lOMoARcPSD|15378615 Unit 02 Networking..praveen hnd Intermediate Accounting I (German Jordanian University) Studocu is not sponsored or endorsed by any college or university Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Higher Nationals Internal verification of assessment decisions – BTEC (RQF) INTERNAL VERIFICATION – ASSESSMENT DECISIONS Pearson Higher Nationals in Computing Programme title Nuwan Hirantha Assessor Unit 02: Unit(s) Internal Verifier Pathum Sanjaya Networking Assignment title H.B.P Karunarathne Student’s name Pass Merit Distinction √ INTERNAL VERIFIER CHECKLIST Do the assessment criteria awarded match those shown in the assignment brief? Y/N Is the Pass/Merit/Distinction grade awarded justified by the assessor’s comments on the student work? Y/N Has the work been assessed accurately? Y/N Yes, the assessment criteria awarded matches those shown in the assignment brief Yes, the Pass/Merit/Distinction grade awarded justified by the assessor’s comments on the student work Yes, the work been assessed accurately Yes Is the feedback to the student: Give details: • Constructive? • Linked to relevant assessment criteria? • Identifying opportunities for improved performance? • Agreeing actions? Y/N Y/N Y/N Does the assessment decision need amending? Y/N Y/N No hiranthadj@gmail.com Assessor signature pathum.sanjaya@gmail.com Internal Verifier signature Programme Leader signature (if required) Date Date 2018/05/13 2018/05/12 Date Confirm action completed Remedial action taken Give details: Assessor signature Internal Verifier signature Date Ama Kulathilake Task 3.1 is not satisfactory. Learner has not Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) Date 16/05/2018 lOMoARcPSD|15378615 provided a clear plan. Task 3.2 is not covered. Provided IP table is incorrect. Task 3.4 is not done at all. Task 4.1 is incomplete. Packet tracer evidence for the implementation is not provided. De-graded to RESUBMISSION. Programme Leader signature (if required) Date Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Higher Nationals - Summative Assignment Feedback Form Student Name/ID H.B.P Karunarathne Unit Title Unit 02: Assignment Number 1 Assessor 2018/04/31 Date Received 1st submission Submission Date Networking Nuwan Hirantha Date Received 2nd submission Re-submission Date Assessor Feedback: LO1 Examine networking principles and their protocols. Pass, Merit & Distinction P1 M1 √ √ Descripts D1 √ LO2 Explain networking devices and operations. Pass, Merit & Distinction Descripts P2 √ M2 √ D2 √ M3 √ D3 √ LO3 Design efficient networked systems. Pass, Merit & Distinction Descripts P3 √ LO4 Implement and diagnose networked systems. Grade: Pass Assessor Signature: hiranthadj@gmail.com Date: 2018/05/05 Resubmission Feedback: Grade: Assessor Signature: Date: Internal Verifier’s Comments: Agree with the given grade Signature & Date: pathum.sanjaya@gmail.com, 2018/05/12 * Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have been agreed at the assessment board. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Pearson Higher Nationals in Computing Unit 02: Networking Assignment 01 Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 General Guidelines 1. A cover page or title page should be attached to your assignment. Use page 1 of this assignment brief as your cover page and make sure all details are accurately filled. 2. The entire assignment brief should be attached as the first section of your assignment. 3. The assignment should be prepared using a word processing software. 4. The assignment should be word processing in an A4 sized paper. 5. Allow 1” margin on top, bottom and right sides of the paper and 1.25” on the left side (for binding). Word Processing Rules 1. The font size should be 12 point and should be in the style of Time New Roman. 2. Set line spacing to 1.5. Justify all paragraphs. 3. Ensure that all headings are consistent in terms of size and font style. 4. Use footer function on the word processor to insert your name, unit, assignment no, and page number on each page. This is useful if individual sheets get detached from the submission. 5. Use the spell check and grammar check function of the word processing application to review the use of language on your assignment. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Important Points: 1. Carefully check carefully the hand in date and the instructions given with the assignment. Late submissions will not be accepted. 2. Ensure that sufficient time is spent to complete the assignment by the due date. 3. Do not wait till the last minute to get feedback on the assignment. Such excuses will not be accepted for late submissions. 4. You must be responsible for efficient management of your time. 5. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing) for an extension. 6. Failure to achieve at least a PASS grade will result in a REFERRAL grade. 7. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will then be asked to complete an alternative assignment. 8. If you use other people’s work or ideas in your assignment, it must be properly referenced, using the HARVARD referencing system, in your text or any bibliography. Otherwise, you’ll be found guilty of committing plagiarism. 9. If you are caught plagiarising, your grade will be reduced to a REFERRAL or at worst, you could be excluded from the course. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Student Declaration I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without attributing the sources in the correct form. I further understand what it means to copy another’s work. 1. I know that plagiarism is a punishable offence because it constitutes theft. 2. I understand the plagiarism and copying policy of Edexcel UK. 3. I know what the consequences will be if I plagiarise or copy another’s work in any of the assignments for this program. 4. I declare therefore that all work presented by me for every aspect of my program, will be my own, and where I have made use of another’s work, I will attribute the source in the correct way. 5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between myself and Edexcel UK. 6. I understand that my assignment will not be considered as submitted if this document is not attached to the assignment. Student’s Signature: (Provide E-mail ID) Date: (Provide Submission Date) Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Higher National Diploma in Business Assignment Brief Student Name /ID Number Unit Number and Title Unit 2: Networking Academic Year 2017/18 Unit Tutor LAN Design & Implementation for Enclave Films Company Assignment Title Issue Date Submission Date IV Name & Date Submission format The submission is in the form of an individual written report. This should be written in a concise, formal business style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all work must be supported with research and referenced using the Harvard referencing system. Please also provide an end list of references using the Harvard referencing system. The recommended word count is 3,000–3,500 words for the report excluding annexures Unit Learning Outcomes: LO1 Examine networking principles and their protocols. Address P1, P2, M1, D1 LO2 Explain networking devices and operations. Address P3, P4, M2, D1 LO3 Design efficient networked systems. Address P5, P6, M3, D2 LO4 Implement and diagnose networked systems. Address P7, P8, M4, D3 Assignment Brief and Guidance: Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 You are the newly recruited Network Engineer of an eminent movie company called Enclave Films. This company composes movies and delivers high quality video to make it download through VividZone company website. The original movie company management has