Higher Nationals Internal verification of assessment decisions – BTEC (RQF) INTERNAL VERIFICATION – ASSESSMENT DECISIONS Programme title BTEC Higher National Diploma in Computing Assessor Unit(s) Assignment title Internal Verifier Unit 02: Networking LAN Design & Implementation for SYNTAX SOLUTIONS Student’s name Pass List which assessment criteria the Assessor has awarded. Merit Distinction INTERNAL VERIFIER CHECKLIST Do the assessment criteria awarded match those shown in the assignment brief? Y/N Is the Pass/Merit/Distinction grade awarded justified by the assessor’s comments on the student work? Y/N Has the work been assessed accurately? Y/N Is the feedback to the student: Give details: • Constructive? • Linked to relevant assessment criteria? • Identifying opportunities for improved performance? • Agreeing actions? Y/N Y/N Y/N Does the assessment decision need amending? Y/N Y/N Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date Confirm action completed Page 1 Remedial action taken Give details: Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date Higher Nationals - Summative Assignment Feedback Form Student Name/ID Unit Title Unit 02: Assignment Number 1 Assessor 01/01/2023 Date Received 1st submission Submission Date Networking Date Received 2nd submission Re-submission Date Assessor Feedback: LO1 Examine networking principles and their protocols. Pass, Merit & Distinction Descripts P1 P2 M1 LO2 Explain networking devices and operations. Pass, Merit & Distinction Descripts P3 P4 M2 D1 P6 M3 D2 M4 D3 LO3 Design efficient networked systems. Pass, Merit & Distinction Descripts P5 LO4 Implement and diagnose networked systems. Pass, Merit & Distinction P7 P8 Descripts Grade: Assessor Signature: Date: Resubmission Feedback: Grade: Assessor Signature: Date: Internal Verifier’s Comments: Page 2 Signature & Date: * Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have been agreed at the assessment board. Assignment Feedback Formative Feedback: Assessor to Student Action Plan Summative feedback Page 3 Feedback: Student to Assessor Assessor signature Date Student signature Date 01/01/2023 Pearson Higher Nationals in Computing Page 4 Unit 02: Networking Assignment 01 General Guidelines 1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as your cover sheet and make sure all the details are accurately filled. 2. Attach this brief as the first section of your assignment. 3. All the assignments should be prepared using a word processing software. 4. All the assignments should be printed on A4 sized papers. Use single side printing. 5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page. Word Processing Rules 1. 2. 3. 4. The font size should be 12 point, and should be in the style of Time New Roman. Use 1.5 line spacing. Left justify all paragraphs. Ensure that all the headings are consistent in terms of the font size and font style. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page Number on each page. This is useful if individual sheets become detached for any reason. 5. Use word processing application spell check and grammar check function to help editing your assignment. Page 5 Important Points: 1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the before mentioned compulsory information will result in rejection of your work. 2. Avoid using page borders in your assignment body. 3. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be accepted. 4. Ensure that you give yourself enough time to complete the assignment by the due date. 5. Excuses of any nature will not be accepted for failure to hand in the work on time. 6. You must take responsibility for managing your own time effectively. 7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing) for an extension. 8. Failure to achieve at least PASS criteria will result in a REFERRAL grade . 9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then be asked to complete an alternative assignment. 10. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and a reference list. 11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A REFERRAL or at worst you could be expelled from the course Student Declaration I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without attributing the sources in the correct form. I further understand what it means to copy another’s work. 1. I know that plagiarism is a punishable offence because it constitutes theft. 2. I understand the plagiarism and copying policy of Pearson UK. 3. I know what the consequences will be if I plagiarise or copy another’s work in any of the assignments for this program. 4. I declare therefore that all work presented by me for every aspect of my program, will be my own, and where I have made use of another’s work, I will attribute the source in the correct way. 5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between myself and Pearson, UK. 6. I understand that my assignment will not be considered as submitted if this document is not attached to the assignment. Page 6 Student’s Signature: Date:01/01/2023 (Provide Submission Date) Pearson Higher Nationals in Computing Unit 02: Networking Assignment 01 7 Page NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Higher National Diploma in Computing Assignment Brief Student Name /ID Number K.K.Sanduni Malsha Kumari /COL00126947 Unit Number and Title Unit 2: Networking Academic Year 2021/22 Unit Tutor Assignment Title LAN Design & Implementation for SYNTAX SOLUTIONS Issue Date Submission Date 01/01/2023 IV Name & Date Submission format The submission should be in the form of an individual report written in a concise, formal business style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all work must be supported with research and referenced using Harvard referencing system. Please also provide an end list of references using the Harvard referencing system. The recommended word count is 3,000–3,500 words for the report excluding annexures, although you will not be penalised for exceeding the total word limit. Unit Learning Outcomes: LO1 Examine networking principles and their protocols. LO2 Explain networking devices and operations. LO3 Design efficient networked systems. Page 8 LO4 Implement and diagnose networked systems. NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Assignment Brief and Guidance: Scenario SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They are planning to make it one of the state-of-the-art companies in Matara with the latest facilities. It is expected to have nearly 150 employees in Matara branch. Department Number of Users Customer Care 10 Sales and Marketing 20 Finance 25 Legal 5 HR 10 Developers 55 Network Team 5 Server Room Servers +ISP connections Following requirements are given by the Management. All the departments must be separated with unique subnet and should not communicate with each other unless there is a special requirement . 192 . 168 . 10 . 0 / 24 is given and should be used for all the departments except the Page 9 server room. IPs should assign using DHCP . ERP and CRM Systems need to be implemented in Matara branch in local servers. Number of servers required for the Server room need to be decided by the Network designer and should be assigned with 10 . 254 . 1 . 0 / 24 subnet. ( Uses static NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA IPs ) High level of redundancy is expected in network design to eliminate s ingle point of failures and traffic bottle necks. Sales and Marketing Team need to access Network resources using WIFI connectivity. Proper methods for networking monitoring and troubleshooting need to be established. All possible network security mechanisms should be implemented. Assume you have been appointed as the new network consultant of SYNTAX SOLUTIONS . Prepare a network architectural design and implement i t with your suggestions and recommendations to meet the company requirements. ( Note: Clearly state your assumptions. You are allowed to design the network according to your assumptions, but main requirements should not be violated) Activity 01 Discuss the benefits and constraints of different network system types that can be implemented in the Matara branch and the main IEEE Ethernet standards that can be used in above LAN and WLAN design. Discuss the importance and impact of network topologies and network protocol suites while comparing the main network topologies and network protocol suites that are used in network design using examples . Recommend suitable network topologies and network protocol suites for above scenario and justify your answer Page 10 with valid points. NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Activity 02 Discuss the operating principles of network devices ( Ex: Router, Switch, Etc.) and server types that can be used for above scenario while exploring different servers that are available in today’ s market with their specifications . Recommend server/ servers for the above scenario and justify your selection with valid point s. Discuss the inter- dependence of workstation hardware with networking software and provide examples for networking software that can be used in above network design. Activity 03 Prepare a written network design plan to meet the above mentioned user requirements including a blueprint drawn using a modeling tool. (Ex: Microsoft Visio, EdrawMax). Support your answer by providing the VLAN and IP subnetting scheme for