Uploaded by sanduni mk

Unit 02 Networking Reworded 2021

advertisement
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title
BTEC Higher National Diploma in Computing
Assessor
Unit(s)
Assignment title
Internal Verifier
Unit 02:
Networking
LAN Design & Implementation for SYNTAX SOLUTIONS
Student’s name
Pass
List which assessment criteria
the Assessor has awarded.
Merit
Distinction
INTERNAL VERIFIER CHECKLIST
Do the assessment criteria awarded match
those shown in the assignment brief?
Y/N
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the
student work?
Y/N
Has the work been assessed
accurately?
Y/N
Is the feedback to the student:
Give details:
• Constructive?
• Linked to relevant assessment criteria?
• Identifying opportunities for
improved performance?
• Agreeing actions?
Y/N
Y/N
Y/N
Does the assessment decision need
amending?
Y/N
Y/N
Assessor signature
Date
Internal Verifier signature
Date
Programme Leader signature (if required)
Date
Confirm action completed
Page
1
Remedial action taken
Give details:
Assessor signature
Date
Internal Verifier
signature
Date
Programme Leader
signature (if required)
Date
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID
Unit Title
Unit 02:
Assignment Number
1
Assessor
01/01/2023
Date Received
1st submission
Submission Date
Networking
Date Received 2nd
submission
Re-submission Date
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction
Descripts
P1
P2
M1
LO2 Explain networking devices and operations.
Pass, Merit & Distinction
Descripts
P3
P4
M2
D1
P6
M3
D2
M4
D3
LO3 Design efficient networked systems.
Pass, Merit & Distinction
Descripts
P5
LO4 Implement and diagnose networked systems.
Pass, Merit & Distinction P7
P8
Descripts
Grade:
Assessor Signature:
Date:
Resubmission Feedback:
Grade:
Assessor Signature:
Date:
Internal Verifier’s Comments:
Page
2
Signature & Date:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades
decisions have been agreed at the assessment board.
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Page
3
Feedback: Student to Assessor
Assessor signature
Date
Student signature
Date
01/01/2023
Pearson Higher Nationals in
Computing
Page
4
Unit 02: Networking
Assignment 01
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous
page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
Word Processing Rules
1.
2.
3.
4.
The font size should be 12 point, and should be in the style of Time New Roman.
Use 1.5 line spacing. Left justify all paragraphs.
Ensure that all the headings are consistent in terms of the font size and font style.
Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Page
5
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the
before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then
be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.
1. I know that plagiarism is a punishable offence because it constitutes theft.
2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my own,
and where I have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.
Page
6
Student’s Signature:
Date:01/01/2023
(Provide Submission Date)
Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01
7
Page
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number
K.K.Sanduni Malsha Kumari /COL00126947
Unit Number and Title
Unit 2: Networking
Academic Year
2021/22
Unit Tutor
Assignment Title
LAN Design & Implementation for SYNTAX SOLUTIONS
Issue Date
Submission Date
01/01/2023
IV Name & Date
Submission format
The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
LO1 Examine networking principles and their protocols.
LO2 Explain networking devices and operations.
LO3 Design efficient networked systems.
Page
8
LO4 Implement and diagnose networked systems.
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
Assignment Brief and Guidance:
Scenario
SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The
Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They
are planning to make it one of the state-of-the-art companies in Matara with the latest facilities.
It is expected to have nearly 150 employees in Matara branch.
Department
Number of Users
Customer Care
10
Sales and Marketing
20
Finance
25
Legal
5
HR
10
Developers
55
Network Team
5
Server Room
Servers +ISP connections
Following requirements are given by the Management.

All the departments must be separated with unique subnet and should not
communicate with each other unless there is a special requirement .

192 . 168 . 10 . 0 / 24 is given and should be used for all the departments except the
Page
9
server room. IPs should assign using DHCP .

ERP and CRM Systems need to be implemented in Matara branch in local servers.

Number of servers required for the Server room need to be decided by the
Network designer and should be assigned with 10 . 254 . 1 . 0 / 24 subnet. ( Uses static
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
IPs )

High level of redundancy is expected in network design to eliminate s ingle point
of failures and traffic bottle necks.

Sales and Marketing Team need to access Network resources using WIFI
connectivity.

Proper methods for networking monitoring and troubleshooting need to be
established.

All possible network security mechanisms should be implemented.
Assume you have been appointed as the new network consultant of SYNTAX SOLUTIONS .
Prepare a network architectural design and implement i t with your suggestions and
recommendations to meet the company requirements.
( Note: Clearly state your assumptions. You are allowed to design the network according
to your assumptions, but main requirements should not be violated)
Activity 01

Discuss the benefits and constraints of different network system types that can be
implemented in the Matara branch and the main IEEE Ethernet standards that can
be used in above LAN and WLAN design.

Discuss the importance and impact of network topologies and
network protocol
suites while comparing the main network topologies and network protocol suites
that are used in network design using examples . Recommend suitable network
topologies and network protocol suites for above scenario and justify your answer
Page
10
with valid points.
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
Activity 02

Discuss the operating principles of network devices ( Ex: Router, Switch, Etc.)
and
server types that can be used for above scenario while exploring different servers
that are available
in today’ s market
with their
specifications .
Recommend
server/ servers for the above scenario and justify your selection with valid point s.

Discuss the inter- dependence of workstation hardware with networking software and
provide examples for networking software that can be used in above network design.
Activity 03

Prepare a written network design plan to meet the above mentioned user
requirements including a blueprint drawn using a modeling tool. (Ex: Microsoft
Visio, EdrawMax).
Support your answer by providing the VLAN and IP subnetting scheme for the
above scenario and the l ist of devices, network components and software used
to design the network for above scenario and while justifying your selections.

Test and evaluate the proposed design to meet the requirements and analyse
user feedback by using a User feedback form.

Install and configure Network services, devices and applications ( Ex: VLAN, DHCP,
DNS, Proxy, Web, Etc.) according to the proposed design to accomplish the user
requirements and design a detailed Maintenance schedule for above Network.
* Note: - Screen shots of Configuration scripts should be presented.
Activity 04
Page
11

Implement a networked system based on your prepared design with valid evidence s
and recommend potential future enhancements for the networked system with valid
justifications to your recommendations. Use critical reflection to critically evaluat e
the design, plan, configuration, and testing of your network while justifying with valid
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
conclusions.