decided to consolidate the contract with VividZone by adding more efficient staff and appliances. Enclave Films is in building B and the web team is positioned in the same building while majority of the administration, sales, accounts and management functions are supported in building A. Both buildings are located in the same premises. Movie company plans to aggregate all their staff and resources in one building. Therefore, when adjacent office space becomes available in building A, these groups will be accommodated together. Building A has a reception and a customer area as well. About the Network The branch network of Enclave Films has grown without proper planning. The LAN cabling in both offices is Cat5e Ethernet. The office complex provides an Ethernet link between the two buildings. Because of the recent acquisition of VividZone, the addressing and naming of the network are inconsistent. The combined network infrastructure has not been optimized or redesigned. It is a flat network design with minimal redundancy. A small wireless LAN is used occasionally by few project managers with laptops and the guests at Building B. Movie company believes that the WLAN may be used frequently since mobile and contract employees of VividZone will require network access. Remote access to Enclave Films network is provided through an ADSL internet link terminating in Building A. Currently there are two sets of Enclave Films staff onsite at the stadium in building A. The VividZone provides them office space in their management offices. The current network equipment includes: a) Two routers b) Three switches c) One network and business server d) One wireless router e) One ADSL modem Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 The current network has TWO VLANs. f) The General VLAN in building A serves the general office and managers, including reception, accounts, and administration. It consists of 12 PCs and 02 printers. g) The Production VLAN in building B serves the production suites and provides networking for the media development and storage. It consists of 09 high-performance workstations, 05 office PCs, and 02 printers. The Management expects to enhance the network based on following major criteria: h) Data traffic expected to increase by 80% i) Possibly consider connecting directly to the VividZone network; must be a fast and reliable connection j) High network availability with redundant links and technology k) Wireless network access at the stadium and at Building A and Building B l) QoS to support video applications m) High network reliability with network monitoring and security LO1 Examine networking principles and their protocols Task 1.1 (P1) a) Discuss the benefits and constraints of different network types and standards. b) Explain the benefits & constraints of current network solution including bandwidth & effectiveness of the networking system. Task 1.2 a) What is a topology? Give a brief introduction about Logical and Physical topologies including examples. (P2) b) Identify what are the most suitable Logical & Physical topologies for the given scenario. (D1) Task 1.3 Identify the protocol structure models available in networking & briefly explain how they work with comparisons. (M1) Task 1.4 Define the protocols, their functions and identify the suitable protocols for the given scenario. Explain for your selection. (D1) Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 LO2 Explain networking devices and operations Task 2.1 Identify the current network equipment’s (devices) which have been used and discuss the functionality of each device related to the given scenario. Justify your choice of devices for this network design. (P3) Task 2.2 Discuss the interdependence of workstation hardware with relevant networking software. (P4) Task 2.3 (M2) a) How should you select a server/s for a network? Explain the techniques to be followed by? b) Identify the server types suitable for the given scenario. Justify your selection considering cost and performance optimization. LO3 Design efficient networked systems Task 3.1 (P5) a) Prepare a written step-by-step plan of how you are going to design a Local Area Network including a blueprint of your LAN. b) Justify the security requirements and quality of services needed for selection of accessories Task 3.2 (P5) a) Design a networked system to meet a given specification by using packet tracer software b) Find the IP addresses allocated for the two VLANs in given scenario. (General VLAN & Production VLAN). c) Network IP d) Gateway e) Hosts (Dynamic & Static) Task 3.3 Install & configure network services and applications of your choice. (M3) Task 3.4 Conduct a test and evaluate the design to meet the requirements and analyse user feedback. (P6) Task 3.5 Suggest a maintenance schedule to support the networked system. (D2) Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 LO4 Implement and diagnose networked systems Task 4.1 Implement a networked system based on your prepared design. (P7) Task 4.2 Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc. Record the test results and analyze these against expected results. (P8) Task 4.3 Investigate what functionalities would allow the system to support device growth and the addition of communication devices. (M4) Task 4.4 Use critical reflection to evaluate own work and justify valid conclusions beyond the given specification. (D3) Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Grading Rubric Grading Criteria Achieved Feedback LO1 : Examine networking principles and their protocols. P1 Achieved Student has discussed the benefits & constraints of different network types & standards Achieved Student has explained the impact of network topology, Discuss the benefits and constraints of different network types and standards. P2 communication and bandwidth requirements Explain the impact of network topology, communication and bandwidth requirements. Achieved M1 Student has compared common networking principles and how protocols enable the effectiveness of networked systems Compare common networking principles and how protocols enable the effectiveness of networked systems. LO2 : Explain networking devices and operations Achieved P3 Discuss the operating principles of networking devices and Student has discussed the operating principles of networking devices and server types. server types. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 P4 Achieved Learners has discussed the inter-dependence of workstation hardware with relevant networking software Achieved Learners has explored a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization. Discuss the inter-dependence of workstation hardware with relevant networking software. M2 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization. LO 1 & LO2 Achieved D1 Considering a given scenario, identify the topology protocol selected for the efficient utilization of a networking system. Student has considered a given scenario, identify the topology protocol selected for the efficient utilization of a networking system. LO3 : Design efficient networked systems P5 Achieved Student has designed a networked system to meet a given specification Achieved Student has tested and evaluate the design to meet the requirements and analyze user feedback. Achieved Learners has installed and configure network services and Design a networked system to meet a given specification. P6 Test and evaluate the design to meet the requirements and analyze user feedback. M3 Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 applications on your choice. Install and configure network services and applications on your choice. Achieved D2 Design a maintenance schedule to support the networked Student has designed a maintenance schedule to support the networked system. system. LO4 : Implement and diagnose networked systems P7 Achieved Student has Implemented a networked system based on a prepared design Achieved Learners has Document and analyze test results against expected results Achieved Leaners has Recommend potential enhancements for the networked systems. Achieved Student has Use critical reflection to evaluate own work and justify valid conclusions. Implement a networked system based on a prepared design. P8 Document and analyze test results against expected results. M4 Recommend potential enhancements for the networked systems. D3 Use critical reflection to evaluate own work and justify valid conclusions. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Table of Contents Task 1.1 (P1) ............................................................................................................................. 19 a) Discuss the benefits and constraints of different network types and standards. ........ 19 Local Area network (LAN) ........................................................................................................ 19 Metropolitan Area network (MAN) ......................................................................................... 19 Wide Area network (WAN) ...................................................................................................... 19 b) Explain the benefits & constraints of current network solution including bandwidth & effectiveness of the networking system. ............................................................................. 20 VLAN ......................................................................................................................................... 20 Benefits of VLAN: ................................................................................................................. 20 Using flat network ................................................................................................................ 21 Cat5e cable ........................................................................................................................... 21 Ethernet ............................................................................................................................... 21 Task 1.2 .................................................................................................................................... 22 a) What is a topology? Give a brief introduction about Logical and Physical topologies including examples. (P2) ...................................................................................................... 22 Topology. .............................................................................................................................. 22 Bus topology......................................................................................................................... 22 Ring topology ....................................................................................................................... 23 Star topology ........................................................................................................................ 24 Tree topology ....................................................................................................................... 24 Mash topology ..................................................................................................................... 25 Hybrid topology.................................................................................................................... 26 Different types of logical topologies. ................................................................................... 26 Ethernet ............................................................................................................................... 26 Virtual LAN ........................................................................................................................... 27 Token ring. ........................................................................................................................... 27 b) Identify what are the most suitable Logical & Physical topologies for the given scenario. (D1) ....................................................................................................................... 27 Task 1.3 .................................................................................................................................... 28 a) Identify the protocol structure models available in networking & briefly explain how they work with comparisons. (M1) ...................................................................................... 28 OSI Model ............................................................................................................................. 28 Physical layer ........................................................................................................................ 29 Data link layer ...................................................................................................................... 29 Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Networking layer .................................................................................................................. 30 Transport layer ..................................................................................................................... 30 Session layer ........................................................................................................................ 31 Presentation layer ................................................................................................................ 31 Application layer .................................................................................................................. 32 Data Encapsulation. ............................................................................................................. 32 TCP/IP ................................................................................................................................... 32 First TCP/IP network model ................................................................................................. 32 Application ........................................................................................................................... 32 Transport .............................................................................................................................. 33 Network................................................................................................................................ 33 Link layer .............................................................................................................................. 33 Standard ................................................................................................................................... 33 Task 1.4 .................................................................................................................................... 34 Define the protocols, their functions and identify the suitable protocols for the given scenario. Explain for your selection. (D1) ............................................................................ 34 1.OSI 7 layer model .............................................................................................................. 34 TCP/IP layer .......................................................................................................................... 35 Task 2.1 .................................................................................................................................... 