the above scenario and the l ist of devices, network components and software used to design the network for above scenario and while justifying your selections. Test and evaluate the proposed design to meet the requirements and analyse user feedback by using a User feedback form. Install and configure Network services, devices and applications ( Ex: VLAN, DHCP, DNS, Proxy, Web, Etc.) according to the proposed design to accomplish the user requirements and design a detailed Maintenance schedule for above Network. * Note: - Screen shots of Configuration scripts should be presented. Activity 04 Page 11 Implement a networked system based on your prepared design with valid evidence s and recommend potential future enhancements for the networked system with valid justifications to your recommendations. Use critical reflection to critically evaluat e the design, plan, configuration, and testing of your network while justifying with valid NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA conclusions. Develop test cases and conduct verification ( Ex: Ping, extended ping, trace route, telnet, SSH, etc.) to test the above Network and analyse the test results against the Page 12 expected results. NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 13 Page NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Grading Rubric Grading Criteria Achieved Feedback LO1 : Examine networking principles and their protocols. P1 Discuss the benefits and constraints of different network types and standards. P2 Explain the impact of network topology, communication and bandwidth requirements. M1 Compare common networking principles and how protocols enable the effectiveness of networked systems. P3 Page 14 LO2 : Explain networking devices and operations NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Discuss the operating principles of networking devices and server types. P4 Discuss the inter-dependence of workstation hardware with relevant networking software. M2 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization. LO 1 & LO2 D1 Critically evaluate the topology protocol selected for a given scenario to demonstrate the efficient utilisation of a networking system. LO3 : Design efficient networked systems P5 Design a networked system to meet a given specification. Page 15 P6 Test and evaluate the design to meet the requirements and analyze user feedback. NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA M3 Install and configure network services and applications on your choice. D2 Design a maintenance schedule to support the networked system. LO4 : Implement and diagnose networked systems P7 Implement a networked system based on a prepared design. P8 Document and analyze test results against expected results. M4 Recommend potential enhancements for the networked systems. Page 16 D3 Use critical reflection to evaluate own work and justify valid conclusions. NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Table of Contents Activity 01 ............................................................................................................................................ 20 1.0 Computer Networks............................................................................................................ 20 1.0.1 Advantages of Computer Networks .......................................................................... 20 1.0.2 Disadvantages of Computer Networks ...................................................................... 21 1.1 Point to point network ........................................................................................................ 22 1.2 Multi point network ............................................................................................................ 22 1.3 Network Systems ................................................................................................................. 22 1.3.1 Peer to peer network ................................................................................................... 23 1.3.2 Client server network ................................................................................................. 24 1.3.3 Cloud network ............................................................................................................. 25 1.3.4 Personal Area Network............................................................................................... 27 1.3.5 Local area network ..................................................................................................... 29 1.3.6 Wireless Local area network ...................................................................................... 30 1.3.7 Wide Area Network .................................................................................................... 32 1.3.8 Metropolitan Area Network ....................................................................................... 34 1.4 2.0 2.1 2.2 IEEE Ethernet specifications ......................................................................................... 35 Network topology ................................................................................................................ 35 Physical Topology ........................................................................................................... 35 Logical Topology ................................................................................................................. 43 2.2.1 Ethernet ....................................................................................................................... 43 2.2.2 Fast Ethernet ............................................................................................................... 43 2.2.3 Gigabit Ethernet.......................................................................................................... 43 2.2.4 Bandwidth .................................................................................................................... 43 3.0 Network Protocols ............................................................................................................... 44 3.1 Layer Protocols ............................................................................................................... 44 3.2 Types of Protocols ........................................................................................................... 45 3.3 Network topology that is appropriate for syntax solutions ............................................. 46 Activity 2 .............................................................................................................................................. 46 Page 17 2.0 Network Devices .................................................................................................................. 46 2.0.1 Network Interface Card (NIC) .................................................................................. 46 2.0.2 Switch ........................................................................................................................... 47 2.0.3 Hubs ............................................................................................................................. 47 2.0.4 Repeaters ..................................................................................................................... 47 2.0.5 Bridges ......................................................................................................................... 48 NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 2.0.6 Router........................................................................................................................... 48 2.0.7 Content filter ............................................................................................................... 49 2.0.8 Firewall ........................................................................................................................ 50 2.0.9 Access point ................................................................................................................. 50 2.0.10 Wireless router ............................................................................................................ 50 2.1 Networking Software .......................................................................................................... 50 2.1.1 Client software............................................................................................................. 50 2.1.2 Server Software ........................................................................................................... 51 2.2 2.2.1 2.3 2.3.1 Server Types ........................................................................................................................ 51 Server ........................................................................................................................... 51 Server selection for Syntax solution................................................................................... 52 Workstation ................................................................................................................. 52 Activity 3 .............................................................................................................................................. 53 3.1 IP address scheme ..................................................................................................................... 