Develop test cases and conduct verification ( Ex: Ping, extended ping, trace
route,
telnet, SSH, etc.) to test the above Network and analyse the test results against the
Page
12
expected results.
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
13
Page
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
Grading Rubric
Grading Criteria
Achieved
Feedback
LO1 : Examine networking principles and their protocols.
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.
P3
Page
14
LO2 : Explain networking devices and operations
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
Discuss the operating principles of networking devices and
server types.
P4
Discuss the inter-dependence of workstation hardware with
relevant networking software.
M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.
LO 1 & LO2
D1 Critically evaluate the topology protocol selected for a given
scenario to demonstrate the efficient utilisation of a networking
system.
LO3 : Design efficient networked systems
P5
Design a networked system to meet a given specification.
Page
15
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
M3
Install and configure network services and applications on your
choice.
D2
Design a maintenance schedule to support the networked
system.
LO4 : Implement and diagnose networked systems
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
Page
16
D3
Use critical reflection to evaluate own work and justify valid
conclusions.
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
Table of Contents
Activity 01 ............................................................................................................................................ 20
1.0
Computer Networks............................................................................................................ 20
1.0.1
Advantages of Computer Networks .......................................................................... 20
1.0.2
Disadvantages of Computer Networks ...................................................................... 21
1.1
Point to point network ........................................................................................................ 22
1.2
Multi point network ............................................................................................................ 22
1.3
Network Systems ................................................................................................................. 22
1.3.1
Peer to peer network ................................................................................................... 23
1.3.2
Client server network ................................................................................................. 24
1.3.3
Cloud network ............................................................................................................. 25
1.3.4
Personal Area Network............................................................................................... 27
1.3.5
Local area network ..................................................................................................... 29
1.3.6
Wireless Local area network ...................................................................................... 30
1.3.7
Wide Area Network .................................................................................................... 32
1.3.8
Metropolitan Area Network ....................................................................................... 34
1.4
2.0
2.1
2.2
IEEE Ethernet specifications ......................................................................................... 35
Network topology ................................................................................................................ 35
Physical Topology ........................................................................................................... 35
Logical Topology ................................................................................................................. 43
2.2.1
Ethernet ....................................................................................................................... 43
2.2.2
Fast Ethernet ............................................................................................................... 43
2.2.3
Gigabit Ethernet.......................................................................................................... 43
2.2.4
Bandwidth .................................................................................................................... 43
3.0
Network Protocols ............................................................................................................... 44
3.1
Layer Protocols ............................................................................................................... 44
3.2
Types of Protocols ........................................................................................................... 45
3.3
Network topology that is appropriate for syntax solutions ............................................. 46
Activity 2 .............................................................................................................................................. 46
Page
17
2.0
Network Devices .................................................................................................................. 46
2.0.1
Network Interface Card (NIC) .................................................................................. 46
2.0.2
Switch ........................................................................................................................... 47
2.0.3
Hubs ............................................................................................................................. 47
2.0.4
Repeaters ..................................................................................................................... 47
2.0.5
Bridges ......................................................................................................................... 48
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
2.0.6
Router........................................................................................................................... 48
2.0.7
Content filter ............................................................................................................... 49
2.0.8
Firewall ........................................................................................................................ 50
2.0.9
Access point ................................................................................................................. 50
2.0.10
Wireless router ............................................................................................................ 50
2.1
Networking Software .......................................................................................................... 50
2.1.1
Client software............................................................................................................. 50
2.1.2
Server Software ........................................................................................................... 51
2.2
2.2.1
2.3
2.3.1
Server Types ........................................................................................................................ 51
Server ........................................................................................................................... 51
Server selection for Syntax solution................................................................................... 52
Workstation ................................................................................................................. 52
Activity 3 .............................................................................................................................................. 53
3.1 IP address scheme ..................................................................................................................... 53
3.2 Feedback forum for Syntax Solution....................................................................................... 54
3.4
Software Used to the implementation................................................................................ 54
Activity 4 .............................................................................................................................................. 56
4.1 Implementation of the network ............................................................................................... 56
4.2 Test Cases .................................................................................................................................. 57
References ............................................................................................................................................ 60
Page
18
Table of Figures
Figure 1: Point to point network ........................................................................................................... 22
Figure 2:multipoint network ................................................................................................................. 22
Figure 3: Peer to peer network .............................................................................................................. 23
Figure 4:Client server network ............................................................................................................. 24
Figure 5:LAN Design .............................................................................................................................. 29
Figure 6:Wireless Local Area Network .................................................................................................. 30
Figure 7:Wide area network ................................................................................................................. 32
Figure 8:Metropolitan Area Network ................................................................................................... 34
Figure 9:Bus topology ........................................................................................................................... 36
Figure 10:Star topology ......................................................................................................................... 38
Figure 11:Tree Topology ....................................................................................................................... 40
Figure 12:Mesh Topology ..................................................................................................................... 41
Figure 13:Protocol Stack ....................................................................................................................... 44
Figure 14:Network Interface Card (NIC) ............................................................................................... 46
Figure 15:switch .................................................................................................................................... 47
Figure 16:Hubs ...................................................................................................................................... 47
Figure 17:Repeater................................................................................................................................ 48
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
Figure 18:Bridges .................................................................................................................................. 48
Figure 19:Router ................................................................................................................................... 49
Figure 20:Firewall.................................................................................................................................. 50
Figure 21:Feedback Forum ................................................................................................................... 54
Figure 22:Installing of Packet tracer ..................................................................................................... 54
Figure 23:Starting Packet tracer ........................................................................................................... 55
Figure 24:Registering netcad ................................................................................................................ 55
Figure 25:Registering using email ......................................................................................................... 56
Figure 26: Packet tracer interface ......................................................................................................... 56
Figure 27: Syntax solution Implementation .......................................................................................... 57
Figure 28:test case-ping ........................................................................................................................ 58
Figure 29:test case- ping -t.................................................................................................................... 59
Figure 30: test case - tracert ................................................................................................................. 59
Figure 31:test case- telnet.................................................................................................................... 60
Page
19
Table 1: Bridge vs router ....................................................................................................................... 48
Table 2: Hardware requrements for syntax solution ............................................................................ 52
Table 3: IP address scheme ................................................................................................................... 53
Table 4:Test cases ................................................................................................................................. 57
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
Activity 01
1.0 Computer Networks
A computer network is a setup that joins two or more computers together to share and transport
data. A system that connects two or more computing devices for the purpose of information
sharing and transmission is known as a computer network . (AWS, 2022)
1.0.1
Advantages of Computer Networks
1. Convenience of access
Exploring contemporary computer networks is simple. You will therefore find it simple to
connect, even if you are a child or a person who is new to technology .
2. Versatility
Here, versatility means that many individuals will be able to investigate various options in
accordance with their needs. Computer networks give you a variety of options for sharing a
specific piece of information for this purpose. Email or messaging services like WhatsApp are
two examples. There is therefore flexibility for various users .
3. Resource sharing with ease
A computer network's fundamental goal is to make it possible for its users to share resources.
You can make use of facilities like photocopy machines, scanners, and printers that can be
shared by several people. For large businesses, resource sharing is crucial because it allows
them to connect with their workforce through a single, shared network
4. Accessibility
No matter where a person is, computer networks enhance connectivity. As we communicate
with friends and coworkers via video call apps or Google docs in these testing times, we can
observe real-world examples
5. Safety
Authorization in computer networks provides security. A user ID and password are used for
information in the database are an exact match .
Page
20
authorization. As a result, it makes sure that we can only log in when our information and the
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
6. Large capacity for storing
There is a lot of data that needs to be saved by organizations. They must keep them on a
central server for that purpose. Every employee has access to a remote server known as a central
server. Consequently, others have the data in case one loses it
1.0.2
Disadvantages of Computer Networks
1. A lack of durability
The central server, which is the primary server in computer networks, is essential. The entire
network would cease to operate if there was a problem with the central server or if it
malfunctioned. Because of the reliance on a single server, this has many drawbacks
2. Computer malware spread
Due to the interconnected nature of computers in a network, there is a significant chance that
if one machine contracts a virus, others will likely follow suit. The system could genuinely
suffer from this spread. Additionally, because the network depends on the central server, it is
quite risky if it becomes corrupt
3. Issues with independence
It lacks independence because the foundation of the entire networking system is a single
server. Therefore, individual users are not free to use the computer anyway they choose
4. A lack of output
Given all of the benefits and applications of networks, it is inevitable that they lead to the
concurrent usage of numerous services that are distracting. Therefore, productivity problems
Page
21
are extremely typical as a result of employees concentrating on a variety of jobs
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
1.1
Point to point network
Over a wide area network, point-to-point connections are typically utilized to link two systems
together (WAN). A point-to-point link can be used to transfer data from a local system to a
distant system or from a local network to a distant network . (Naomi J. Alpern, 2010)
Figure 1: Point to point network
1.2
Multi point network
A connection that has been formed between more than two devices is called a multipoint
connection. Multidrop line configuration is another name for the multipoint connection.
Multiple devices share a single link in a multipoint connection . (TechDifferences, 2022)
Figure 2:multipoint network
1.3
Network Systems
Page
22
Two models of computer networks can be logically distinguished:
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
1.3.1
Peer to peer network
Peer to peer networks do not have dedicated servers because they are made up of several
workstations joined together for the purpose of exchanging information. Any workstation has
the ability to function as either a client or a server at any time . (WebRoot, 2020)
Figure 3: Peer to peer network
1.3.1.1 Benefits of peer to peer model