36 Identify the current network equipments (devices) which have been used and discuss the functionality of each device related to the given scenario. Justify your choice of devices forthis network design. (P3) ................................................................................................ 36 Sever ......................................................................................................................................... 36 2.Switches ............................................................................................................................ 37 3.Routers .............................................................................................................................. 37 4.ADSL modem ..................................................................................................................... 37 5.Wairless router.................................................................................................................. 37 Task 2.2 .................................................................................................................................... 38 Discuss the interdependence of workstation hardware with relevant networking software. (P4) ....................................................................................................................................... 38 Task 2.3 (M2) ............................................................................................................................ 38 How should you select a server/s for a network? Explain the techniques to be followed by? ........................................................................................................................................ 38 Identify the server types suitable for the given scenario. Justify your selection considering cost and performance optimization. ................................................................................... 38 Task 3.1 (P5) ............................................................................................................................. 39 Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Prepare a written step-by-step plan of how you are going to design a Local Area Network including a blueprint of your LAN. ....................................................................................... 39 Task 3.2 (P5) ............................................................................................................................. 44 Design a networked system to meet a given specification by using packet tracer software .............................................................................................................................................. 44 Find the IP addresses allocated for the two VLANs in given scenario. (General VLAN & Production VLAN)................................................................................................................. 45 Task 3.4 .................................................................................................................................... 48 Conduct a test and evaluate the design to meet the requirements and analyze user feedback. (P6) ...................................................................................................................... 48 Task 3.5 .................................................................................................................................... 50 Suggest a maintenance schedule to support the networked system. (D2) ......................... 50 Task 4.1 .................................................................................................................................... 51 Implement a networked system based on your prepared design. (P7) .............................. 51 Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Task 1.1 (P1) a) Discuss the benefits and constraints of different network types and standards. Local Area network (LAN) A computer network that spans a relatively small area. Most LAN are confined to a single building or group of buildings. However, one LAN can be connecting to other LANs over any distance via telephone line and radio waves. A system of LANs connected in this way is called wide – area network (WAN). Most LANs connect workstations and personal computers. Each node (individual computer) in a LAN has its own CPU with which it executes programs bit it also able to access data and devise anywhere on the LAN. This means that many users can share expensive devices such as laser printers as well as data. Users can also use the LAN to communicate with each other by sending e-mail or engaging in chat sessions. There are many different types of LANs Ethernet being the most common of PCs. Most Apple Macintosh networks are based on Apple’s Apple talk network system which is built into Macintosh computers. LANs are capable of transmitting data at very fast rates much faster than data can be transmitted over a telephone line but the distances are limited and there is also a limit on the number of computer that can be attached to a single LAN. Metropolitan Area network (MAN) Short for Metropolitan area network a data network designed for a town or city. In terms of geographic breadth MANs are lager then local area networks(LANs) but smaller than wide area network (WANs). MANs are usually characterized by very high –speed connections using fiber optical cable or other digital media. Wide Area network (WAN) A computers network that spans a relatively large geographical area. Typically, a WAN consists of two or more local area networks(LANS). Computers connected to a wide area network are often connected through public networks such as the telephone system. They can also be connected through leased lines or satellites. The largest WAN in existence is the internet. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 b) Explain the benefits & constraints of current network solution including bandwidth & effectiveness of the networking system. VLAN In the current network solution VLAN is used. In traditional LAN workstations are connected to each other by means of a hub or a repeater. These devices propagate any incoming data throughout the network. However, if two people attempt to send information at the same time a collection will occur and all the transmitted data will be lost. VLAN’s allow network manager to logically segment a LAN into different domains. Since this is a logical segmentation and a physical one workstations do not have to be physically located together. Users on different floors of the same building or even in different buildings can now belong to the same LAN.VLAN’s also allow broadcast domains to be defined without using routers. Bridging software is used instead to define which workstations are to be in the broadcast domain. Routers would only have to be used to communicate between two VLAN’s. Benefits of VLAN: Performance In network where traffic consists of a high percentage of broadcasts and multicasts VLAN’s can reduce the need to send such traffic to unnecessary destinations. The use of VLAN’s reduces the number of routers needed since VLAN’s create broadcast domains using switches instead of routers. Simplified Administration Seventy percent of network cost are a result of adds, moves, and changes of users in the network. Every time user is moved a LAN, recalling, new station addressing and reconfiguration of hubs and routers become necessary. Some of these tasks can be simplified with the use of VLAN’s. If a user is moved within a VLAN reconfiguration routers is unnecessary. In addition, depending on the type of VLAN other administrative work can be reduced or