53 3.2 Feedback forum for Syntax Solution....................................................................................... 54 3.4 Software Used to the implementation................................................................................ 54 Activity 4 .............................................................................................................................................. 56 4.1 Implementation of the network ............................................................................................... 56 4.2 Test Cases .................................................................................................................................. 57 References ............................................................................................................................................ 60 Page 18 Table of Figures Figure 1: Point to point network ........................................................................................................... 22 Figure 2:multipoint network ................................................................................................................. 22 Figure 3: Peer to peer network .............................................................................................................. 23 Figure 4:Client server network ............................................................................................................. 24 Figure 5:LAN Design .............................................................................................................................. 29 Figure 6:Wireless Local Area Network .................................................................................................. 30 Figure 7:Wide area network ................................................................................................................. 32 Figure 8:Metropolitan Area Network ................................................................................................... 34 Figure 9:Bus topology ........................................................................................................................... 36 Figure 10:Star topology ......................................................................................................................... 38 Figure 11:Tree Topology ....................................................................................................................... 40 Figure 12:Mesh Topology ..................................................................................................................... 41 Figure 13:Protocol Stack ....................................................................................................................... 44 Figure 14:Network Interface Card (NIC) ............................................................................................... 46 Figure 15:switch .................................................................................................................................... 47 Figure 16:Hubs ...................................................................................................................................... 47 Figure 17:Repeater................................................................................................................................ 48 NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Figure 18:Bridges .................................................................................................................................. 48 Figure 19:Router ................................................................................................................................... 49 Figure 20:Firewall.................................................................................................................................. 50 Figure 21:Feedback Forum ................................................................................................................... 54 Figure 22:Installing of Packet tracer ..................................................................................................... 54 Figure 23:Starting Packet tracer ........................................................................................................... 55 Figure 24:Registering netcad ................................................................................................................ 55 Figure 25:Registering using email ......................................................................................................... 56 Figure 26: Packet tracer interface ......................................................................................................... 56 Figure 27: Syntax solution Implementation .......................................................................................... 57 Figure 28:test case-ping ........................................................................................................................ 58 Figure 29:test case- ping -t.................................................................................................................... 59 Figure 30: test case - tracert ................................................................................................................. 59 Figure 31:test case- telnet.................................................................................................................... 60 Page 19 Table 1: Bridge vs router ....................................................................................................................... 48 Table 2: Hardware requrements for syntax solution ............................................................................ 52 Table 3: IP address scheme ................................................................................................................... 53 Table 4:Test cases ................................................................................................................................. 57 NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Activity 01 1.0 Computer Networks A computer network is a setup that joins two or more computers together to share and transport data. A system that connects two or more computing devices for the purpose of information sharing and transmission is known as a computer network . (AWS, 2022) 1.0.1 Advantages of Computer Networks 1. Convenience of access Exploring contemporary computer networks is simple. You will therefore find it simple to connect, even if you are a child or a person who is new to technology . 2. Versatility Here, versatility means that many individuals will be able to investigate various options in accordance with their needs. Computer networks give you a variety of options for sharing a specific piece of information for this purpose. Email or messaging services like WhatsApp are two examples. There is therefore flexibility for various users . 3. Resource sharing with ease A computer network's fundamental goal is to make it possible for its users to share resources. You can make use of facilities like photocopy machines, scanners, and printers that can be shared by several people. For large businesses, resource sharing is crucial because it allows them to connect with their workforce through a single, shared network 4. Accessibility No matter where a person is, computer networks enhance connectivity. As we communicate with friends and coworkers via video call apps or Google docs in these testing times, we can observe real-world examples 5. Safety Authorization in computer networks provides security. A user ID and password are used for information in the database are an exact match . Page 20 authorization. As a result, it makes sure that we can only log in when our information and the NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 6. Large capacity for storing There is a lot of data that needs to be saved by organizations. They must keep them on a central server for that purpose. Every employee has access to a remote server known as a central server. Consequently, others have the data in case one loses it 1.0.2 Disadvantages of Computer Networks 1. A lack of durability The central server, which is the primary server in computer networks, is essential. The entire network would cease to operate if there was a problem with the central server or if it malfunctioned. Because of the reliance on a single server, this has many drawbacks 2. Computer malware spread Due to the interconnected nature of computers in a network, there is a significant chance that if one machine contracts a virus, others will likely follow suit. The system could genuinely suffer from this spread. Additionally, because the network depends on the central server, it is quite risky if it becomes corrupt 3. Issues with independence It lacks independence because the foundation of the entire networking system is a single server. Therefore, individual users are not free to use the computer anyway they choose 4. A lack of output Given all of the benefits and applications of networks, it is inevitable that they lead to the concurrent usage of numerous services that are distracting. Therefore, productivity problems Page 21 are extremely typical as a result of employees concentrating on a variety of jobs NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 1.1 Point to point network Over a wide area network, point-to-point connections are typically utilized to link two systems together (WAN). A point-to-point link can be used to transfer data from a local system to a distant system or from a local network to a distant network . (Naomi J. Alpern, 2010) Figure 1: Point to point network 1.2 Multi point network A connection that has been formed between more than two devices is called a multipoint connection. Multidrop line configuration is another name for the multipoint connection. Multiple devices share a single link in a multipoint connection . (TechDifferences, 2022) Figure 2:multipoint network 1.3 Network Systems Page 22 Two models of computer networks can be logically distinguished: NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 1.3.1 Peer to peer network Peer to peer networks do not have dedicated servers because they are made up of several workstations joined together for the purpose of exchanging information. Any workstation has the ability to function as either a client or a server at any time . (WebRoot, 2020) Figure 3: Peer to peer network 1.3.1.1 Benefits of peer to peer model Simple file sharing: A sophisticated P2P network allows for the rapid transfer of files over long distances. Access to files is always possible . Reduced costs: When setting up a P2P network, there is no need to spend extra money on a server computer. Both a network operating system and a full-time system administrator are not necessary . Adaptability: A P2P network can easily grow to include additional users. These networks are more adaptable than client-server networks thanks to this advantage. It can scale up . Reliability: A P2P network will continue to function even if the central server goes down, in contrast to a Page 23 client-server network, which can fail if the central server has problems. The other computers keep running normally even if one crashes. In addition, bottlenecking is avoided because to the distribution of traffic among several computers NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA High performance: A P2P network can perform better as more clients join it, but a client-server network performs worse as more clients join. This is so that the network can benefit from the resources that each client in a P2P network provides as a server . Efficiency: New P2P networks allow devices with various resources to work together for the benefit of the network as a whole . 1.3.1.2 Constraints of Peer to peer model Data backups are challenging since there is no centralized server and the data is spread across numerous computer systems . Given that each system in a peer-to-peer network is independent and stores its own data, it is challenging to provide overall security . 1.3.2 Client server network Client-server networks allow users to share and access network resources from a single location, centralizing shared data and making it simple to backup important corporate data. A client computer is any computer that is connected to the network . (Techopedia, 2020 Aug 25) Page 24 Figure 4:Client server network NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 1.3.2.1 Benefits of Client server network There is a single area where all files are kept The management of network peripherals is centralized Central management oversees network security and backups . Users can access centrally regulated shared data 1.3.2.2 Constraints of Client server network We require a specialized network operating system . It costs a lot to buy a server . Network manager or other specialized personnel are required . There may be significant disruptions if any component of the network breaks 1.3.3 Cloud network An organization's network capabilities and resources may be partially or entirely housed in a public or private cloud platform, managed internally or by a service provider, and made readily available on demand. This is known as cloud networking . (Techopedia, 2020) 1.3.3.1 Importance of Cloud Network Flexibility Using cloud computing makes resource management simpler than ever. Just make a monthly payment for the resources you actually use. You may simply increase or decrease the amount of storage and bandwidth you are paying for to utilize with the flexible packages offered by cloud storage and cloud VPS providers . Data Restoration It can be difficult to recover data from physically damaged servers and hard disks. The actual gadget may not be recoverable if it is severely damaged. These problems may cause firms to Page 25 lose crucial data, especially if proper backups are not taken. These problems are less important when using cloud computing When data is kept in the cloud, the provider typically keeps it there as well as in other places. This implies that your data is stored in more than one physical location. Your data is protected NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA even if they experience a problem with one of their servers or large storage facilities because a copy is kept at a different place . There is no upkeep Businesses that operate traditional server configurations are responsible for upkeep of the entire system. Regular inspections are required, but parts also need to be replaced all the time when they wear out or stop working . Simple Access With cloud computing, it is considerably simpler to access documents, backend files, software, and the company website. While the entire business is connected through its cloud interface, employees can work remotely with ease. Your employees only need a networkaccessible device and the proper security standards . 1.3.3.2 Constraints of Cloud network Data confidentiality risk There is always a chance that someone else could obtain user data. Data confidentiality won't be jeopardized, so data and cloud protection must be strong . According to internet connection Cloud computing can only be accessed through the internet. Access to your cloud computing device will be automatically disabled if there is no internet at your location or if there is a problem with the internet path to the cloud provider. This is currently the biggest challenge in underdeveloped nations and distant regions with poor internet connectivity. The vulnerability of public clouds is that everyone has access to the same server, which raises the possibility of an attack and brings the server offline . The degree of security Security and secrecy are two of the cloud computing's most ambiguous concepts. By utilizing a cloud computing system, we fully trust the providers of cloud computing servers with the Page 26 security and confidentiality of our data. You are not able to bring a claim against the server for data errors when they occur. You are not able to bring a claim against the server for data errors when they occur NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Adherence This alludes to the danger of a provider's degree of compliance deviating from the user's rules Exposure to attack vulnerability There are several justifications for opposing cloud computing. One of these is computing. Since the Cloud Computing work system is online, every component on it can be exposed to a variety of threats. This creates a huge window of opportunity for attacks on the data or activities kept on the server. Data security and data privacy are issues that arise when a hacker attack is conducted . Data Mobility, It speaks to the potential for data sharing between cloud services and how to retrieve data in the event that a user decides to stop using cloud computing services in the future A technical issues In addition to making it impossible for you to handle it yourself while using cloud computing, you must contact customer assistance, which is not always available 24/7. This is a concern because you sometimes have to pay more for help . Low Connection works poorly if the connection is sluggish. One of the most crucial factors we take into account when choosing cloud computing server service providers is the quality of the servers. We will suffer because of low server quality when the server is offline or the permorma is bad. Additionally, there is local storage where the data can be accessed whenever necessary . 