Uploaded by Nishantha Mendis

unit-02-networkingpraveen-hnd

advertisement
lOMoARcPSD|15378615
Unit 02 Networking..praveen hnd
Intermediate Accounting I (German Jordanian University)
Studocu is not sponsored or endorsed by any college or university
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Pearson Higher Nationals in Computing
Programme title
Nuwan Hirantha
Assessor
Unit 02:
Unit(s)
Internal Verifier
Pathum Sanjaya
Networking
Assignment title
H.B.P Karunarathne
Student’s name
Pass
Merit
Distinction
√
INTERNAL VERIFIER CHECKLIST
Do the assessment criteria awarded match
those shown in the assignment brief?
Y/N
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the
student work?
Y/N
Has the work been assessed
accurately?
Y/N
Yes, the assessment criteria awarded
matches those shown in the assignment
brief
Yes, the Pass/Merit/Distinction grade
awarded justified by the assessor’s
comments on the student work
Yes, the work been assessed accurately
Yes
Is the feedback to the student:
Give details:
• Constructive?
• Linked to relevant assessment criteria?
• Identifying opportunities for
improved performance?
• Agreeing actions?
Y/N
Y/N
Y/N
Does the assessment decision need
amending?
Y/N
Y/N
No
hiranthadj@gmail.com
Assessor signature
pathum.sanjaya@gmail.com
Internal Verifier signature
Programme Leader signature (if required)
Date
Date
2018/05/13
2018/05/12
Date
Confirm action completed
Remedial action taken
Give details:
Assessor signature
Internal Verifier
signature
Date
Ama Kulathilake
Task 3.1 is not satisfactory. Learner has not
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
Date
16/05/2018
lOMoARcPSD|15378615
provided a clear plan.
Task 3.2 is not covered. Provided IP table is
incorrect.
Task 3.4 is not done at all.
Task 4.1 is incomplete. Packet tracer evidence
for the implementation is not provided.
De-graded to RESUBMISSION.
Programme Leader
signature (if required)
Date
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID
H.B.P Karunarathne
Unit Title
Unit 02:
Assignment Number
1
Assessor
2018/04/31
Date Received
1st submission
Submission Date
Networking
Nuwan Hirantha
Date Received 2nd
submission
Re-submission Date
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1
M1 √
√
Descripts
D1
√
LO2 Explain networking devices and operations.
Pass, Merit & Distinction
Descripts
P2
√
M2
√
D2
√
M3
√
D3
√
LO3 Design efficient networked systems.
Pass, Merit & Distinction
Descripts
P3
√
LO4 Implement and diagnose networked systems.
Grade: Pass
Assessor Signature: hiranthadj@gmail.com
Date: 2018/05/05
Resubmission Feedback:
Grade:
Assessor Signature:
Date:
Internal Verifier’s Comments: Agree with the given grade
Signature & Date: pathum.sanjaya@gmail.com, 2018/05/12
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
General Guidelines
1. A cover page or title page should be attached to your assignment. Use page 1 of this assignment
brief as your cover page and make sure all details are accurately filled.
2. The entire assignment brief should be attached as the first section of your assignment.
3. The assignment should be prepared using a word processing software.
4. The assignment should be word processing in an A4 sized paper.
5. Allow 1” margin on top, bottom and right sides of the paper and 1.25” on the left side (for
binding).
Word Processing Rules
1. The font size should be 12 point and should be in the style of Time New Roman.
2. Set line spacing to 1.5. Justify all paragraphs.
3. Ensure that all headings are consistent in terms of size and font style.
4. Use footer function on the word processor to insert your name, unit, assignment no, and page
number on each page. This is useful if individual sheets get detached from the submission.
5. Use the spell check and grammar check function of the word processing application to review
the use of language on your assignment.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Important Points:
1. Carefully check carefully the hand in date and the instructions given with the assignment. Late
submissions will not be accepted.
2. Ensure that sufficient time is spent to complete the assignment by the due date.
3. Do not wait till the last minute to get feedback on the assignment. Such excuses will not be
accepted for late submissions.
4. You must be responsible for efficient management of your time.
5. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
6. Failure to achieve at least a PASS grade will result in a REFERRAL grade.
7. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will
then be asked to complete an alternative assignment.
8. If you use other people’s work or ideas in your assignment, it must be properly referenced, using
the HARVARD referencing system, in your text or any bibliography. Otherwise, you’ll be found
guilty of committing plagiarism.
9. If you are caught plagiarising, your grade will be reduced to a REFERRAL or at worst, you could
be excluded from the course.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to
copy another’s work.
1. I know that plagiarism is a punishable offence because it constitutes theft.
2. I understand the plagiarism and copying policy of Edexcel UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Edexcel UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.
Student’s Signature:
(Provide E-mail ID)
Date:
(Provide Submission Date)
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Higher National Diploma in Business
Assignment Brief
Student Name /ID Number
Unit Number and Title
Unit 2: Networking
Academic Year
2017/18
Unit Tutor
LAN Design & Implementation for Enclave Films Company
Assignment Title
Issue Date
Submission Date
IV Name & Date
Submission format
The submission is in the form of an individual written report. This should be written in a concise,
formal business style using single spacing and font size 12. You are required to make use of headings,
paragraphs and subsections as appropriate, and all work must be supported with research and
referenced using the Harvard referencing system. Please also provide an end list of references using
the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures
Unit Learning Outcomes:
LO1 Examine networking principles and their protocols.
Address P1, P2, M1, D1
LO2 Explain networking devices and operations.
Address P3, P4, M2, D1
LO3 Design efficient networked systems.
Address P5, P6, M3, D2
LO4 Implement and diagnose networked systems.
Address P7, P8, M4, D3
Assignment Brief and Guidance:
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
You are the newly recruited Network Engineer of an eminent movie company called
Enclave Films. This company composes movies and delivers high quality video to
make it download through VividZone company website. The original movie
company management has decided to consolidate the contract with VividZone by
adding more efficient staff and appliances.
Enclave Films is in building B and the web team is positioned in the same building
while majority of the administration, sales, accounts and management functions are
supported in building A. Both buildings are located in the same premises. Movie
company plans to aggregate all their staff and resources in one building. Therefore,
when adjacent office space becomes available in building A, these groups will be
accommodated together. Building A has a reception and a customer area as well.
About the Network
The branch network of Enclave Films has grown without proper planning. The LAN
cabling in both offices is Cat5e Ethernet. The office complex provides an Ethernet
link between the two buildings. Because of the recent acquisition of VividZone, the
addressing and naming of the network are inconsistent.
The combined network infrastructure has not been optimized or redesigned. It is a
flat network design with minimal redundancy. A small wireless LAN is used
occasionally by few project managers with laptops and the guests at Building B.
Movie company believes that the WLAN may be used frequently since mobile and
contract employees of VividZone will require network access.
Remote access to Enclave Films network is provided through an ADSL internet link
terminating in Building A. Currently there are two sets of Enclave Films staff onsite
at the stadium in building A. The VividZone provides them office space in their
management offices.
The current network equipment includes:
a) Two routers
b) Three switches
c) One network and business server
d) One wireless router
e) One ADSL modem
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
The current network has TWO VLANs.
f) The General VLAN in building A serves the general office and managers, including
reception, accounts, and administration. It consists of 12 PCs and 02 printers.
g) The Production VLAN in building B serves the production suites and provides
networking for the media development and storage. It consists of 09 high-performance
workstations, 05 office PCs, and 02 printers.
The Management expects to enhance the network based on following major
criteria:
h) Data traffic expected to increase by 80%
i) Possibly consider connecting directly to the VividZone network; must be a fast and
reliable connection
j) High network availability with redundant links and technology
k) Wireless network access at the stadium and at Building A and Building B
l) QoS to support video applications
m) High network reliability with network monitoring and security
LO1 Examine networking principles and their protocols
Task 1.1 (P1)
a) Discuss the benefits and constraints of different network types and standards.
b) Explain the benefits & constraints of current network solution including