eliminated. Reduced cost Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 VLAN’s can be used to create broadcast domains which eliminate the need for expensive routers. Security Periodically sensitive data may be broadcast on a network. In such cases placing only those users who can have access to that data on a VLAN can reduce the chances of an outsider gaining access the data. VLAN’s can also be control broadcast domains, set up firewalls, restrict access and inform the manager of an intrusion. Using flat network A network in which all stations can reach other without going through any intermediary hardware devices such as a brig or router. A flat network is a network segment. Large network is broken into segments for security purposes as well as to improve traffic within departments and workgroups. Benefits of flat network Reduce cost Flat network reduces the cost of maintenance and administration. Cat5e cable The category 5 e cable an enhanced version of cat 5 adheres to more stringent standards specified by TIA/ELA568C.2 and ICE 6063030-7-4. These cables are made using 24-gauge (AWG)copper wires with about three twists per inch enabling them to transmission data at 1000 Mbps with a frequency of 100 MHz’s. Benefits of cat5e cable Low cost in implement. Faster than cat5 cables. Cat 5e cables have capability of backwards compatible. Ethernet Ethernet a physical layer local area network(LAN)technology. It is nearly 30 years old. In the last three decades it has become the most widely used LAN technology because of its speed, low cost and relative ease of installation. This is combined with wide computer market acceptance and the ability to support the majority if network protocols. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Benefits of Ethernet Low cost in implementing. High speed Task 1.2 a) What is a topology? Give a brief introduction about Logical and Physical topologies including examples. (P2) Topology. Network topologies describe the way in which the elements of a network are mapped. They describe the physical and logical arrangement of the network nodes. The physical topology of a network refers to the configuration of cables, computers and other peripherals. Different types of Physical topologies Bus topology. Star topology. Ring topology. Mesh topology. Tree topology. Hybrid topology. Bus topology Advantages of Bus topology It is cheap, easy handle and implement. Require less cable. It is best suited for small networks. Disadvantages of Bus topology Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 The cable length is limited. This limits the number of stations that can be connected. This network topology can perform well only for a limited number of nodes. Ring topology In a ring network every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction. A failure in any cable or device breaks the loop and can take down the entire network. To implement a ring network, we use the token ring technology. A token or small data packet is continuously passed around the network. When a device need to transmit it reserves the token for the next trip around then attaches its data packet to it. Advantage of ring topology: Very orderly network where every device has access to the token and the opportunity to transmit. Good communication over long distances. Handles high volume of traffic. Disadvantages of ring topology The failure of a single node of the network can cause the entire network to fail. The movement or changes made to network nodes affects the performance of the entire network. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Star topology In a star network each node is connected to a central device called a hub. The hub takes a signal that come from any node and passes it along to all the other nodes in the network. Data on a star network passes through the hub, switch or concentrator before continuing to its destination. The star topology reduces the chance of network failure by connecting all of the systems to a central node. Advantages of star topology Easy to manage. Easy to locate problems. Easier to install and wire. Easy to detect faults and remove parts. Disadvantages of star topology Requires more cable length then a linear topology. If the hub or concentrator fails nodes attached are disabled. More expensive because of the cost of the concentrators. Tree topology Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 A tree topology can be viewed as a collection of star networks arranged in a hierarchy. Tis tree has individual peripheral nods which are required to transmit to and receive from one other only and are not requested to act as repeaters or regenerators. The tree topology arranges links and nodes into distinct hierarchies in order to allow greater control and easier troubleshooting. This is particularly helpful for colleges, universities and schools so that each of the connect the big network in some way. Advantages of a tree topology: Point to point writing for individual segments. Supported by several hardware and software vendors. All the computers have access to the larger and their immediate networks. Disadvantages of tree topology: Overall length of each segment is limited by the type of cabling used. If the backbone line breaks the entire segment goes down. More difficult to configure and wire than other topologies. Mash topology In this topology each node is connected to every other node is the network. Implementing the mesh topology is expensive and difficult. In this type of network each node may send message to destination through multiple paths. While the data in travelling on the mesh network it is automatically configured to reach the destination by taking the shortest route which means the least number of hops. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Advantages of mesh topology: No traffic problem as their dedicated links. It has multiple links so if any router is blocked then other router can be use. Points to point link make fault identification easy. Disadvantages of mash topology: There is mash of wiring which can be difficult to manage. Installation is complex as each node is connected to every node. Cabling cost is high. Hybrid topology. A combination of any two or more network topologies A hybrid topology always accrues when two different basic network topologies are connected. It is a mixture of above mentioned topologies. Usually a central computer is attached with sub-controllers which in turn participate in a variety of topologies. Advantages of a hybrid topology: It is extremely flexible. It is very reliable. Disadvantages of a hybrid topology Expensive. Different types of logical topologies. Ethernet. Virtual LAN. Token ring. Ethernet A local area network (LAN) protocol developed by Xerox cooperation in cooperation with DEC and Intel in 1976. Ethernet use a bus or star topology or star topology and supports data transfer rates of 10 Mbps. The Ethernet specification served as the basis for IEEE 802.3 standard which specifies the physical and lower software layers. Ethernet uses the Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 CSMA/CD access method to handle simultaneous demands and one of the most widely implemented LAN standards. It is one of the most widely implemented LAN standards. Virtual LAN A virtual local area network(VLAN) is a logical group of workstations, sever and network devices that appear to be on the same LAN despite their geographical distribution. A VLAN allows a network of computers and users to communication in a simulated environment as if they exist in a signal LAN and are sharing a signal broadcast and multicast domain. VLANs are implemented to achieve scalability, security and ease of network management