1.3.4 Personal Area Network Electronic devices in a user's local vicinity are connected by a personal area network (PAN). A PAN can be anywhere in size from a few centimeters and a few meters. The link between a Bluetooth earpiece and a smartphone is one of the most typical real-world instances of a PAN. (Flare, 2020) Page 27 PANs can link various electronic devices including keyboards, printers, tablets, and laptops . NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 1.3.4.1 Benefits of Personal Area Network In PAN no extra space requires . No need for extra cable and wire It used in the TV remote, AC remotes, etc . It is reliable It is secure Connect to any devices at a time It is easy to use Data can be synchronized between different devices It is used in offices, conferences, and meetings . No extra space requires . Affordable cost . It is portable 1.3.4.2 Constraints of Personal Area Network It can be operated in less range of areas . It is a slow data transfer It interfaces with radio signals PAN has a limited range . Devices are not compatible with each other Infrared signal travel only in a straight line It can only be used for the personal area The device with inbuilt WPAN is more expensive PAN uses microwave signals in some digital devices which have and effect on the human body like rain and heart problems may occur . TV remote use infrared signals which have a problem that they travel in a straight Page 28 line NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 1.3.5 Local area network Local area network (LAN), one of the most basic forms of networks, links together groups of computers and other devices over a restricted region, typically inside a single building or a collection of closely spaced buildings . (Flare, 2020) 1.3.5.1 Design Figure 5:LAN Design 1.3.5.2 Benefits of Local area network Affordable transmission medium It can make it easier for a gadget to be physically connected to the media High data transfer speeds are employed with it Since network data transmission is independent of linked devices' data rates, a device Page 29 with one speed can transfer data to a device with another speed . A rapid rate of device connectivity . Every linked gadget has the potential to communicate with other connected devices It is adaptable and focused on progress Locking files is possible NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA It offers complete evidence that the security system prevents unauthorized access to data LANs are a tool for productivity. A LAN should be a clear contribution to increased profitability in the business setting 1.3.5.3 Constraints of Local area network Each mainframe utilized on the network requires a memory space for the LAN software. This reduces the amount of RAM that the user's program can use Local area networking raises the bar for computer operation by another level. Users may have difficulty comprehending network commands. Establishing and managing several PCs that are not networked requires much fewer technical and managerial skills than installing and managing a LAN If it is imperative to protect sensitive information, then a security system should be put into action There is a loss of some customer control. Various consumers must share a printer with us 1.3.6 In a network context, several present application programs won't function Wireless Local area network Despite using wireless network technology, such as Wi-Fi, WLAN performs the same duties as a LAN. Devices that rely on physical wires to connect are not required for this network type (Flare, 2020) Page 30 Figure 6:Wireless Local Area Network 1.3.6.1 Benefits of Wireless Local area network Mobility NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA The ability to move around while utilizing a device, such as a handheld computer or data collector, is known as mobility. Inventory clerks, healthcare professionals, police officers, and emergency care specialists are just a few of the occupations that demand people to be mobile. Wireline networks, by necessity, entail a physical tether between the user's workstation and the network's resources, making access to them while moving about the building or elsewhere difficult. Due to efficiency improvements, this freedom of mobility yields a large return on investment Installation in Complicated-to-Wire Locations When completing installations in hard-to-wire places, the use of wireless networks offers very real cost benefits. If you wish to connect buildings that are separated by rivers, motorways, or other obstructions, a wireless solution may be far more cost-effective than running actual cable or renting communications circuits, such T1 service or 56Kbps lines. Some businesses invest tens of thousands of dollars or even millions to create physical connections with nearby facilities. If you have to do this kind of installation, think about switching to wireless networking. Although the installation of wireless networking in these circumstances is expensive, there will be long-term cost reductions that are evident greater dependability The downtime caused by cable problems is a challenge unique to wired networks. In actuality, system outages are frequently brought on by cable failures. Through rainwater entry during storms and unintentional spills or leaks of liquids, moisture corrodes metallic conductors. When attempting to disconnect their PC from the network in order to relocate it to another location on wired networks, customers run the risk of inadvertently breaking their network connector. Signal reflections from poor cable splices might result in irrational mistakes. Unintentional cable cutting has the potential to shut down a network instantly. Misuse and everyday use can quickly cause wires and connectors to fail. These issues make it difficult for users to use network resources, which is disastrous for network administrators Shortened installation period Page 31 Cabling installation is frequently a labor-intensive process. In order to connect network outlets to the wall, installers for LANs must pull twisted-pair wires above the ceiling and drop cables through walls. Depending on the magnitude of the installation, these procedures may take days or weeks to complete. Digging holes to lay the fiber or passing the fiber through an alreadyNETWORKING – ASSIGNMENT 01 SANDUNI MALSHA existing conduit are the two methods for installing optical fiber between buildings in the same geographic area. To get right-of-way approvals and dig through asphalt and ground, it may take weeks or even months 1.3.6.2 Constraints of Wireless Local area network WLAN calls for a license There isn't much room to conceal Government agencies have the power to limit and manage WLAN signal flow as necessary. Data flow from connected devices to the web will be impacted by this Data transfer rate drops as there are more connected devices WLAN uses frequency, which could cause interference with other frequency-using devices Communication may be hindered by rain or thunder Because of low security, it allows attackers to view the transmitted data In comparison to employing fiber optics, the environment may potentially harm signals The environment is frequently harmed by WLAN radiation Due to its access points, WLAN is more expensive than wires and hubs 1.3.7 Wide Area Network Explain that the internet is a network that spans a very wide geographic area, such as a country, continent, or even the entire world (Flare, 2020) Page 32 Figure 7:Wide area network NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 1.3.7.1 Benefits of Wide Area Network Boost performance simple communication extensive coverage Disseminate information over a wide area Messages can be sent to anyone else on the network very rapidly It promotes international trade and business IT infrastructure that is centralized Increased privacy 1.3.7.2 Disadvantages Of Wide Area Network It is intricate and complicated The network requires a lot of maintenance, and it is highly expensive because we must pay every time we move data WAN is a significant and difficult issue Because it is a public network, it is extremely dependent upon the third party The WAN is unreliable and insecure Security issue Training expense Maintenance issue Need high-performance equipment Page 33 NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 1.3.8 Metropolitan Area Network This network is larger than LANs and smaller than WANs since it serves a medium-sized geographic area, such as a town or city . (Flare, 2020) Figure 8:Metropolitan Area Network 1.3.8.1 Benefits of Metropolitan Area Network It offers greater security than WAN Greater than LAN in size It facilitates the economical sharing of shared resources like printers and other things It facilitates the quick LAN interfacing of users. This is because links are simple to implement When compared to WAN, MAN uses lower resources. This reduces the price of implementation The dual bus employed in MAN facilitates simultaneous data transmission in both directions It offers a strong backbone for a large network and improved WAN access A MAN typically spans several city blocks or the entire city Improves data processing effectiveness and speed of data transport Link that is simple to use Save money by delaying the establishment of a wide area network Page 34 NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 1.3.8.2 Constraints of Metropolitan Area Network A MAN connection requires more cable to link from one location to another, and its data throughput is lower than that of a LAN Making a system secure against hackers is challenging Managing the extensive network is challenging Once the network grows huge, it becomes tough to safeguard it Network administrators and experienced technicians are needed for network implementation. Costs for installation and management as a whole go up as a result More expensive than LAN When we relocate our network to a different city or region, nothing happens 1.4 IEEE Ethernet specifications The non-profit organization known as IEEE which stands for institute of electrical and electronic engineers works to standardize, educate, and innovate in the field of electrical and electronic development 1.4.1 IEEE 802 The physical and data-link specifications for technologies like Ethernet and wireless are covered by the networking standard IEEE 802. (LAN and WLAN). The IEEE 802 ensures that internet services and technology adhere to a set of best practices so that network devices can coexist peacefully . 