bandwidth & effectiveness of the networking system.
Task 1.2
a) What is a topology? Give a brief introduction about Logical and Physical
topologies including examples. (P2)
b) Identify what are the most suitable Logical & Physical topologies for the
given scenario. (D1)
Task 1.3
Identify the protocol structure models available in networking & briefly explain
how they work with comparisons. (M1)
Task 1.4
Define the protocols, their functions and identify the suitable protocols for the
given scenario. Explain for your selection. (D1)
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
LO2 Explain networking devices and operations
Task 2.1
Identify the current network equipment’s (devices) which have been used and
discuss the functionality of each device related to the given scenario. Justify your
choice of devices for this network design. (P3)
Task 2.2
Discuss the interdependence of workstation hardware with relevant networking
software. (P4)
Task 2.3 (M2)
a) How should you select a server/s for a network? Explain the techniques to
be followed by?
b) Identify the server types suitable for the given scenario. Justify your selection
considering cost and performance optimization.
LO3 Design efficient networked systems
Task 3.1 (P5)
a) Prepare a written step-by-step plan of how you are going to design a
Local Area Network including a blueprint of your LAN.
b) Justify the security requirements and quality of services needed for
selection of accessories
Task 3.2 (P5)
a) Design a networked system to meet a given specification by using packet
tracer software
b) Find the IP addresses allocated for the two VLANs in given scenario.
(General VLAN & Production VLAN).
c) Network IP
d) Gateway
e) Hosts (Dynamic & Static)
Task 3.3
Install & configure network services and applications of your choice. (M3)
Task 3.4
Conduct a test and evaluate the design to meet the requirements and analyse user
feedback. (P6)
Task 3.5
Suggest a maintenance schedule to support the networked system. (D2)
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
LO4 Implement and diagnose networked systems
Task 4.1
Implement a networked system based on your prepared design. (P7)
Task 4.2
Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc.
Record the test results and analyze these against expected results. (P8)
Task 4.3
Investigate what functionalities would allow the system to support device growth
and the addition of communication devices. (M4)
Task 4.4
Use critical reflection to evaluate own work and justify valid conclusions beyond the
given specification. (D3)
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Grading Rubric
Grading Criteria
Achieved
Feedback
LO1 : Examine networking principles and their protocols.
P1
Achieved
Student has discussed the benefits & constraints of different
network types & standards
Achieved
Student has explained the impact of network topology,
Discuss the benefits and constraints of different network types
and standards.
P2
communication and bandwidth requirements
Explain the impact of network topology, communication and
bandwidth requirements.
Achieved
M1
Student has compared common networking principles
and how protocols enable the effectiveness of
networked systems
Compare common networking principles and how protocols
enable the effectiveness of networked systems.
LO2 : Explain networking devices and operations
Achieved
P3
Discuss the operating principles of networking devices and
Student has discussed the operating principles of
networking devices and server types.
server types.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
P4
Achieved
Learners has discussed the inter-dependence of workstation
hardware with relevant networking software
Achieved
Learners has explored a range of server types and justify the
selection of a server, considering a given scenario regarding
cost and performance optimization.
Discuss the inter-dependence of workstation hardware with
relevant networking software.
M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.
LO 1 & LO2
Achieved
D1
Considering a given scenario, identify the topology protocol
selected for the efficient utilization of a networking system.
Student has considered a given scenario, identify the
topology protocol selected for the efficient utilization of a
networking system.
LO3 : Design efficient networked systems
P5
Achieved
Student has designed a networked system to meet a given
specification
Achieved
Student has tested and evaluate the design to meet the
requirements and analyze user feedback.
Achieved
Learners has installed and configure network services and
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
applications on your choice.
Install and configure network services and applications on your
choice.
Achieved
D2
Design a maintenance schedule to support the networked
Student has designed a maintenance schedule to support the
networked system.
system.
LO4 : Implement and diagnose networked systems
P7
Achieved
Student has Implemented a networked system based on a
prepared design
Achieved
Learners has Document and analyze test results against
expected results
Achieved
Leaners has Recommend potential enhancements for the
networked systems.
Achieved
Student has Use critical reflection to evaluate own work and
justify valid conclusions.
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Table of Contents
Task 1.1 (P1) ............................................................................................................................. 19
a)
Discuss the benefits and constraints of different network types and standards. ........ 19
Local Area network (LAN) ........................................................................................................ 19
Metropolitan Area network (MAN) ......................................................................................... 19
Wide Area network (WAN) ...................................................................................................... 19
b) Explain the benefits & constraints of current network solution including bandwidth &
effectiveness of the networking system. ............................................................................. 20
VLAN ......................................................................................................................................... 20
Benefits of VLAN: ................................................................................................................. 20
Using flat network ................................................................................................................ 21
Cat5e cable ........................................................................................................................... 21
Ethernet ............................................................................................................................... 21
Task 1.2 .................................................................................................................................... 22
a) What is a topology? Give a brief introduction about Logical and Physical topologies
including examples. (P2) ...................................................................................................... 22
Topology. .............................................................................................................................. 22
Bus topology......................................................................................................................... 22
Ring topology ....................................................................................................................... 23
Star topology ........................................................................................................................ 24
Tree topology ....................................................................................................................... 24
Mash topology ..................................................................................................................... 25
Hybrid topology.................................................................................................................... 26
Different types of logical topologies. ................................................................................... 26
Ethernet ............................................................................................................................... 26
Virtual LAN ........................................................................................................................... 27
Token ring. ........................................................................................................................... 27
b) Identify what are the most suitable Logical & Physical topologies for the given
scenario. (D1) ....................................................................................................................... 27
Task 1.3 .................................................................................................................................... 28
a) Identify the protocol structure models available in networking & briefly explain how
they work with comparisons. (M1) ...................................................................................... 28
OSI Model ............................................................................................................................. 28
Physical layer ........................................................................................................................ 29