Simple file sharing:
A sophisticated P2P network allows for the rapid transfer of files over long distances. Access
to files is always possible .

Reduced costs:
When setting up a P2P network, there is no need to spend extra money on a server computer.
Both a network operating system and a full-time system administrator are not necessary .

Adaptability:
A P2P network can easily grow to include additional users. These networks are more
adaptable than client-server networks thanks to this advantage. It can scale up .

Reliability:
A P2P network will continue to function even if the central server goes down, in contrast to a
Page
23
client-server network, which can fail if the central server has problems. The other computers
keep running normally even if one crashes. In addition, bottlenecking is avoided because to the
distribution of traffic among several computers
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA

High performance:
A P2P network can perform better as more clients join it, but a client-server network performs
worse as more clients join. This is so that the network can benefit from the resources that each
client in a P2P network provides as a server .

Efficiency:
New P2P networks allow devices with various resources to work together for the benefit of
the network as a whole .
1.3.1.2 Constraints of Peer to peer model

Data backups are challenging since there is no centralized server and the data is spread
across numerous computer systems .

Given that each system in a peer-to-peer network is independent and stores its own
data, it is challenging to provide overall security .
1.3.2
Client server network
Client-server networks allow users to share and access network resources from a single
location, centralizing shared data and making it simple to backup important corporate data. A
client computer is any computer that is connected to the network . (Techopedia, 2020 Aug 25)
Page
24
Figure 4:Client server network
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
1.3.2.1 Benefits of Client server network

There is a single area where all files are kept

The management of network peripherals is centralized

Central management oversees network security and backups .

Users can access centrally regulated shared data
1.3.2.2 Constraints of Client server network

We require a specialized network operating system .

It costs a lot to buy a server .

Network manager or other specialized personnel are required .

There may be significant disruptions if any component of the network breaks
1.3.3
Cloud network
An organization's network capabilities and resources may be partially or entirely housed in a
public or private cloud platform, managed internally or by a service provider, and made readily
available on demand. This is known as cloud networking . (Techopedia, 2020)
1.3.3.1 Importance of Cloud Network

Flexibility
Using cloud computing makes resource management simpler than ever. Just make a monthly
payment for the resources you actually use. You may simply increase or decrease the amount
of storage and bandwidth you are paying for to utilize with the flexible packages offered by
cloud storage and cloud VPS providers .

Data Restoration
It can be difficult to recover data from physically damaged servers and hard disks. The actual
gadget may not be recoverable if it is severely damaged. These problems may cause firms to
Page
25
lose crucial data, especially if proper backups are not taken. These problems are less important
when using cloud computing
When data is kept in the cloud, the provider typically keeps it there as well as in other places.
This implies that your data is stored in more than one physical location. Your data is protected
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
even if they experience a problem with one of their servers or large storage facilities because a
copy is kept at a different place .

There is no upkeep
Businesses that operate traditional server configurations are responsible for upkeep of the
entire system. Regular inspections are required, but parts also need to be replaced all the time
when they wear out or stop working .

Simple Access
With cloud computing, it is considerably simpler to access documents, backend files,
software, and the company website. While the entire business is connected through its cloud
interface, employees can work remotely with ease. Your employees only need a networkaccessible device and the proper security standards .
1.3.3.2 Constraints of Cloud network

Data confidentiality risk
There is always a chance that someone else could obtain user data. Data confidentiality won't
be jeopardized, so data and cloud protection must be strong .