2.0 Network topology The physical connections and logical communication channels between items in a network are described by its topology. Because it aids in understanding the many components of the network and their connections, network topology is significant Physical Logical 2.1 Physical Topology Page 35 There are two different topology kinds: NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA The physical topology of the devices' connections is described. Physical topology comes in a variety of forms, including bus, star, tree, ring, and mesh 2.1.1 Bus Topology The network's nodes are connected in a line, with each node tapping into a single cable to listen in on packets delivered over the network as a whole. Every packet sent over the cable can be seen by every node in the network, and each node examines the packet before sending it to see if it is intended for it. In that case, the node claims the packet; otherwise, the node disregards the packet Page 36 Figure 9:Bus topology NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 2.1.1.1 Advantages of Bus Topology Device connection is simple: Joining a computer or other device to the network is simple. The newly connected device has immediate access to the network. It is the finest choice for an instantaneous temporary network connection. Through bus topology, a device introduced to the network can be shared by many users Cost-effective setup technique: Compared to other hybrid network types, bus topology has a substantially lower implementation cost. The reason is that fewer cables are needed compared with other network configurations. The simplest and most cheap solution in the case of a small network is bus topology Each device works independently thanks to the network's linear structure, which ensures that each unit connects to the main cable on its own and has access to data as long as it is connected. The performance of other devices is unaffected by a problem with one particular device. As a result, the communication is efficient and continuous . The straightforward architecture offers a localized network that enables simple data flow to every device connected to the main file server without the need for hubs or switches. In this configuration, any potential failure can be properly managed even in the absence of hubs and switches Easy expansion: The bus topology network's size can be increased with little difficulty. By connecting a cable with a connector, further devices or computers can be added to the network with ease. It offers an easier way to add tools that let more people collaborate rapidly. Such devices can be added to or withdrawn from a network without affecting how other computers operate . 2.1.1.2 Disadvantages of Bus Topology The bus topology enables every computer and peripheral to connect via a solitary central wire, which slows the network as more devices are added. Therefore, adding additional devices tends to make the network as a whole slower. With more devices, there is a chance that network collisions can happen and communication would suffer. Page 37 When adopting bus topology, a larger network may experience speed concerns Size restrictions: A bus topology typically includes a limited amount of cable, which limits the number of nodes that can be built on the network and prevents the addition of further computers to the network once a particular threshold has been reached NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Limited Options for security: In this topology, any computer connected to the network's main cable will be aware of data transmissions from the source device to the other computers. Through the central bus, each terminal has complete access to every other terminal. As a result, installing security features on such a configuration is challenging Higher maintenance costs: Although bus topology installation is less expensive, with time, the expenses of maintaining this sort of network rise. Due to its limited scalability and escalating costs, this topology may not be the best option for those wishing to grow and expand their network 2.1.2 Star Topology Each network node is connected to a hub or switch, a central device. With LANs, star topologies are frequently employed. A star network's nodes can continue to function normally even if a cable breaks since only the node attached to that cable is disconnected from the Page 38 network. The network of Syntax Solutions Company uses this topology Figure 10:Star topology 2.1.2.1 Advantages of Star Topology NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Network management that is centralized makes use of a hub, switch, or central computer to keep an eye on the network User-friendly: New nodes can be readily added to a star topology network without affecting the other nodes. Components can be removed similarly quickly. To maintain your production levels, it is thus simple to add a second computer to the network and to swap out a broken machine Very trustworthy: All other cables and equipment will continue to function even if one fails. Therefore, the network as a whole is unaffected by the failure of a single node or link Highly effective: Since each device connects to the central core using its own cable, the likelihood of data collisions is comparatively low. This is similar to the star topology. This also means that, in comparison to other network architectures, this system's performance levels are extraordinarily high Simple to handle: easy to find the link because it is frequently simple to do so. Detecting the issue and fixing it are both simple processes No point-to-point links: Any size of network can benefit from a star topology system. Signal reflection inside the network is completely eliminated, resulting in a safe method of unicast communication and point-to-point connections for data packet transmission 2.1.2.2 Disadvantages of Star Topology High cost: Setting up a switch or router might be more expensive, especially when one of these devices serves as the main network device Everything is dependent on the focal point: The performance and number of nodes the network can support are determined by the central network device Highly reliant on the hub: Since none of the devices can function without a hub, if the hub fails, everything fails. The disadvantage is that the failure of the primary device brings down the entire network High upkeep: As the star's core system, the hub requires more resources and ongoing maintenance Damage-prone: The cables or wires used in a star topology network increase the risk beneath floors, and other obstructions. Additionally, if the LAN installation work must Page 39 of damage. To get to the desired workstations or peripherals, it must pass through walls, NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA be done on the building's exterior, it may be vulnerable to damages from wildlife or shifting weather conditions Low data transfer rates apply to wireless systems: A wired star topology system performs better than a wireless one if you require your network to handle severe loads. Because a wireless LAN (WLAN) flows more slowly, there is a greater chance of a bottleneck 2.1.3 Tree Topology A unique kind of structure called a tree topology has numerous connected parts arranged like the branches of a tree. For instance, tree topologies are widely used to arrange the data in a database or the machines in a business network Figure 11:Tree Topology 2.1.3.1 Advantages of Tree Topology This topology combines the bus topology and the star topology The nodes are arranged in a hierarchical and central data organization using this architecture This topology offers excellent scalability because the leaf nodes can expand by adding Page 40 one or more nodes to the hierarchical chain If one of a network's nodes is broken or malfunctions, the other nodes are unaffected . Easy fault discovery and maintenance are provided by tree topology Tree topology with cables. More nodes can fit inside leaf nodes Supported by a number of software and hardware providers Wiring for individual segments that is point to point Using a tree topology is quite secure It's employed in WAN Reliability of tree topology NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 2.1.3.2 Disadvantages of Tree Topology Compared to other network topologies, this one is very challenging to configure A segment can only be a certain length, and that length limit is determined by the kind of cabling that is being used The network performance of a tree topology slows down slightly due to the abundance of nodes The computer on the following level will experience issues if the computer on the first level is inaccurate Compared to star and ring topologies, requires a significant amount of cables There is a lot of network traffic since the data needs to travel from the main cable The Backbone looks to be the network segment as a whole's single point of failure . The topology is treated in a somewhat complicated manner 2.1.4 Mesh Topology Each computer and network device in this topology is connected to every other one. This topology comes in two variations: entire mesh and partially connected mesh. In a network with a full mesh topology, every computer is connected to every other computer. The number of computers in a full mesh network can be determined using the formula n(n-1)/2. At least two computers in