Data link layer ...................................................................................................................... 29
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Networking layer .................................................................................................................. 30
Transport layer ..................................................................................................................... 30
Session layer ........................................................................................................................ 31
Presentation layer ................................................................................................................ 31
Application layer .................................................................................................................. 32
Data Encapsulation. ............................................................................................................. 32
TCP/IP ................................................................................................................................... 32
First TCP/IP network model ................................................................................................. 32
Application ........................................................................................................................... 32
Transport .............................................................................................................................. 33
Network................................................................................................................................ 33
Link layer .............................................................................................................................. 33
Standard ................................................................................................................................... 33
Task 1.4 .................................................................................................................................... 34
Define the protocols, their functions and identify the suitable protocols for the given
scenario. Explain for your selection. (D1) ............................................................................ 34
1.OSI 7 layer model .............................................................................................................. 34
TCP/IP layer .......................................................................................................................... 35
Task 2.1 .................................................................................................................................... 36
Identify the current network equipments (devices) which have been used and discuss the
functionality of each device related to the given scenario. Justify your choice of devices
forthis network design. (P3) ................................................................................................ 36
Sever ......................................................................................................................................... 36
2.Switches ............................................................................................................................ 37
3.Routers .............................................................................................................................. 37
4.ADSL modem ..................................................................................................................... 37
5.Wairless router.................................................................................................................. 37
Task 2.2 .................................................................................................................................... 38
Discuss the interdependence of workstation hardware with relevant networking software.
(P4) ....................................................................................................................................... 38
Task 2.3 (M2) ............................................................................................................................ 38
How should you select a server/s for a network? Explain the techniques to be followed
by? ........................................................................................................................................ 38
Identify the server types suitable for the given scenario. Justify your selection considering
cost and performance optimization. ................................................................................... 38
Task 3.1 (P5) ............................................................................................................................. 39
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Prepare a written step-by-step plan of how you are going to design a Local Area Network
including a blueprint of your LAN. ....................................................................................... 39
Task 3.2 (P5) ............................................................................................................................. 44
Design a networked system to meet a given specification by using packet tracer software
.............................................................................................................................................. 44
Find the IP addresses allocated for the two VLANs in given scenario. (General VLAN &
Production VLAN)................................................................................................................. 45
Task 3.4 .................................................................................................................................... 48
Conduct a test and evaluate the design to meet the requirements and analyze user
feedback. (P6) ...................................................................................................................... 48
Task 3.5 .................................................................................................................................... 50
Suggest a maintenance schedule to support the networked system. (D2) ......................... 50
Task 4.1 .................................................................................................................................... 51
Implement a networked system based on your prepared design. (P7) .............................. 51
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Task 1.1 (P1)
a) Discuss the benefits and constraints of different network types and standards.
Local Area network (LAN)
A computer network that spans a relatively small area. Most LAN are confined to a single
building or group of buildings. However, one LAN can be connecting to other LANs over
any distance via telephone line and radio waves. A system of LANs connected in this way is
called wide – area network (WAN).
Most LANs connect workstations and personal computers. Each node (individual computer)
in a LAN has its own CPU with which it executes programs bit it also able to access data and
devise anywhere on the LAN. This means that many users can share expensive devices such
as laser printers as well as data. Users can also use the LAN to communicate with each other
by sending e-mail or engaging in chat sessions.
There are many different types of LANs Ethernet being the most common of PCs. Most
Apple Macintosh networks are based on Apple’s Apple talk network system which is built
into Macintosh computers.
LANs are capable of transmitting data at very fast rates much faster than data can be
transmitted over a telephone line but the distances are limited and there is also a limit on the
number of computer that can be attached to a single LAN.
Metropolitan Area network (MAN)
Short for Metropolitan area network a data network designed for a town or city. In terms of
geographic breadth MANs are lager then local area networks(LANs) but smaller than wide
area network (WANs). MANs are usually characterized by very high –speed connections
using fiber optical cable or other digital media.
Wide Area network (WAN)
A computers network that spans a relatively large geographical area. Typically, a WAN
consists of two or more local area networks(LANS).
Computers connected to a wide area network are often connected through public networks
such as the telephone system. They can also be connected through leased lines or satellites.
The largest WAN in existence is the internet.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
b) Explain the benefits & constraints of current network solution including
bandwidth & effectiveness of the networking system.
VLAN
In the current network solution VLAN is used. In traditional LAN workstations are connected
to each other by means of a hub or a repeater. These devices propagate any incoming data
throughout the network. However, if two people attempt to send information at the same time
a collection will occur and all the transmitted data will be lost. VLAN’s allow network
manager to logically segment a LAN into different domains. Since this is a logical
segmentation and a physical one workstations do not have to be physically located together.
Users on different floors of the same building or even in different buildings can now belong
to the same LAN.VLAN’s also allow broadcast domains to be defined without using routers.
Bridging software is used instead to define which workstations are to be in the broadcast
domain. Routers would only have to be used to communicate between two VLAN’s.
Benefits of VLAN:

Performance
In network where traffic consists of a high percentage of broadcasts and
multicasts VLAN’s can reduce the need to send such traffic to unnecessary
destinations. The use of VLAN’s reduces the number of routers needed since
VLAN’s create broadcast domains using switches instead of routers.

Simplified Administration
Seventy percent of network cost are a result of adds, moves, and changes of
users in the network. Every time user is moved a LAN, recalling, new station
addressing and reconfiguration of hubs and routers become necessary.
Some of these tasks can be simplified with the use of VLAN’s. If a user is
moved within a VLAN reconfiguration routers is unnecessary. In addition,
depending on the type of VLAN other administrative work can be reduced or
eliminated.

Reduced cost
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
VLAN’s can be used to create broadcast domains which eliminate the need for
expensive routers.

Security
Periodically sensitive data may be broadcast on a network. In such cases
placing only those users who can have access to that data on a VLAN can
reduce the chances of an outsider gaining access the data. VLAN’s can also be
control broadcast domains, set up firewalls, restrict access and inform the
manager of an intrusion.
Using flat network
A network in which all stations can reach other without going through any
intermediary hardware devices such as a brig or router. A flat network is a network
segment. Large network is broken into segments for security purposes as well as to
improve traffic within departments and workgroups.

Benefits of flat network

Reduce cost

Flat network reduces the cost of maintenance and administration.
Cat5e cable
The category 5 e cable an enhanced version of cat 5 adheres to more stringent
standards specified by TIA/ELA568C.2 and ICE 6063030-7-4. These cables are made
using 24-gauge (AWG)copper wires with about three twists per inch enabling them to
transmission data at 1000 Mbps with a frequency of 100 MHz’s.

Benefits of cat5e cable

Low cost in implement.

Faster than cat5 cables.

Cat 5e cables have capability of backwards compatible.
Ethernet
Ethernet a physical layer local area network(LAN)technology. It is nearly 30 years
old. In the last three decades it has become the most widely used LAN technology
because of its speed, low cost and relative ease of installation. This is combined with
wide computer market acceptance and the ability to support the majority if network
protocols.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615

Benefits of Ethernet

Low cost in implementing.

High speed
Task 1.2
a) What is a topology? Give a brief introduction about Logical and Physical
topologies including examples. (P2)
Topology.

Network topologies describe the way in which the elements of a network are mapped.
They describe the physical and logical arrangement of the network nodes. The
physical topology of a network refers to the configuration of cables, computers and
other peripherals.

Different types of Physical topologies

Bus topology.

Star topology.

Ring topology.

Mesh topology.

Tree topology.

Hybrid topology.
Bus topology


Advantages of Bus topology

It is cheap, easy handle and implement.

Require less cable.

It is best suited for small networks.
Disadvantages of Bus topology
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615

The cable length is limited. This limits the number of stations that can
be connected.

This network topology can perform well only for a limited number of
nodes.
Ring topology
In a ring network every device has exactly two neighbors for communication purposes.

All messages travel through a ring in the same direction.

A failure in any cable or device breaks the loop and can take down the entire
network.

To implement a ring network, we use the token ring technology.