and can quickly adapt to changes in network requirements and relocation of workstations and sever nodes. Advantages of VLAN Allowing network administrators to apply additional security to network communication. Making expansion and relocation of a network of a network device easier. Provide flexibility because administrators are able to configure in a centralized environment while the devices might be located in different geographical locations. Disadvantages of VLAN High risk of virus issues because on infected system may spread a virus through the whole logical network. Equipment limitation in very lager networks because additional routers might be needed to control the workload. More effective at controlling latency than a WAN, but less efficient than a LAN. Token ring. Token ring network use the token passing access method, which is based on a small frame called a token that circulates a ring shaped media in a logical direction when devices are idle. To transmit the device must seize the token. b) Identify what are the most suitable Logical & Physical topologies for the given scenario. (D1) This network is in two buildings and each building every flow should have to connect to the network and also the two buildings should connect to it. There is one sever in this network through the switchers and the routers all the terminals should have to connect to the sever. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Why are the star topologies suitable? In ring topology it is using peer level computers to connect the network in this network there is workstation computers and servers to inter connect them ring topology suitable. Bus topology has limited cable limit this is a network in two buildings because the limitation of cabal Bus topology can’t use to this network. Mesh and hybrid topologies can be use but it is an unnecessary coast. Ethernet is the logically suitable to this network this is a LAN and it is spared in two buildings only Ethernet is capable to give severs to that much big network. Task 1.3 a) Identify the protocol structure models available in networking & briefly explain how they work with comparisons. (M1) OSI Model In 1984 International Organization for Standardization developed this model. This model is very help full to troubleshooting in network problems. OSI model provide a good foundation to categorize and analyze the network issues. In this model there are 7 layers. T r a n s m i t D a t a User 7.Application Layer 6.Presentation Layer 5.Session Layer 4. Transport Layer 3.Network Layer 2.Data Link Layer 1.Physical layer Physical Link Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) R e c i c e D a t a lOMoARcPSD|15378615 Physical layer Patch penal Hub and Device Wall jack The physical layer of the OSI model defines connector and interface specifications as well as the medium requirements. Components of the physical layer: Cabling system components. Adapters that connect media to physical interfaces. Connector design and pin assignments. Hub, Repeater and patch panel specifications. Wireless system components. Parallel SCSI. Network interface card(NIC). In a LAN environment cat5e cabala is generally used for the physical layer for individual device connections. The physical layer of the OSI model is only part of a LAN. Data link layer Ethernet switch A,B, C,D, Sever AB C D E F The second layer of the OSI model provides following functions: Allows a device to access the network to send and receive messages. Offers a physical address so a device’s data can be sent on the network. Works with a device’s networking software when sending and receiving messages. Provides error-detection capability. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Common networking components that function at data link layer: Network interface cards. Ethernet and token ring switches. Bridges. Networking layer Layer3 Subnet1 addressing Subnet3 Subnet2 LAN LAN router Layer3 WAN Layer3 addressing router Addressing In this data link layer of OSI model provide an end to end logical addressing system so that a packet of data can be routed across several layers 2 networks (Ethernet, Token Ring, Frame relay and etc). Transport layer Network User Sever The transport layer of the OSI model offers end to end communication between end devices through a network. It depending on the application the transport layer either offers reliable connection oriented or connectionless best-effort communication. Some of the function offered by the transport layer: Application identification. Client-side entity identification. Confirmation that the entire message arrived intact. Segmentation of data for network transport. Control of data flow to prevent memory overruns. Transmission error detection. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Session layer Data 96 net wor User devise Fill sever Ok got 96 Session layer provides various services including tracking number of bytes that each end of the session has acknowledged receiving from the other end of the session. This session layer allows application functioning on devices to establish, manage and terminate a dialog through a network. Session layer functionality includes: Virtual connection between application entities. Synchronization of data flow. Creation of dialog units. Connection parameter negotiations. Partitioning of services into functional groups. Presentation layer netwo rk Encrypt data Decrypt data The presentation layer, is responsible for how an application formers the data to be sent out onto the network. Presentation layer basically allows an application to read the message. Presentation layer functionality include: Encryption and decryption of a message for security. Compression and expansion of a message so that it travels efficiently. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Graphics formatting. Content transmitting. System specific translation. Application layer Web browser, email, FTP Application layer provides an interface for the end user operating a device connected to a network. This layer is what the user sees in terms of loading an application that is this application layer is the data the user views while using these applications. Application layer functionality: Support for file transfers. Ability to print on a network. Electronic messaging. Browsing the world wide web. Data Encapsulation. Data encapsulation is an object-oriented programming concept that bind a group of related properties, functions and other members are treated as a single unit. Class is the best example of data encapsulation. It sometimes referred to as data hiding that prevents the user to access the implementation details. TCP/IP TCP/IP is the protocol that build internet in 1969 by the department of defense conceived it. This is older than Ethernet. TCP/IP is based on four layers it is similar to ISO model. There are two version of this method First TCP/IP network model Application This protocols provide service to run the application software on PC or Server such as HTTP,FTP,SMTP,POP and more. It defines services that application need. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Transport Transport layer where the data gets segmented based on TCP or UDP port numbers and IP Addresses, together “IP-Address:” called “TCP socket or UDP socket. Network In network layer packaged get IP packets and it includes major protocols. community it us internet protocol(IP). Link layer This is where IP packets get framed and it is where the last piece of software control protocol can be applied on the data before it can handled as frame to hardware layer for bit transmission. In second version physical layer added. Standard In 1985 the computer society of the IEEE started project 802. This Project is not replace for the ISO model or the TCP/IP model.it specifying the functions of the physical layer and the data link layer of major LAN protocols. The IEEE divided in to two sub layers logistic link control (LLC) and media access control (MAC).It also have several physical layers standard to different LAN protocols. IEEE 802 LAN/MAN IEEE802.1 Standards for LAN/MAN bridging and management and remote media access control (MAC) bridging. IEEE802.2 Standards for Logical link Control (LLC) standards for connectivity. IEEE802.3 Ethernet standards for carrier sense multiple access with collision detection (CSMA/CD). IEEE802.4 Standards for token passing bus access. IEEE802.24 Standards for logical link control (LLC) standards for connectivity. IEEE802.5 Standards for token ring access and for communication between LANs and MANs IEEE802.6 Standards for information exchange between systems. IEEE802.7 Standards for broadband LAN cabling. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 IEEE802.8 Fiber optical connection . IEEE802.9 Standards for integrated services ,like voice and data. IEEE802.10 Standards for LAN/MAN security implements. IEEE802.11 Wireless networking (WiFi) . IEEE802.12 Standards for demand priority access method. IEEE802.14 Standards for cable television broadband communications. IEEE802.15.1 Bluetooth IEEE802.15.4 Wireless sensor/control network. IEEE802.15.6 Wireless body area network (BAN). IEEE802.16 Wireless networking-“WIMAX” Task 1.4 Define the protocols, their functions and identify the suitable protocols for the given scenario. Explain for your selection. (D1) 1.OSI 7 layer model Open system interconnection (OSI) model has 7 layers each layer has clear characteristics. Application layer(functions). Defines interface to user processes for communication and data transfer in network . Provides standardized services such as virtual terminal file and job transfer and operations. Presentation layer(functions) Masks the differences of data formats between dissimilar systems. Specifies architecture independent data transfer format. Encodes and decodes data encrypts and decrypts data compresses and decompresses data. Session layer(function) Manages user sessions and dialogues. Controls establishment and termination of logic links between users . Repots upper layer errors. Transport layer(function) Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Manages end to end message delivery in network. Provides reliable and sequential packet delivery through error recovery and flow control mechanisms. Provides connectionless oriented packet delivery. Network layer(function) Determines how data are transferred between network devices. Routes packet according to unique network device addresses. Provides flow and congestion control to prevent network resource depletion. Data link layer(function) Defines procedures for operating the communication links. Frames packets. Detects and corrects packets transmit errors. Physical layer(function) Defines physical means of sending data over network devices. Interfaces between network medium and devices. Defines optical, electrical and mechanical characteristics. TCP/IP layer The TCP/IP layer model has 4 layers functions of each layer is described below Application layer The application layer in TCP/IP model the functions of OSI application presentation layer and session layer. Therefore, any process above the transport layers called an application in the TCP/IP architecture.in TCP/IP socket and port are used to describe the path over which application communicate. Most application level protocols are associated with one or more port number. Transport layer In TCP/IP architecture there are two transport layer protocols . the transmutation control protocol (TCP) guarantees information transmission. The user Datagram protocol (UDP) transports datagram without end to end reliability checking. Broth protocols are useful for different applications. Network layer The internet protocol(IP) is the primary in the TCP/IP network layer. All upper and lower layer communications must travel through IP as they are passed through the Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 TCP/IP protocols in the network layer such as ICMP to facilitate and manage the routing process. Network access layer In the TCP/IP architecture the data link layer and physical layer are normally group together to become the network access layer. TCP/IP makes use of existing its own. Many RFCs describe how IP utilizes and interfaces with the existing data link protocols such as Ethernet, Token ring, FDDI, HSSI and ATM. The OSI model is the best protocol to this network. Task 2.1 Identify the current network equipments (devices) which have been used and discuss the functionality of each device related to the given scenario. Justify your choice of devices forthis network design. (P3) Sever What is a server? Sever is a computer that build to prosses and deliver the data to other client computes over the local network or the internet. This computer has high performances and lager scale of storage capacity. In this computers software are specially diced of the severs. Common types of severs: Webserver This types of severs are build to show web pagers and run apps in connecting web browsers. Web server are used for all sorts of things in addition to delivering simple text and imagers like for uploading and backing up files online through a cloud storage or online backup severs. Email severs This severs are using to send and receiving of massagers. If you have an email client on your computer the software is connecting to an IMAP or POP email sever to download your computer and SMTP server to send messages back through the email sever. FTP severs FTP server supports the moving of files through File Transfer protocol tools. FTP severs are accessible remotely via FTP client programs. Identity severs Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Identity sever is logins and security roles for authorized users. Hundreds of different types of specialized sever types support computer networks. Apart form the common corporate types home users often interface with online game severs chat servers audio streaming services and etc. 2.Switches Switch is a hardware devise that centralized communication among multiple Connected devices within one local area network(LAN). It is work like hub it is the Connectivity point to Ethernet network. Switches only forward the port that connects to the destination device. It knows MAC address and it match the MAC address in the date it receives. Fully switched network is dedicated segment for each devise is connected to switch. In this network they use many terminals. By the switches connect that terminals in to the network. 3.Routers Router is a electronic devise that join multiple computers network together via either wired or wireless connection. It creates lager networks by joining two networks segments. Routers dedicated hardware devise or computer systems with more than one network interface and routing software. Given network there are two buildings routers are joining that two networks. 4.ADSL modem Modem is a modulator/demodulator it convent digital signal generated by computer into analog signals that can travel over conventional phone line. Modems are connected to SIP and it dialing up to a LAN. Modems need internal add-in expansion card or external devices connect to serial or USB port(PCMCIA cards for laptop).ADSL modem is use to connect internet in this network. 5.Wairless router This is the devices that provide connectivity between warless LAN devices and in most cases a wired network. It converts signal from radio wave or other to that used on the LANs. Warless router provides the connectivity between the devices that are not provide Cable to connect the network. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Task 2.2 Discuss the interdependence of workstation hardware with relevant networking software. (P4) Sever 2016 has installed to the all workstations. Task 2.3 (M2) How should you select a server/s for a network? Explain the techniques to be followed by? When select a sever there are few things how to select it 1.What is the load put in to the sever? When the sever implement to a network the first thing that we should look is this. The load mining of this is what kind of software run in the sever and how much workload should press in the sever. Considering it sever should have to select. 2.How many client devises connect to the sever and their performance? Second thing is the devises and their performance if there are very few devises and low performing devises normal sever can be select but the devises or performance of the devises are high the sever should be select in high performing sever. Identify the server types suitable for the given scenario. Justify your selection considering cost and performance optimization. The sever type is given scenario is the networking and business management sever. In this scenario company has implement a sever that use to manage network and the business. Sever is a computer design to presses request and deliver the data to client computers over a local network or the internet. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 LO3 Design efficient networked systems Task 3.1 (P5) Prepare a written step-by-step plan of how you are going to design a Local Area Network including a blueprint of your LAN. 1step Gather the requests that need to the costumer. 2step Study the building and categories the departments. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 3step Implement the network workstations, PC and sever separate to each department and configure each pc giving IP address. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 4step Implementing the network devises to the department to connect pc in department. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 5step Set up the connection of two VLAN of each buildings and connect the pc in each department to the switch and switches connect in to the routers. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 6step Building the connection among the two buildings. 7step Configure the devices connection. a) Justify the security requirements and quality of services needed for selection of accessories This network access to internet and it is a risk because of that a ASA security devise implement to this network as a fire wall. The other thing is the pc and other devises that are in the network through that devises an attack can be spared in the network but the security devise filters all the threats before reach to the network. All the other accessories implement to this network to improve the speed and high capacity data transfer. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Task 3.2 (P5) Design a networked system to meet a given specification by using packet tracer software Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Find the IP addresses allocated for the two VLANs in given scenario. (General VLAN & Production VLAN). VLAN / Type Departmen IP addresses Laptops Printers Project PC ons t / Room Production/ VLAN 3 Workstati 168.192.0.0 3 0 0 0 IP address Subnet range mask 168.192.0. 255.255.0.0 managers 0- room 168.192.0. 3 Production /VLAN2 Sever 191.168.0.1 0 0 0 0 191.168.0. 255.255.0.0 1- room 191.168.0. 2 Production /VLAN 2 Storage 166.160.0.1 0 1 0 5 166.160.0. 255.255.0.0 1166.160.0. 5 Production / VLAN 2 Media 128.168.1.1 0 1 9 0 128.168.1. 255.255.0.0 1- department 128.168.1. 9 General / VLAN 1 General 191.126.1.1 1 office 2 191.126.1 .1- Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) 255.255.0.0 lOMoARcPSD|15378615 191.126.1 .3 General / VALN 1 Managers 2 121.126.1.1 121.126.1. 255.255.0.0 1- office 121.126.1. 3 General / VLAN 1 Reception 1 126.121.1.1 126.121.1. 255.255.0.0 1 General / VLAN 1 Account 166.160.0.1 1 2 166.160.0. 255.255.0.0 1- office 166.160.0. 3 General / VLAN 1 Administra 188.180.0.1 2 188.180.0. 1- tion office 188.180.0. 2 Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) 255.255.0.0 lOMoARcPSD|15378615 Network IP 191.168.0.1 Gateway 126.168.0.1 Hosts (Dynamic & Static) Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Task 3.4 Conduct a test and evaluate the design to meet the requirements and analyze user feedback. (P6) Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 6 Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Task 3.5 Suggest a maintenance schedule to support the networked system. (D2) When designing a maintenance schedule, it may can categorized in few parts. Maintenance Category Person who maintain Week of the month 1. Sever maintenance 1.Review system logs for errors and potential Network administrator. First problems. week of month. 2. Review service pack and hotfix installation history. 3.Review service pack and hotfix installation history. 4.Review hard disk usage and health reports. 5.Review system backup process and disaster recovery status. 6.Review antivirus protection 2.Network 1.Document network maintenance (hub/switches/routers). devices Network technicians Second week of month. 2.Review device configuration. 3.Review firewall configuration. 3.Workstation 1.Review disk usage. Network manager maintenance Third week of 2.Review hardware statistics. 3.Review hotfix and service pack install history. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) mounth. lOMoARcPSD|15378615 1. Network maintenance Under the network maintenance: Under the workstation maintenance Task 4.1 Implement a networked system based on your prepared design. (P7) Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Task 4.2 Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc. Record the test results and analyze these against expected results. (P8) Ping Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Extended ping Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Trace route Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Task 4.3 Investigate what functionalities would allow the system to support device growth and the addition of communication devices. (M4) Adding Wi-Fi adapters to each pc and workstation. By adding Wi-Fi adapters, we can communicate wireless method then we can remove the cables and other network devises and by adding Wi-Fi routers we can communicate more fast Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 and it will be reducing the cost of cables and other network devices Adding one router to building B by removing the switch. By adding only one router to the building B as communication device will help to accurate data transfer and enhanced the speed of the data transferring not only that it will also reduce the cost of switchers. In building B have only 12 PCs and one router can have managed it. Conclusion. I have learned many things in networking. What are the devices that are using in networking and have to use them what kind of scenarios that we can use those devices. And how to build a fully function network. To learn all those things help me or class teacher. He gives us every inch of knowledge in networking subject. And I am thanking full to him to giving his fully support to make this assignment. References (HND IN COMPUTING Unit 2 : Networking, 2000-2018; Placeholder1) (Networking Fundamentals, 2006, p. 2) Downloaded by Nishantha Mendis (bnsmeslk@gmail.com) lOMoARcPSD|15378615 Gannet chart. Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)