the network have connections to numerous additional computers in the network Figure 12:Mesh Topology Page 41 in a partially linked mesh architecture NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 2.1.4.1 Advantages of Mesh Topology Mesh Topology is capable of handling heavy traffic: There is no hierarchical relationship in mesh topology. Assume that any connected device tries to directly contact any other connected device by utilizing the devices' routing capabilities. They will be able to do it in that situation A single device's failure has no impact on the network: Regarding resistance to issues, mesh topology is outstanding. Information is received and translated by each network node. The system offers its users enough redundancy so that they can continue using it even if certain errors take place. The network is strong enough to employ the other nodes to complete the mesh even if one of them fails The layout of Mesh Topology enables users to add new widgets to add new devices without interfering with the messages that were already being sent at that moment. Adding new devices does not influence data transfer. A malfunction in one piece of equipment won't stop the information from flowing because every node is connected It's easy to increase network size with mesh topology because each node functions as its own router, making it possible to do so without difficulty. Therefore, in a business setting at the existing rate of operation temporarily adding new technology is simple 2.1.4.2 Disadvantages of Mesh Topology High price: Mesh Topology implementation comes at a greater price than similar projects since it requires a large number of different pieces of equipment. Until you have all the gear, wiring, internet speed, etc., required for the installation, it cannot function properly Taking time to construct and maintain: The initial process is complicated and timeconsuming, but once it is up and running, adding new nodes is easy Significant redundant connection risk: There is a probability of setting redundant connections because Mesh Topology may manage many networks The strain on each node has increased: Each node is required to serve as a router in Page 42 addition to its other duties. The mechanism is therefore exceedingly intricate NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 2.2 Logical Topology The arrangement of network nodes and devices to create a logical or physical structure is known as logical topology. The arrangement of the network nodes to create the network structure can be done using a variety of network topologies. Topology, taken literally, refers to the nodes that make up a network and how they are connected 2.2.1 Ethernet Shares media; a shared media network has a high likelihood of data collision. When a collision occurs in Ethernet, all of its hosts roll back and wait for a random period of time before retransmitting the data. Ethernet employs CSMA/CD technology to detect collisions. up to 10 Mbps in speed 2.2.2 Fast Ethernet Fast Ethernet can be used wirelessly, through optical fiber, and over UTP. up to 100 mbps of speed 2.2.3 Gigabit Ethernet Faster than fast Ethernet, gigabit Ethernet has a maximum speed of 1000 Mbps 2.2.4 Bandwidth A medium's capacity to transfer data is measured by its bandwidth. High bandwidth is associated with high capacity, while low bandwidth is associated with low capacity. The number of bits that may be communicated per second is a common unit used to describe data transmission rates. Theoretically, an Ethernet LAN has a capacity of 10 megabits per second Page 43 and can transport 10 million bits per second (Mbps) NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 3.0 Network Protocols The formatting, transmission, and reception of data between two or more devices are governed by sets of recognized standards called network protocols. It makes it possible for connected devices to communicate with one another despite any variations in their design, procedure, or architecture. Network protocols are essential to modern digital communications because they make it possible for individuals to speak with one other easily across the globe . 3.1 Layer Protocols The majority of network protocol suites are composed of several layers, which are commonly referred to as a protocol stack. Each layer serves a certain function. Both the sending host and the receiving host support each tier Figure 13:Protocol Stack You can use the TCP/IP Model to work out how a particular machine should be connected to the internet and how data should be sent between them On top of the TCP/IP Model, a variety of applications have been standardized to work Transmission Control Protocol/Internet Protocol is known as TCP/IP Page 44 NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 3.2 Types of Protocols 3.2.1 TCP The Internet Protocol and an application program can communicate through to the TCPTransmission Control Protocol . 3.2.2 HTTP The World Wide Web is built on the Hypertext Transfer Protocol, or HTTP. It's used to move files like webpages and other types of resources from the HTTP server or web server to the HTTP client or web client . 3.2.3 SMTP Simple mail transport protocol is known as SMTP. It is known as a basic mail transfer protocol and supports email. You can transmit the data to another email address using this protocol . 3.2.4 FTP File Transfer Protocol is referred to as FTP. It is one of the standard protocols that is used the most frequently to transfer files from one system to another . 3.2.5 Internet Protocol (IP) It is responsible for logical addressing, path determination, and packet delivery from the source host to the destination host 3.2.6 Short Message Service Text messages can be sent and received over cellular networks using the Short Message Service (SMS) communication protocol 3.2.7 SNMP the TCP/IP protocol to manage devices connected to the internet . Page 45 Simple Network Management Protocol is known as SNMP. It is a framework for leveraging NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 3.2.8 Terminal Network (TELNET) It creates the link between the local and distant computers. It creates a connection so that you can mimic your local system at the distant system . 3.3 Network topology that is appropriate for syntax solutions Because star topology has less drawbacks than bus topology and can fulfill the needs of the business, it is utilized for syntax solution network models. The network uses the Fast Ethernet protocol because it satisfies the company's speed requirements . Activity 2 2.0 Network Devices All equipment that enables communication between end user devices is referred to as a network device. Data that has to be exchanged between end user devices is transported through network devices. provides an explanation of network interface cards (NIC), hubs, switches, routers, etc . 2.0.1 Network Interface Card (NIC) Host devices are physically connected to the network medium via NICs, or network interface cards. With the use of this connection, they can send emails, print reports, scan photos, and access databases. A network interface card, or NIC, is a printed circuit board that resides in a bus expansion slot on a computer motherboard. A media access control address, or MACIA, is a special code that is carried by each individual NIC. The network host's data connection is Page 46 managed using this address Figure 14:Network Interface Card (NIC) NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 2.0.2 Switch Switches function as concentrators, giving workstation, server, and peripheral cables a single point of connectivity. By only sending a received network packet to the one or more devices for whom it was designed, switches control the flow of data across a network . Figure 15:switch 2.0.3 Hubs This component links two or more workstations together to form a local area network. A hub quickly retransmits a data frame to all associated links after receiving a transmission from a workstation . Figure 16:Hubs 2.0.4 Repeaters Repeaters are the most basic kind of hardware component in terms of functionality, design, Page 47 and operation. In accordance with the ISO open system interconnection reference model, this device functions at the physical layer. It regenerates signals received on one cable segment and retransmits them onto another cable segment . NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Figure 17:Repeater 2.0.5 Bridges These devices link together two LANs, or two identical LAN segments, using the same protocol. No hosts on segment B will receive information from host to host communication on segment A because the bridge will prevent them; information will only traverse the bridge if it is addressed for a host on the other side . Figure 18:Bridges 2.0.6 Router A router is similar to a bridge in that it translates data between networks. Based on the origin and destination addresses, routers choose the optimum path to route a message. The router is intelligent enough to recognize when to guide traffic along side roads and shortcuts and can direct traffic to avoid head-on crashes . Table 1: Bridge vs router Page 48 Characteristic Routing based upon an Bridge Router Normally no Yes algorithm or protocol NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Protocol transparency Yes Only protocol-independent Route Uses network addresses No Yes Promiscuous mode of Yes No Forwarding decision elementary Can be complex Multiple path transmission Limited High Routing control Limited High Flow control No Yes Frame fragmentation No Yes Packet processing rate High Moderate Cost Less expensive More expensive Operation 2.0.7 Content filter Page 49 Figure 19:Router NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Software that limits or regulates the content that readers have permission to access is known as a content filter 2.0.8 Firewall Between two networks, a firewall system imposes an access control policy. usually found at a network's entrance gateway Figure 20:Firewall 2.0.9 Access point A two-port bridge can be compared to an access point. One port is connected to an antenna, as opposed to each port being tied to a LAN . 