A token or small data packet is continuously passed around the network.
When a device need to transmit it reserves the token for the next trip around
then attaches its data packet to it.

Advantage of ring topology:

Very orderly network where every device has access to the token and the
opportunity to transmit.


Good communication over long distances.

Handles high volume of traffic.
Disadvantages of ring topology
 The failure of a single node of the network can cause the entire network to fail.
 The movement or changes made to network nodes affects the performance of
the entire network.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Star topology

In a star network each node is connected to a central device called a hub.

The hub takes a signal that come from any node and passes it along to all the
other nodes in the network.

Data on a star network passes through the hub, switch or concentrator before
continuing to its destination.

The star topology reduces the chance of network failure by connecting all of
the systems to a central node.


Advantages of star topology

Easy to manage.

Easy to locate problems.

Easier to install and wire.

Easy to detect faults and remove parts.
Disadvantages of star topology

Requires more cable length then a linear topology.

If the hub or concentrator fails nodes attached are disabled.

More expensive because of the cost of the concentrators.
Tree topology
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
A tree topology can be viewed as a collection of star networks arranged in a hierarchy.

Tis tree has individual peripheral nods which are required to transmit to and
receive from one other only and are not requested to act as repeaters
or
regenerators.

The tree topology arranges links and nodes into distinct hierarchies in order to
allow greater control and easier troubleshooting.

This is particularly helpful for colleges, universities and schools so that each
of the connect the big network in some way.

Advantages of a tree topology:
 Point to point writing for individual segments.
 Supported by several hardware and software vendors.
 All the computers have access to the larger and their immediate
networks.

Disadvantages of tree topology:

Overall length of each segment is limited by the type of cabling used.

If the backbone line breaks the entire segment goes down.

More difficult to configure and wire than other topologies.
Mash topology
In this topology each node is connected to every other node is the network.

Implementing the mesh topology is expensive and difficult.

In this type of network each node may send message to destination through
multiple paths.

While the data in travelling on the mesh network it is automatically configured
to reach the destination by taking the shortest route which means the least
number of hops.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615

Advantages of mesh topology:

No traffic problem as their dedicated links.

It has multiple links so if any router is blocked then other router can be
use.


Points to point link make fault identification easy.
Disadvantages of mash topology:

There is mash of wiring which can be difficult to manage.

Installation is complex as each node is connected to every node.

Cabling cost is high.
Hybrid topology.

A combination of any two or more network topologies

A hybrid topology always accrues when two different basic network
topologies are connected.

It is a mixture of above mentioned topologies. Usually a central computer
is attached with sub-controllers which in turn participate in a variety of
topologies.


Advantages of a hybrid topology:

It is extremely flexible.

It is very reliable.
Disadvantages of a hybrid topology

Expensive.
Different types of logical topologies.
 Ethernet.

Virtual LAN.

Token ring.
Ethernet
A local area network (LAN) protocol developed by Xerox cooperation in cooperation with
DEC and Intel in 1976. Ethernet use a bus or star topology or star topology and supports
data transfer rates of 10 Mbps. The Ethernet specification served as the basis for IEEE 802.3
standard which specifies the physical and lower software layers. Ethernet uses the
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
CSMA/CD access method to handle simultaneous demands and one of the most widely
implemented LAN standards. It is one of the most widely implemented LAN standards.
Virtual LAN
A virtual local area network(VLAN) is a logical group of workstations, sever and network
devices that appear to be on the same LAN despite their geographical distribution. A VLAN
allows a network of computers and users to communication in a simulated environment as if
they exist in a signal LAN and are sharing a signal broadcast and multicast domain. VLANs
are implemented to achieve scalability, security and ease of network management and can
quickly adapt to changes in network requirements and relocation of workstations and sever
nodes.

Advantages of VLAN

Allowing network administrators to apply additional security to network
communication.

Making expansion and relocation of a network of a network device easier.

Provide flexibility because administrators are able to configure in a centralized
environment while the devices might be located in different geographical locations.

Disadvantages of VLAN

High risk of virus issues because on infected system may spread a virus through the
whole logical network.

Equipment limitation in very lager networks because additional routers might be
needed to control the workload.

More effective at controlling latency than a WAN, but less efficient than a LAN.
Token ring.
Token ring network use the token passing access method, which is based on a small frame
called a token that circulates a ring shaped media in a logical direction when devices are
idle. To transmit the device must seize the token.
b) Identify what are the most suitable Logical & Physical topologies for the given
scenario. (D1)
This network is in two buildings and each building every flow should have to connect to the
network and also the two buildings should connect to it. There is one sever in this network
through the switchers and the routers all the terminals should have to connect to the sever.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Why are the star topologies suitable?
In ring topology it is using peer level computers to connect the network in this network
there is workstation computers and servers to inter connect them ring topology suitable. Bus
topology has limited cable limit this is a network in two buildings because the limitation of
cabal Bus topology can’t use to this network. Mesh and hybrid topologies can be use but it
is an unnecessary coast.
Ethernet is the logically suitable to this network this is a LAN and it is spared in two
buildings only Ethernet is capable to give severs to that much big network.
Task 1.3
a) Identify the protocol structure models available in networking & briefly explain
how they work with comparisons. (M1)
OSI Model
In 1984 International Organization for Standardization developed this model. This model is
very help full to troubleshooting in network problems. OSI model provide a good
foundation to categorize and analyze the network issues. In this model there are 7 layers.
T
r
a
n
s
m
i
t
D
a
t
a
User
7.Application Layer
6.Presentation Layer
5.Session Layer
4. Transport Layer
3.Network Layer
2.Data Link Layer
1.Physical layer
Physical Link
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
R
e
c
i
c
e
D
a
t
a
lOMoARcPSD|15378615
Physical layer
Patch penal
Hub and
Device
Wall jack
The physical layer of the OSI model defines connector and interface specifications
as well
as the medium requirements.
Components of the physical layer:

Cabling system components.