According to internet connection
Cloud computing can only be accessed through the internet. Access to your cloud computing
device will be automatically disabled if there is no internet at your location or if there is a
problem with the internet path to the cloud provider. This is currently the biggest challenge in
underdeveloped nations and distant regions with poor internet connectivity. The vulnerability
of public clouds is that everyone has access to the same server, which raises the possibility of
an attack and brings the server offline .

The degree of security
Security and secrecy are two of the cloud computing's most ambiguous concepts. By utilizing
a cloud computing system, we fully trust the providers of cloud computing servers with the
Page
26
security and confidentiality of our data. You are not able to bring a claim against the server for
data errors when they occur. You are not able to bring a claim against the server for data errors
when they occur
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA

Adherence
This alludes to the danger of a provider's degree of compliance deviating from the user's
rules

Exposure to attack vulnerability
There are several justifications for opposing cloud computing. One of these is computing.
Since the Cloud Computing work system is online, every component on it can be exposed to a
variety of threats. This creates a huge window of opportunity for attacks on the data or activities
kept on the server. Data security and data privacy are issues that arise when a hacker attack is
conducted .

Data Mobility,
It speaks to the potential for data sharing between cloud services and how to retrieve data in
the event that a user decides to stop using cloud computing services in the future

A technical issues
In addition to making it impossible for you to handle it yourself while using cloud computing,
you must contact customer assistance, which is not always available 24/7. This is a concern
because you sometimes have to pay more for help .

Low Connection
works poorly if the connection is sluggish. One of the most crucial factors we take into account
when choosing cloud computing server service providers is the quality of the servers. We will
suffer because of low server quality when the server is offline or the permorma is bad.
Additionally, there is local storage where the data can be accessed whenever necessary .
1.3.4
Personal Area Network
Electronic devices in a user's local vicinity are connected by a personal area network (PAN).
A PAN can be anywhere in size from a few centimeters and a few meters. The link between a
Bluetooth earpiece and a smartphone is one of the most typical real-world instances of a PAN.
(Flare, 2020)
Page
27
PANs can link various electronic devices including keyboards, printers, tablets, and laptops .
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
1.3.4.1 Benefits of Personal Area Network

In PAN no extra space requires .

No need for extra cable and wire

It used in the TV remote, AC remotes, etc .

It is reliable

It is secure

Connect to any devices at a time

It is easy to use

Data can be synchronized between different devices

It is used in offices, conferences, and meetings .

No extra space requires .

Affordable cost .

It is portable
1.3.4.2 Constraints of Personal Area Network

It can be operated in less range of areas .

It is a slow data transfer

It interfaces with radio signals

PAN has a limited range .

Devices are not compatible with each other

Infrared signal travel only in a straight line

It can only be used for the personal area

The device with inbuilt WPAN is more expensive

PAN uses microwave signals in some digital devices which have and effect on the
human body like rain and heart problems may occur .

TV remote use infrared signals which have a problem that they travel in a straight
Page
28
line
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
1.3.5
Local area network
Local area network (LAN), one of the most basic forms of networks, links together groups of
computers and other devices over a restricted region, typically inside a single building or a
collection of closely spaced buildings . (Flare, 2020)
1.3.5.1 Design
Figure 5:LAN Design
1.3.5.2 Benefits of Local area network

Affordable transmission medium

It can make it easier for a gadget to be physically connected to the media

High data transfer speeds are employed with it

Since network data transmission is independent of linked devices' data rates, a device
Page
29
with one speed can transfer data to a device with another speed .

A rapid rate of device connectivity .

Every linked gadget has the potential to communicate with other connected devices

It is adaptable and focused on progress

Locking files is possible
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA

It offers complete evidence that the security system prevents unauthorized access to
data

LANs are a tool for productivity. A LAN should be a clear contribution to increased
profitability in the business setting
1.3.5.3 Constraints of Local area network

Each mainframe utilized on the network requires a memory space for the LAN
software. This reduces the amount of RAM that the user's program can use

Local area networking raises the bar for computer operation by another level. Users
may have difficulty comprehending network commands. Establishing and managing
several PCs that are not networked requires much fewer technical and managerial skills
than installing and managing a LAN

If it is imperative to protect sensitive information, then a security system should be put
into action

There is a loss of some customer control. Various consumers must share a printer with
us

1.3.6
In a network context, several present application programs won't function
Wireless Local area network
Despite using wireless network technology, such as Wi-Fi, WLAN performs the same duties
as a LAN. Devices that rely on physical wires to connect are not required for this network
type (Flare, 2020)
Page
30
Figure 6:Wireless Local Area Network
1.3.6.1 Benefits of Wireless Local area network

Mobility
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
The ability to move around while utilizing a device, such as a handheld computer or data
collector, is known as mobility. Inventory clerks, healthcare professionals, police officers, and
emergency care specialists are just a few of the occupations that demand people to be mobile.
Wireline networks, by necessity, entail a physical tether between the user's workstation and the
network's resources, making access to them while moving about the building or elsewhere
difficult. Due to efficiency improvements, this freedom of mobility yields a large return on
investment

Installation in Complicated-to-Wire Locations
When completing installations in hard-to-wire places, the use of wireless networks offers very
real cost benefits. If you wish to connect buildings that are separated by rivers, motorways, or
other obstructions, a wireless solution may be far more cost-effective than running actual cable
or renting communications circuits, such T1 service or 56Kbps lines. Some businesses invest
tens of thousands of dollars or even millions to create physical connections with nearby
facilities. If you have to do this kind of installation, think about switching to wireless
networking. Although the installation of wireless networking in these circumstances is
expensive, there will be long-term cost reductions that are evident

greater dependability
The downtime caused by cable problems is a challenge unique to wired networks. In actuality,
system outages are frequently brought on by cable failures. Through rainwater entry during
storms and unintentional spills or leaks of liquids, moisture corrodes metallic conductors.
When attempting to disconnect their PC from the network in order to relocate it to another
location on wired networks, customers run the risk of inadvertently breaking their network
connector. Signal reflections from poor cable splices might result in irrational mistakes.
Unintentional cable cutting has the potential to shut down a network instantly. Misuse and
everyday use can quickly cause wires and connectors to fail. These issues make it difficult for
users to use network resources, which is disastrous for network administrators

Shortened installation period
Page
31
Cabling installation is frequently a labor-intensive process. In order to connect network outlets
to the wall, installers for LANs must pull twisted-pair wires above the ceiling and drop cables
through walls. Depending on the magnitude of the installation, these procedures may take days
or weeks to complete. Digging holes to lay the fiber or passing the fiber through an alreadyNETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
existing conduit are the two methods for installing optical fiber between buildings in the same
geographic area. To get right-of-way approvals and dig through asphalt and ground, it may take
weeks or even months
1.3.6.2 Constraints of Wireless Local area network