2.0.10 Wireless router A wireless router is a piece of technology that functions similarly to a router in that it transmits data through an internet cable to a recipient device and features a wireless access point that allows data to be transferred wirelessly rather than over another cable. The Wi-Fi router transforms telephone line data into radio signals that may be accessed by laptops, tablets, and smartphones that have Wi-Fi capabilities . 2.1 Networking Software A wide range of software is referred to as network software and is used for computer network design, implementation, operation, and monitoring Client software Page 50 2.1.1 NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA A client software program that can be used to connect to another piece of software and exchange data via a network. On the other hand, client software can be run on a computer without a network connection. Web browsers, MS Outlook, and the weather widget on mobile devices are a few examples of client software 2.1.1.1 Client operating system A system used by desktop computers and other portable electronics. As opposed to centralized servers, this approach may accommodate just one user. Microsoft Windows, Apple MacOS, Linux, Android, and Apple's iOS are typical examples 2.1.2 Server Software Software that is created specifically to be utilized, run, and maintained on a computing server is known as server software. It offers and makes possible the exploitation of the underlying server computing capacity for a variety of high-end computing services and tasks 2.1.2.1 Server operating system The term “server operating system” (or server OS) refers to a particular kind of operating system that is installed and utilized on servers. It is an advanced operating system with the features and functionalities necessary for client-server architecture or a comparable enterprise computing environment. Red Hat Enterprise Linux, Windows Server, and Mac OS X Server are a few typical examples of server operating systems 2.2 Server Types 2.2.1 Server A server is a computer created to handle requests from other client computers and distribute data across a local area network or the internet. One or more servers that handle specific tasks are supported by computer networks . 2.2.1.1 Web server A machine that responds to HTTP-based client requests sent over the World Wide Web is a storing, and distributing webpages to users Page 51 web server. A web server's primary responsibility is to show website content by processing, NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 2.2.1.2 File Server A file server is a central location where all data files are kept so that users of workstations may readily access the same spreadsheets, documents, and other data 2.2.1.3 Database Server Database servers offer database services to computers or other computer programs. Oracle and MySQL, as examples 2.2.1.4 Virtualization server The technique of employing software on a physical server to produce numerous virtual partitions or instances, each of which can function independently 2.3 Server selection for Syntax solution Syntax solutions can do on a file server The server has space for all of the departments' data files and can be utilized for file backups A small company network like syntax solutions might cost between $1000 and $3000 OS requirements Table 2: Hardware requrements for syntax solution Minimum Requirement Recommended Requirement CPU 2 Cores 4 Cores Memory 1 GB 4 GB Storage 300MB disk space for file 100gb or more disk space for server file server 2.3.1 Workstation A workstation is a personal computer that is faster and more powerful than a personal computer and is designed for a single user. Since they are PCs, provided they have their own installed software and hard disk storage, they can also be utilized independently of the mainframe. A network interface card is a piece of hardware for computers that makes it possible for them to connect to one another. Networked computers always exchange data packets with Page 52 one another according to a predetermined protocol. Network interface cards serve as translators, enabling machines to communicate and receive data from one another on a LAN. Network cabling is used to connect everything using a network after the server, workstations, NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA and network interface cards have been installed. Twisted pair wiring, coaxial cable, and fiber optics are the three most often used types of network cables Activity 3 3.1 IP address scheme Table 3: IP address scheme No:of Users 10 Vlan ID 10 Network Id 192.168.10.2-11 SubnetMask 255.255.255.240 Sales and Marketing HR 20 20 192.168.10.33-52 255.255.255.224 10 30 192.168.10.65-74 255.255.255.224 Legal 5 40 192.168.10.97-101 255.255.255.248 Finance 25 50 192.168.10.129-153 255.255.255.240 Developer 55 60 192.168.10.161-217 255.255.255.192 Network Team 5 70 192.168.10.225-229 255.255.255.248 Server Room 5 100 10.254.1.2-7 255.255.255.0 Page 53 Department Customer Care NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 3.2 Feedback forum for Syntax Solution Figure 21:Feedback Forum 3.4 Software Used to the implementation Figure 22:Installing of Packet tracer Page 54 Packet tracer is used for the implementation NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Figure 23:Starting Packet tracer Page 55 Figure 24:Registering netcad NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Figure 25:Registering using email Figure 26: Packet tracer interface Activity 4 Page 56 4.1 Implementation of the network NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Figure 27: Syntax solution Implementation 4.2 Test Cases Table 4:Test cases Test Case ID 1 Test Name Test Condition Outcome Ping 100% pass 2 3 4 Extended Ping Trace root Telnet Ping HR PC with Customer care PC Ping 192.168.10.2 Ping -t 10.254.1.5 Tracert 10.254.1.5 telnet 192.168.10.97 5 SSH Tracert complete Connection refused by remote host Not connected SSH 192.168.10.97 100% pass Page 57 Test case 1 NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Figure 28:test case-ping Page 58 Test case 2 NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Figure 29:test case- ping -t Page 59 Test case 3 Figure 30: test case - tracert Test case 4 NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Figure 31:test case- telnet References AWS, 2022. What is computer networking?. AWS, 10(https://aws.amazon.com/what-is/computernetworking/). Flare, C., 2020. Local Area Network. [Online] Available at: https://www.cloudflare.com/learning/network-layer/what-is-a-lan/ [Accessed 15 08 2022]. Flare, C., 2020. Metropolitain Area Network. [Online] Available at: https://www.cloudflare.com/learning/network-layer/what-is-a-man/ [Accessed 15 08 2022]. Page 60 Flare, C., 2020. What is Personal Area Network?. [Online] Available at: https://www.cloudflare.com/learning/network-layer/what-is-a-personal-area-network/ [Accessed 15 08 2022]. Flare, C., 2020. Wide area network. [Online] Available at: https://www.cloudflare.com/learning/network-layer/what-is-a-wan/ [Accessed 15 08 2022]. NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Flare, C., 2020. Wireless Local area network. [Online] Available at: https://www.cloudflare.com/learning/network-layer/what-is-a-wlan/ [Accessed 15 08 2022]. Naomi J. Alpern, R. J. S., 2010. Network Fundamentals. Eleventh Hour Network+, 10(11), p. 150. TechDifferences, 2022. TechDifferences. [Online] Available at: https://techdifferences.com/difference-between-point-to-point-and-multipointconnection.html [Accessed 15 08 2022]. Techopedia, 2020 Aug 25. Client server Architecture. [Online] Available at: https://www.techopedia.com/definition/438/clientserver-architecture [Accessed 15 08 2022]. Techopedia, 2020. Cloud network. [Online] Available at: https://www.techopedia.com/definition/30218/cloud-network [Accessed 15 08 2022]. Page 61 WebRoot, 2020. Peer topeer connection. [Online] Available at: https://www.webroot.com/us/en/resources/glossary/what-is-peer-to-peer-networking [Accessed 15 08 2022]. NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA Feedback Form 1. Specify your user type o Administrator o User o Other 2. Is it helpful for you? o Yes o No 3. It its secure for you? o Yes o No 4. Rate the connection between various devices within the network o Excellent o Above Average o Average o Poor Page 62 o Below Average NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA 5. What you think about this network? Page 63 6. Any suggestions for improve the network NETWORKING – ASSIGNMENT 01 SANDUNI MALSHA