Adapters that connect media to physical interfaces.

Connector design and pin assignments.

Hub, Repeater and patch panel specifications.

Wireless system components.

Parallel SCSI.

Network interface card(NIC).
In a LAN environment cat5e cabala is generally used for the physical layer for individual
device connections. The physical layer of the OSI model is only part of a LAN.
Data link layer
Ethernet switch
A,B,
C,D,
Sever
AB
C
D
E
F
The second layer of the OSI model provides following functions:
 Allows a device to access the network to send and receive messages.

Offers a physical address so a device’s data can be sent on the network.

Works with a device’s networking software when sending and
receiving messages.

Provides error-detection capability.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Common networking components that function at data link layer:

Network interface cards.

Ethernet and token ring switches.

Bridges.
Networking layer
Layer3
Subnet1
addressing
Subnet3
Subnet2
LAN
LAN
router
Layer3
WAN
Layer3
addressing router
Addressing
In this data link layer of OSI model provide an end to end logical addressing system so that
a packet of data can be routed across several layers 2 networks (Ethernet, Token Ring,
Frame relay and etc).
Transport layer
Network
User
Sever
The transport layer of the OSI model offers end to end communication between end devices
through a network. It depending on the application the transport layer either offers reliable
connection oriented or connectionless best-effort communication.
Some of the function offered by the transport layer:

Application identification.

Client-side entity identification.

Confirmation that the entire message arrived intact.

Segmentation of data for network transport.

Control of data flow to prevent memory overruns.

Transmission error detection.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Session layer
Data 96
net
wor
User devise
Fill sever
Ok got 96
Session layer provides various services including tracking number of bytes that each end of
the session has acknowledged receiving from the other end of the session. This session layer
allows application functioning on devices to establish, manage and terminate a dialog
through a network.
Session layer functionality includes:

Virtual connection between application entities.

Synchronization of data flow.

Creation of dialog units.

Connection parameter negotiations.

Partitioning of services into functional groups.
Presentation layer
netwo
rk
Encrypt
data
Decrypt
data
The presentation layer, is responsible for how an application formers the data to be sent out
onto the network. Presentation layer basically allows an application to read the message.
Presentation layer functionality include:

Encryption and decryption of a message for security.

Compression and expansion of a message so that it travels efficiently.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615

Graphics formatting.

Content transmitting.

System specific translation.
Application layer
Web browser,
email, FTP
Application layer provides an interface for the end user operating a device connected to a
network. This layer is what the user sees in terms of loading an application that is this
application layer is the data the user views while using these applications.
Application layer functionality:

Support for file transfers.

Ability to print on a network.

Electronic messaging.

Browsing the world wide web.
Data Encapsulation.
Data encapsulation is an object-oriented programming concept that bind a group of related
properties, functions and other members are treated as a single unit. Class is the best
example of data encapsulation. It sometimes referred to as data hiding that prevents the user
to access the implementation details.
TCP/IP
TCP/IP is the protocol that build internet in 1969 by the department of defense conceived it.
This is older than Ethernet. TCP/IP is based on four layers it is similar to ISO model. There
are two version of this method
First TCP/IP network model
Application
This protocols provide service to run the application software on PC or Server such as
HTTP,FTP,SMTP,POP and more. It defines services that application need.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Transport
Transport layer where the data gets segmented based on TCP or UDP port numbers and IP
Addresses, together “IP-Address:” called “TCP socket or UDP socket.
Network
In network layer packaged get IP packets and it includes major protocols. community it us
internet protocol(IP).
Link layer
This is where IP packets get framed and it is where the last piece of software control
protocol can be applied on the data before it can handled as frame to hardware layer for bit
transmission.
In second version physical layer added.
Standard
In 1985 the computer society of the IEEE started project 802. This Project is not replace for
the ISO model or the TCP/IP model.it specifying the functions of the physical layer and the
data link layer of major LAN protocols. The IEEE divided in to two sub layers logistic link
control (LLC) and media access control (MAC).It also have several physical layers standard
to different LAN protocols.
IEEE 802
LAN/MAN
IEEE802.1
Standards for LAN/MAN bridging and management and remote
media access control (MAC) bridging.
IEEE802.2
Standards for
Logical
link Control
(LLC)
standards
for
connectivity.
IEEE802.3
Ethernet standards for carrier sense multiple access with collision
detection (CSMA/CD).
IEEE802.4
Standards for token passing bus access.
IEEE802.24
Standards for logical link control (LLC) standards for connectivity.
IEEE802.5
Standards for token ring access and for communication between
LANs and MANs
IEEE802.6
Standards for information exchange between systems.
IEEE802.7
Standards for broadband LAN cabling.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
IEEE802.8
Fiber optical connection .
IEEE802.9
Standards for integrated services ,like voice and data.
IEEE802.10
Standards for LAN/MAN security implements.
IEEE802.11
Wireless networking (WiFi) .
IEEE802.12
Standards for demand priority access method.
IEEE802.14
Standards for cable television broadband communications.
IEEE802.15.1
Bluetooth
IEEE802.15.4
Wireless sensor/control network.
IEEE802.15.6
Wireless body area network (BAN).
IEEE802.16
Wireless networking-“WIMAX”
Task 1.4
Define the protocols, their functions and identify the suitable protocols for the given
scenario. Explain for your selection. (D1)
1.OSI 7 layer model
Open system interconnection (OSI) model has 7 layers each layer has clear
characteristics.

