2. Maintenance Schedule In this task I have designed a maintenance schedule to support network systems considering backup, upgrades, security and auditing in the context to the above scenario. I have a maintenance schedule to support a network design including backups, upgrades, security and auditing. LE TRAN THAI TUAN 66 Task Time Check network devices (router, switch, WAP,etc.) Daily Weekly Monthly Annually X X Check backups and replication X Check and delete temp files X Review and update antivirus X Checking the software version X Review firewall X Check Bandwidth 6 Month X Backup and Restore X X Update network Diagrams Check and Update firmware Reset server X X D3 Use critical reflection to evaluate own work and justify valid conclusions. 1. Critical reasoning on selection of the topology During the planning and designing this network system, I had to select the Star topology. Topology is the physical arrangement of network system and the good arrangement was first priority of network design. There are various types of topology, among them I considered Star topology as best topology. There are 3 floors, each floor is equipped with many computers and other devices, so this topology is useful when we use switch-layer 3 to connect to the router, then multilayer-switch connection. For the other switches, each of these switches is used per room. The central device which connects all the workstations in star network is connected to a backbone cable. This type of topology is particularly useful for the arrangement of networking devices for colleges, bank, schools etc, school so that each of the branches can identify the relevant systems in their own network and yet connect easily to the big network in some way. This topology has a centralized managing system through which all the networking devices that are connected to the network can be managed, control, monitor, and excesses easily. Being centralized, it provides the best security to the network system because this topology follows a hierarchal pattern where each level is connected to the next higher level in a symmetrical pattern and each level of hierarchy follows a certain pattern in connecting the networking devices in LE TRAN THAI TUAN 67 this large organization. It doesn’t matter how many networking devices are connected to each level of the network, it just functions well. If one of the networking devices gets damage then it doesn’t affect the network, it runs well without any disturbances 2. Critical reason on selection of networking devices, server and server types: As the networking devices and server are the important parts of network system so it is very important to select the best server and devices for network. Where server is a main computer which stores all the data, information of the organization. Networking devices are the connecting devices in the network so they also must be working good and perform well. The networking devices that I used in my network design are switch, routers, firewalls, access point, etc. Switch, routers establish a connection between other networking devices. For the good communication and connection between networking devices the switch and routers should perform good. 3. Critical reflecting on the testing After completed design and implement, I have tested the system follow the test plan was made, for the purpose to know whether the system running well or not. I tested for all the server and that is mentioned in the previous tasks. To know the errors to solve that errors I did testing of all networking devices and servers. In general, networking devices were performing well as well as servers were also performing well. But there are some problem of configure WAP. 4. Conclusion 4.1 Advantages I have researched, consulted, and gave quite a few theories about computer networks, including... Along with that, I have completed the design and implementation of the network in order of user requirements. Through the testing process according to the plan, the test results show that the system operates as expected. In addition, it is easy to understand design, easy to deploy, as well as solve trouble, upgrades, and maintenance. In order to ensure the quality system of this network, I have also designed a periodic maintenance schedule. It can be seen that this design can be implemented in practice and meet the needs of users. 4.2 Disadvantages Besides the above advantages, this design also has some shortcomings that have not been overcome. Specifically, in terms of physical design, this model consumes a lot of cables and switches, so the price may be higher than the other model. During the operation, there were still some errors such as failure of WAP setting, server response time not as fast as expected. So I have to find and fix errors, upgrade the quality of the network. LE TRAN THAI TUAN 68 4.3 Future directions Scaling the network Set up a firewall Replace with better devices Bandwidth upgrades LE TRAN THAI TUAN 69 References cfindia, 2020. What Is Server? And Types Of Server. [Online] Available at: http://cfindia.net/what-is-server-and-types-of-server.php [Accessed 17 October 2020]. cloudflare.com, 2020. The OSI Model. [Online] Available at: https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/ [Accessed 16 October 2020]. Guru99, 2020. Types of Computer Networks: LAN, MAN, WAN, VPN. [Online] Available at: https://www.guru99.com/types-of-computer-network.html [Accessed 16 October 2020]. Miller, B., 2020. Advantages and Disadvantages of Star Topology. [Online] Available at: https://greengarageblog.org/15-advantages-and-disadvantages-of-star-topology [Accessed October 30 2020]. studytonight, 2020. Types of Network Topology. [Online] Available at: https://www.studytonight.com/computer-networks/network-topology-types [Accessed 17 October 2020]. techopedia.com, 2020. Computer Network. [Online] Available at: https://www.techopedia.com/definition/25597/computer-network [Accessed 16 October 2020]. tutorialspoint, 2019. OSI vs. TCP/IP Reference Model. [Online] Available at: https://www.tutorialspoint.com/OSI-vs-TCP-IP-ReferenceModel#:~:text=OSI%20model%20is%20a%20generic,is%20a%20protocol%2Doriented%20standard.&text=OSI%20 model%20gives%20guidelines%20on,is%20a%20more%20practical%20model. [Accessed 16 October 2020]. Wikibook, 2020. Common Protocols. [Online] Available at: https://en.wikibooks.org/wiki/Network_Plus_Certification/Technologies/Common_Protocols#TCP_(Transmission_ Control_Protocol) [Accessed 26 October 2020]. LE TRAN THAI TUAN 70 INDEX OF COMMENTS ........................................................................................................................................................................................ ........................................................................................................................................................................................ ........................................................................................................................................................................................ ........................................................................................................................................................................................ ........................................................................................................................................................................................ ........................................................................................................................................................................................ ........................................................................................................................................................................................ ........................................................................................................................................................................................ ........................................................................................................................................................................................ ........................................................................................................................................................................................ ........................................................................................................................................................................................ ........................................................................................................................................................................................ ........................................................................................................................................................................................ ........................................................................................................................................................................................ ........................................................................................................................................................................................ ........................................................................................................................................................................................ ........................................................................................................................................................................................ ........................................................................................................................................................................................ ........................................................................................................................................................................................ ........................................................................................................................................................................................ ........................................................................................................................................................................................ ........................................................................................................................................................................................ LE TRAN THAI TUAN 71