WLAN calls for a license

There isn't much room to conceal

Government agencies have the power to limit and manage WLAN signal flow as
necessary. Data flow from connected devices to the web will be impacted by this

Data transfer rate drops as there are more connected devices

WLAN uses frequency, which could cause interference with other frequency-using
devices

Communication may be hindered by rain or thunder

Because of low security, it allows attackers to view the transmitted data

In comparison to employing fiber optics, the environment may potentially harm
signals

The environment is frequently harmed by WLAN radiation

Due to its access points, WLAN is more expensive than wires and hubs
1.3.7
Wide Area Network
Explain that the internet is a network that spans a very wide geographic area, such as a
country, continent, or even the entire world (Flare, 2020)
Page
32
Figure 7:Wide area network
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
1.3.7.1 Benefits of Wide Area Network

Boost performance

simple communication

extensive coverage

Disseminate information over a wide area

Messages can be sent to anyone else on the network very rapidly

It promotes international trade and business

IT infrastructure that is centralized

Increased privacy
1.3.7.2 Disadvantages Of Wide Area Network

It is intricate and complicated

The network requires a lot of maintenance, and it is highly expensive because we must
pay every time we move data
WAN is a significant and difficult issue

Because it is a public network, it is extremely dependent upon the third party

The WAN is unreliable and insecure

Security issue

Training expense

Maintenance issue

Need high-performance equipment
Page
33

NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
1.3.8
Metropolitan Area Network
This network is larger than LANs and smaller than WANs since it serves a medium-sized
geographic area, such as a town or city . (Flare, 2020)
Figure 8:Metropolitan Area Network
1.3.8.1 Benefits of Metropolitan Area Network

It offers greater security than WAN

Greater than LAN in size

It facilitates the economical sharing of shared resources like printers and other things

It facilitates the quick LAN interfacing of users. This is because links are simple to
implement

When compared to WAN, MAN uses lower resources. This reduces the price of
implementation

The dual bus employed in MAN facilitates simultaneous data transmission in both
directions
It offers a strong backbone for a large network and improved WAN access

A MAN typically spans several city blocks or the entire city

Improves data processing effectiveness and speed of data transport

Link that is simple to use

Save money by delaying the establishment of a wide area network
Page
34

NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
1.3.8.2 Constraints of Metropolitan Area Network

A MAN connection requires more cable to link from one location to another, and its
data throughput is lower than that of a LAN

Making a system secure against hackers is challenging

Managing the extensive network is challenging

Once the network grows huge, it becomes tough to safeguard it

Network administrators and experienced technicians are needed for network
implementation. Costs for installation and management as a whole go up as a result

More expensive than LAN

When we relocate our network to a different city or region, nothing happens
1.4
IEEE Ethernet specifications
The non-profit organization known as IEEE which stands for institute of electrical and
electronic engineers works to standardize, educate, and innovate in the field of electrical and
electronic development
1.4.1
IEEE 802
The physical and data-link specifications for technologies like Ethernet and wireless are
covered by the networking standard IEEE 802. (LAN and WLAN). The IEEE 802 ensures that
internet services and technology adhere to a set of best practices so that network devices can
coexist peacefully .
2.0 Network topology
The physical connections and logical communication channels between items in a network
are described by its topology. Because it aids in understanding the many components of the
network and their connections, network topology is significant

Physical

Logical
2.1 Physical Topology
Page
35
There are two different topology kinds:
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
The physical topology of the devices' connections is described. Physical topology comes in a
variety of forms, including bus, star, tree, ring, and mesh
2.1.1
Bus Topology
The network's nodes are connected in a line, with each node tapping into a single cable to
listen in on packets delivered over the network as a whole. Every packet sent over the cable
can be seen by every node in the network, and each node examines the packet before sending
it to see if it is intended for it. In that case, the node claims the packet; otherwise, the node
disregards the packet
Page
36
Figure 9:Bus topology
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
2.1.1.1 Advantages of Bus Topology

Device connection is simple: Joining a computer or other device to the network is
simple. The newly connected device has immediate access to the network. It is the finest
choice for an instantaneous temporary network connection. Through bus topology, a
device introduced to the network can be shared by many users

Cost-effective setup technique: Compared to other hybrid network types, bus
topology has a substantially lower implementation cost. The reason is that fewer cables
are needed compared with other network configurations. The simplest and most cheap
solution in the case of a small network is bus topology

Each device works independently thanks to the network's linear structure, which
ensures that each unit connects to the main cable on its own and has access to data as
long as it is connected. The performance of other devices is unaffected by a problem
with one particular device. As a result, the communication is efficient and continuous .

The straightforward architecture offers a localized network that enables simple data
flow to every device connected to the main file server without the need for hubs or
switches. In this configuration, any potential failure can be properly managed even in
the absence of hubs and switches

Easy expansion: The bus topology network's size can be increased with little
difficulty. By connecting a cable with a connector, further devices or computers can be
added to the network with ease. It offers an easier way to add tools that let more people
collaborate rapidly. Such devices can be added to or withdrawn from a network without
affecting how other computers operate .
2.1.1.2 Disadvantages of Bus Topology

The bus topology enables every computer and peripheral to connect via a solitary
central wire, which slows the network as more devices are added. Therefore, adding
additional devices tends to make the network as a whole slower. With more devices,
there is a chance that network collisions can happen and communication would suffer.
Page
37
When adopting bus topology, a larger network may experience speed concerns

Size restrictions: A bus topology typically includes a limited amount of cable, which
limits the number of nodes that can be built on the network and prevents the addition
of further computers to the network once a particular threshold has been reached
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA

Limited Options for security: In this topology, any computer connected to the
network's main cable will be aware of data transmissions from the source device to the
other computers. Through the central bus, each terminal has complete access to every
other terminal. As a result, installing security features on such a configuration is
challenging
Higher maintenance costs: Although bus topology installation is less expensive, with
time, the expenses of maintaining this sort of network rise. Due to its limited scalability
and escalating costs, this topology may not be the best option for those wishing to grow
and expand their network
2.1.2
Star Topology
Each network node is connected to a hub or switch, a central device. With LANs, star
topologies are frequently employed. A star network's nodes can continue to function normally
even if a cable breaks since only the node attached to that cable is disconnected from the
Page
38
network. The network of Syntax Solutions Company uses this topology
Figure 10:Star topology
2.1.2.1 Advantages of Star Topology
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA

Network management that is centralized makes use of a hub, switch, or central
computer to keep an eye on the network

User-friendly: New nodes can be readily added to a star topology network without
affecting the other nodes. Components can be removed similarly quickly. To maintain
your production levels, it is thus simple to add a second computer to the network and
to swap out a broken machine

Very trustworthy: All other cables and equipment will continue to function even if
one fails. Therefore, the network as a whole is unaffected by the failure of a single node
or link

Highly effective: Since each device connects to the central core using its own cable,
the likelihood of data collisions is comparatively low. This is similar to the star
topology. This also means that, in comparison to other network architectures, this
system's performance levels are extraordinarily high

Simple to handle: easy to find the link because it is frequently simple to do so.
Detecting the issue and fixing it are both simple processes

No point-to-point links: Any size of network can benefit from a star topology system.
Signal reflection inside the network is completely eliminated, resulting in a safe method
of unicast communication and point-to-point connections for data packet transmission
2.1.2.2 Disadvantages of Star Topology

High cost: Setting up a switch or router might be more expensive, especially when
one of these devices serves as the main network device

Everything is dependent on the focal point: The performance and number of nodes
the network can support are determined by the central network device

Highly reliant on the hub: Since none of the devices can function without a hub, if
the hub fails, everything fails. The disadvantage is that the failure of the primary device
brings down the entire network

High upkeep: As the star's core system, the hub requires more resources and ongoing
maintenance

Damage-prone: The cables or wires used in a star topology network increase the risk
beneath floors, and other obstructions. Additionally, if the LAN installation work must
Page
39
of damage. To get to the desired workstations or peripherals, it must pass through walls,
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
be done on the building's exterior, it may be vulnerable to damages from wildlife or
shifting weather conditions

Low data transfer rates apply to wireless systems: A wired star topology system
performs better than a wireless one if you require your network to handle severe loads.
Because a wireless LAN (WLAN) flows more slowly, there is a greater chance of a
bottleneck
2.1.3
Tree Topology
A unique kind of structure called a tree topology has numerous connected parts arranged like
the branches of a tree. For instance, tree topologies are widely used to arrange the data in a
database or the machines in a business network
Figure 11:Tree Topology
2.1.3.1 Advantages of Tree Topology

This topology combines the bus topology and the star topology

The nodes are arranged in a hierarchical and central data organization using this
architecture

This topology offers excellent scalability because the leaf nodes can expand by adding
Page
40
one or more nodes to the hierarchical chain

If one of a network's nodes is broken or malfunctions, the other nodes are unaffected .

Easy fault discovery and maintenance are provided by tree topology

Tree topology with cables. More nodes can fit inside leaf nodes

Supported by a number of software and hardware providers

Wiring for individual segments that is point to point

Using a tree topology is quite secure

It's employed in WAN

Reliability of tree topology
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
2.1.3.2 Disadvantages of Tree Topology

Compared to other network topologies, this one is very challenging to configure

A segment can only be a certain length, and that length limit is determined by the kind
of cabling that is being used

The network performance of a tree topology slows down slightly due to the abundance
of nodes

The computer on the following level will experience issues if the computer on the first
level is inaccurate

Compared to star and ring topologies, requires a significant amount of cables

There is a lot of network traffic since the data needs to travel from the main cable

The Backbone looks to be the network segment as a whole's single point of failure .

The topology is treated in a somewhat complicated manner
2.1.4
Mesh Topology
Each computer and network device in this topology is connected to every other one. This
topology comes in two variations: entire mesh and partially connected mesh. In a network with
a full mesh topology, every computer is connected to every other computer. The number of
computers in a full mesh network can be determined using the formula n(n-1)/2. At least two
computers in the network have connections to numerous additional computers in the network
Figure 12:Mesh Topology
Page
41
in a partially linked mesh architecture
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
2.1.4.1 Advantages of Mesh Topology

Mesh Topology is capable of handling heavy traffic: There is no hierarchical
relationship in mesh topology. Assume that any connected device tries to directly
contact any other connected device by utilizing the devices' routing capabilities. They
will be able to do it in that situation
A single device's failure has no impact on the network: Regarding resistance to
issues, mesh topology is outstanding. Information is received and translated by each
network node. The system offers its users enough redundancy so that they can continue
using it even if certain errors take place. The network is strong enough to employ the
other nodes to complete the mesh even if one of them fails

The layout of Mesh Topology enables users to add new widgets to add new devices
without interfering with the messages that were already being sent at that moment.
Adding new devices does not influence data transfer. A malfunction in one piece of
equipment won't stop the information from flowing because every node is connected

It's easy to increase network size with mesh topology because each node functions as
its own router, making it possible to do so without difficulty. Therefore, in a business
setting at the existing rate of operation temporarily adding new technology is simple
2.1.4.2 Disadvantages of Mesh Topology

High price: Mesh Topology implementation comes at a greater price than similar
projects since it requires a large number of different pieces of equipment. Until you
have all the gear, wiring, internet speed, etc., required for the installation, it cannot
function properly

Taking time to construct and maintain: The initial process is complicated and timeconsuming, but once it is up and running, adding new nodes is easy

Significant redundant connection risk: There is a probability of setting redundant
connections because Mesh Topology may manage many networks

The strain on each node has increased: Each node is required to serve as a router in
Page
42
addition to its other duties. The mechanism is therefore exceedingly intricate
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
2.2 Logical Topology
The arrangement of network nodes and devices to create a logical or physical structure is
known as logical topology. The arrangement of the network nodes to create the network
structure can be done using a variety of network topologies. Topology, taken literally, refers to
the nodes that make up a network and how they are connected
2.2.1
Ethernet
Shares media; a shared media network has a high likelihood of data collision. When a collision
occurs in Ethernet, all of its hosts roll back and wait for a random period of time before
retransmitting the data. Ethernet employs CSMA/CD technology to detect collisions. up to 10
Mbps in speed
2.2.2
Fast Ethernet
Fast Ethernet can be used wirelessly, through optical fiber, and over UTP. up to 100 mbps of
speed
2.2.3
Gigabit Ethernet
Faster than fast Ethernet, gigabit Ethernet has a maximum speed of 1000 Mbps
2.2.4
Bandwidth
A medium's capacity to transfer data is measured by its bandwidth. High bandwidth is
associated with high capacity, while low bandwidth is associated with low capacity. The
number of bits that may be communicated per second is a common unit used to describe data
transmission rates. Theoretically, an Ethernet LAN has a capacity of 10 megabits per second
Page
43
and can transport 10 million bits per second (Mbps)
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
3.0 Network Protocols
The formatting, transmission, and reception of data between two or more devices are governed
by sets of recognized standards called network protocols. It makes it possible for connected
devices to communicate with one another despite any variations in their design, procedure, or
architecture. Network protocols are essential to modern digital communications because they
make it possible for individuals to speak with one other easily across the globe .
3.1 Layer Protocols
The majority of network protocol suites are composed of several layers, which are commonly
referred to as a protocol stack. Each layer serves a certain function. Both the sending host and
the receiving host support each tier
Figure 13:Protocol Stack