Application layer(functions).
Defines interface to user processes for communication and data transfer in network .
Provides standardized services such as virtual terminal file and job transfer and
operations.

Presentation layer(functions)
Masks the differences of data formats between dissimilar systems.
Specifies architecture independent data transfer format.
Encodes and decodes data encrypts and decrypts data compresses and decompresses
data.

Session layer(function)
Manages user sessions and dialogues.
Controls establishment and termination of logic links between users .
Repots upper layer errors.

Transport layer(function)
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Manages end to end message delivery in network.
Provides reliable and sequential packet delivery through error recovery and flow control
mechanisms.
Provides connectionless oriented packet delivery.

Network layer(function)
Determines how data are transferred between network devices.
Routes packet according to unique network device addresses.
Provides flow and congestion control to prevent network resource depletion.

Data link layer(function)
Defines procedures for operating the communication links.
Frames packets.
Detects and corrects packets transmit errors.

Physical layer(function)
Defines physical means of sending data over network devices.
Interfaces between network medium and devices.
Defines optical, electrical and mechanical characteristics.
TCP/IP layer
The TCP/IP layer model has 4 layers functions of each layer is described below

Application layer
The application layer in TCP/IP model the functions of OSI application presentation
layer and session layer. Therefore, any process above the transport layers called an
application in the TCP/IP architecture.in TCP/IP socket and port are used to describe the
path over which application communicate. Most application level protocols are
associated with one or more port number.

Transport layer
In TCP/IP architecture there are two transport layer protocols . the transmutation control
protocol (TCP) guarantees information transmission. The user Datagram protocol (UDP)
transports datagram without end to end reliability checking. Broth protocols are useful
for different applications.

Network layer
The internet protocol(IP) is the primary in the TCP/IP network layer. All upper and
lower layer communications must travel through IP as they are passed through the
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
TCP/IP protocols in the network layer such as ICMP to
facilitate and manage the
routing process.

Network access layer
In the TCP/IP architecture the data link layer and physical layer are normally group
together to become the network access layer. TCP/IP makes use of existing its own.
Many RFCs describe how IP utilizes and interfaces with the existing data link protocols
such as Ethernet, Token ring, FDDI, HSSI and ATM.
The OSI model is the best protocol to this network.
Task 2.1
Identify the current network equipments (devices) which have been used and discuss
the functionality of each device related to the given scenario. Justify your choice of
devices forthis network design. (P3)
Sever

What is a server?
Sever is a computer that build to prosses and deliver the data to other client computes
over the local network or the internet. This computer has high performances and lager
scale of storage capacity. In this computers software are specially diced of the severs.
Common types of severs:

Webserver
This types of severs are build to show web pagers and run apps in connecting web
browsers. Web server are used for all sorts of things in addition to delivering
simple text and imagers like for uploading and backing up files online through a
cloud storage or online backup severs.

Email severs
This severs are using to send and receiving of massagers. If you have an email
client on your computer the software is connecting to an IMAP or POP email
sever to download your computer and SMTP server to send messages back
through the email sever.

FTP severs
FTP server supports the moving of files through File Transfer protocol tools.
FTP severs are accessible remotely via FTP client programs.

Identity severs
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Identity sever is logins and security roles for authorized users.
Hundreds of different types of specialized sever types support computer networks.
Apart form the common corporate types home users often interface with online
game severs chat servers audio streaming services and etc.
2.Switches
Switch is a hardware devise that centralized communication among multiple Connected
devices within one local area network(LAN). It is work like hub it is the Connectivity point
to Ethernet network. Switches only forward the port that connects to the destination device.
It knows MAC address and it match the MAC address in the date it receives. Fully switched
network is dedicated segment for each devise is connected to switch. In this network they
use many terminals. By the switches connect that terminals in to the network.
3.Routers
Router is a electronic devise that join multiple computers network together via
either
wired or wireless connection. It creates lager networks by joining two networks segments.
Routers dedicated hardware devise or computer systems with more than one network
interface and routing software. Given network there are two buildings routers are joining
that two networks.
4.ADSL modem
Modem is a modulator/demodulator it convent digital signal generated by computer into
analog signals that can travel over conventional phone line. Modems are connected to SIP
and it dialing up to a LAN. Modems need internal add-in expansion card or external devices
connect to serial or USB port(PCMCIA cards for laptop).ADSL modem is use to connect
internet in this network.
5.Wairless router
This is the devices that provide connectivity between warless LAN devices and in
most
cases a wired network. It converts signal from radio wave or other to that used on the LANs.
Warless router provides the connectivity between the devices that are not provide Cable to
connect the network.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Task 2.2
Discuss the interdependence of workstation hardware with relevant networking
software. (P4)
Sever 2016 has installed to the all workstations.
Task 2.3 (M2)
How should you select a server/s for a network? Explain the techniques to be followed
by?
When select a sever there are few things how to select it
1.What is the load put in to the sever?
When the sever implement to a network the first thing that we should look is this. The
load mining of this is what kind of software run in the sever and how much workload
should press in the sever. Considering it sever should have to select.
2.How many client devises connect to the sever and their performance?
Second thing is the devises and their performance if there are very few devises and low
performing devises normal sever can be select but the devises or performance of the
devises are high the sever should be select in high performing sever.
Identify the server types suitable for the given scenario. Justify your selection
considering cost and performance optimization.
The sever type is given scenario is the networking and business management sever. In
this scenario company has implement a sever that use to manage network and the
business. Sever is a computer design to presses request and deliver the data to client
computers over a local network or the internet.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
LO3 Design efficient networked systems
Task 3.1 (P5)
Prepare a written step-by-step plan of how you are going to design a Local Area
Network including a blueprint of your LAN.
1step
Gather the requests that need to the costumer.
2step
Study the building and categories the departments.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
3step
Implement the network workstations, PC and sever separate to each department and
configure each pc giving IP address.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
4step
Implementing the network devises to the department to connect pc in department.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
5step
Set up the connection of two VLAN of each buildings and connect the pc in each
department to the switch and switches connect in to the routers.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
6step
Building the connection among the two buildings.
7step
Configure the devices connection.
a) Justify the security requirements and quality of services needed for selection
of accessories
This network access to internet and it is a risk because of that a ASA security devise
implement to this network as a fire wall. The other thing is the pc and other devises that
are in the network through that devises an attack can be spared in the network but the
security devise filters all the threats before reach to the network. All the other
accessories implement to this network to improve the speed and high capacity data
transfer.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Task 3.2 (P5)
Design a networked system to meet a given specification by using packet tracer
software
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Find the IP addresses allocated for the two VLANs in given scenario. (General VLAN & Production VLAN).
VLAN / Type
Departmen
IP addresses
Laptops
Printers
Project
PC
ons
t / Room
Production/ VLAN 3
Workstati
168.192.0.0
3
0
0
0
IP address
Subnet
range
mask
168.192.0.
255.255.0.0
managers
0-
room
168.192.0.
3
Production /VLAN2
Sever
191.168.0.1
0
0
0
0
191.168.0.
255.255.0.0
1-
room
191.168.0.
2
Production /VLAN 2
Storage
166.160.0.1
0
1
0
5
166.160.0.
255.255.0.0
1166.160.0.
5
Production / VLAN 2
Media
128.168.1.1
0
1
9
0
128.168.1.
255.255.0.0
1-
department
128.168.1.
9
General / VLAN 1
General
191.126.1.1
1
office
2
191.126.1
.1-
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
255.255.0.0
lOMoARcPSD|15378615
191.126.1
.3
General / VALN 1
Managers
2
121.126.1.1
121.126.1.
255.255.0.0
1-
office
121.126.1.
3
General / VLAN 1
Reception
1
126.121.1.1
126.121.1.
255.255.0.0
1
General / VLAN 1
Account
166.160.0.1
1
2
166.160.0.
255.255.0.0
1-
office
166.160.0.
3
General / VLAN 1
Administra
188.180.0.1
2
188.180.0.
1-
tion office
188.180.0.
2
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
255.255.0.0
lOMoARcPSD|15378615





Network IP
191.168.0.1
Gateway
126.168.0.1
Hosts (Dynamic & Static)
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Task 3.4
Conduct a test and evaluate the design to meet the requirements and analyze user
feedback. (P6)
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
6
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Task 3.5
Suggest a maintenance schedule to support the networked system. (D2)
When designing a maintenance schedule, it may can categorized in few parts.
Maintenance
Category
Person who maintain
Week of
the
month
1.
Sever
maintenance
1.Review system logs for errors and potential Network administrator.
First
problems.
week of
month.
2. Review service pack and hotfix installation
history.
3.Review service pack and hotfix installation
history.
4.Review hard disk usage and health reports.
5.Review system backup process and disaster
recovery status.
6.Review antivirus protection
2.Network
1.Document
network
maintenance
(hub/switches/routers).
devices Network technicians
Second
week of
month.
2.Review device configuration.
3.Review firewall configuration.
3.Workstation
1.Review disk usage.
Network manager
maintenance
Third
week of
2.Review hardware statistics.
3.Review hotfix and service pack install
history.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
mounth.
lOMoARcPSD|15378615
1. Network maintenance
Under the network maintenance:
Under the workstation maintenance
Task 4.1
Implement a networked system based on your prepared design. (P7)
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Task 4.2
Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc.
Record the test results and analyze these against expected results. (P8)
Ping
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Extended ping
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Trace route
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Task 4.3
Investigate what functionalities would allow the system to support device growth and
the addition of communication devices. (M4)
Adding Wi-Fi adapters to each pc and workstation.
By adding Wi-Fi adapters, we can communicate wireless method then we can remove the
cables and other network devises and by adding Wi-Fi routers we can communicate more fast
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
and it will be reducing the cost of cables and other network devices Adding one router to
building B by removing the switch.
By adding only one router to the building B as communication device will help to accurate
data transfer and enhanced the speed of the data transferring not only that it will also reduce
the cost of switchers. In building B have only 12 PCs and one router can have managed it.
Conclusion.
I have learned many things in networking.
What are the devices that are using in networking and have to use them what kind of
scenarios that we can use those devices. And how to build a fully function network.
To learn all those things help me or class teacher. He gives us every inch of knowledge in
networking subject. And I am thanking full to him to giving his fully support to make this
assignment.
References
(HND IN COMPUTING Unit 2 : Networking, 2000-2018; Placeholder1)
(Networking Fundamentals, 2006, p. 2)
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
lOMoARcPSD|15378615
Gannet chart.
Downloaded by Nishantha Mendis (bnsmeslk@gmail.com)
Download