You can use the TCP/IP Model to work out how a particular machine should be
connected to the internet and how data should be sent between them

On top of the TCP/IP Model, a variety of applications have been standardized to
work
Transmission Control Protocol/Internet Protocol is known as TCP/IP
Page
44

NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
3.2 Types of Protocols
3.2.1
TCP
The Internet Protocol and an application program can communicate through to the TCPTransmission Control Protocol .
3.2.2
HTTP
The World Wide Web is built on the Hypertext Transfer Protocol, or HTTP. It's used to move
files like webpages and other types of resources from the HTTP server or web server to the
HTTP client or web client .
3.2.3
SMTP
Simple mail transport protocol is known as SMTP. It is known as a basic mail transfer protocol
and supports email. You can transmit the data to another email address using this protocol .
3.2.4
FTP
File Transfer Protocol is referred to as FTP. It is one of the standard protocols that is used the
most frequently to transfer files from one system to another .
3.2.5
Internet Protocol (IP)
It is responsible for logical addressing, path determination, and packet delivery from the
source host to the destination host
3.2.6
Short Message Service
Text messages can be sent and received over cellular networks using the Short Message
Service (SMS) communication protocol
3.2.7
SNMP
the TCP/IP protocol to manage devices connected to the internet .
Page
45
Simple Network Management Protocol is known as SNMP. It is a framework for leveraging
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
3.2.8
Terminal Network (TELNET)
It creates the link between the local and distant computers. It creates a connection so that you
can mimic your local system at the distant system .
3.3 Network topology that is appropriate for syntax solutions
Because star topology has less drawbacks than bus topology and can fulfill the needs of the
business, it is utilized for syntax solution network models. The network uses the Fast Ethernet
protocol because it satisfies the company's speed requirements .
Activity 2
2.0 Network Devices
All equipment that enables communication between end user devices is referred to as a
network device. Data that has to be exchanged between end user devices is transported through
network devices. provides an explanation of network interface cards (NIC), hubs, switches,
routers, etc .
2.0.1 Network Interface Card (NIC)
Host devices are physically connected to the network medium via NICs, or network interface
cards. With the use of this connection, they can send emails, print reports, scan photos, and
access databases. A network interface card, or NIC, is a printed circuit board that resides in a
bus expansion slot on a computer motherboard. A media access control address, or MACIA, is
a special code that is carried by each individual NIC. The network host's data connection is
Page
46
managed using this address
Figure 14:Network Interface Card (NIC)
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
2.0.2
Switch
Switches function as concentrators, giving workstation, server, and peripheral cables a single
point of connectivity. By only sending a received network packet to the one or more devices
for whom it was designed, switches control the flow of data across a network .
Figure 15:switch
2.0.3
Hubs
This component links two or more workstations together to form a local area network. A hub
quickly retransmits a data frame to all associated links after receiving a transmission from a
workstation .
Figure 16:Hubs
2.0.4
Repeaters
Repeaters are the most basic kind of hardware component in terms of functionality, design,
Page
47
and operation. In accordance with the ISO open system interconnection reference model, this
device functions at the physical layer. It regenerates signals received on one cable segment and
retransmits them onto another cable segment .
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
Figure 17:Repeater
2.0.5
Bridges
These devices link together two LANs, or two identical LAN segments, using the same
protocol. No hosts on segment B will receive information from host to host communication on
segment A because the bridge will prevent them; information will only traverse the bridge if it
is addressed for a host on the other side .
Figure 18:Bridges
2.0.6
Router
A router is similar to a bridge in that it translates data between networks. Based on the origin
and destination addresses, routers choose the optimum path to route a message. The router is
intelligent enough to recognize when to guide traffic along side roads and shortcuts and can
direct traffic to avoid head-on crashes .
Table 1: Bridge vs router
Page
48
Characteristic
Routing based upon an
Bridge
Router
Normally no
Yes
algorithm or protocol
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
Protocol transparency
Yes
Only protocol-independent
Route
Uses network addresses
No
Yes
Promiscuous mode of
Yes
No
Forwarding decision
elementary
Can be complex
Multiple path transmission
Limited
High
Routing control
Limited
High
Flow control
No
Yes
Frame fragmentation
No
Yes
Packet processing rate
High
Moderate
Cost
Less expensive
More expensive
Operation
2.0.7
Content filter
Page
49
Figure 19:Router
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
Software that limits or regulates the content that readers have permission to access is known
as a content filter
2.0.8
Firewall
Between two networks, a firewall system imposes an access control policy. usually found at
a network's entrance gateway
Figure 20:Firewall
2.0.9
Access point
A two-port bridge can be compared to an access point. One port is connected to an antenna,
as opposed to each port being tied to a LAN .
2.0.10 Wireless router
A wireless router is a piece of technology that functions similarly to a router in that it transmits
data through an internet cable to a recipient device and features a wireless access point that
allows data to be transferred wirelessly rather than over another cable. The Wi-Fi router
transforms telephone line data into radio signals that may be accessed by laptops, tablets, and
smartphones that have Wi-Fi capabilities .
2.1 Networking Software
A wide range of software is referred to as network software and is used for computer network
design, implementation, operation, and monitoring
Client software
Page
50
2.1.1
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
A client software program that can be used to connect to another piece of software and
exchange data via a network. On the other hand, client software can be run on a computer
without a network connection. Web browsers, MS Outlook, and the weather widget on mobile
devices are a few examples of client software
2.1.1.1 Client operating system
A system used by desktop computers and other portable electronics. As opposed to centralized
servers, this approach may accommodate just one user. Microsoft Windows, Apple MacOS,
Linux, Android, and Apple's iOS are typical examples
2.1.2
Server Software
Software that is created specifically to be utilized, run, and maintained on a computing server
is known as server software. It offers and makes possible the exploitation of the underlying
server computing capacity for a variety of high-end computing services and tasks
2.1.2.1 Server operating system
The term “server operating system” (or server OS) refers to a particular kind of operating
system that is installed and utilized on servers. It is an advanced operating system with the
features and functionalities necessary for client-server architecture or a comparable enterprise
computing environment. Red Hat Enterprise Linux, Windows Server, and Mac OS X Server
are a few typical examples of server operating systems
2.2 Server Types
2.2.1 Server
A server is a computer created to handle requests from other client computers and distribute
data across a local area network or the internet. One or more servers that handle specific tasks
are supported by computer networks .
2.2.1.1 Web server
A machine that responds to HTTP-based client requests sent over the World Wide Web is a
storing, and distributing webpages to users
Page
51
web server. A web server's primary responsibility is to show website content by processing,
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
2.2.1.2 File Server
A file server is a central location where all data files are kept so that users of workstations
may readily access the same spreadsheets, documents, and other data
2.2.1.3 Database Server
Database servers offer database services to computers or other computer programs. Oracle
and MySQL, as examples
2.2.1.4 Virtualization server
The technique of employing software on a physical server to produce numerous virtual
partitions or instances, each of which can function independently
2.3 Server selection for Syntax solution

Syntax solutions can do on a file server

The server has space for all of the departments' data files and can be utilized for file
backups

A small company network like syntax solutions might cost between $1000 and
$3000

OS requirements
Table 2: Hardware requrements for syntax solution
Minimum Requirement
Recommended Requirement
CPU
2 Cores
4 Cores
Memory
1 GB
4 GB
Storage
300MB disk space for file
100gb or more disk space for
server
file server
2.3.1 Workstation
A workstation is a personal computer that is faster and more powerful than a personal
computer and is designed for a single user. Since they are PCs, provided they have their own
installed software and hard disk storage, they can also be utilized independently of the
mainframe. A network interface card is a piece of hardware for computers that makes it possible
for them to connect to one another. Networked computers always exchange data packets with
Page
52
one another according to a predetermined protocol. Network interface cards serve as
translators, enabling machines to communicate and receive data from one another on a LAN.
Network cabling is used to connect everything using a network after the server, workstations,
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
and network interface cards have been installed. Twisted pair wiring, coaxial cable, and fiber
optics are the three most often used types of network cables
Activity 3
3.1 IP address scheme
Table 3: IP address scheme
No:of Users
10
Vlan ID
10
Network Id
192.168.10.2-11
SubnetMask
255.255.255.240
Sales and
Marketing
HR
20
20
192.168.10.33-52
255.255.255.224
10
30
192.168.10.65-74
255.255.255.224
Legal
5
40
192.168.10.97-101
255.255.255.248
Finance
25
50
192.168.10.129-153
255.255.255.240
Developer
55
60
192.168.10.161-217
255.255.255.192
Network Team
5
70
192.168.10.225-229
255.255.255.248
Server Room
5
100
10.254.1.2-7
255.255.255.0
Page
53
Department
Customer Care
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
3.2 Feedback forum for Syntax Solution
Figure 21:Feedback Forum
3.4 Software Used to the implementation
Figure 22:Installing of Packet tracer
Page
54
Packet tracer is used for the implementation
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
Figure 23:Starting Packet tracer
Page
55
Figure 24:Registering netcad
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
Figure 25:Registering using email
Figure 26: Packet tracer interface
Activity 4
Page
56
4.1 Implementation of the network
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
Figure 27: Syntax solution Implementation
4.2 Test Cases
Table 4:Test cases
Test Case
ID
1
Test Name
Test Condition
Outcome
Ping
100% pass
2
3
4
Extended
Ping
Trace root
Telnet
Ping HR PC with Customer care PC
Ping 192.168.10.2
Ping -t 10.254.1.5
Tracert 10.254.1.5
telnet 192.168.10.97
5
SSH
Tracert complete
Connection refused
by remote host
Not connected
SSH 192.168.10.97
100% pass
Page
57
Test case 1
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
Figure 28:test case-ping
Page
58
Test case 2
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
Figure 29:test case- ping -t
Page
59
Test case 3
Figure 30: test case - tracert
Test case 4
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
Figure 31:test case- telnet
References
AWS, 2022. What is computer networking?. AWS, 10(https://aws.amazon.com/what-is/computernetworking/).
Flare, C., 2020. Local Area Network. [Online]
Available at: https://www.cloudflare.com/learning/network-layer/what-is-a-lan/
[Accessed 15 08 2022].
Flare, C., 2020. Metropolitain Area Network. [Online]
Available at: https://www.cloudflare.com/learning/network-layer/what-is-a-man/
[Accessed 15 08 2022].
Page
60
Flare, C., 2020. What is Personal Area Network?. [Online]
Available at: https://www.cloudflare.com/learning/network-layer/what-is-a-personal-area-network/
[Accessed 15 08 2022].
Flare, C., 2020. Wide area network. [Online]
Available at: https://www.cloudflare.com/learning/network-layer/what-is-a-wan/
[Accessed 15 08 2022].
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
Flare, C., 2020. Wireless Local area network. [Online]
Available at: https://www.cloudflare.com/learning/network-layer/what-is-a-wlan/
[Accessed 15 08 2022].
Naomi J. Alpern, R. J. S., 2010. Network Fundamentals. Eleventh Hour Network+, 10(11), p. 150.
TechDifferences, 2022. TechDifferences. [Online]
Available at: https://techdifferences.com/difference-between-point-to-point-and-multipointconnection.html
[Accessed 15 08 2022].
Techopedia, 2020 Aug 25. Client server Architecture. [Online]
Available at: https://www.techopedia.com/definition/438/clientserver-architecture
[Accessed 15 08 2022].
Techopedia, 2020. Cloud network. [Online]
Available at: https://www.techopedia.com/definition/30218/cloud-network
[Accessed 15 08 2022].
Page
61
WebRoot, 2020. Peer topeer connection. [Online]
Available at: https://www.webroot.com/us/en/resources/glossary/what-is-peer-to-peer-networking
[Accessed 15 08 2022].
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
Feedback Form
1. Specify your user type
o Administrator
o User
o Other
2. Is it helpful for you?
o Yes
o No
3. It its secure for you?
o Yes
o No
4. Rate the connection between various devices within the
network
o Excellent
o Above Average
o Average
o Poor
Page
62
o Below Average
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
5. What you think about this network?
Page
63
6. Any suggestions for improve the network
NETWORKING – ASSIGNMENT 01
SANDUNI MALSHA
Download